[ 44.950674][ T25] audit: type=1800 audit(1575416223.497:25): pid=7998 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 44.969662][ T25] audit: type=1800 audit(1575416223.497:26): pid=7998 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 45.032065][ T25] audit: type=1800 audit(1575416223.507:27): pid=7998 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 45.070567][ T25] audit: type=1800 audit(1575416223.507:28): pid=7998 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.207' (ECDSA) to the list of known hosts. 2019/12/03 23:37:14 fuzzer started 2019/12/03 23:37:15 dialing manager at 10.128.0.26:42111 2019/12/03 23:37:15 syscalls: 2689 2019/12/03 23:37:15 code coverage: enabled 2019/12/03 23:37:15 comparison tracing: enabled 2019/12/03 23:37:15 extra coverage: extra coverage is not supported by the kernel 2019/12/03 23:37:15 setuid sandbox: enabled 2019/12/03 23:37:15 namespace sandbox: enabled 2019/12/03 23:37:15 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/03 23:37:15 fault injection: enabled 2019/12/03 23:37:15 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/03 23:37:15 net packet injection: enabled 2019/12/03 23:37:15 net device setup: enabled 2019/12/03 23:37:15 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/03 23:37:15 devlink PCI setup: PCI device 0000:00:10.0 is not available 23:37:16 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000440)=0x4) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000180)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x9, 0x0, 0x0, [], 0x6}, {}, {}, {}, {0x5, 0x0, 0x3}, {0x3f, 0x4}, {0xff}, {}, {0xfc}, {0x0, 0xfd}, {}, {0x0, 0x0, 0xfe}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x5}]}}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000280)=""/36, 0x24}], 0x1, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) add_key$keyring(&(0x7f0000000480)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:37:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xf9399621131868d1}, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffd}) r3 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000100)) syzkaller login: [ 58.156596][ T8161] IPVS: ftp: loaded support on port[0] = 21 23:37:16 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 58.324171][ T8161] chnl_net:caif_netlink_parms(): no params data found [ 58.326183][ T8164] IPVS: ftp: loaded support on port[0] = 21 [ 58.428785][ T8161] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.436523][ T8161] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.449397][ T8161] device bridge_slave_0 entered promiscuous mode [ 58.494821][ T8166] IPVS: ftp: loaded support on port[0] = 21 [ 58.494889][ T8161] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.517293][ T8161] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.525739][ T8161] device bridge_slave_1 entered promiscuous mode [ 58.575469][ T8161] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.634368][ T8161] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.665216][ T8164] chnl_net:caif_netlink_parms(): no params data found [ 58.685237][ T8161] team0: Port device team_slave_0 added [ 58.709134][ T8161] team0: Port device team_slave_1 added 23:37:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000009dc0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000040)="b3", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003b80)=[@pktinfo={{0x24, 0x29, 0x32, {@local}}}], 0x28}}], 0x2, 0x0) [ 58.730333][ T8164] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.738155][ T8164] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.746060][ T8164] device bridge_slave_0 entered promiscuous mode [ 58.819786][ T8161] device hsr_slave_0 entered promiscuous mode 23:37:17 executing program 4: syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') getdents64(r1, &(0x7f00000004c0)=""/4087, 0xff7) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0xfffffffffffffffc) [ 58.917585][ T8161] device hsr_slave_1 entered promiscuous mode [ 59.017578][ T8164] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.024668][ T8164] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.048040][ T8164] device bridge_slave_1 entered promiscuous mode [ 59.113128][ T8169] IPVS: ftp: loaded support on port[0] = 21 [ 59.146869][ T8164] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 23:37:17 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) open(0x0, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x6) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) [ 59.171259][ T8171] IPVS: ftp: loaded support on port[0] = 21 [ 59.196378][ T8166] chnl_net:caif_netlink_parms(): no params data found [ 59.211909][ T8164] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.249443][ T8161] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 59.300388][ T8161] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 59.379898][ T8164] team0: Port device team_slave_0 added [ 59.388901][ T8164] team0: Port device team_slave_1 added [ 59.399754][ T8161] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 59.440545][ T8161] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 59.534696][ T8174] IPVS: ftp: loaded support on port[0] = 21 [ 59.599089][ T8164] device hsr_slave_0 entered promiscuous mode [ 59.648216][ T8164] device hsr_slave_1 entered promiscuous mode [ 59.687488][ T8164] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.713311][ T8166] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.720623][ T8166] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.729442][ T8166] device bridge_slave_0 entered promiscuous mode [ 59.739100][ T8166] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.746198][ T8166] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.754229][ T8166] device bridge_slave_1 entered promiscuous mode [ 59.814951][ T8164] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 59.891141][ T8164] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 59.970923][ T8166] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.983009][ T8166] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.015690][ T8164] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 60.070566][ T8164] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 60.160288][ T8166] team0: Port device team_slave_0 added [ 60.220022][ T8166] team0: Port device team_slave_1 added [ 60.282413][ T8171] chnl_net:caif_netlink_parms(): no params data found [ 60.330362][ T8166] device hsr_slave_0 entered promiscuous mode [ 60.368192][ T8166] device hsr_slave_1 entered promiscuous mode [ 60.417352][ T8166] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.429123][ T8161] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.479257][ T8174] chnl_net:caif_netlink_parms(): no params data found [ 60.541581][ T8169] chnl_net:caif_netlink_parms(): no params data found [ 60.559027][ T8171] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.566114][ T8171] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.576327][ T8171] device bridge_slave_0 entered promiscuous mode [ 60.585359][ T8171] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.593088][ T8171] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.601042][ T8171] device bridge_slave_1 entered promiscuous mode [ 60.638961][ T8166] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 60.692691][ T8161] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.720219][ T8174] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.728303][ T8174] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.736409][ T8174] device bridge_slave_0 entered promiscuous mode [ 60.744876][ T8166] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 60.800288][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.809133][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.841558][ T8171] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.853642][ T8171] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.869608][ T8174] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.878330][ T8174] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.886207][ T8174] device bridge_slave_1 entered promiscuous mode [ 60.893629][ T8166] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 60.960480][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.970418][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.979249][ T2961] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.986458][ T2961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.994511][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.003685][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.012502][ T2961] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.019605][ T2961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.027467][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.036347][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.045057][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.053586][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.062898][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.072327][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.082962][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.091908][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.101160][ T8169] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.110324][ T8169] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.120313][ T8169] device bridge_slave_0 entered promiscuous mode [ 61.129747][ T8169] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.139894][ T8169] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.150491][ T8169] device bridge_slave_1 entered promiscuous mode [ 61.170211][ T8169] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.190977][ T8171] team0: Port device team_slave_0 added [ 61.199733][ T8166] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 61.279967][ T8169] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.303005][ T8169] team0: Port device team_slave_0 added [ 61.312785][ T8171] team0: Port device team_slave_1 added [ 61.331710][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.340325][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.352025][ T8169] team0: Port device team_slave_1 added [ 61.363250][ T8174] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.375638][ T8174] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.410952][ T8171] device hsr_slave_0 entered promiscuous mode [ 61.467580][ T8171] device hsr_slave_1 entered promiscuous mode [ 61.507378][ T8171] debugfs: Directory 'hsr0' with parent '/' already present! [ 61.539930][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.549054][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.565442][ T8161] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.630222][ T8169] device hsr_slave_0 entered promiscuous mode [ 61.668432][ T8169] device hsr_slave_1 entered promiscuous mode [ 61.707394][ T8169] debugfs: Directory 'hsr0' with parent '/' already present! [ 61.724547][ T8164] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.741350][ T8174] team0: Port device team_slave_0 added [ 61.760766][ T8174] team0: Port device team_slave_1 added [ 61.788886][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.796561][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.804955][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 61.812717][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 61.831333][ T8164] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.850726][ T8161] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.899432][ T8174] device hsr_slave_0 entered promiscuous mode [ 61.927869][ T8174] device hsr_slave_1 entered promiscuous mode [ 61.977333][ T8174] debugfs: Directory 'hsr0' with parent '/' already present! [ 61.987772][ T8171] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 62.052592][ T3061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.066492][ T3061] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.076499][ T3061] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.083797][ T3061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.098555][ T8169] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 62.139573][ T8169] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 62.169823][ T8169] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 62.209622][ T8171] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 62.249707][ T8171] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 62.290496][ T8171] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 62.340808][ T8175] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.349589][ T8175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.358889][ T8175] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.367789][ T8175] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.375425][ T8175] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.383751][ T8175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.408466][ T8169] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 62.478712][ T8184] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 62.506514][ T8175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.537112][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 167.543875][ C0] rcu: 0-....: (10499 ticks this GP) idle=332/1/0x4000000000000002 softirq=10696/10696 fqs=5250 [ 167.554595][ C0] (t=10501 jiffies g=6421 q=316) [ 167.559644][ C0] NMI backtrace for cpu 0 [ 167.564050][ C0] CPU: 0 PID: 8175 Comm: kworker/0:3 Not tainted 5.4.0-syzkaller #0 [ 167.572026][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.582589][ C0] Workqueue: events linkwatch_event [ 167.588559][ C0] Call Trace: [ 167.591827][ C0] [ 167.594663][ C0] dump_stack+0x1fb/0x318 [ 167.598989][ C0] nmi_cpu_backtrace+0xaf/0x1a0 [ 167.603825][ C0] ? nmi_trigger_cpumask_backtrace+0x16d/0x290 [ 167.609959][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 167.616075][ C0] nmi_trigger_cpumask_backtrace+0x174/0x290 [ 167.622031][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 167.628245][ C0] rcu_dump_cpu_stacks+0x15a/0x220 [ 167.633334][ C0] rcu_sched_clock_irq+0xe25/0x1ad0 [ 167.639375][ C0] ? trace_hardirqs_off+0x74/0x80 [ 167.644551][ C0] update_process_times+0x12d/0x180 [ 167.650727][ C0] tick_sched_timer+0x263/0x420 [ 167.656263][ C0] ? tick_setup_sched_timer+0x3d0/0x3d0 [ 167.662144][ C0] __hrtimer_run_queues+0x403/0x840 [ 167.668113][ C0] hrtimer_interrupt+0x38c/0xda0 [ 167.673557][ C0] ? debug_smp_processor_id+0x9/0x20 [ 167.679166][ C0] smp_apic_timer_interrupt+0x109/0x280 [ 167.686376][ C0] apic_timer_interrupt+0xf/0x20 [ 167.692340][ C0] [ 167.695256][ C0] RIP: 0010:free_thread_stack+0x151/0x590 [ 167.700965][ C0] Code: 31 f6 e8 42 af 6e 00 43 80 3c 2e 00 74 08 4c 89 e7 e8 43 a4 69 00 49 8b 1c 24 48 83 c3 08 48 89 d8 48 c1 e8 03 42 80 3c 28 00 <74> 08 48 89 df e8 25 a4 69 00 48 8b 3b be fc ff ff ff e8 28 04 00 [ 167.720775][ C0] RSP: 0018:ffffc90001f07700 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 167.729419][ C0] RAX: 1ffff11012506071 RBX: ffff888092830388 RCX: 0000000000000000 [ 167.737592][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea00029eb540 [ 167.745559][ C0] RBP: ffffc90001f07738 R08: 000000000003a768 R09: fffffbfff120248a [ 167.753502][ C0] R10: fffffbfff120248a R11: 0000000000000000 R12: ffff888092830420 [ 167.761594][ C0] R13: dffffc0000000000 R14: 1ffff11012506084 R15: ffff8880a8b69828 [ 167.769768][ C0] put_task_stack+0xa3/0x130 [ 167.774391][ C0] finish_task_switch+0x3f1/0x550 [ 167.779392][ C0] __schedule+0x9a8/0xcc0 [ 167.783706][ C0] ? ___preempt_schedule+0x16/0x18 [ 167.788927][ C0] preempt_schedule+0xdb/0x120 [ 167.793687][ C0] ___preempt_schedule+0x16/0x18 [ 167.798740][ C0] ? vprintk_emit+0x2fe/0x3a0 [ 167.803620][ C0] ? vprintk_emit+0x368/0x3a0 [ 167.808287][ C0] vprintk_emit+0x36d/0x3a0 [ 167.812878][ C0] vprintk_default+0x28/0x30 [ 167.817654][ C0] vprintk_func+0x158/0x170 [ 167.822697][ C0] printk+0x62/0x8d [ 167.827628][ C0] ? addrconf_notify+0xd37/0x3c90 [ 167.832644][ C0] ? addrconf_notify+0x779/0x3c90 [ 167.837675][ C0] addrconf_notify+0x2c8d/0x3c90 [ 167.842810][ C0] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 167.848079][ C0] ? __local_bh_enable_ip+0x13a/0x240 [ 167.854218][ C0] ? clusterip_netdev_event+0x48b/0x4a0 [ 167.860360][ C0] ? trace_hardirqs_on+0x74/0x80 [ 167.867060][ C0] ? __local_bh_enable_ip+0x13a/0x240 [ 167.872844][ C0] ? clusterip_netdev_event+0x48b/0x4a0 [ 167.879109][ C0] ? tls_dev_event+0x619/0xc00 [ 167.884100][ C0] ? clusterip_netdev_event+0x48b/0x4a0 [ 167.889655][ C0] ? ip6mr_device_event+0x1ee/0x210 [ 167.895401][ C0] raw_notifier_call_chain+0xec/0x190 [ 167.900961][ C0] netdev_state_change+0x147/0x1f0 [ 167.906075][ C0] linkwatch_do_dev+0x10e/0x160 [ 167.911049][ C0] __linkwatch_run_queue+0x446/0x730 [ 167.916527][ C0] linkwatch_event+0x4c/0x60 [ 167.921100][ C0] process_one_work+0x7ef/0x10d0 [ 167.926069][ C0] worker_thread+0xc01/0x1630 [ 167.931115][ C0] kthread+0x332/0x350 [ 167.935341][ C0] ? rcu_lock_release+0x30/0x30 [ 167.941155][ C0] ? kthread_blkcg+0xe0/0xe0 [ 167.945729][ C0] ret_from_fork+0x24/0x30