[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 55.170376][ T26] audit: type=1800 audit(1566886363.771:25): pid=8335 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 55.214982][ T26] audit: type=1800 audit(1566886363.771:26): pid=8335 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 55.258131][ T26] audit: type=1800 audit(1566886363.771:27): pid=8335 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.246' (ECDSA) to the list of known hosts. 2019/08/27 06:12:51 fuzzer started 2019/08/27 06:12:54 dialing manager at 10.128.0.26:45029 2019/08/27 06:12:55 syscalls: 2487 2019/08/27 06:12:55 code coverage: enabled 2019/08/27 06:12:55 comparison tracing: enabled 2019/08/27 06:12:55 extra coverage: extra coverage is not supported by the kernel 2019/08/27 06:12:55 setuid sandbox: enabled 2019/08/27 06:12:55 namespace sandbox: enabled 2019/08/27 06:12:55 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/27 06:12:55 fault injection: enabled 2019/08/27 06:12:55 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/27 06:12:55 net packet injection: enabled 2019/08/27 06:12:55 net device setup: enabled 06:15:35 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$HCIINQUIRY(r0, 0x800448f0, 0x0) 06:15:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) clone(0x100100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syzkaller login: [ 227.014907][ T8502] IPVS: ftp: loaded support on port[0] = 21 [ 227.138174][ T8502] chnl_net:caif_netlink_parms(): no params data found [ 227.153116][ T8505] IPVS: ftp: loaded support on port[0] = 21 [ 227.188192][ T8502] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.195710][ T8502] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.203881][ T8502] device bridge_slave_0 entered promiscuous mode [ 227.216867][ T8502] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.223910][ T8502] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.235956][ T8502] device bridge_slave_1 entered promiscuous mode 06:15:35 executing program 2: r0 = socket$unix(0x1, 0x400000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000040)=0xffffffff, 0x4) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) accept4$unix(r1, 0x0, 0x0, 0x0) [ 227.274152][ T8502] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 227.298892][ T8502] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 227.336752][ T8502] team0: Port device team_slave_0 added [ 227.367375][ T8502] team0: Port device team_slave_1 added [ 227.479780][ T8502] device hsr_slave_0 entered promiscuous mode 06:15:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='fuseblk\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}]}}) [ 227.555185][ T8502] device hsr_slave_1 entered promiscuous mode [ 227.652995][ T8502] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.660234][ T8502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.667949][ T8502] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.675029][ T8502] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.693967][ T8507] IPVS: ftp: loaded support on port[0] = 21 06:15:36 executing program 4: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000000)=ANY=[@ANYBLOB="09000000010000000b"], 0x0) [ 227.763481][ T8509] IPVS: ftp: loaded support on port[0] = 21 [ 227.791640][ T8505] chnl_net:caif_netlink_parms(): no params data found [ 227.918817][ T8502] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.990841][ T8513] IPVS: ftp: loaded support on port[0] = 21 [ 228.055177][ T8502] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.063253][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.077510][ T3009] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.097722][ T3009] bridge0: port 2(bridge_slave_1) entered disabled state 06:15:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000080)="3100000013000900690006342fc56aef40be44081900000046000107000000540d0003c0256465a3000000002075702e1a", 0x31}], 0x1) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 228.106532][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 228.122593][ T8505] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.130892][ T8505] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.143095][ T8505] device bridge_slave_0 entered promiscuous mode [ 228.193972][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.204472][ T3009] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.211577][ T3009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.225281][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.233810][ T3009] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.240887][ T3009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.249741][ T8505] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.257118][ T8505] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.266203][ T8505] device bridge_slave_1 entered promiscuous mode [ 228.291645][ T8519] IPVS: ftp: loaded support on port[0] = 21 [ 228.294299][ T8502] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 228.312796][ T8502] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 228.329254][ T8509] chnl_net:caif_netlink_parms(): no params data found [ 228.338381][ T8507] chnl_net:caif_netlink_parms(): no params data found [ 228.358028][ T8510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.366936][ T8510] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.375296][ T8510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.383612][ T8510] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.392020][ T8510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.400170][ T8510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.408746][ T8510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.416982][ T8510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.425437][ T8510] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.433316][ T8510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.471972][ T8505] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 228.484587][ T8505] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 228.538157][ T8502] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 228.553951][ T8507] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.562995][ T8507] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.571997][ T8507] device bridge_slave_0 entered promiscuous mode [ 228.580174][ T8507] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.587415][ T8507] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.595064][ T8507] device bridge_slave_1 entered promiscuous mode [ 228.602750][ T8505] team0: Port device team_slave_0 added [ 228.610168][ T8505] team0: Port device team_slave_1 added [ 228.624659][ T8509] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.631908][ T8509] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.640072][ T8509] device bridge_slave_0 entered promiscuous mode [ 228.673136][ T8509] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.680843][ T8509] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.689083][ T8509] device bridge_slave_1 entered promiscuous mode [ 228.708561][ T8507] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 228.722003][ T8507] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 228.741047][ T8509] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 228.847724][ T8505] device hsr_slave_0 entered promiscuous mode [ 228.895339][ T8505] device hsr_slave_1 entered promiscuous mode [ 228.955085][ T8505] debugfs: Directory 'hsr0' with parent '/' already present! [ 228.963984][ T8509] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 228.994197][ T8509] team0: Port device team_slave_0 added [ 229.020598][ T8509] team0: Port device team_slave_1 added [ 229.096762][ T8509] device hsr_slave_0 entered promiscuous mode [ 229.135278][ T8509] device hsr_slave_1 entered promiscuous mode 06:15:37 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$HCIINQUIRY(r0, 0x800448f0, 0x0) [ 229.175032][ T8509] debugfs: Directory 'hsr0' with parent '/' already present! [ 229.182756][ T8513] chnl_net:caif_netlink_parms(): no params data found [ 229.192458][ T8507] team0: Port device team_slave_0 added [ 229.200945][ T8507] team0: Port device team_slave_1 added [ 229.280223][ T8509] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.287381][ T8509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.294721][ T8509] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.301835][ T8509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.318102][ T8510] bridge0: port 1(bridge_slave_0) entered disabled state 06:15:37 executing program 0: [ 229.337109][ T8510] bridge0: port 2(bridge_slave_1) entered disabled state 06:15:38 executing program 0: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="d16f09b0f0176ad6ecef252da057449aa899980b0cc059fb5b28bee5fe1036aa6e8ca1f5833c78d6b8f67d7b6a02b260614b1b98eb205dfe3e565ed4458e21c8a6b4d4c690d3c0fbbedf2061e1511b036f373365795ced6ef8743bfc7b1ee3f5734ed9238cd85239e4f50aed18f02dc4aa48e9fa6ab3cf") setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000180)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xaaaaaaaaaaaacb3, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x10b, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) [ 229.407720][ T8507] device hsr_slave_0 entered promiscuous mode [ 229.445297][ T8507] device hsr_slave_1 entered promiscuous mode [ 229.475098][ T8507] debugfs: Directory 'hsr0' with parent '/' already present! [ 229.503101][ T8513] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.513670][ T8513] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.529740][ T8513] device bridge_slave_0 entered promiscuous mode [ 229.552501][ T8540] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 229.570987][ T8540] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 229.571006][ T8540] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 229.591062][ T8540] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 229.613455][ T8540] [EXT4 FS bs=2048, gc=1, bpg=2816, ipg=128, mo=e000e018, mo2=0000] [ 229.632212][ T8540] System zones: 0-7 [ 229.640789][ T8540] EXT4-fs (loop0): mounting with "discard" option, but the device does not support discard [ 229.651579][ T8540] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 229.691248][ T8513] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.703276][ T8513] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.729364][ T8513] device bridge_slave_1 entered promiscuous mode 06:15:38 executing program 0: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="d16f09b0f0176ad6ecef252da057449aa899980b0cc059fb5b28bee5fe1036aa6e8ca1f5833c78d6b8f67d7b6a02b260614b1b98eb205dfe3e565ed4458e21c8a6b4d4c690d3c0fbbedf2061e1511b036f373365795ced6ef8743bfc7b1ee3f5734ed9238cd85239e4f50aed18f02dc4aa48e9fa6ab3cf") setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000180)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xaaaaaaaaaaaacb3, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x10b, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) [ 229.742653][ T8502] [ 229.745191][ T8502] ============================= [ 229.750028][ T8502] WARNING: suspicious RCU usage [ 229.762713][ T8502] 5.3.0-rc6-next-20190826 #73 Not tainted [ 229.769148][ T8502] ----------------------------- [ 229.774000][ T8502] fs/ext4/block_validity.c:333 suspicious rcu_dereference_check() usage! [ 229.782809][ T8502] [ 229.782809][ T8502] other info that might help us debug this: [ 229.782809][ T8502] [ 229.793607][ T8502] [ 229.793607][ T8502] rcu_scheduler_active = 2, debug_locks = 1 [ 229.802347][ T8502] 1 lock held by syz-executor.0/8502: [ 229.808349][ T8502] #0: ffff88805f4b4598 (&type->s_umount_key#48){+.+.}, at: deactivate_super+0x1aa/0x1d0 [ 229.818785][ T8502] [ 229.818785][ T8502] stack backtrace: [ 229.824716][ T8502] CPU: 0 PID: 8502 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190826 #73 [ 229.833716][ T8502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.843762][ T8502] Call Trace: [ 229.847051][ T8502] dump_stack+0x172/0x1f0 [ 229.851375][ T8502] lockdep_rcu_suspicious+0x153/0x15d [ 229.856825][ T8502] ext4_release_system_zone+0x166/0x1a0 [ 229.856843][ T8502] ext4_put_super+0x954/0xd70 [ 229.856861][ T8502] ? ext4_quota_write+0x5a0/0x5a0 [ 229.867130][ T8502] generic_shutdown_super+0x14c/0x370 [ 229.867148][ T8502] kill_block_super+0xa0/0x100 [ 229.867164][ T8502] deactivate_locked_super+0x95/0x100 [ 229.867181][ T8502] deactivate_super+0x1b2/0x1d0 [ 229.867197][ T8502] ? mount_bdev+0x3c0/0x3c0 [ 229.867209][ T8502] ? dput+0x38/0xe10 [ 229.867223][ T8502] ? dput+0x1f2/0xe10 [ 229.867235][ T8502] ? mnt_get_writers.isra.0+0xf9/0x150 [ 229.867258][ T8502] cleanup_mnt+0x351/0x4c0 [ 229.877608][ T8502] ? trace_hardirqs_on+0x67/0x240 [ 229.887681][ T8502] ? __kasan_check_read+0x11/0x20 [ 229.887699][ T8502] __cleanup_mnt+0x16/0x20 [ 229.887713][ T8502] task_work_run+0x145/0x1c0 [ 229.887736][ T8502] exit_to_usermode_loop+0x316/0x380 [ 229.887776][ T8502] do_syscall_64+0x65f/0x760 [ 229.887809][ T8502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.887823][ T8502] RIP: 0033:0x45c2a7 [ 229.897135][ T8502] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 229.897143][ T8502] RSP: 002b:00007ffce6477228 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 229.897157][ T8502] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000045c2a7 [ 229.897165][ T8502] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffce64772d0 [ 229.897174][ T8502] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000009 [ 229.897182][ T8502] R10: 0000000000000005 R11: 0000000000000206 R12: 00007ffce6478360 [ 229.897189][ T8502] R13: 0000555555735940 R14: 0000000000000000 R15: 00007ffce6478360 [ 230.023599][ T8502] ------------[ cut here ]------------ [ 230.029070][ T8502] ODEBUG: free active (active state 0) object type: percpu_counter hint: 0x0 [ 230.029384][ T8502] WARNING: CPU: 0 PID: 8502 at lib/debugobjects.c:481 debug_print_object+0x168/0x250 [ 230.038708][ T8513] kobject: 'veth1_to_bond' (00000000a9775a7d): kobject_add_internal: parent: 'net', set: 'devices' [ 230.047324][ T8502] Kernel panic - not syncing: panic_on_warn set ... [ 230.047338][ T8502] CPU: 0 PID: 8502 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190826 #73 [ 230.047345][ T8502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.047350][ T8502] Call Trace: [ 230.047368][ T8502] dump_stack+0x172/0x1f0 [ 230.047385][ T8502] ? debug_print_object+0x90/0x250 [ 230.047398][ T8502] panic+0x2dc/0x755 [ 230.047410][ T8502] ? add_taint.cold+0x16/0x16 [ 230.047435][ T8502] ? __kasan_check_write+0x14/0x20 [ 230.058902][ T8513] kobject: 'veth1_to_bond' (00000000a9775a7d): kobject_uevent_env [ 230.064635][ T8502] ? __warn.cold+0x14/0x3c [ 230.073685][ T8513] kobject: 'veth1_to_bond' (00000000a9775a7d): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bond' [ 230.083658][ T8502] ? __warn+0xd9/0x1d0 [ 230.083693][ T8502] ? debug_print_object+0x168/0x250 [ 230.083707][ T8502] __warn.cold+0x2f/0x3c [ 230.087079][ T8513] kobject: 'queues' (000000003d8194d3): kobject_add_internal: parent: 'veth1_to_bond', set: '' [ 230.091264][ T8502] ? debug_print_object+0x168/0x250 [ 230.096384][ T8513] kobject: 'queues' (000000003d8194d3): kobject_uevent_env [ 230.100221][ T8502] report_bug+0x289/0x300 [ 230.105087][ T8513] kobject: 'queues' (000000003d8194d3): kobject_uevent_env: filter function caused the event to drop! [ 230.109956][ T8502] do_error_trap+0x11b/0x200 [ 230.117773][ T8513] kobject: 'rx-0' (0000000072a1af62): kobject_add_internal: parent: 'queues', set: 'queues' [ 230.122117][ T8502] do_invalid_op+0x37/0x50 [ 230.133621][ T8513] kobject: 'rx-0' (0000000072a1af62): kobject_uevent_env [ 230.137515][ T8502] ? debug_print_object+0x168/0x250 [ 230.137532][ T8502] invalid_op+0x23/0x30 [ 230.137550][ T8502] RIP: 0010:debug_print_object+0x168/0x250 [ 230.142743][ T8513] kobject: 'rx-0' (0000000072a1af62): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bond/queues/rx-0' [ 230.146926][ T8502] Code: dd 60 6c e6 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 60 6c e6 87 48 c7 c7 c0 61 e6 87 e8 20 31 01 fe <0f> 0b 83 05 f3 67 83 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 230.146935][ T8502] RSP: 0018:ffff88808a637b80 EFLAGS: 00010086 [ 230.146945][ T8502] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 230.146953][ T8502] RDX: 0000000000000000 RSI: ffffffff815bd606 RDI: ffffed10114c6f62 [ 230.146960][ T8502] RBP: ffff88808a637bc0 R08: ffff88808fd92140 R09: ffffed1015d04109 [ 230.146969][ T8502] R10: ffffed1015d04108 R11: ffff8880ae820847 R12: 0000000000000001 [ 230.146977][ T8502] R13: ffffffff8935e800 R14: 0000000000000000 R15: ffff888084d4cc08 [ 230.147001][ T8502] ? vprintk_func+0x86/0x189 [ 230.147026][ T8502] debug_check_no_obj_freed+0x2d4/0x43f [ 230.147041][ T8502] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 230.147060][ T8502] kfree+0xf8/0x2c0 [ 230.147075][ T8502] ext4_put_super+0x8e0/0xd70 [ 230.147091][ T8502] ? ext4_quota_write+0x5a0/0x5a0 [ 230.147105][ T8502] generic_shutdown_super+0x14c/0x370 [ 230.147120][ T8502] kill_block_super+0xa0/0x100 [ 230.147136][ T8502] deactivate_locked_super+0x95/0x100 [ 230.147150][ T8502] deactivate_super+0x1b2/0x1d0 [ 230.147164][ T8502] ? mount_bdev+0x3c0/0x3c0 [ 230.147175][ T8502] ? dput+0x38/0xe10 [ 230.147187][ T8502] ? dput+0x1f2/0xe10 [ 230.147203][ T8502] ? mnt_get_writers.isra.0+0xf9/0x150 [ 230.159054][ T8513] kobject: 'tx-0' (00000000613a478d): kobject_add_internal: parent: 'queues', set: 'queues' [ 230.163198][ T8502] cleanup_mnt+0x351/0x4c0 [ 230.170579][ T8513] kobject: 'tx-0' (00000000613a478d): kobject_uevent_env [ 230.174674][ T8502] ? trace_hardirqs_on+0x67/0x240 [ 230.185636][ T8513] kobject: 'tx-0' (00000000613a478d): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bond/queues/tx-0' [ 230.190139][ T8502] ? __kasan_check_read+0x11/0x20 [ 230.201073][ T8513] kobject: 'batman_adv' (000000002dd4a6a5): kobject_add_internal: parent: 'veth1_to_bond', set: '' [ 230.204564][ T8502] __cleanup_mnt+0x16/0x20 [ 230.212458][ T8513] kobject: 'bond_slave_1' (000000001e972bd8): kobject_add_internal: parent: 'net', set: 'devices' [ 230.216726][ T8502] task_work_run+0x145/0x1c0 [ 230.216749][ T8502] exit_to_usermode_loop+0x316/0x380 [ 230.216766][ T8502] do_syscall_64+0x65f/0x760 [ 230.221649][ T8513] kobject: 'bond_slave_1' (000000001e972bd8): kobject_uevent_env [ 230.226679][ T8502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.226691][ T8502] RIP: 0033:0x45c2a7 [ 230.226705][ T8502] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.226711][ T8502] RSP: 002b:00007ffce6477228 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 230.226721][ T8502] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000045c2a7 [ 230.226728][ T8502] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffce64772d0 [ 230.226736][ T8502] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000009 [ 230.226743][ T8502] R10: 0000000000000005 R11: 0000000000000206 R12: 00007ffce6478360 [ 230.226755][ T8502] R13: 0000555555735940 R14: 0000000000000000 R15: 00007ffce6478360 [ 230.239584][ T8513] kobject: 'bond_slave_1' (000000001e972bd8): fill_kobj_path: path = '/devices/virtual/net/bond_slave_1' [ 230.265378][ T8502] Kernel Offset: disabled [ 230.555939][ T8502] Rebooting in 86400 seconds..