[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 46.380351][ T24] audit: type=1800 audit(1575348415.315:25): pid=8080 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 46.401819][ T24] audit: type=1800 audit(1575348415.315:26): pid=8080 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 46.421337][ T24] audit: type=1800 audit(1575348415.315:27): pid=8080 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.21' (ECDSA) to the list of known hosts. 2019/12/03 04:47:04 fuzzer started 2019/12/03 04:47:05 dialing manager at 10.128.0.26:38907 2019/12/03 04:47:05 syscalls: 2697 2019/12/03 04:47:05 code coverage: enabled 2019/12/03 04:47:05 comparison tracing: enabled 2019/12/03 04:47:05 extra coverage: extra coverage is not supported by the kernel 2019/12/03 04:47:05 setuid sandbox: enabled 2019/12/03 04:47:05 namespace sandbox: enabled 2019/12/03 04:47:05 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/03 04:47:05 fault injection: enabled 2019/12/03 04:47:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/03 04:47:05 net packet injection: enabled 2019/12/03 04:47:05 net device setup: enabled 2019/12/03 04:47:05 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/03 04:47:05 devlink PCI setup: PCI device 0000:00:10.0 is not available 04:47:06 executing program 0: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getegid() r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x4, &(0x7f0000000540)=[{&(0x7f0000000180)}, {0x0, 0x0, 0x4}, {&(0x7f0000000380)="e8a7174cee5b7e264a87bbb3a4911e773b795810f1324089c030b97523293e91da955d52c62d323bdaacd91b362c6f57cb3bc8c19a136e087087d32544eac39d26209fb5e8090955f12685cb4ea8449d34b7941bc0045a3855b4059e7e3c533fe6a81846c0dc8d1b901fcc2694041425d832dc0f1f7a37c66592a3d850fab7f2f748231b75d059631529d55ff4626ff1cc7277b859bb9f5f19dc1dca75d2d930aa1fdbdc39755561bf472a315f1624cdc07f23e44a09d6ed063e98cec1314778f7476c0ec05a9acc5fd2c648e430b0765061077b1b98681a322b61", 0xdb, 0x5}, {0x0, 0x0, 0x5}], 0x8000, &(0x7f00000005c0)=ANY=[@ANYBLOB='case_sensitive=no,mft_zone_multiplier=0x0000000000000004,errors=continue,umask=00000000000000000100000,case_sensitive=no,gid=', @ANYRESHEX=r0, @ANYBLOB=',gid=', @ANYRESHEX=r2, @ANYBLOB=',disable_sparse=no,fmask=00000000000000000000401,dmask=000000000']) 04:47:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2800) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) syzkaller login: [ 58.105489][ T8245] IPVS: ftp: loaded support on port[0] = 21 04:47:07 executing program 2: r0 = socket(0x15, 0x80005, 0x0) r1 = socket(0x15, 0x80005, 0x0) r2 = dup3(r0, r1, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="594ba399c944eb2231ca38d7554a91d2"}, 0x1c) [ 58.271161][ T8245] chnl_net:caif_netlink_parms(): no params data found [ 58.355543][ T8248] IPVS: ftp: loaded support on port[0] = 21 [ 58.373446][ T8245] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.396922][ T8245] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.404957][ T8245] device bridge_slave_0 entered promiscuous mode [ 58.441330][ T8245] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.457167][ T8245] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.464795][ T8245] device bridge_slave_1 entered promiscuous mode 04:47:07 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x3, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000180)={0x0, 0x2815cd64}) [ 58.516179][ T8250] IPVS: ftp: loaded support on port[0] = 21 [ 58.536413][ T8245] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.591185][ T8245] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.686244][ T8245] team0: Port device team_slave_0 added [ 58.726051][ T8245] team0: Port device team_slave_1 added 04:47:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) io_setup(0xff, &(0x7f0000000100)=0x0) io_getevents(r1, 0x2, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f0000000180)) socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') write$P9_RUNLINKAT(r2, &(0x7f00000000c0)={0x7, 0x4d, 0x1}, 0x7) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r3, 0x40106410, 0x0) r4 = getpid() r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/protocols\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000480)={0x7, 0x5d68, 0x9}) dup(r6) close(r3) [ 58.779718][ T8248] chnl_net:caif_netlink_parms(): no params data found [ 58.810834][ T8253] IPVS: ftp: loaded support on port[0] = 21 [ 58.839984][ T8245] device hsr_slave_0 entered promiscuous mode [ 58.877913][ T8245] device hsr_slave_1 entered promiscuous mode 04:47:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 58.984187][ T8250] chnl_net:caif_netlink_parms(): no params data found [ 59.019484][ T8256] IPVS: ftp: loaded support on port[0] = 21 [ 59.075955][ T8248] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.085142][ T8248] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.094753][ T8248] device bridge_slave_0 entered promiscuous mode [ 59.104741][ T8248] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.113959][ T8248] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.122765][ T8248] device bridge_slave_1 entered promiscuous mode [ 59.131534][ T8245] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 59.202577][ T8245] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 59.272035][ T8245] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 59.308611][ T8245] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 59.364458][ T8248] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.376053][ T8248] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.385524][ T8250] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.392947][ T8250] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.401054][ T8250] device bridge_slave_0 entered promiscuous mode [ 59.409563][ T8250] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.416619][ T8250] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.424336][ T8250] device bridge_slave_1 entered promiscuous mode [ 59.465513][ T8258] IPVS: ftp: loaded support on port[0] = 21 [ 59.484440][ T8248] team0: Port device team_slave_0 added [ 59.492896][ T8250] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.503655][ T8250] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.535007][ T8248] team0: Port device team_slave_1 added [ 59.550632][ T8250] team0: Port device team_slave_0 added [ 59.592605][ T8250] team0: Port device team_slave_1 added [ 59.608195][ T8245] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.621270][ T8253] chnl_net:caif_netlink_parms(): no params data found [ 59.679723][ T8248] device hsr_slave_0 entered promiscuous mode [ 59.727315][ T8248] device hsr_slave_1 entered promiscuous mode [ 59.777018][ T8248] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.838997][ T8250] device hsr_slave_0 entered promiscuous mode [ 59.887620][ T8250] device hsr_slave_1 entered promiscuous mode [ 59.926994][ T8250] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.981575][ T3056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.990290][ T3056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.998937][ T8256] chnl_net:caif_netlink_parms(): no params data found [ 60.032967][ T8245] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.050581][ T8248] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 60.112051][ T8248] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 60.196368][ T8253] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.204065][ T8253] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.212060][ T8253] device bridge_slave_0 entered promiscuous mode [ 60.223089][ T8253] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.230552][ T8253] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.238481][ T8253] device bridge_slave_1 entered promiscuous mode [ 60.262251][ T8248] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 60.312745][ T8248] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 60.376366][ T8250] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 60.408085][ T3056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.417284][ T3056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.425649][ T3056] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.432840][ T3056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.443274][ T8253] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.469652][ T8256] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.476718][ T8256] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.485686][ T8256] device bridge_slave_0 entered promiscuous mode [ 60.495306][ T8256] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.502449][ T8256] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.511122][ T8256] device bridge_slave_1 entered promiscuous mode [ 60.518813][ T8250] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 60.568396][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.582091][ T8253] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.604275][ T8253] team0: Port device team_slave_0 added [ 60.622572][ T8250] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 60.669127][ T8250] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 60.730516][ T8259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.739094][ T8259] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.747736][ T8259] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.754792][ T8259] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.763114][ T8258] chnl_net:caif_netlink_parms(): no params data found [ 60.773460][ T8253] team0: Port device team_slave_1 added [ 60.783065][ T8256] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.794040][ T8256] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.909695][ T8253] device hsr_slave_0 entered promiscuous mode [ 60.967355][ T8253] device hsr_slave_1 entered promiscuous mode [ 61.016962][ T8253] debugfs: Directory 'hsr0' with parent '/' already present! [ 61.032665][ T8256] team0: Port device team_slave_0 added [ 61.039001][ T8258] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.046052][ T8258] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.053888][ T8258] device bridge_slave_0 entered promiscuous mode [ 61.061832][ T8258] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.069184][ T8258] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.077194][ T8258] device bridge_slave_1 entered promiscuous mode [ 61.092088][ T3780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.113924][ T8256] team0: Port device team_slave_1 added [ 61.139723][ T8259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.166729][ T8245] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 61.178165][ T8245] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 61.192410][ T8258] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.202372][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.211583][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.221017][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.229689][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.238297][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.246487][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.255290][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.263700][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.308552][ T8256] device hsr_slave_0 entered promiscuous mode [ 61.358136][ T8256] device hsr_slave_1 entered promiscuous mode [ 61.397052][ T8256] debugfs: Directory 'hsr0' with parent '/' already present! [ 61.428473][ T8258] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.442202][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.450475][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.481428][ T8258] team0: Port device team_slave_0 added [ 61.490080][ T8253] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 61.543185][ T8245] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.551020][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 61.558718][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 61.579703][ T8258] team0: Port device team_slave_1 added [ 61.590952][ T8248] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.598899][ T8253] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 61.638711][ T8253] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 61.750804][ T8258] device hsr_slave_0 entered promiscuous mode [ 61.807220][ T8258] device hsr_slave_1 entered promiscuous mode [ 61.867049][ T8258] debugfs: Directory 'hsr0' with parent '/' already present! [ 61.885252][ T8256] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 61.919184][ T8253] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 61.962827][ T8256] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 62.023764][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.044670][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.059338][ T8248] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.090671][ T8258] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 167.076789][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 167.083519][ C0] rcu: 0-...!: (10499 ticks this GP) idle=5ea/1/0x4000000000000002 softirq=11694/11694 fqs=39 [ 167.094056][ C0] (t=10500 jiffies g=6405 q=118) [ 167.099070][ C0] rcu: rcu_preempt kthread starved for 10422 jiffies! g6405 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 167.110146][ C0] rcu: RCU grace-period kthread stack dump: [ 167.116108][ C0] rcu_preempt R running task 29032 10 2 0x80004000 [ 167.124081][ C0] Call Trace: [ 167.127365][ C0] __schedule+0x9a0/0xcc0 [ 167.131690][ C0] schedule+0x181/0x210 [ 167.135848][ C0] schedule_timeout+0x14f/0x240 [ 167.140684][ C0] ? run_local_timers+0x120/0x120 [ 167.145699][ C0] rcu_gp_kthread+0xed8/0x1770 [ 167.150457][ C0] kthread+0x332/0x350 [ 167.154509][ C0] ? rcu_report_qs_rsp+0x140/0x140 [ 167.159607][ C0] ? kthread_blkcg+0xe0/0xe0 [ 167.164179][ C0] ret_from_fork+0x24/0x30 [ 167.168592][ C0] NMI backtrace for cpu 0 [ 167.172907][ C0] CPU: 0 PID: 8118 Comm: rsyslogd Not tainted 5.4.0-syzkaller #0 [ 167.180607][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.191271][ C0] Call Trace: [ 167.194557][ C0] [ 167.197412][ C0] dump_stack+0x1fb/0x318 [ 167.201738][ C0] nmi_cpu_backtrace+0xaf/0x1a0 [ 167.206577][ C0] ? nmi_trigger_cpumask_backtrace+0x16d/0x290 [ 167.212719][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 167.218771][ C0] nmi_trigger_cpumask_backtrace+0x174/0x290 [ 167.224739][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 167.230614][ C0] rcu_dump_cpu_stacks+0x15a/0x220 [ 167.235715][ C0] rcu_sched_clock_irq+0xe25/0x1ad0 [ 167.240900][ C0] ? trace_hardirqs_off+0x74/0x80 [ 167.245909][ C0] update_process_times+0x12d/0x180 [ 167.251094][ C0] tick_sched_timer+0x263/0x420 [ 167.255935][ C0] ? tick_setup_sched_timer+0x3d0/0x3d0 [ 167.261465][ C0] __hrtimer_run_queues+0x403/0x840 [ 167.266664][ C0] hrtimer_interrupt+0x38c/0xda0 [ 167.271602][ C0] ? debug_smp_processor_id+0x9/0x20 [ 167.276899][ C0] smp_apic_timer_interrupt+0x109/0x280 [ 167.282441][ C0] apic_timer_interrupt+0xf/0x20 [ 167.287363][ C0] [ 167.290299][ C0] RIP: 0010:mod_memcg_page_state+0x3d/0x190 [ 167.296355][ C0] Code: 28 2e 00 48 83 c3 38 48 89 d8 48 c1 e8 03 49 bc 00 00 00 00 00 fc ff df 42 80 3c 20 00 74 08 48 89 df e8 b6 9f 69 00 48 8b 1b <48> 85 db 0f 84 d8 00 00 00 48 c7 c0 20 96 0a 89 48 c1 e8 03 42 80 [ 167.315948][ C0] RSP: 0018:ffffc90001a57a30 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 167.324344][ C0] RAX: 1ffffd40004b05c7 RBX: 0000000000000000 RCX: ffff88809780a040 [ 167.332299][ C0] RDX: 0000000000000000 RSI: 00000000fffffffc RDI: ffffea0002582e00 [ 167.340255][ C0] RBP: ffffc90001a57a50 R08: dffffc0000000000 R09: fffffbfff120248a [ 167.348212][ C0] R10: fffffbfff120248a R11: 0000000000000000 R12: dffffc0000000000 [ 167.356164][ C0] R13: dffffc0000000000 R14: 00000000fffffffc R15: ffff888098b41a28 [ 167.364139][ C0] free_thread_stack+0x168/0x590 [ 167.369068][ C0] put_task_stack+0xa3/0x130 [ 167.373645][ C0] finish_task_switch+0x3f1/0x550 [ 167.378657][ C0] __schedule+0x9a8/0xcc0 [ 167.382981][ C0] schedule+0x181/0x210 [ 167.387212][ C0] do_syslog+0xdc7/0x1740 [ 167.391529][ C0] ? init_wait_entry+0xe0/0xe0 [ 167.396277][ C0] kmsg_read+0x94/0xd0 [ 167.400326][ C0] ? mmap_vmcore_fault+0x10/0x10 [ 167.405246][ C0] proc_reg_read+0x1e2/0x2d0 [ 167.409913][ C0] ? proc_reg_llseek+0x2c0/0x2c0 [ 167.414838][ C0] __vfs_read+0xb8/0x730 [ 167.419068][ C0] ? security_file_permission+0x23c/0x350 [ 167.424774][ C0] ? rw_verify_area+0x1c2/0x360 [ 167.429609][ C0] vfs_read+0x1dd/0x420 [ 167.433761][ C0] ksys_read+0x117/0x220 [ 167.438013][ C0] __x64_sys_read+0x7b/0x90 [ 167.442527][ C0] do_syscall_64+0xf7/0x1c0 [ 167.447038][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 167.452915][ C0] RIP: 0033:0x7f921d8831fd [ 167.457319][ C0] Code: d1 20 00 00 75 10 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e fa ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 a7 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 167.477027][ C0] RSP: 002b:00007f921ae22e30 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 167.485428][ C0] RAX: ffffffffffffffda RBX: 0000000000fb3650 RCX: 00007f921d8831fd [ 167.493389][ C0] RDX: 0000000000000fff RSI: 00007f921c6575a0 RDI: 0000000000000004 [ 167.501345][ C0] RBP: 0000000000000000 R08: 0000000000f9e260 R09: 0000000000000000 [ 167.509311][ C0] R10: 6576203a2945474e R11: 0000000000000293 R12: 000000000065e420 [ 167.517787][ C0] R13: 00007f921ae239c0 R14: 00007f921dec8040 R15: 0000000000000003