[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 44.839825][ T25] audit: type=1800 audit(1575319883.758:25): pid=8028 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 44.864274][ T25] audit: type=1800 audit(1575319883.758:26): pid=8028 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 44.887267][ T25] audit: type=1800 audit(1575319883.758:27): pid=8028 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.222' (ECDSA) to the list of known hosts. 2019/12/02 20:51:33 fuzzer started 2019/12/02 20:51:35 dialing manager at 10.128.0.26:38907 2019/12/02 20:51:35 syscalls: 2697 2019/12/02 20:51:35 code coverage: enabled 2019/12/02 20:51:35 comparison tracing: enabled 2019/12/02 20:51:35 extra coverage: extra coverage is not supported by the kernel 2019/12/02 20:51:35 setuid sandbox: enabled 2019/12/02 20:51:35 namespace sandbox: enabled 2019/12/02 20:51:35 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/02 20:51:35 fault injection: enabled 2019/12/02 20:51:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/02 20:51:35 net packet injection: enabled 2019/12/02 20:51:35 net device setup: enabled 2019/12/02 20:51:35 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/02 20:51:35 devlink PCI setup: PCI device 0000:00:10.0 is not available 20:51:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x22, 0x4, 0x400, 0x0, 0x1}, 0x3c) inotify_init1(0x0) socket$rxrpc(0x21, 0x2, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffeb4) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:51:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "f0f3c23db58cbd48", "4a80970c81539622b93494f5266177be2f653d878723c5509f129ac6b5d7f2a9", "43d5f174", "ef770a7deeb0ad10"}, 0x38) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040), 0x4) syzkaller login: [ 57.771625][ T8193] IPVS: ftp: loaded support on port[0] = 21 [ 57.910157][ T8193] chnl_net:caif_netlink_parms(): no params data found [ 57.950682][ T8193] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.960174][ T8193] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.968410][ T8193] device bridge_slave_0 entered promiscuous mode [ 57.977494][ T8193] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.985002][ T8193] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.992919][ T8193] device bridge_slave_1 entered promiscuous mode [ 58.016871][ T8193] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.028532][ T8193] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.046419][ T8196] IPVS: ftp: loaded support on port[0] = 21 [ 58.058740][ T8193] team0: Port device team_slave_0 added 20:51:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b000000000000", 0x10, 0x0, 0x0, 0x0) getsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000080)={0x2, "150b"}, 0x3) r1 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0xffffffffffffffb3, 0x40000) r2 = socket(0x0, 0x803, 0x0) write(r2, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a", 0x1d) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_int(r2, 0x1, 0x4, 0x0, &(0x7f00000000c0)) read(r2, &(0x7f0000000100)=""/166, 0xa6) connect$rxrpc(r2, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0xfffffffffffffe44, {0x2, 0x0, @rand_addr=0x7}}, 0x24) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4048000) socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) eventfd(0x0) r4 = socket(0x10, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) recvmmsg(r4, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf0}}], 0x1, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYRESHEX]) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket(0x0, 0x0, 0x0) setsockopt$inet_int(r5, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000180)) [ 58.066738][ T8193] team0: Port device team_slave_1 added [ 58.157055][ T8193] device hsr_slave_0 entered promiscuous mode 20:51:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setpriority(0x1, 0x0, 0xffffffff) [ 58.233681][ T8193] device hsr_slave_1 entered promiscuous mode [ 58.311712][ T8198] IPVS: ftp: loaded support on port[0] = 21 [ 58.386133][ T8193] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 58.446027][ T8193] netdevsim netdevsim0 netdevsim1: renamed from eth1 20:51:37 executing program 4: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000100)=0x80000000) [ 58.503981][ T8193] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 58.536190][ T8193] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 58.579938][ T8200] IPVS: ftp: loaded support on port[0] = 21 [ 58.658623][ T8196] chnl_net:caif_netlink_parms(): no params data found [ 58.706297][ T8193] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.713590][ T8193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.721447][ T8193] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.728581][ T8193] bridge0: port 1(bridge_slave_0) entered forwarding state 20:51:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xec\xda\xbc~\xe7Y`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\xed\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x20) fcntl$notify(r0, 0x402, 0x6) [ 58.814121][ T8203] IPVS: ftp: loaded support on port[0] = 21 [ 58.888166][ T8196] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.898162][ T8196] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.906540][ T8196] device bridge_slave_0 entered promiscuous mode [ 58.929504][ T8207] IPVS: ftp: loaded support on port[0] = 21 [ 58.938273][ T8196] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.946188][ T8196] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.955104][ T8196] device bridge_slave_1 entered promiscuous mode [ 58.969237][ T3106] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.988680][ T3106] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.011433][ T8198] chnl_net:caif_netlink_parms(): no params data found [ 59.028386][ T8196] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.060593][ T8196] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.083221][ T8196] team0: Port device team_slave_0 added [ 59.112654][ T8196] team0: Port device team_slave_1 added [ 59.131499][ T8193] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.157399][ T8198] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.165277][ T8198] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.173102][ T8198] device bridge_slave_0 entered promiscuous mode [ 59.185143][ T8200] chnl_net:caif_netlink_parms(): no params data found [ 59.201856][ T8198] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.209371][ T8198] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.217302][ T8198] device bridge_slave_1 entered promiscuous mode [ 59.325041][ T8196] device hsr_slave_0 entered promiscuous mode [ 59.403633][ T8196] device hsr_slave_1 entered promiscuous mode [ 59.453544][ T8196] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.489163][ T8203] chnl_net:caif_netlink_parms(): no params data found [ 59.502401][ T8198] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.521089][ T8200] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.529086][ T8200] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.539657][ T8200] device bridge_slave_0 entered promiscuous mode [ 59.549781][ T8200] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.557026][ T8200] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.566702][ T8200] device bridge_slave_1 entered promiscuous mode [ 59.582968][ T8198] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.600561][ T3106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.609079][ T3106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.660629][ T8193] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.673756][ T8203] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.680840][ T8203] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.688778][ T8203] device bridge_slave_0 entered promiscuous mode [ 59.698726][ T8203] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.705941][ T8203] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.713693][ T8203] device bridge_slave_1 entered promiscuous mode [ 59.731758][ T8198] team0: Port device team_slave_0 added [ 59.739004][ T8198] team0: Port device team_slave_1 added [ 59.746063][ T8200] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.757592][ T8200] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.780505][ T8203] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.815631][ T8203] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.827053][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.835905][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.844589][ T2711] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.851614][ T2711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.859179][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.867671][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.876366][ T2711] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.883470][ T2711] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.891225][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.900977][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.909427][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.917937][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.926191][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.934781][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.943000][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.951272][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.960568][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 59.976663][ T8196] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 60.025086][ T8207] chnl_net:caif_netlink_parms(): no params data found [ 60.088461][ T8198] device hsr_slave_0 entered promiscuous mode [ 60.133652][ T8198] device hsr_slave_1 entered promiscuous mode [ 60.183519][ T8198] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.191374][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.199898][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.209510][ T8200] team0: Port device team_slave_0 added [ 60.220649][ T8200] team0: Port device team_slave_1 added [ 60.228381][ T8196] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 60.289552][ T8196] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 60.345637][ T8196] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 60.397761][ T8203] team0: Port device team_slave_0 added [ 60.409371][ T8203] team0: Port device team_slave_1 added [ 60.418174][ T8193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.485185][ T8200] device hsr_slave_0 entered promiscuous mode [ 60.553745][ T8200] device hsr_slave_1 entered promiscuous mode [ 60.603481][ T8200] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.696688][ T8203] device hsr_slave_0 entered promiscuous mode [ 60.753938][ T8203] device hsr_slave_1 entered promiscuous mode [ 60.813476][ T8203] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.821126][ T8198] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 60.884031][ T8198] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 60.905770][ T8207] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.912871][ T8207] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.921035][ T8207] device bridge_slave_0 entered promiscuous mode [ 60.947515][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 60.957258][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 60.965981][ T8198] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 61.015747][ T8198] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 61.061619][ T8207] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.070491][ T8207] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.079665][ T8207] device bridge_slave_1 entered promiscuous mode [ 61.102277][ T8207] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.141258][ T8193] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.150688][ T8207] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.165802][ T8200] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 61.196258][ T8196] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.219563][ T8200] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 61.285576][ T8200] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 61.327455][ T8200] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 61.389258][ T8203] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 61.435355][ T8203] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 61.498700][ T8196] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.522244][ T8203] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 166.523303][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 166.530084][ C1] rcu: 1-...!: (10499 ticks this GP) idle=196/1/0x4000000000000002 softirq=11179/11179 fqs=0 [ 166.540956][ C1] (t=10501 jiffies g=6397 q=148) [ 166.546129][ C1] rcu: rcu_preempt kthread starved for 10502 jiffies! g6397 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 166.557244][ C1] rcu: RCU grace-period kthread stack dump: [ 166.563146][ C1] rcu_preempt R running task 29032 10 2 0x80004000 [ 166.571067][ C1] Call Trace: [ 166.574370][ C1] __schedule+0x9a0/0xcc0 [ 166.578711][ C1] schedule+0x181/0x210 [ 166.582869][ C1] schedule_timeout+0x14f/0x240 [ 166.587723][ C1] ? run_local_timers+0x120/0x120 [ 166.592867][ C1] rcu_gp_kthread+0xed8/0x1770 [ 166.598196][ C1] kthread+0x332/0x350 [ 166.602267][ C1] ? rcu_report_qs_rsp+0x140/0x140 [ 166.607378][ C1] ? kthread_blkcg+0xe0/0xe0 [ 166.611980][ C1] ret_from_fork+0x24/0x30 [ 166.616455][ C1] NMI backtrace for cpu 1 [ 166.620964][ C1] CPU: 1 PID: 8066 Comm: rsyslogd Not tainted 5.4.0-syzkaller #0 [ 166.628686][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.638767][ C1] Call Trace: [ 166.642066][ C1] [ 166.644939][ C1] dump_stack+0x1fb/0x318 [ 166.649298][ C1] nmi_cpu_backtrace+0xaf/0x1a0 [ 166.654151][ C1] ? nmi_trigger_cpumask_backtrace+0x16d/0x290 [ 166.660322][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 166.666433][ C1] nmi_trigger_cpumask_backtrace+0x174/0x290 [ 166.672431][ C1] arch_trigger_cpumask_backtrace+0x10/0x20 [ 166.678346][ C1] rcu_dump_cpu_stacks+0x15a/0x220 [ 166.683466][ C1] rcu_sched_clock_irq+0xe25/0x1ad0 [ 166.688659][ C1] ? trace_hardirqs_off+0x74/0x80 [ 166.693708][ C1] update_process_times+0x12d/0x180 [ 166.698909][ C1] tick_sched_timer+0x263/0x420 [ 166.703774][ C1] ? tick_setup_sched_timer+0x3d0/0x3d0 [ 166.709316][ C1] __hrtimer_run_queues+0x403/0x840 [ 166.714518][ C1] hrtimer_interrupt+0x38c/0xda0 [ 166.719460][ C1] ? debug_smp_processor_id+0x9/0x20 [ 166.724739][ C1] smp_apic_timer_interrupt+0x109/0x280 [ 166.730289][ C1] apic_timer_interrupt+0xf/0x20 [ 166.735210][ C1] [ 166.738141][ C1] RIP: 0010:free_thread_stack+0x151/0x590 [ 166.743871][ C1] Code: 31 f6 e8 42 af 6e 00 43 80 3c 2e 00 74 08 4c 89 e7 e8 43 a4 69 00 49 8b 1c 24 48 83 c3 08 48 89 d8 48 c1 e8 03 42 80 3c 28 00 <74> 08 48 89 df e8 25 a4 69 00 48 8b 3b be fc ff ff ff e8 28 04 00 [ 166.763465][ C1] RSP: 0018:ffffc90001d07a60 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 166.771865][ C1] RAX: 1ffff11013191fe1 RBX: ffff888098c8ff08 RCX: 0000000000000000 [ 166.779827][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea00025db540 [ 166.787875][ C1] RBP: ffffc90001d07a98 R08: 000000000003a768 R09: ffffed1014fe7aaf [ 166.795833][ C1] R10: ffffed1014fe7aaf R11: 0000000000000000 R12: ffff888098c8ffa0 [ 166.803791][ C1] R13: dffffc0000000000 R14: 1ffff11013191ff4 R15: ffff8880a7f3d568 [ 166.811790][ C1] put_task_stack+0xa3/0x130 [ 166.816367][ C1] finish_task_switch+0x3f1/0x550 [ 166.821421][ C1] __schedule+0x9a8/0xcc0 [ 166.825747][ C1] schedule+0x181/0x210 [ 166.830933][ C1] do_syslog+0xdc7/0x1740 [ 166.835256][ C1] ? init_wait_entry+0xe0/0xe0 [ 166.840013][ C1] kmsg_read+0x94/0xd0 [ 166.844065][ C1] ? mmap_vmcore_fault+0x10/0x10 [ 166.848987][ C1] proc_reg_read+0x1e2/0x2d0 [ 166.853572][ C1] ? proc_reg_llseek+0x2c0/0x2c0 [ 166.858504][ C1] __vfs_read+0xb8/0x730 [ 166.862742][ C1] ? security_file_permission+0x23c/0x350 [ 166.868481][ C1] ? rw_verify_area+0x1c2/0x360 [ 166.873341][ C1] vfs_read+0x1dd/0x420 [ 166.877514][ C1] ksys_read+0x117/0x220 [ 166.881751][ C1] __x64_sys_read+0x7b/0x90 [ 166.886242][ C1] do_syscall_64+0xf7/0x1c0 [ 166.890757][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.896681][ C1] RIP: 0033:0x7fce0f3271fd [ 166.901101][ C1] Code: d1 20 00 00 75 10 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e fa ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 a7 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 166.920955][ C1] RSP: 002b:00007fce0c8c6e30 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 166.929361][ C1] RAX: ffffffffffffffda RBX: 0000000000aad650 RCX: 00007fce0f3271fd [ 166.937340][ C1] RDX: 0000000000000fff RSI: 00007fce0e0fb5a0 RDI: 0000000000000004 [ 166.945299][ C1] RBP: 0000000000000000 R08: 0000000000a98260 R09: 0000000000000000 [ 166.953256][ C1] R10: 203a7463656a626f R11: 0000000000000293 R12: 000000000065e420 [ 166.961475][ C1] R13: 00007fce0c8c79c0 R14: 00007fce0f96c040 R15: 0000000000000003