[?25l[?1c7[ ok 8[?25h[?0c. [ 34.633375][ T26] audit: type=1800 audit(1572278640.904:25): pid=7092 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 34.660829][ T26] audit: type=1800 audit(1572278640.904:26): pid=7092 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 34.702035][ T26] audit: type=1800 audit(1572278640.904:27): pid=7092 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.81' (ECDSA) to the list of known hosts. 2019/10/28 16:04:11 fuzzer started 2019/10/28 16:04:12 dialing manager at 10.128.0.105:45117 2019/10/28 16:04:12 checking machine... 2019/10/28 16:04:12 checking revisions... 2019/10/28 16:04:12 testing simple program... syzkaller login: [ 46.495927][ T7259] IPVS: ftp: loaded support on port[0] = 21 2019/10/28 16:04:12 building call list... executing program [ 50.330564][ T7255] can: request_module (can-proto-0) failed. [ 50.343143][ T7255] can: request_module (can-proto-0) failed. 2019/10/28 16:04:18 syscalls: 2540 2019/10/28 16:04:18 code coverage: enabled 2019/10/28 16:04:18 comparison tracing: enabled 2019/10/28 16:04:18 extra coverage: extra coverage is not supported by the kernel 2019/10/28 16:04:18 setuid sandbox: enabled 2019/10/28 16:04:18 namespace sandbox: enabled 2019/10/28 16:04:18 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/28 16:04:18 fault injection: enabled 2019/10/28 16:04:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/28 16:04:18 net packet injection: enabled 2019/10/28 16:04:18 net device setup: enabled 2019/10/28 16:04:18 concurrency sanitizer: enabled 16:04:19 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000540), 0x4) 16:04:19 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000000200)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001084, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x9c283a, &(0x7f0000000140)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 53.117116][ T7304] IPVS: ftp: loaded support on port[0] = 21 [ 53.285986][ T7304] chnl_net:caif_netlink_parms(): no params data found [ 53.324544][ T7304] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.332566][ T7304] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.340883][ T7304] device bridge_slave_0 entered promiscuous mode [ 53.348858][ T7304] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.356809][ T7304] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.365168][ T7304] device bridge_slave_1 entered promiscuous mode [ 53.385406][ T7307] IPVS: ftp: loaded support on port[0] = 21 [ 53.389207][ T7304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.403394][ T7304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.432464][ T7304] team0: Port device team_slave_0 added [ 53.463169][ T7304] team0: Port device team_slave_1 added 16:04:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, &(0x7f0000000080)) [ 53.552536][ T7304] device hsr_slave_0 entered promiscuous mode [ 53.600583][ T7304] device hsr_slave_1 entered promiscuous mode [ 53.668361][ T7310] IPVS: ftp: loaded support on port[0] = 21 [ 53.766856][ T7307] chnl_net:caif_netlink_parms(): no params data found [ 53.841481][ T7304] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.848568][ T7304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.855930][ T7304] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.863008][ T7304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.078490][ T7307] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.119559][ T7307] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.127692][ T7307] device bridge_slave_0 entered promiscuous mode 16:04:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = socket$packet(0x11, 0xa, 0x300) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0x70}, {0x80000006}]}, 0x10) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x1f4, 0x0, 0x1201000000003618) [ 54.199299][ T7307] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.221125][ T7307] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.242648][ T7307] device bridge_slave_1 entered promiscuous mode [ 54.365655][ T7307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.389912][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.431394][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.482459][ T7307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.526109][ T7310] chnl_net:caif_netlink_parms(): no params data found [ 54.579738][ T7307] team0: Port device team_slave_0 added [ 54.586745][ T7307] team0: Port device team_slave_1 added [ 54.714749][ T7304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.802416][ T7307] device hsr_slave_0 entered promiscuous mode [ 54.829854][ T7307] device hsr_slave_1 entered promiscuous mode [ 54.859484][ T7307] debugfs: Directory 'hsr0' with parent '/' already present! [ 54.907876][ T7338] IPVS: ftp: loaded support on port[0] = 21 [ 54.914650][ T7310] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.940390][ T7310] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.971326][ T7310] device bridge_slave_0 entered promiscuous mode [ 55.001781][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.020059][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.035048][ T7310] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.049458][ T7310] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.101953][ T7310] device bridge_slave_1 entered promiscuous mode [ 55.219152][ T7304] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.244437][ T7310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.303773][ T7310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.416469][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.440448][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.494905][ T3500] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.502064][ T3500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.612815][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.652524][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 16:04:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0x0, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) r2 = creat(0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x766802, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000009c0)='timers\x00') ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f00000001c0)={0xff28, "f878dc4f836afdec1165441a319d1c8b605a87d0ec31fdab7a5be7974befb7b0"}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000540)=0x101, 0x0) [ 55.719731][ T3500] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.727429][ T3500] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.822303][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.863037][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.994246][ T7334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 56.024686][ T7334] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 56.082963][ T7334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 56.158424][ T7334] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 56.202930][ T7334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 56.262338][ T7334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.302493][ T7334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 56.362707][ T7334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.455994][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 56.471549][ T7310] team0: Port device team_slave_0 added [ 56.481937][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 56.560653][ T7310] team0: Port device team_slave_1 added [ 56.617167][ T7307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.675318][ T7367] IPVS: ftp: loaded support on port[0] = 21 [ 56.676923][ T7307] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.736628][ T7304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.761359][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.770438][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.822598][ T7310] device hsr_slave_0 entered promiscuous mode [ 56.849812][ T7310] device hsr_slave_1 entered promiscuous mode [ 56.889469][ T7310] debugfs: Directory 'hsr0' with parent '/' already present! [ 56.990561][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.002795][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.017535][ T3500] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.024640][ T3500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.036015][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 57.045131][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.056790][ T3500] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.063902][ T3500] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.088628][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.172613][ T7338] chnl_net:caif_netlink_parms(): no params data found [ 57.195354][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 57.229256][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.250317][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 57.273494][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.407475][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 57.428640][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.468889][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.507793][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 57.553271][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 16:04:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup3(r0, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r2) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x76, 0xffffffffffffffda, 0x2, {0x7, 0x1f, 0x0, 0x820100, 0x0, 0x0, 0x3f, 0x3}}, 0x1c7) 16:04:23 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000540), 0x4) [ 57.642209][ T7307] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 57.660477][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 57.730252][ T7334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 57.748424][ T7334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 57.952890][ T7367] chnl_net:caif_netlink_parms(): no params data found [ 58.015758][ T7338] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.029447][ T7338] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.037386][ T7338] device bridge_slave_0 entered promiscuous mode [ 58.117922][ T7338] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.139435][ T7338] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.147723][ T7338] device bridge_slave_1 entered promiscuous mode 16:04:24 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000540), 0x4) [ 58.262249][ T7307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 58.393309][ T7310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.406473][ T7367] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.459537][ T7367] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.467494][ T7367] device bridge_slave_0 entered promiscuous mode [ 58.525001][ T7310] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.575857][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.589677][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.597573][ T7367] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.608426][ T7367] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.680671][ T7367] device bridge_slave_1 entered promiscuous mode [ 58.721918][ T7338] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.804084][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.823549][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.848376][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.855487][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.915726][ T7338] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.003857][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.014420][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.030115][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.038544][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.045611][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.090215][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.119723][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.128971][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.170299][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.189786][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.198833][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.221023][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.239988][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.248801][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 59.258683][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.269799][ T7367] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.287438][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.308710][ T7419] IPVS: ftp: loaded support on port[0] = 21 [ 59.315646][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 16:04:25 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000540), 0x4) [ 59.351660][ T7367] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.370439][ T7338] team0: Port device team_slave_0 added [ 59.379247][ T7310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 59.452544][ T7338] team0: Port device team_slave_1 added [ 59.459360][ T7367] team0: Port device team_slave_0 added [ 59.486247][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 59.486274][ T26] audit: type=1800 audit(1572278665.754:31): pid=7426 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16528 res=0 [ 59.509252][ T7367] team0: Port device team_slave_1 added 16:04:25 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000540), 0x4) [ 59.643089][ T7338] device hsr_slave_0 entered promiscuous mode [ 59.653388][ T7426] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 59.719954][ T7338] device hsr_slave_1 entered promiscuous mode [ 59.768148][ T7338] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.799599][ T7431] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 59.982797][ T7367] device hsr_slave_0 entered promiscuous mode [ 60.030223][ T7367] device hsr_slave_1 entered promiscuous mode 16:04:26 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000000200)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001084, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x9c283a, &(0x7f0000000140)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) [ 60.072802][ T7367] debugfs: Directory 'hsr0' with parent '/' already present! 16:04:26 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000540), 0x4) [ 60.372899][ T26] audit: type=1800 audit(1572278666.644:32): pid=7463 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16528 res=0 [ 60.549809][ T7463] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsold, [ 60.632584][ T7419] chnl_net:caif_netlink_parms(): no params data found [ 60.790364][ T7338] 8021q: adding VLAN 0 to HW filter on device bond0 16:04:27 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000540), 0x4) 16:04:27 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000000200)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001084, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x9c283a, &(0x7f0000000140)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) 16:04:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, &(0x7f0000000080)) [ 61.159637][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.167712][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.242285][ T7338] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.324503][ T7419] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.339453][ T7419] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.370299][ T7419] device bridge_slave_0 entered promiscuous mode [ 61.426767][ T7498] ================================================================== [ 61.431206][ T26] audit: type=1800 audit(1572278667.704:33): pid=7512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16533 res=0 [ 61.434905][ T7498] BUG: KCSAN: data-race in pid_update_inode / tomoyo_get_local_path [ 61.459742][ T7419] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.463066][ T7498] [ 61.472387][ T7498] write to 0xffff88812a7de088 of 2 bytes by task 7500 on cpu 1: [ 61.480016][ T7498] pid_update_inode+0x51/0x70 [ 61.484684][ T7498] pid_revalidate+0x91/0xd0 [ 61.489187][ T7498] lookup_fast+0x6f2/0x700 [ 61.493600][ T7498] walk_component+0x6d/0xe80 [ 61.498182][ T7498] link_path_walk.part.0+0x5d3/0xa90 [ 61.503459][ T7498] path_openat+0x14f/0x36e0 [ 61.507955][ T7498] do_filp_open+0x11e/0x1b0 [ 61.512456][ T7498] do_sys_open+0x3b3/0x4f0 [ 61.516870][ T7498] __x64_sys_open+0x55/0x70 [ 61.521363][ T7498] do_syscall_64+0xcc/0x370 [ 61.525854][ T7498] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 61.531728][ T7498] [ 61.534055][ T7498] read to 0xffff88812a7de088 of 2 bytes by task 7498 on cpu 0: [ 61.538619][ T7419] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.541596][ T7498] tomoyo_get_local_path+0x403/0x470 [ 61.541613][ T7498] tomoyo_realpath_from_path+0x288/0x4c0 [ 61.541625][ T7498] tomoyo_path_perm+0x15d/0x390 [ 61.541639][ T7498] tomoyo_inode_getattr+0x26/0x40 [ 61.541651][ T7498] security_inode_getattr+0x9b/0xd0 [ 61.541674][ T7498] vfs_getattr+0x2e/0x70 [ 61.571650][ T7419] device bridge_slave_1 entered promiscuous mode [ 61.574584][ T7498] vfs_statx+0x102/0x190 [ 61.589333][ T7498] __do_sys_newstat+0x51/0xb0 [ 61.594004][ T7498] __x64_sys_newstat+0x3a/0x50 [ 61.598773][ T7498] do_syscall_64+0xcc/0x370 [ 61.603274][ T7498] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 61.609148][ T7498] [ 61.611473][ T7498] Reported by Kernel Concurrency Sanitizer on: [ 61.617625][ T7498] CPU: 0 PID: 7498 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 61.624374][ T7498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.634418][ T7498] ================================================================== [ 61.642469][ T7498] Kernel panic - not syncing: panic_on_warn set ... [ 61.649051][ T7498] CPU: 0 PID: 7498 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 61.655799][ T7498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.665930][ T7498] Call Trace: [ 61.669216][ T7498] dump_stack+0xf5/0x159 [ 61.673458][ T7498] panic+0x210/0x640 [ 61.677349][ T7498] ? __x64_sys_newstat+0x3a/0x50 [ 61.682281][ T7498] ? vprintk_func+0x8d/0x140 [ 61.686870][ T7498] kcsan_report.cold+0xc/0x10 [ 61.691545][ T7498] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 61.697092][ T7498] __tsan_read2+0x2c/0x30 [ 61.701428][ T7498] tomoyo_get_local_path+0x403/0x470 [ 61.706708][ T7498] ? __kmalloc+0x201/0x690 [ 61.711120][ T7498] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 61.716746][ T7498] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 61.721999][ T7419] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.722382][ T7498] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 61.737010][ T7498] tomoyo_realpath_from_path+0x288/0x4c0 [ 61.742638][ T7498] tomoyo_path_perm+0x15d/0x390 [ 61.747512][ T7498] tomoyo_inode_getattr+0x26/0x40 [ 61.752545][ T7498] security_inode_getattr+0x9b/0xd0 [ 61.757736][ T7498] vfs_getattr+0x2e/0x70 [ 61.761978][ T7498] vfs_statx+0x102/0x190 [ 61.766218][ T7498] __do_sys_newstat+0x51/0xb0 [ 61.770885][ T7498] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 61.776515][ T7498] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 61.782140][ T7498] ? __tsan_read4+0x2c/0x30 [ 61.786640][ T7498] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 61.792271][ T7498] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 61.797902][ T7498] ? __tsan_read8+0x2c/0x30 [ 61.802408][ T7498] __x64_sys_newstat+0x3a/0x50 [ 61.807176][ T7498] do_syscall_64+0xcc/0x370 [ 61.811682][ T7498] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 61.817570][ T7498] RIP: 0033:0x7f1d37bc8c65 [ 61.818132][ T7419] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.821983][ T7498] Code: 00 00 00 e8 5d 01 00 00 48 83 c4 18 c3 90 90 90 90 90 90 90 90 83 ff 01 48 89 f0 77 18 48 89 c7 48 89 d6 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 17 f3 c3 90 48 8b 05 a1 51 2b 00 64 c7 00 16 [ 61.821992][ T7498] RSP: 002b:00007ffe064292c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 61.822006][ T7498] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f1d37bc8c65 [ 61.822015][ T7498] RDX: 00007f1d38096c60 RSI: 00007f1d38096c60 RDI: 00000000012e5220 [ 61.822023][ T7498] RBP: 0000000000020062 R08: 00007f1d37e7e5a0 R09: 0000000000000000 [ 61.822031][ T7498] R10: 1999999999999999 R11: 0000000000000246 R12: 00000000012e5220 [ 61.822039][ T7498] R13: 00000000012e51c0 R14: 0000000000000005 R15: 0000000000000000 [ 61.832292][ T7498] Kernel Offset: disabled [ 61.904279][ T7498] Rebooting in 86400 seconds..