[info] Using makefile-style concurrent boot in runlevel 2. [ 46.060451][ T26] audit: type=1800 audit(1574802713.538:21): pid=7416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 46.109117][ T26] audit: type=1800 audit(1574802713.538:22): pid=7416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.50' (ECDSA) to the list of known hosts. 2019/11/26 21:12:01 fuzzer started 2019/11/26 21:12:03 dialing manager at 10.128.0.105:46511 2019/11/26 21:12:06 syscalls: 2566 2019/11/26 21:12:06 code coverage: enabled 2019/11/26 21:12:06 comparison tracing: enabled 2019/11/26 21:12:06 extra coverage: extra coverage is not supported by the kernel 2019/11/26 21:12:06 setuid sandbox: enabled 2019/11/26 21:12:06 namespace sandbox: enabled 2019/11/26 21:12:06 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/26 21:12:06 fault injection: enabled 2019/11/26 21:12:06 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/26 21:12:06 net packet injection: enabled 2019/11/26 21:12:06 net device setup: enabled 2019/11/26 21:12:06 concurrency sanitizer: enabled 2019/11/26 21:12:06 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 63.660904][ T7586] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/26 21:12:12 adding functions to KCSAN blacklist: 'generic_write_end' 'bio_endio' 'mod_timer' 'tomoyo_supervisor' 'run_timer_softirq' 'echo_char' 'alloc_pid' 'do_readlinkat' '__rcu_read_unlock' 'rcu_gp_fqs_check_wake' 'blk_mq_get_request' 'xas_find_marked' 'tick_do_update_jiffies64' 'wbt_done' 'do_nanosleep' 'sbitmap_queue_clear' 'add_timer' '__splice_from_pipe' 'vm_area_dup' 'ext4_nonda_switch' 'taskstats_exit' 'pipe_poll' '__hrtimer_run_queues' 'find_next_bit' '__ext4_new_inode' 'blk_mq_dispatch_rq_list' 'generic_fillattr' 'lruvec_lru_size' 'tick_nohz_idle_stop_tick' 'tcp_add_backlog' 'find_get_pages_range_tag' 'poll_schedule_timeout' 'tick_sched_do_timer' 'page_counter_try_charge' 'ext4_free_inode' 'd_delete' 'n_tty_receive_buf_common' 'ext4_has_free_clusters' 'blk_mq_run_hw_queue' 'ep_poll' 'ext4_free_inodes_count' 'dd_has_work' 21:12:55 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f5f00fe01b2a4a28093020600f2ffff7f01020b00000a0012000200280014000000190005407fffffff0022de1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d400", 0x55}], 0x1}, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000100), 0x492492492492685, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 21:12:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x500000}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{0x0}, {0x0}, {&(0x7f00000005c0)=""/2, 0x2}, {0x0}, {0x0}], 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f00000017c0), 0x73, 0x0) [ 108.274656][ T7590] IPVS: ftp: loaded support on port[0] = 21 [ 108.354597][ T7590] chnl_net:caif_netlink_parms(): no params data found [ 108.384212][ T7590] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.391700][ T7590] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.410782][ T7590] device bridge_slave_0 entered promiscuous mode [ 108.439569][ T7590] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.446932][ T7590] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.454805][ T7590] device bridge_slave_1 entered promiscuous mode [ 108.472185][ T7590] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 108.483308][ T7590] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 108.501333][ T7594] IPVS: ftp: loaded support on port[0] = 21 [ 108.514663][ T7590] team0: Port device team_slave_0 added [ 108.523215][ T7590] team0: Port device team_slave_1 added 21:12:56 executing program 2: r0 = epoll_create1(0x80006) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = socket(0x0, 0x0, 0x0) modify_ldt$read(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000700)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000000fe80a18511f408abe3f32b452246ad28077c2157f77d937f2112f4366e9000000000000", @ANYRES32=r1], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) fsync(r1) r2 = getpgrp(0xffffffffffffffff) fcntl$setown(r1, 0x8, r2) setsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000006c0)={0x50000008}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) connect$packet(r3, &(0x7f0000000440)={0x11, 0x2000000001b, r5, 0x1, 0x81, 0x6, @remote}, 0x14) readv(r3, &(0x7f0000000600), 0x0) flock(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000800)='trusted.overlay.upper\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="4e024fd2c4d803ace4eb4d05937e3f894c1d6b4a52454b46732e59c03c86b69ae07221d271294ca1"], 0x1, 0x3) fcntl$getown(r4, 0x9) r6 = shmget(0x2, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_RMID(r6, 0x0) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0xfffffffffffffffc, &(0x7f0000000000)={0x0, 0x6, 0x4}) ioctl$RNDZAPENTCNT(r3, 0x5204, &(0x7f0000000140)=0x2000001) capget(&(0x7f0000000600)={0x20080522}, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{0x9, 0xbbf8, 0x4, 0x2}, {0x2, 0x800, 0x4, 0x6}, {0x7, 0x1, 0x81, 0x2}]}, 0x8) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f00000002c0)=0x8, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f00000003c0)={0x109, 0x1, 0x8, 0x6, 0x5}, 0x14) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000780), &(0x7f00000007c0)=0x4) fremovexattr(r4, &(0x7f0000000280)=@known='trusted.overlay.metacopy\x00') ppoll(&(0x7f00000001c0)=[{r7, 0x8000}, {0xffffffffffffffff, 0x420}], 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, 0x0) [ 108.611356][ T7590] device hsr_slave_0 entered promiscuous mode [ 108.680326][ T7590] device hsr_slave_1 entered promiscuous mode [ 108.736195][ T7596] IPVS: ftp: loaded support on port[0] = 21 [ 108.810179][ T7590] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.817255][ T7590] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.824645][ T7590] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.831695][ T7590] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.970123][ T7594] chnl_net:caif_netlink_parms(): no params data found 21:12:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = socket(0x10, 0x800000000080002, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x68, r1, 0x1, 0x70bd2c, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x80, @link='syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x00'}}}, [""]}, 0x68}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) setreuid(0x0, 0xee00) r2 = creat(0x0, 0x4007) r3 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) r4 = dup2(r3, r3) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f0000000380)) [ 109.105647][ T7594] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.139116][ T7594] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.179181][ T7594] device bridge_slave_0 entered promiscuous mode [ 109.199496][ T7594] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.206647][ T7594] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.269679][ T7594] device bridge_slave_1 entered promiscuous mode [ 109.340284][ T7594] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 109.387249][ T7590] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.412555][ T7594] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 109.429444][ T7593] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.459270][ T7593] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.480485][ T7593] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 109.527015][ T7623] IPVS: ftp: loaded support on port[0] = 21 [ 109.547681][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.560807][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.610077][ T7594] team0: Port device team_slave_0 added [ 109.662913][ T7594] team0: Port device team_slave_1 added [ 109.706633][ T7590] 8021q: adding VLAN 0 to HW filter on device team0 [ 109.738581][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.769705][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.800423][ T2880] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.807568][ T2880] bridge0: port 1(bridge_slave_0) entered forwarding state 21:12:57 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000400)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffc6, &(0x7f0000000000)) [ 109.911669][ T7594] device hsr_slave_0 entered promiscuous mode [ 109.989383][ T7594] device hsr_slave_1 entered promiscuous mode [ 110.019114][ T7594] debugfs: Directory 'hsr0' with parent '/' already present! [ 110.049465][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 110.058202][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.099508][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.106625][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.159803][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 110.190054][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 110.219352][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 110.228043][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 110.288116][ T7596] chnl_net:caif_netlink_parms(): no params data found [ 110.323324][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 110.346235][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 110.363812][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 110.405455][ T7628] IPVS: ftp: loaded support on port[0] = 21 [ 110.470941][ T7593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 110.490913][ T7593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 21:12:58 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x401}) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x3f}) [ 110.570398][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 110.578930][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.660465][ T7590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 110.690350][ T7623] chnl_net:caif_netlink_parms(): no params data found [ 110.706159][ T7596] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.721979][ T7596] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.749809][ T7596] device bridge_slave_0 entered promiscuous mode [ 110.798210][ T7596] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.829151][ T7596] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.861965][ T7596] device bridge_slave_1 entered promiscuous mode [ 110.913345][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 110.929469][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 110.945238][ T7590] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 110.997308][ T7596] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 111.066674][ T7596] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 111.095124][ T7660] IPVS: ftp: loaded support on port[0] = 21 [ 111.100385][ T7623] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.108343][ T7623] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.129842][ T7623] device bridge_slave_0 entered promiscuous mode [ 111.161262][ T7594] 8021q: adding VLAN 0 to HW filter on device bond0 [ 111.179613][ T7623] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.186670][ T7623] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.221403][ T7623] device bridge_slave_1 entered promiscuous mode [ 111.286893][ T7596] team0: Port device team_slave_0 added [ 111.306206][ T7594] 8021q: adding VLAN 0 to HW filter on device team0 [ 111.366053][ T7596] team0: Port device team_slave_1 added [ 111.379753][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.387495][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.423646][ T7623] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 111.483146][ T7593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.499728][ T7593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.531437][ T7593] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.539021][ T7593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.583326][ T7593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.612069][ T7593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.641781][ T7593] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.648885][ T7593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.694130][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.720694][ T7623] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 111.781060][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 111.793973][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 111.824213][ T7628] chnl_net:caif_netlink_parms(): no params data found [ 111.845084][ T7672] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 111.869144][ T7672] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 111.898405][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 111.921211][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 111.937169][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 111.952845][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 112.011608][ T7596] device hsr_slave_0 entered promiscuous mode [ 112.059406][ T7596] device hsr_slave_1 entered promiscuous mode [ 112.109314][ T7596] debugfs: Directory 'hsr0' with parent '/' already present! [ 112.132128][ T7623] team0: Port device team_slave_0 added [ 112.145724][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 112.155411][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.164353][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.173047][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.181621][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.191558][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 21:12:59 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f5f00fe01b2a4a28093020600f2ffff7f01020b00000a0012000200280014000000190005407fffffff0022de1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d400", 0x55}], 0x1}, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000100), 0x492492492492685, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 112.215104][ T7623] team0: Port device team_slave_1 added [ 112.309578][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 112.317051][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 112.354012][ T7682] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 112.366411][ T7682] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 112.412025][ T7628] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.428622][ T7628] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.458463][ T7628] device bridge_slave_0 entered promiscuous mode [ 112.500259][ T7628] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.507328][ T7628] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.539800][ T7628] device bridge_slave_1 entered promiscuous mode [ 112.551012][ T7702] ================================================================== [ 112.559224][ T7702] BUG: KCSAN: data-race in pid_update_inode / tomoyo_get_local_path [ 112.567192][ T7702] [ 112.569522][ T7702] read to 0xffff8881270af588 of 2 bytes by task 7692 on cpu 1: [ 112.577091][ T7702] tomoyo_get_local_path+0x403/0x470 [ 112.582559][ T7702] tomoyo_realpath_from_path+0x288/0x4c0 [ 112.588193][ T7702] tomoyo_path_perm+0x15d/0x390 [ 112.593039][ T7702] tomoyo_inode_getattr+0x26/0x40 [ 112.598059][ T7702] security_inode_getattr+0x9b/0xd0 [ 112.603259][ T7702] vfs_getattr+0x2e/0x70 [ 112.607773][ T7702] vfs_statx+0x102/0x190 [ 112.612021][ T7702] __do_sys_newstat+0x51/0xb0 [ 112.616705][ T7702] __x64_sys_newstat+0x3a/0x50 [ 112.621468][ T7702] do_syscall_64+0xcc/0x370 [ 112.625970][ T7702] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 112.631849][ T7702] [ 112.634184][ T7702] write to 0xffff8881270af588 of 2 bytes by task 7702 on cpu 0: [ 112.641818][ T7702] pid_update_inode+0x51/0x70 [ 112.646504][ T7702] pid_revalidate+0x91/0xd0 [ 112.651007][ T7702] lookup_fast+0x6f2/0x700 [ 112.655426][ T7702] walk_component+0x6d/0xe70 [ 112.660019][ T7702] link_path_walk.part.0+0x5d3/0xa90 [ 112.665301][ T7702] path_openat+0x14f/0x36e0 [ 112.669834][ T7702] do_filp_open+0x11e/0x1b0 [ 112.674369][ T7702] do_sys_open+0x3b3/0x4f0 [ 112.678812][ T7702] __x64_sys_open+0x55/0x70 [ 112.683329][ T7702] do_syscall_64+0xcc/0x370 [ 112.687839][ T7702] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 112.693720][ T7702] [ 112.696048][ T7702] Reported by Kernel Concurrency Sanitizer on: [ 112.702201][ T7702] CPU: 0 PID: 7702 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 112.709390][ T7702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.719451][ T7702] ================================================================== [ 112.727499][ T7702] Kernel panic - not syncing: panic_on_warn set ... [ 112.734083][ T7702] CPU: 0 PID: 7702 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 112.741265][ T7702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.751318][ T7702] Call Trace: [ 112.754612][ T7702] dump_stack+0x11d/0x181 [ 112.758968][ T7702] panic+0x210/0x640 [ 112.762867][ T7702] ? vprintk_func+0x8d/0x140 [ 112.767461][ T7702] kcsan_report.cold+0xc/0xd [ 112.772077][ T7702] kcsan_setup_watchpoint+0x3fe/0x460 [ 112.777455][ T7702] __tsan_unaligned_write2+0xc4/0x100 [ 112.782830][ T7702] pid_update_inode+0x51/0x70 [ 112.787508][ T7702] pid_revalidate+0x91/0xd0 [ 112.792015][ T7702] lookup_fast+0x6f2/0x700 [ 112.796440][ T7702] walk_component+0x6d/0xe70 [ 112.801043][ T7702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 112.809109][ T7702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 112.815348][ T7702] ? security_inode_permission+0xa5/0xc0 [ 112.821949][ T7702] ? inode_permission+0xa0/0x3c0 [ 112.826896][ T7702] link_path_walk.part.0+0x5d3/0xa90 [ 112.832196][ T7702] path_openat+0x14f/0x36e0 [ 112.836707][ T7702] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 112.842633][ T7702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 112.849495][ T7702] ? __rcu_read_unlock+0x66/0x3c0 [ 112.854522][ T7702] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 112.860414][ T7702] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 112.866310][ T7702] ? __read_once_size+0x41/0xe0 [ 112.871192][ T7702] do_filp_open+0x11e/0x1b0 [ 112.875803][ T7702] ? __alloc_fd+0x2ef/0x3b0 [ 112.880344][ T7702] do_sys_open+0x3b3/0x4f0 [ 112.884881][ T7702] __x64_sys_open+0x55/0x70 [ 112.889392][ T7702] do_syscall_64+0xcc/0x370 [ 112.893923][ T7702] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 112.899896][ T7702] RIP: 0033:0x7ff509839120 [ 112.904316][ T7702] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 112.923923][ T7702] RSP: 002b:00007ffea61ec3a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 112.932505][ T7702] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007ff509839120 [ 112.940487][ T7702] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ff509d07d00 [ 112.948455][ T7702] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007ff509b01a10 [ 112.956453][ T7702] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff509d06d00 [ 112.964427][ T7702] R13: 0000000001c5a1c0 R14: 0000000000000005 R15: 0000000000000000 [ 112.973794][ T7702] Kernel Offset: disabled [ 112.978160][ T7702] Rebooting in 86400 seconds..