[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 52.480822][ T7541] sshd (7541) used greatest stack depth: 10128 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.753718][ T26] kauditd_printk_skb: 7 callbacks suppressed [ 52.753740][ T26] audit: type=1800 audit(1574290636.383:29): pid=7476 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 52.787486][ T26] audit: type=1800 audit(1574290636.383:30): pid=7476 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.17' (ECDSA) to the list of known hosts. 2019/11/20 22:57:24 fuzzer started 2019/11/20 22:57:26 dialing manager at 10.128.0.105:37585 2019/11/20 22:57:28 syscalls: 2566 2019/11/20 22:57:28 code coverage: enabled 2019/11/20 22:57:28 comparison tracing: enabled 2019/11/20 22:57:28 extra coverage: extra coverage is not supported by the kernel 2019/11/20 22:57:28 setuid sandbox: enabled 2019/11/20 22:57:28 namespace sandbox: enabled 2019/11/20 22:57:28 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/20 22:57:28 fault injection: enabled 2019/11/20 22:57:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/20 22:57:28 net packet injection: enabled 2019/11/20 22:57:28 net device setup: enabled 2019/11/20 22:57:28 concurrency sanitizer: enabled 2019/11/20 22:57:28 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 68.968022][ T7640] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/20 22:57:34 adding functions to KCSAN blacklist: 'tomoyo_supervisor' 'run_timer_softirq' 'ep_poll' '__ext4_new_inode' 'ext4_free_inode' 'ext4_free_inodes_count' 'tcp_add_backlog' 'sctp_assoc_migrate' '__hrtimer_run_queues' 'futex_wait_queue_me' 'find_get_pages_range_tag' 'find_next_bit' 'taskstats_exit' 'mod_timer' 'tick_do_update_jiffies64' 'ext4_has_free_clusters' 'generic_write_end' 'wbt_done' '__delete_from_page_cache' 'do_syslog' 'wbt_issue' 'p9_poll_workfn' 'generic_fillattr' 'do_nanosleep' 'poll_schedule_timeout' 'padata_find_next' 'xas_find_marked' 'rcu_gp_fqs_check_wake' 'pid_update_inode' 'xas_clear_mark' 'ext4_mb_find_by_goal' 'pipe_poll' 'ext4_nonda_switch' 'blk_mq_sched_dispatch_requests' 'atime_needs_update' 'blk_mq_dispatch_rq_list' 22:58:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 101.183694][ T7645] IPVS: ftp: loaded support on port[0] = 21 22:58:04 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000100), &(0x7f0000000440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000200), &(0x7f0000000180)}, 0x20) [ 101.262301][ T7645] chnl_net:caif_netlink_parms(): no params data found [ 101.314049][ T7645] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.337998][ T7645] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.345741][ T7645] device bridge_slave_0 entered promiscuous mode [ 101.379645][ T7645] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.386789][ T7645] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.395571][ T7645] device bridge_slave_1 entered promiscuous mode [ 101.429856][ T7645] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 101.441597][ T7645] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 101.444249][ T7648] IPVS: ftp: loaded support on port[0] = 21 [ 101.461385][ T7645] team0: Port device team_slave_0 added [ 101.468440][ T7645] team0: Port device team_slave_1 added 22:58:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x1, 0x1, [@remote]}) [ 101.570588][ T7645] device hsr_slave_0 entered promiscuous mode [ 101.608308][ T7645] device hsr_slave_1 entered promiscuous mode [ 101.702092][ T7650] IPVS: ftp: loaded support on port[0] = 21 [ 101.769141][ T7645] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.776384][ T7645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.784124][ T7645] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.791340][ T7645] bridge0: port 1(bridge_slave_0) entered forwarding state 22:58:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='\xfb\xe18!\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0xffffff59}], 0x0, 0x0) sysfs$2(0x2, 0x2, &(0x7f0000000080)=""/130) [ 102.008412][ T7645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 102.017447][ T7648] chnl_net:caif_netlink_parms(): no params data found [ 102.048756][ T7645] 8021q: adding VLAN 0 to HW filter on device team0 [ 102.060251][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.079184][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.108387][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.138640][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 102.180077][ T7661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.200132][ T7661] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.207377][ T7661] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.228474][ T7661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.248450][ T7661] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.255888][ T7661] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.319416][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 102.350019][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 102.378936][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 102.413191][ T7648] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.450896][ T7648] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.471887][ T7648] device bridge_slave_0 entered promiscuous mode [ 102.499817][ T7648] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.528016][ T7648] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.588636][ T7648] device bridge_slave_1 entered promiscuous mode [ 102.638185][ T7648] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 102.658849][ T7650] chnl_net:caif_netlink_parms(): no params data found [ 102.680751][ T7661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 102.690361][ T7661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 102.723213][ T7645] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 102.748773][ T7645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 102.780727][ T7648] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 102.861062][ T7661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 102.880139][ T7661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.939497][ T7645] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 102.953010][ T7648] team0: Port device team_slave_0 added [ 102.979423][ T7648] team0: Port device team_slave_1 added [ 102.987615][ T7661] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 102.998154][ T7661] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 103.100640][ T7648] device hsr_slave_0 entered promiscuous mode [ 103.138265][ T7648] device hsr_slave_1 entered promiscuous mode [ 103.158099][ T7648] debugfs: Directory 'hsr0' with parent '/' already present! [ 103.177817][ T7682] IPVS: ftp: loaded support on port[0] = 21 [ 103.205409][ T7650] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.243203][ T7650] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.263295][ T7650] device bridge_slave_0 entered promiscuous mode [ 103.281665][ T7650] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.299841][ T7650] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.313108][ T7650] device bridge_slave_1 entered promiscuous mode [ 103.388350][ T7650] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 22:58:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000180)="6337a57571362c", 0x7}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 103.456564][ T7650] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 103.578735][ T7650] team0: Port device team_slave_0 added [ 103.639319][ T7650] team0: Port device team_slave_1 added [ 103.715372][ T7648] 8021q: adding VLAN 0 to HW filter on device bond0 [ 103.767098][ T7682] chnl_net:caif_netlink_parms(): no params data found [ 103.796046][ T7710] ================================================================== [ 103.804468][ T7710] BUG: KCSAN: data-race in generic_permission / task_dump_owner [ 103.812087][ T7710] [ 103.814416][ T7710] read to 0xffff88812556058c of 4 bytes by task 7715 on cpu 0: [ 103.823144][ T7710] generic_permission+0x65/0x3d0 [ 103.828084][ T7710] proc_pid_permission+0xea/0x1c0 [ 103.833119][ T7710] inode_permission+0x241/0x3c0 [ 103.837990][ T7710] link_path_walk.part.0+0x622/0xa90 [ 103.843284][ T7710] path_openat+0x14f/0x36e0 [ 103.847788][ T7710] do_filp_open+0x11e/0x1b0 [ 103.852321][ T7710] do_sys_open+0x3b3/0x4f0 [ 103.856765][ T7710] __x64_sys_open+0x55/0x70 [ 103.861304][ T7710] do_syscall_64+0xcc/0x370 [ 103.865824][ T7710] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 103.871723][ T7710] [ 103.874057][ T7710] write to 0xffff88812556058c of 4 bytes by task 7710 on cpu 1: [ 103.881767][ T7710] task_dump_owner+0x237/0x260 [ 103.886662][ T7710] pid_update_inode+0x3c/0x70 [ 103.891520][ T7710] pid_revalidate+0x91/0xd0 [ 103.896030][ T7710] lookup_fast+0x6f2/0x700 [ 103.900534][ T7710] walk_component+0x6d/0xe70 [ 103.905130][ T7710] link_path_walk.part.0+0x5d3/0xa90 [ 103.910430][ T7710] path_openat+0x14f/0x36e0 [ 103.914970][ T7710] do_filp_open+0x11e/0x1b0 [ 103.919490][ T7710] do_sys_open+0x3b3/0x4f0 [ 103.923948][ T7710] __x64_sys_open+0x55/0x70 [ 103.928462][ T7710] do_syscall_64+0xcc/0x370 [ 103.932974][ T7710] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 103.938876][ T7710] [ 103.941194][ T7710] Reported by Kernel Concurrency Sanitizer on: [ 103.947345][ T7710] CPU: 1 PID: 7710 Comm: ps Not tainted 5.4.0-rc7+ #0 [ 103.954100][ T7710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.964168][ T7710] ================================================================== [ 103.972565][ T7710] Kernel panic - not syncing: panic_on_warn set ... [ 103.979164][ T7710] CPU: 1 PID: 7710 Comm: ps Not tainted 5.4.0-rc7+ #0 [ 103.985934][ T7710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.995997][ T7710] Call Trace: [ 103.999294][ T7710] dump_stack+0x11d/0x181 [ 104.003628][ T7710] panic+0x210/0x640 [ 104.007528][ T7710] ? vprintk_func+0x8d/0x140 [ 104.012126][ T7710] kcsan_report.cold+0xc/0xd [ 104.016741][ T7710] kcsan_setup_watchpoint+0x3fe/0x460 [ 104.022120][ T7710] __tsan_unaligned_write4+0xc4/0x100 [ 104.027491][ T7710] task_dump_owner+0x237/0x260 [ 104.032250][ T7710] ? __rcu_read_unlock+0x66/0x3c0 [ 104.037269][ T7710] pid_update_inode+0x3c/0x70 [ 104.041952][ T7710] pid_revalidate+0x91/0xd0 [ 104.046459][ T7710] lookup_fast+0x6f2/0x700 [ 104.050898][ T7710] walk_component+0x6d/0xe70 [ 104.055495][ T7710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.061733][ T7710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.067973][ T7710] ? security_inode_permission+0xa5/0xc0 [ 104.073613][ T7710] ? inode_permission+0xa0/0x3c0 [ 104.078562][ T7710] link_path_walk.part.0+0x5d3/0xa90 [ 104.084027][ T7710] path_openat+0x14f/0x36e0 [ 104.088534][ T7710] ? proc_pid_status+0xee1/0x1000 [ 104.093574][ T7710] ? __read_once_size.constprop.0+0x12/0x20 [ 104.099472][ T7710] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 104.105716][ T7710] ? __virt_addr_valid+0x126/0x190 [ 104.110834][ T7710] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 104.117077][ T7710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.123318][ T7710] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 104.129211][ T7710] ? __read_once_size+0x41/0xe0 [ 104.134060][ T7710] do_filp_open+0x11e/0x1b0 [ 104.138570][ T7710] ? __alloc_fd+0x2ef/0x3b0 [ 104.143080][ T7710] do_sys_open+0x3b3/0x4f0 [ 104.147506][ T7710] __x64_sys_open+0x55/0x70 [ 104.152016][ T7710] do_syscall_64+0xcc/0x370 [ 104.156533][ T7710] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 104.162509][ T7710] RIP: 0033:0x7f263a64b120 [ 104.166934][ T7710] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 104.187581][ T7710] RSP: 002b:00007fff191b7178 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 104.195996][ T7710] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f263a64b120 [ 104.203965][ T7710] RDX: 00007fff191b71b2 RSI: 0000000000000000 RDI: 00007fff191b71a0 [ 104.211939][ T7710] RBP: 0000000000020000 R08: 0000000000000000 R09: 00007f263a91355f [ 104.219909][ T7710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001840220 [ 104.227874][ T7710] R13: 0000000000000020 R14: 00007f263ad00010 R15: 0000000000000000 [ 104.237245][ T7710] Kernel Offset: disabled [ 104.242449][ T7710] Rebooting in 86400 seconds..