[info] Using makefile-style concurrent boot in runlevel 2. [ 40.840858][ T26] audit: type=1800 audit(1573671114.351:21): pid=7411 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 40.887876][ T26] audit: type=1800 audit(1573671114.351:22): pid=7411 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.82' (ECDSA) to the list of known hosts. 2019/11/13 18:52:06 fuzzer started 2019/11/13 18:52:08 dialing manager at 10.128.0.105:45453 2019/11/13 18:52:08 syscalls: 2566 2019/11/13 18:52:08 code coverage: enabled 2019/11/13 18:52:08 comparison tracing: enabled 2019/11/13 18:52:08 extra coverage: extra coverage is not supported by the kernel 2019/11/13 18:52:08 setuid sandbox: enabled 2019/11/13 18:52:08 namespace sandbox: enabled 2019/11/13 18:52:08 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/13 18:52:08 fault injection: enabled 2019/11/13 18:52:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/13 18:52:08 net packet injection: enabled 2019/11/13 18:52:08 net device setup: enabled 2019/11/13 18:52:08 concurrency sanitizer: enabled 2019/11/13 18:52:08 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 68.188921][ T7575] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/13 18:52:30 adding functions to KCSAN blacklist: 'xas_clear_mark' 'tick_nohz_idle_stop_tick' '__dev_queue_xmit' 'ext4_mb_good_group' 'packet_do_bind' '__hrtimer_run_queues' 'blk_mq_dispatch_rq_list' 'echo_char' 'snd_seq_prioq_cell_out' 'mousedev_poll' '__rcu_read_unlock' '__acct_update_integrals' 'percpu_counter_add_batch' 'enqueue_timer' 'blk_mq_get_request' 'free_pid' 'ext4_writepages' 'delete_from_page_cache_batch' '__do_page_fault' 'add_timer' 'ext4_nonda_switch' 'kernfs_refresh_inode' 'list_lru_count_one' 'ext4_es_lookup_extent' 'find_alive_thread' 'vti_tunnel_xmit' '__snd_rawmidi_transmit_ack' 'vfs_fsync_range' 'generic_write_end' 'bio_chain' 'ep_poll' 'process_srcu' 'do_syslog' 'mem_cgroup_select_victim_node' 'ktime_get_seconds' 'snd_ctl_notify' 'do_exit' 'timer_clear_idle' 'unix_release_sock' 'xprt_connect' 'tomoyo_supervisor' 'do_nanosleep' 'futex_wait_queue_me' 'kvm_mmu_notifier_invalidate_range_end' 'mm_update_next_owner' 'n_tty_receive_buf_common' 'common_perm_cond' 'rcu_gp_fqs_loop' 'filemap_map_pages' 'pid_update_inode' '__add_to_page_cache_locked' 'xas_find_marked' 'exit_signals' 'skb_dequeue' 'tcp_add_backlog' 'ksys_read' 'atime_needs_update' 'commit_echoes' 'blk_stat_add' 'ip_finish_output2' 'run_timer_softirq' 'ext4_free_inode' '__wb_update_bandwidth' 'dput' '__lru_cache_add' 'tick_sched_do_timer' 'ext4_has_free_clusters' 'p9_client_cb' 'virtqueue_disable_cb' 'poll_schedule_timeout' 'shmem_add_to_page_cache' '__writeback_single_inode' 'find_next_bit' 'taskstats_exit' 'blk_mq_sched_dispatch_requests' 'rq_depth_scale_up' 'shmem_file_read_iter' 'fasync_remove_entry' 'wbt_issue' 'ext4_free_inodes_count' 'rcu_gp_fqs_check_wake' 'pcpu_alloc' 'smpboot_thread_fn' 'page_counter_try_charge' '__find_get_block' 'mod_timer' 'copy_process' 'wbc_detach_inode' '__delete_from_page_cache' 'batadv_tt_local_add' 'generic_fillattr' 'ksys_write' 'blk_mq_run_hw_queue' 'calc_timer_values' 'find_get_pages_range_tag' 'kauditd_thread' '__filemap_fdatawrite_range' 'fsverity_file_open' 'vm_area_dup' 'blk_mq_free_request' 'tick_do_update_jiffies64' 'audit_log_start' '__perf_event_overflow' 'complete_signal' '__d_lookup_done' 'snd_seq_check_queue' '__mark_inode_dirty' 'inactive_list_is_low' 'snd_rawmidi_kernel_write1' 'l2tp_tunnel_del_work' 'pipe_poll' '__ext4_new_inode' 'icmp_global_allow' 'p9_poll_workfn' 'del_timer' 'shmem_getpage_gfp' 'ext4_mark_iloc_dirty' 'lruvec_lru_size' 'pipe_wait' 'evict' 'page_counter_charge' 'generic_file_read_iter' '__skb_try_recv_from_queue' 'ktime_get_real_seconds' 'do_readlinkat' '__skb_wait_for_more_packets' 'dd_has_work' 'do_signal_stop' 'sit_tunnel_xmit' 'clean_buffers' 18:56:09 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) r1 = accept4$x25(r0, 0x0, &(0x7f0000000000), 0x80000) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@remote={[], 0x0}, 0xf, 'hwsim0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r2, 0xe, 0x0, @in={0x2, 0x4e20, @rand_addr=0xfff}}}, 0x90) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000300)=0x78) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000380)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {&(0x7f0000000340), r3}}, 0x18) pipe2$9p(&(0x7f0000000440), 0x4000) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000480)) r4 = syz_open_dev$admmidi(&(0x7f00000004c0)='/dev/admmidi#\x00', 0x0, 0x224200) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x80000, 0x0) ioctl$SG_GET_SG_TABLESIZE(r6, 0x227f, &(0x7f0000000540)) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000600)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vcs\x00', 0x4002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {&(0x7f00000005c0), r8, r9}}, 0x18) r10 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000700)='/dev/snapshot\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000740)={0x0, 0x59, 0x6, 0x6}, &(0x7f0000000780)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r10, 0x84, 0x1f, &(0x7f00000007c0)={r11, @in6={{0xa, 0x4e23, 0x6, @local, 0x9}}, 0x3, 0xd8d2}, &(0x7f0000000880)=0x90) r12 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/dlm-monitor\x00', 0x500000, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r12, &(0x7f0000000c00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x204400}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000940)={0x274, 0x0, 0x1501, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK={0x174, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff62f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5b1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x274}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}]}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x18b4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9db1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4d}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2aa3}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x825}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffff7}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x274}, 0x1, 0x0, 0x0, 0xc800}, 0x4c73849e7b25384c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c80)={&(0x7f0000000c40)='/dev/null\x00', r6}, 0x10) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r7, 0xc008551a, &(0x7f0000000cc0)={0xfffffff8, 0x8, [0x200, 0xfffffff7]}) r13 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d00)='/proc/self/net/pfkey\x00', 0x80000, 0x0) ioctl$VHOST_SET_LOG_BASE(r13, 0x4008af04, &(0x7f0000000d80)=&(0x7f0000000d40)) [ 295.789816][ T7578] IPVS: ftp: loaded support on port[0] = 21 18:56:09 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x2) timerfd_settime(r0, 0x2, &(0x7f0000000040), &(0x7f0000000080)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x80000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r2}}, 0x18) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x40000, 0x0) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x3) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x4000, 0x0) name_to_handle_at(r4, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0xf3, 0x9, "fcc3cb3acafd2201b3510a837533ff1d1ec239327531fbf96d0c59859ebfecf1003cee22bd4a701ceeaebd9858a95df74efaff8fabee8b6a3fce0fcf3c0391e89dd68f547685b0f518c7a089aae9104fdbf312d6313fd543b9bea1f00067087b9b1e93bb92c1019604a92e55e3a8d95c5d12f25673e7d3351dfe26a134efa07db557cf35d18c4499301ca516721c3809ac59c77813804472fcc3258ab6a0376bbe3f28bf449cca459388c4a8317fa0bbf093cf2d65e98f94eea18bed1e995b51e08e104c48b2150799210c3eea1668e775d16ba11b1eb574cf6743362f18fce5267a710d091bf2042ae4b6"}, &(0x7f00000003c0), 0xaa2a5526f002bbae) r5 = socket$inet(0x2, 0x4, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x10011, r5, 0x64647000) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000400)) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000440)=0x6) keyctl$session_to_parent(0x12) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x701002, 0x0) ioctl$VT_GETMODE(r6, 0x5601, &(0x7f00000004c0)) pselect6(0x40, &(0x7f0000000500)={0x4, 0x7, 0x400, 0x8, 0x705f, 0x8, 0x5dec, 0x200}, &(0x7f0000000540)={0xcc, 0x1f, 0x9, 0x82e, 0x400, 0x7f, 0x5, 0x746c8d23}, &(0x7f0000000580)={0x4, 0x7fffffff, 0x1, 0x2, 0x9, 0xcb9, 0x1, 0x8}, &(0x7f00000005c0), &(0x7f0000000640)={&(0x7f0000000600)={0x8e51}, 0x8}) prctl$PR_SET_KEEPCAPS(0x8, 0x1) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f0000000680)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000740)=0x2, 0x4) r7 = syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x7, 0x100) fsetxattr$trusted_overlay_opaque(r7, &(0x7f00000007c0)='trusted.overlay.opaque\x00', &(0x7f0000000800)='y\x00', 0x2, 0x1) ioctl$EVIOCSFF(r6, 0x40304580, &(0x7f0000000840)={0x52, 0x1, 0x8001, {0x2, 0x6}, {0x400, 0x3}, @rumble={0x5a11, 0x40}}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000880)='/dev/autofs\x00', 0xc0321, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000008c0)={0xffffffffffffffff}, 0x139, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000940)={0xa, 0x4, 0xfa00, {r8}}, 0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cachefiles\x00', 0x400000, 0x0) read$eventfd(r9, &(0x7f00000009c0), 0x8) r10 = accept$alg(r7, 0x0, 0x0) vmsplice(r10, &(0x7f0000000a40)=[{&(0x7f0000000a00)="342219b72ac29d6dc60375e956f3a89c4785c3b58f10bf830491675d270966461b94f23d91046c24d75369977010912d6e391c9f14e5", 0x36}], 0x1, 0x1) [ 295.841512][ T7565] ================================================================== [ 295.849666][ T7565] BUG: KCSAN: data-race in tomoyo_check_acl / tomoyo_update_domain [ 295.857544][ T7565] [ 295.859874][ T7565] read to 0xffff888122e1e9d8 of 1 bytes by task 7559 on cpu 0: [ 295.860559][ T7578] chnl_net:caif_netlink_parms(): no params data found [ 295.867421][ T7565] tomoyo_check_acl+0x98/0x270 [ 295.867435][ T7565] tomoyo_path_number_perm+0x272/0x3c0 [ 295.867456][ T7565] tomoyo_path_mkdir+0x6e/0xa0 [ 295.889599][ T7565] security_path_mkdir+0xb8/0xf0 [ 295.894532][ T7565] do_mkdirat+0xef/0x1f0 [ 295.895267][ T7578] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.898862][ T7565] __x64_sys_mkdirat+0x4d/0x60 [ 295.905934][ T7578] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.910614][ T7565] do_syscall_64+0xcc/0x370 [ 295.910641][ T7565] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 295.918618][ T7578] device bridge_slave_0 entered promiscuous mode [ 295.922106][ T7565] [ 295.928963][ T7578] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.934295][ T7565] write to 0xffff888122e1e9d8 of 1 bytes by task 7565 on cpu 1: [ 295.934320][ T7565] tomoyo_update_domain+0x32f/0x450 [ 295.934332][ T7565] tomoyo_write_file+0x34e/0x580 [ 295.934356][ T7565] tomoyo_write_domain2+0xad/0x120 [ 295.937238][ T7578] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.943668][ T7565] tomoyo_supervisor+0xad7/0xd20 [ 295.943686][ T7565] tomoyo_path_permission+0x121/0x160 [ 295.943708][ T7565] tomoyo_check_open_permission+0x2b9/0x320 [ 295.952029][ T7578] device bridge_slave_1 entered promiscuous mode [ 295.956484][ T7565] tomoyo_file_open+0x75/0x90 [ 295.956501][ T7565] security_file_open+0x69/0x210 [ 295.956523][ T7565] do_dentry_open+0x211/0x970 [ 295.973256][ T7578] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 295.973548][ T7565] vfs_open+0x62/0x80 [ 295.979518][ T7578] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 295.983819][ T7565] path_openat+0xf73/0x36e0 [ 295.983833][ T7565] do_filp_open+0x11e/0x1b0 [ 295.983844][ T7565] do_sys_open+0x3b3/0x4f0 [ 295.983857][ T7565] __x64_sys_openat+0x62/0x80 [ 295.983881][ T7565] do_syscall_64+0xcc/0x370 [ 296.000895][ T7578] team0: Port device team_slave_0 added [ 296.005716][ T7565] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 296.005722][ T7565] [ 296.005726][ T7565] Reported by Kernel Concurrency Sanitizer on: [ 296.005741][ T7565] CPU: 1 PID: 7565 Comm: syz-fuzzer Not tainted 5.4.0-rc7+ #0 [ 296.005757][ T7565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.011252][ T7578] team0: Port device team_slave_1 added [ 296.019411][ T7565] ================================================================== [ 296.019419][ T7565] Kernel panic - not syncing: panic_on_warn set ... [ 296.019433][ T7565] CPU: 1 PID: 7565 Comm: syz-fuzzer Not tainted 5.4.0-rc7+ #0 [ 296.019440][ T7565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.019444][ T7565] Call Trace: [ 296.019463][ T7565] dump_stack+0x11d/0x181 [ 296.019481][ T7565] panic+0x210/0x640 [ 296.019504][ T7565] ? vprintk_func+0x8d/0x140 [ 296.019531][ T7565] kcsan_report.cold+0xc/0x1a [ 296.150578][ T7565] kcsan_setup_watchpoint+0x3fe/0x460 [ 296.155937][ T7565] ? tomoyo_same_path_acl+0x80/0x80 [ 296.161120][ T7565] __tsan_unaligned_write1+0xc0/0x100 [ 296.166490][ T7565] tomoyo_update_domain+0x32f/0x450 [ 296.171671][ T7565] ? tomoyo_same_path_acl+0x80/0x80 [ 296.176937][ T7565] ? tomoyo_write_misc+0x190/0x190 [ 296.182030][ T7565] tomoyo_write_file+0x34e/0x580 [ 296.186952][ T7565] ? vsnprintf+0x1a7/0xb40 [ 296.191350][ T7565] ? strncmp+0x66/0x80 [ 296.195402][ T7565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.201626][ T7565] tomoyo_write_domain2+0xad/0x120 [ 296.206724][ T7565] tomoyo_supervisor+0xad7/0xd20 [ 296.211642][ T7565] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 296.217359][ T7565] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 296.223593][ T7565] ? __read_once_size.constprop.0+0x12/0x20 [ 296.229483][ T7565] tomoyo_path_permission+0x121/0x160 [ 296.234839][ T7565] tomoyo_check_open_permission+0x2b9/0x320 [ 296.240722][ T7565] tomoyo_file_open+0x75/0x90 [ 296.245382][ T7565] security_file_open+0x69/0x210 [ 296.250298][ T7565] do_dentry_open+0x211/0x970 [ 296.254970][ T7565] ? security_inode_permission+0xa5/0xc0 [ 296.260604][ T7565] vfs_open+0x62/0x80 [ 296.264570][ T7565] path_openat+0xf73/0x36e0 [ 296.269063][ T7565] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 296.274937][ T7565] do_filp_open+0x11e/0x1b0 [ 296.279427][ T7565] ? _raw_spin_unlock+0x4b/0x60 [ 296.284260][ T7565] ? __alloc_fd+0x2ef/0x3b0 [ 296.288775][ T7565] ? get_unused_fd_flags+0x93/0xc0 [ 296.293962][ T7565] do_sys_open+0x3b3/0x4f0 [ 296.298374][ T7565] __x64_sys_openat+0x62/0x80 [ 296.303038][ T7565] do_syscall_64+0xcc/0x370 [ 296.307529][ T7565] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 296.313399][ T7565] RIP: 0033:0x47c5aa [ 296.317280][ T7565] Code: e8 7b 6b fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 296.336879][ T7565] RSP: 002b:000000c4203a57c0 EFLAGS: 00000206 ORIG_RAX: 0000000000000101 [ 296.345293][ T7565] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047c5aa [ 296.353255][ T7565] RDX: 00000000000800c2 RSI: 000000c43f2761c0 RDI: ffffffffffffff9c [ 296.361205][ T7565] RBP: 000000c4203a5840 R08: 0000000000000000 R09: 0000000000000000 [ 296.369157][ T7565] R10: 0000000000000180 R11: 0000000000000206 R12: ffffffffffffffff [ 296.377112][ T7565] R13: 000000000000000f R14: 000000000000000e R15: 0000000000000100 [ 296.386548][ T7565] Kernel Offset: disabled [ 296.390886][ T7565] Rebooting in 86400 seconds..