[ 49.579380][ T26] audit: type=1800 audit(1572963474.454:27): pid=7807 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 49.631642][ T26] audit: type=1800 audit(1572963474.454:28): pid=7807 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 50.472464][ T26] audit: type=1800 audit(1572963475.394:29): pid=7807 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 50.492509][ T26] audit: type=1800 audit(1572963475.394:30): pid=7807 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.205' (ECDSA) to the list of known hosts. 2019/11/05 14:18:02 fuzzer started 2019/11/05 14:18:04 dialing manager at 10.128.0.105:43787 2019/11/05 14:18:04 checking machine... 2019/11/05 14:18:04 checking revisions... 2019/11/05 14:18:04 testing simple program... syzkaller login: [ 59.962325][ T7981] IPVS: ftp: loaded support on port[0] = 21 2019/11/05 14:18:05 building call list... executing program [ 63.068639][ T7964] can: request_module (can-proto-0) failed. [ 63.080562][ T7964] can: request_module (can-proto-0) failed. [ 63.092347][ T7964] can: request_module (can-proto-7) failed. [ 63.104371][ T7964] can: request_module (can-proto-0) failed. 2019/11/05 14:18:11 syscalls: 2553 2019/11/05 14:18:11 code coverage: enabled 2019/11/05 14:18:11 comparison tracing: enabled 2019/11/05 14:18:11 extra coverage: extra coverage is not supported by the kernel 2019/11/05 14:18:11 setuid sandbox: enabled 2019/11/05 14:18:11 namespace sandbox: enabled 2019/11/05 14:18:11 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/05 14:18:11 fault injection: enabled 2019/11/05 14:18:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/05 14:18:11 net packet injection: enabled 2019/11/05 14:18:11 net device setup: enabled 2019/11/05 14:18:11 concurrency sanitizer: enabled 2019/11/05 14:18:11 devlink PCI setup: PCI device 0000:00:10.0 is not available 14:18:12 executing program 0: r0 = socket(0x10, 0x803, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)=""/233, 0xe9}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000940)=""/230, 0xe6}, {&(0x7f0000000140)=""/102, 0x66}, {&(0x7f0000000a40)=""/164, 0xa4}, {&(0x7f0000000e00)=""/197, 0xc5}, {&(0x7f0000000f00)=""/145, 0x91}], 0x5, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000d00)=""/226, 0xe2}], 0x1, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0), 0xc, &(0x7f00000007c0)={&(0x7f00000062c0)=ANY=[@ANYBLOB="54020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x254}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) [ 67.563334][ T8026] IPVS: ftp: loaded support on port[0] = 21 14:18:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000080)=0x802, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 67.640412][ T8026] chnl_net:caif_netlink_parms(): no params data found [ 67.678777][ T8026] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.685926][ T8026] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.693871][ T8026] device bridge_slave_0 entered promiscuous mode [ 67.702024][ T8026] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.709206][ T8026] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.718106][ T8026] device bridge_slave_1 entered promiscuous mode [ 67.762856][ T8026] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.781070][ T8026] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.821953][ T8026] team0: Port device team_slave_0 added [ 67.832171][ T8026] team0: Port device team_slave_1 added 14:18:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000340)) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='\x00\a\x00\x00\x81z\x00\x00\x00G\xe3U:Q<\x16%\x98\xff\xf2\xda\xeb\x88i\x16\x02\xb5\x83\x19\xf3w\x18\xc7\x96\x05\x00y\x93\xd3W\xc4-\x86\xcf\xa5\xed\xc8RF\xf2.Ihm\xe2\x86\xd2\xf1\xd6\xb6\xff<\xa4}\xcb\x99\x9fq\x1dF\xe0\x05Y\xfex\x0f\x17\xf7s\xd51\xdf\xeb\x87tT&|i\xc9\xa8\x95\\\xf2\xb5\ay\xc8\xc8R\x92\xf1#\x9bsm\xf6F\x83\xd7\x13L\x94\xf8}\xc7m>\xe4]\xde\xfa=d\xc5\xf7\x115\xd7\xf3\xbc\x0f\xe3V\x9d\xf8\x8b|1\r\xd4X\xae\\\xd5\x9a4J\n\xac\xd1\x9f\a\xa0\xf6\xb0v\v\xde\x04\x00\x00\x00\x1f\xe0\f,\x9e\x13\xdf\xf4\xc3)mzB\xe0Y\xc3n|M\xc5\xf7\xd0\x94\xfb\x19\x9b\xefS\xf8zi0\xb5v\xde\xed\xccl\xe9\x0e-\xef\x9dN&%\x80A\xacn\x8c~7\x18\x94\x94\xd9\x8f\xd1\xe13\xd9\xa6\xb3\xa7\xf3\xcf\xb3,\x9b\xd8x\x94\xb7\x8f\xcf?\xda\v\xe7\xd2!\x8c\xa8\xe3F\x81\xee\x1c\x1c\xa7\xbcnU!R\xbc\x9fJ\xc1Z\xeeu\'\x7f\xc1\x1c\xcb\x04\xf34F[\xf7\xc8VK\xad\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe6\xb9\x03v\x8d+\xc7\x90U\xd8\x9aP \x92\xf6/\xe1\xcd\x02 \x0f\xffx5\x92\xb2&\x8e\xf6\xd5\x17\xe4\xf6b\x9aw\xca\xf26\xb0n\xef\xa6\x19\xa7/3s\xf4\xda\xb3\xb5Fl\xdco\xca\x00\x00\x00Mxa\xfcD\xa03\xf7\"?Z\x84\xf9\x9es\x10\xb4\xaa\x10Z\x0f0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99>oJ\x02u\x9b\x94a\xac\x00\x00\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32=0x0], 0x4) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) fallocate(r1, 0x0, 0x0, 0x9) write$binfmt_script(r1, 0x0, 0x0) [ 69.405143][ T8026] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 69.423487][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 69.432421][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 69.496333][ T8029] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.530119][ T8029] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.560817][ T8029] device bridge_slave_0 entered promiscuous mode [ 69.571366][ T8029] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.578438][ T8029] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.620448][ T8029] device bridge_slave_1 entered promiscuous mode [ 69.701423][ T8050] chnl_net:caif_netlink_parms(): no params data found [ 69.752556][ T8029] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.807695][ T8029] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.884190][ T8050] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.891613][ T8050] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.899459][ T8050] device bridge_slave_0 entered promiscuous mode [ 69.915159][ T8072] IPVS: ftp: loaded support on port[0] = 21 [ 69.961876][ T8029] team0: Port device team_slave_0 added [ 69.990630][ T8050] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.997695][ T8050] bridge0: port 2(bridge_slave_1) entered disabled state 14:18:15 executing program 5: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x2000000000000006, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x4}, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) close(r0) [ 70.012565][ T8050] device bridge_slave_1 entered promiscuous mode [ 70.020530][ T8029] team0: Port device team_slave_1 added [ 70.039650][ T8061] chnl_net:caif_netlink_parms(): no params data found 14:18:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)=""/233, 0xe9}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000940)=""/230, 0xe6}, {&(0x7f0000000140)=""/102, 0x66}, {&(0x7f0000000a40)=""/164, 0xa4}, {&(0x7f0000000e00)=""/197, 0xc5}, {&(0x7f0000000f00)=""/145, 0x91}], 0x5, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000d00)=""/226, 0xe2}], 0x1, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0), 0xc, &(0x7f00000007c0)={&(0x7f00000062c0)=ANY=[@ANYBLOB="54020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x254}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) [ 70.096908][ T8050] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.152498][ T8029] device hsr_slave_0 entered promiscuous mode [ 70.179912][ T8029] device hsr_slave_1 entered promiscuous mode [ 70.229569][ T8029] debugfs: Directory 'hsr0' with parent '/' already present! [ 70.238136][ T8050] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:18:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)=""/233, 0xe9}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000940)=""/230, 0xe6}, {&(0x7f0000000140)=""/102, 0x66}, {&(0x7f0000000a40)=""/164, 0xa4}, {&(0x7f0000000e00)=""/197, 0xc5}, {&(0x7f0000000f00)=""/145, 0x91}], 0x5, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000d00)=""/226, 0xe2}], 0x1, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0), 0xc, &(0x7f00000007c0)={&(0x7f00000062c0)=ANY=[@ANYBLOB="54020000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f000000140002000800020000000000080002000000000014010100100001006574683a636169663000000038000400200001000a000000000000001cf85251b70cebe9bdc5cae0b7843518000000001400020002000000ac1414bb000000000000000044000400200001000a00000000000000ff02000000000000000000000000000100000000200002000a00000000000000fe88000000000000000000000000000100000000080003000000000034000200080001000000000008000400000000000800020000000000080003000000000008000400000000000800020000000000100001007564703a73797a3200000000380004001400010002000000ac1e00010000000000000000200002000a0000000000000000000000000000000000000000000000000000003800050034000200080002000000000008000100000000000800030000000000080001000000000008000300000000000800010000000000300001002c0004001400010002000000ffffffff00000000000000001400020002000000ac1e000100000000000000001400010008000300000000000800030000000000640005001400020008000300000000000800040000000000080001007564700034000200080004000000000008000200000000000800020000000000080004000000000008000400000000000800020000000000080001007564700008000100696200001c0001000800010069623a00100001007564703a73797a32000000001c000600040002000400020004000200040002000800010000000000b10970e5b0372dd8adcc1b83fa8df5b0b477f882ab81b8b58bf2b42b412cae46b0400b5a8df8692e40bde248129d11eb2a4e2f16025b166b471353b0f9241d9efe4dc5965c91829a5aead091eba2606f6a880fa6c7df2c596d7d3abe8893f621cb1a11169a2b23da730b19036a2205f3e937bb14a22c31b067d1296fdf9737a994829761bee3aa666bd49e86148166c784ba69c5aa4d66c80c704c2e69861f2cbebc428b411e5878dd7f20def978863c2e18e1f6b4369987f2b7eebaf6cc9246ee582321c5f4ba54fce884fef9d99cc7014ef21eaa22"], 0x254}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) [ 70.288340][ T8050] team0: Port device team_slave_0 added [ 70.313478][ T8086] IPVS: ftp: loaded support on port[0] = 21 [ 70.331495][ T8072] chnl_net:caif_netlink_parms(): no params data found [ 70.363709][ T8050] team0: Port device team_slave_1 added [ 70.373151][ T8061] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.385888][ T8061] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.416098][ T8061] device bridge_slave_0 entered promiscuous mode [ 70.518812][ T8061] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.533247][ T8061] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.589672][ T8061] device bridge_slave_1 entered promiscuous mode 14:18:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)=""/233, 0xe9}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000940)=""/230, 0xe6}, {&(0x7f0000000140)=""/102, 0x66}, {&(0x7f0000000a40)=""/164, 0xa4}, {&(0x7f0000000e00)=""/197, 0xc5}, {&(0x7f0000000f00)=""/145, 0x91}], 0x5, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000d00)=""/226, 0xe2}], 0x1, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0), 0xc, &(0x7f00000007c0)={&(0x7f00000062c0)=ANY=[@ANYBLOB="54020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x254}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) [ 70.725610][ T8050] device hsr_slave_0 entered promiscuous mode [ 70.789827][ T8050] device hsr_slave_1 entered promiscuous mode [ 70.798997][ T8111] ================================================================== [ 70.807129][ T8111] BUG: KCSAN: data-race in generic_permission / pid_update_inode [ 70.814828][ T8111] [ 70.817163][ T8111] write to 0xffff88812a7a8838 of 2 bytes by task 8103 on cpu 0: [ 70.824794][ T8111] pid_update_inode+0x51/0x70 [ 70.829475][ T8111] pid_revalidate+0x91/0xd0 [ 70.833982][ T8111] lookup_fast+0x6f2/0x700 [ 70.838404][ T8111] walk_component+0x6d/0xe70 [ 70.843001][ T8111] link_path_walk.part.0+0x5d3/0xa90 [ 70.848291][ T8111] path_openat+0x14f/0x36e0 [ 70.852813][ T8111] do_filp_open+0x11e/0x1b0 [ 70.857317][ T8111] do_sys_open+0x3b3/0x4f0 [ 70.861741][ T8111] __x64_sys_open+0x55/0x70 [ 70.866254][ T8111] do_syscall_64+0xcc/0x370 [ 70.870769][ T8111] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 70.876650][ T8111] [ 70.878987][ T8111] read to 0xffff88812a7a8838 of 2 bytes by task 8111 on cpu 1: [ 70.886543][ T8111] generic_permission+0x36/0x3d0 [ 70.891490][ T8111] proc_pid_permission+0xea/0x1c0 [ 70.896523][ T8111] inode_permission+0x241/0x3c0 [ 70.901381][ T8111] link_path_walk.part.0+0x622/0xa90 [ 70.906666][ T8111] path_openat+0x14f/0x36e0 [ 70.911163][ T8111] do_filp_open+0x11e/0x1b0 [ 70.915670][ T8111] do_sys_open+0x3b3/0x4f0 [ 70.920088][ T8111] __x64_sys_open+0x55/0x70 [ 70.924597][ T8111] do_syscall_64+0xcc/0x370 [ 70.929110][ T8111] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 70.934992][ T8111] [ 70.937315][ T8111] Reported by Kernel Concurrency Sanitizer on: [ 70.943471][ T8111] CPU: 1 PID: 8111 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 70.950226][ T8111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.960279][ T8111] ================================================================== [ 70.968344][ T8111] Kernel panic - not syncing: panic_on_warn set ... [ 70.974942][ T8111] CPU: 1 PID: 8111 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 70.981705][ T8111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.991753][ T8111] Call Trace: [ 70.995055][ T8111] dump_stack+0xf5/0x159 [ 70.999312][ T8111] panic+0x210/0x640 [ 71.003223][ T8111] ? vprintk_func+0x8d/0x140 [ 71.007827][ T8111] kcsan_report.cold+0xc/0xe [ 71.012435][ T8111] kcsan_setup_watchpoint+0x3fe/0x410 [ 71.017816][ T8111] __tsan_read2+0x145/0x1f0 [ 71.022331][ T8111] generic_permission+0x36/0x3d0 [ 71.027277][ T8111] proc_pid_permission+0xea/0x1c0 [ 71.032310][ T8111] ? comm_show+0xb0/0xb0 [ 71.036558][ T8111] inode_permission+0x241/0x3c0 [ 71.041424][ T8111] link_path_walk.part.0+0x622/0xa90 [ 71.046732][ T8111] path_openat+0x14f/0x36e0 [ 71.051257][ T8111] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 71.057159][ T8111] ? __rcu_read_unlock+0x66/0x3c0 [ 71.062188][ T8111] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 71.068092][ T8111] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 71.074003][ T8111] ? __read_once_size+0x41/0xe0 [ 71.078867][ T8111] do_filp_open+0x11e/0x1b0 [ 71.083402][ T8111] ? __alloc_fd+0x2ef/0x3b0 [ 71.088023][ T8111] do_sys_open+0x3b3/0x4f0 [ 71.092451][ T8111] __x64_sys_open+0x55/0x70 [ 71.096961][ T8111] do_syscall_64+0xcc/0x370 [ 71.101470][ T8111] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.107364][ T8111] RIP: 0033:0x7f8fc2ec7120 [ 71.111792][ T8111] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 71.131402][ T8111] RSP: 002b:00007ffedcdcd538 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 71.139826][ T8111] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f8fc2ec7120 [ 71.147794][ T8111] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f8fc3395d00 [ 71.155768][ T8111] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f8fc318fa10 [ 71.163737][ T8111] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8fc3394d00 [ 71.171709][ T8111] R13: 00000000017481c0 R14: 0000000000000005 R15: 0000000000000000 [ 71.180985][ T8111] Kernel Offset: disabled [ 71.185309][ T8111] Rebooting in 86400 seconds..