[info] Using makefile-style concurrent boot in runlevel 2. [ 49.311400][ T27] audit: type=1800 audit(1581986337.991:21): pid=7850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 49.361685][ T27] audit: type=1800 audit(1581986338.001:22): pid=7850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.190' (ECDSA) to the list of known hosts. 2020/02/18 00:39:09 fuzzer started 2020/02/18 00:39:11 dialing manager at 10.128.0.105:39055 2020/02/18 00:39:12 syscalls: 2910 2020/02/18 00:39:12 code coverage: enabled 2020/02/18 00:39:12 comparison tracing: enabled 2020/02/18 00:39:12 extra coverage: enabled 2020/02/18 00:39:12 setuid sandbox: enabled 2020/02/18 00:39:12 namespace sandbox: enabled 2020/02/18 00:39:12 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/18 00:39:12 fault injection: enabled 2020/02/18 00:39:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/18 00:39:12 net packet injection: enabled 2020/02/18 00:39:12 net device setup: enabled 2020/02/18 00:39:12 concurrency sanitizer: enabled 2020/02/18 00:39:12 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/02/18 00:39:13 adding functions to KCSAN blacklist: 'find_get_pages_range_tag' '__rb_insert_augmented' 'ep_poll' '_find_next_bit' syzkaller login: [ 64.623060][ T8021] KCSAN: could not find function: '_find_next_bit' 00:39:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000006400)={&(0x7f0000000000)={0x2c, r1, 0x205, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}]}, 0x2c}}, 0x0) 00:39:25 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 76.639390][ T8025] IPVS: ftp: loaded support on port[0] = 21 [ 76.715554][ T8025] chnl_net:caif_netlink_parms(): no params data found [ 76.838250][ T8025] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.845571][ T8025] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.853475][ T8025] device bridge_slave_0 entered promiscuous mode [ 76.867278][ T8031] IPVS: ftp: loaded support on port[0] = 21 [ 76.874467][ T8025] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.881543][ T8025] bridge0: port 2(bridge_slave_1) entered disabled state 00:39:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x0, r2}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2, 0x5}) [ 76.893183][ T8025] device bridge_slave_1 entered promiscuous mode [ 76.934453][ T8025] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.947695][ T8025] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.995549][ T8025] team0: Port device team_slave_0 added [ 77.015296][ T8025] team0: Port device team_slave_1 added [ 77.059264][ T8025] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 77.074338][ T8025] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 77.123187][ T8025] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 77.152778][ T8031] chnl_net:caif_netlink_parms(): no params data found [ 77.175193][ T8025] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 77.182179][ T8025] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 77.209479][ T8025] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 77.225530][ T8034] IPVS: ftp: loaded support on port[0] = 21 [ 77.295437][ T8005] ================================================================== [ 77.303697][ T8005] BUG: KCSAN: data-race in tomoyo_domain_quota_is_ok / tomoyo_merge_path_acl [ 77.312451][ T8005] [ 77.314790][ T8005] write to 0xffff88810ab6a85a of 2 bytes by task 8022 on cpu 0: [ 77.315488][ T8025] device hsr_slave_0 entered promiscuous mode [ 77.322435][ T8005] tomoyo_merge_path_acl+0x6c/0xa0 [ 77.322464][ T8005] tomoyo_update_domain+0x323/0x450 [ 77.338803][ T8005] tomoyo_write_file+0x34e/0x580 [ 77.344051][ T8005] tomoyo_write_domain2+0xad/0x120 [ 77.349277][ T8005] tomoyo_supervisor+0xa85/0xc90 [ 77.354353][ T8005] tomoyo_path_permission+0x121/0x160 [ 77.359754][ T8005] tomoyo_check_open_permission+0x2b9/0x320 [ 77.365658][ T8005] tomoyo_file_open+0x75/0x90 [ 77.370348][ T8005] security_file_open+0x69/0x210 [ 77.375297][ T8005] do_dentry_open+0x211/0x970 [ 77.379971][ T8005] vfs_open+0x62/0x80 [ 77.383968][ T8005] path_openat+0xe32/0x3150 [ 77.388566][ T8005] do_filp_open+0x11e/0x1b0 [ 77.393097][ T8005] do_sys_openat2+0x4f5/0x620 [ 77.397863][ T8005] do_sys_open+0xa3/0x110 [ 77.402226][ T8005] __x64_sys_openat+0x62/0x80 [ 77.406932][ T8005] do_syscall_64+0xcc/0x3a0 [ 77.411448][ T8005] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 77.417426][ T8005] [ 77.419762][ T8005] read to 0xffff88810ab6a85a of 2 bytes by task 8005 on cpu 1: [ 77.427319][ T8005] tomoyo_domain_quota_is_ok+0x29c/0x2b0 [ 77.432988][ T8005] tomoyo_supervisor+0x1d9/0xc90 [ 77.437954][ T8005] tomoyo_path_number_perm+0x323/0x3c0 [ 77.443432][ T8005] tomoyo_path_chmod+0x2f/0x40 [ 77.448229][ T8005] security_path_chmod+0xac/0xe0 [ 77.454316][ T8005] chmod_common+0xe0/0x2d0 [ 77.458733][ T8005] do_fchmodat+0x7a/0x100 [ 77.463196][ T8005] __x64_sys_fchmodat+0x4d/0x60 [ 77.468060][ T8005] do_syscall_64+0xcc/0x3a0 [ 77.472580][ T8005] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 77.478462][ T8005] [ 77.480788][ T8005] Reported by Kernel Concurrency Sanitizer on: [ 77.486970][ T8005] CPU: 1 PID: 8005 Comm: syz-fuzzer Not tainted 5.6.0-rc1-syzkaller #0 [ 77.495217][ T8005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.505533][ T8005] ================================================================== [ 77.513773][ T8005] Kernel panic - not syncing: panic_on_warn set ... [ 77.520379][ T8005] CPU: 1 PID: 8005 Comm: syz-fuzzer Not tainted 5.6.0-rc1-syzkaller #0 [ 77.528751][ T8005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.538815][ T8005] Call Trace: [ 77.542132][ T8005] dump_stack+0x11d/0x181 [ 77.546530][ T8005] panic+0x210/0x640 [ 77.550452][ T8005] ? vprintk_func+0x8d/0x140 [ 77.555068][ T8005] kcsan_report.cold+0xc/0x1a [ 77.559765][ T8005] kcsan_setup_watchpoint+0x3a3/0x3e0 [ 77.565313][ T8005] __tsan_read2+0xc6/0x100 [ 77.569749][ T8005] tomoyo_domain_quota_is_ok+0x29c/0x2b0 [ 77.575666][ T8005] tomoyo_supervisor+0x1d9/0xc90 [ 77.580652][ T8005] tomoyo_path_number_perm+0x323/0x3c0 [ 77.586148][ T8005] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 77.592050][ T8005] ? __read_once_size+0x5a/0xe0 [ 77.596943][ T8005] tomoyo_path_chmod+0x2f/0x40 [ 77.601726][ T8005] security_path_chmod+0xac/0xe0 [ 77.606684][ T8005] chmod_common+0xe0/0x2d0 [ 77.611320][ T8005] ? getname_flags+0x1a4/0x380 [ 77.616194][ T8005] do_fchmodat+0x7a/0x100 [ 77.620878][ T8005] __x64_sys_fchmodat+0x4d/0x60 [ 77.625745][ T8005] do_syscall_64+0xcc/0x3a0 [ 77.630272][ T8005] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 77.636176][ T8005] RIP: 0033:0x47c5aa [ 77.640082][ T8005] Code: e8 7b 6b fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 77.659796][ T8005] RSP: 002b:000000c421e139e0 EFLAGS: 00000206 ORIG_RAX: 000000000000010c [ 77.668226][ T8005] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047c5aa [ 77.676296][ T8005] RDX: 00000000000001ff RSI: 000000c421a6e240 RDI: ffffffffffffff9c [ 77.684278][ T8005] RBP: 000000c421e13a58 R08: 0000000000000000 R09: 0000000000000000 [ 77.692267][ T8005] R10: 0000000000000000 R11: 0000000000000206 R12: ffffffffffffffff [ 77.700251][ T8005] R13: 000000000000000d R14: 000000000000000c R15: 00000000000000aa [ 77.710148][ T8005] Kernel Offset: disabled [ 77.714487][ T8005] Rebooting in 86400 seconds..