[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 50.737782][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 50.737794][ T26] audit: type=1800 audit(1572816523.861:29): pid=7175 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 50.764293][ T26] audit: type=1800 audit(1572816523.861:30): pid=7175 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.87' (ECDSA) to the list of known hosts. 2019/11/03 21:28:54 fuzzer started 2019/11/03 21:28:56 dialing manager at 10.128.0.105:42255 2019/11/03 21:28:56 syscalls: 2553 2019/11/03 21:28:56 code coverage: enabled 2019/11/03 21:28:56 comparison tracing: enabled 2019/11/03 21:28:56 extra coverage: extra coverage is not supported by the kernel 2019/11/03 21:28:56 setuid sandbox: enabled 2019/11/03 21:28:56 namespace sandbox: enabled 2019/11/03 21:28:56 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/03 21:28:56 fault injection: enabled 2019/11/03 21:28:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/03 21:28:56 net packet injection: enabled 2019/11/03 21:28:56 net device setup: enabled 2019/11/03 21:28:56 concurrency sanitizer: enabled 2019/11/03 21:28:56 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/03 21:28:57 adding functions to KCSAN blacklist: 'get_wchan' 'pid_update_inode' 'generic_permission' 'ktime_get_real_seconds' '__tcp_select_window' '__hrtimer_run_queues' 21:28:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0xfffffffffffffffd]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000002c0)={{}, {0x0, 0xd000, 0x0, 0x5, 0x64a}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:28:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x8000000000010, 0x10000000002, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f00000001c0)=0x5, 0x4) sendto(r2, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syzkaller login: [ 66.384033][ T7349] IPVS: ftp: loaded support on port[0] = 21 [ 66.575389][ T7349] chnl_net:caif_netlink_parms(): no params data found [ 66.595769][ T7352] IPVS: ftp: loaded support on port[0] = 21 [ 66.649782][ T7349] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.657925][ T7349] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.666597][ T7349] device bridge_slave_0 entered promiscuous mode [ 66.681955][ T7349] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.689131][ T7349] bridge0: port 2(bridge_slave_1) entered disabled state 21:28:59 executing program 2: pipe(&(0x7f0000000300)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x23, &(0x7f0000000300)=""/166, &(0x7f0000000140)=0x10) [ 66.698066][ T7349] device bridge_slave_1 entered promiscuous mode [ 66.752901][ T7349] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.774289][ T7349] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.855538][ T7349] team0: Port device team_slave_0 added [ 66.872096][ T7349] team0: Port device team_slave_1 added [ 66.939541][ T7352] chnl_net:caif_netlink_parms(): no params data found [ 66.957861][ T7355] IPVS: ftp: loaded support on port[0] = 21 21:29:00 executing program 3: close(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) tkill(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x200000, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TCSETXF(r0, 0x5434, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010f02000270f7f8", 0x16}], 0x0, 0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="24000000240007251dfffd940101830020200a000900000001000100f1ffffff0d00ff7e", 0x24}], 0x1}, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000000400)={'broute\x00', 0x0, 0x4, 0x0, [], 0x2, &(0x7f0000000300)=[{}, {}], &(0x7f0000000340)}, &(0x7f0000000380)=0x78) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000480)=0x400) pipe(0x0) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000002c0)="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", 0xfc) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000000c0)=0x401, &(0x7f0000000340)=0x2) umount2(&(0x7f0000000540)='./file0\x00', 0x4) socket$can_bcm(0x1d, 0x2, 0x2) setpriority(0x2, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB=',`\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000827bd7000fcdbdf25100000001c000200080009000001000008000e004e20000008000b000a000000080004000700000008000400ff070000200003001400060000000000000000000000ffffac1414aa080005"], 0x3}, 0x1, 0x0, 0x0, 0x10}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffff9c, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000000540)={0x4, 0x2, 0x9, 0x2}, &(0x7f0000000580)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0x10, &(0x7f0000000ac0)={&(0x7f0000000900)=""/167, 0xa7, r5}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r5, 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[], 0x0) [ 67.034339][ T7349] device hsr_slave_0 entered promiscuous mode [ 67.091686][ T7349] device hsr_slave_1 entered promiscuous mode [ 67.325461][ T7352] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.345588][ T7352] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.381592][ T7352] device bridge_slave_0 entered promiscuous mode [ 67.420307][ T7349] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.427556][ T7349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.435101][ T7349] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.442316][ T7349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.495503][ T7352] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.503120][ T7352] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.535918][ T7352] device bridge_slave_1 entered promiscuous mode [ 67.621435][ T7374] IPVS: ftp: loaded support on port[0] = 21 [ 67.660979][ T3498] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.680760][ T3498] bridge0: port 2(bridge_slave_1) entered disabled state 21:29:00 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000300)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x380, 0x200007fd, &(0x7f0000000440)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 67.752183][ T7352] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.816791][ T7352] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.916943][ T7349] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.973483][ T7355] chnl_net:caif_netlink_parms(): no params data found [ 68.003551][ T7349] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.043251][ T7352] team0: Port device team_slave_0 added [ 68.050013][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.062527][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.141594][ T7352] team0: Port device team_slave_1 added [ 68.158399][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.167847][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.201502][ T3498] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.208718][ T3498] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.273727][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.301437][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.341015][ T3498] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.348109][ T3498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.381224][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 68.422029][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 68.551202][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 68.571427][ T7384] IPVS: ftp: loaded support on port[0] = 21 [ 68.585508][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.626836][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 68.664296][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.692284][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.721276][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.768611][ T7349] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 68.812229][ T7349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 68.885457][ T7352] device hsr_slave_0 entered promiscuous mode [ 68.953668][ T7352] device hsr_slave_1 entered promiscuous mode 21:29:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f000000b600)=[{{&(0x7f0000000080)={0x2, 0x4e24, @local}, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000140)="f0dcfbb351", 0x5}, {0x0, 0x27c}, {0x0}, {&(0x7f0000000280)="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", 0xe03}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0) [ 69.012793][ T7352] debugfs: Directory 'hsr0' with parent '/' already present! [ 69.029931][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 69.046239][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 69.083944][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 69.111768][ T7355] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.118858][ T7355] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.151659][ T7355] device bridge_slave_0 entered promiscuous mode [ 69.254100][ T7349] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 69.278871][ T7355] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.293401][ T7355] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.331662][ T7355] device bridge_slave_1 entered promiscuous mode [ 69.378149][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 69.386003][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 69.545604][ T7374] chnl_net:caif_netlink_parms(): no params data found [ 69.617149][ T7355] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.719610][ T7355] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.799868][ T7374] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.834058][ T7374] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.861548][ T7374] device bridge_slave_0 entered promiscuous mode [ 69.884059][ T7423] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 69.920820][ T7374] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.940384][ T7417] IPVS: ftp: loaded support on port[0] = 21 [ 69.953438][ T7374] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.999435][ T7374] device bridge_slave_1 entered promiscuous mode [ 70.105294][ T7355] team0: Port device team_slave_0 added [ 70.115099][ T7355] team0: Port device team_slave_1 added 21:29:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0xfffffffffffffffd]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000002c0)={{}, {0x0, 0xd000, 0x0, 0x5, 0x64a}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 70.190223][ T7374] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.248511][ T7384] chnl_net:caif_netlink_parms(): no params data found [ 70.308789][ T7374] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.433728][ T7355] device hsr_slave_0 entered promiscuous mode [ 70.481005][ T7355] device hsr_slave_1 entered promiscuous mode [ 70.487664][ T7432] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 70.500522][ T7355] debugfs: Directory 'hsr0' with parent '/' already present! [ 70.605030][ T7374] team0: Port device team_slave_0 added [ 70.657438][ T7352] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.701691][ T7374] team0: Port device team_slave_1 added 21:29:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0xfffffffffffffffd]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000002c0)={{}, {0x0, 0xd000, 0x0, 0x5, 0x64a}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 71.032270][ T7384] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.039370][ T7384] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.082130][ T7449] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 71.101515][ T7384] device bridge_slave_0 entered promiscuous mode [ 71.144540][ T7384] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.200757][ T7384] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.208948][ T7384] device bridge_slave_1 entered promiscuous mode 21:29:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0xfffffffffffffffd]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000002c0)={{}, {0x0, 0xd000, 0x0, 0x5, 0x64a}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 71.333897][ T7374] device hsr_slave_0 entered promiscuous mode [ 71.371170][ T7374] device hsr_slave_1 entered promiscuous mode [ 71.444907][ T7374] debugfs: Directory 'hsr0' with parent '/' already present! [ 71.537192][ T7422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.574532][ T7422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.645227][ T7352] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.689012][ T7417] chnl_net:caif_netlink_parms(): no params data found [ 71.789962][ T7414] ================================================================== [ 71.798129][ T7414] BUG: KCSAN: data-race in tomoyo_supervisor / tomoyo_supervisor [ 71.805835][ T7414] [ 71.808166][ T7414] write to 0xffffffff86146f24 of 4 bytes by task 7424 on cpu 0: [ 71.815807][ T7414] tomoyo_supervisor+0x1c9/0xd20 [ 71.820921][ T7414] tomoyo_path_permission+0x121/0x160 [ 71.827012][ T7414] tomoyo_check_open_permission+0x2fd/0x320 [ 71.833081][ T7414] tomoyo_file_open+0x75/0x90 [ 71.838049][ T7414] security_file_open+0x69/0x210 [ 71.843601][ T7414] do_dentry_open+0x20a/0x8f0 [ 71.848537][ T7414] vfs_open+0x62/0x80 [ 71.852517][ T7414] path_openat+0xf75/0x36e0 [ 71.857019][ T7414] do_filp_open+0x11e/0x1b0 [ 71.861606][ T7414] do_sys_open+0x3b3/0x4f0 [ 71.866014][ T7414] __x64_sys_open+0x55/0x70 [ 71.870601][ T7414] do_syscall_64+0xcc/0x370 [ 71.875102][ T7414] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.881169][ T7414] [ 71.883497][ T7414] read to 0xffffffff86146f24 of 4 bytes by task 7414 on cpu 1: [ 71.891040][ T7414] tomoyo_supervisor+0x1b0/0xd20 [ 71.896061][ T7414] tomoyo_path_permission+0x121/0x160 [ 71.901488][ T7414] tomoyo_check_open_permission+0x2fd/0x320 [ 71.907391][ T7414] tomoyo_file_open+0x75/0x90 [ 71.912063][ T7414] security_file_open+0x69/0x210 [ 71.917009][ T7414] do_dentry_open+0x20a/0x8f0 [ 71.921675][ T7414] vfs_open+0x62/0x80 [ 71.925648][ T7414] path_openat+0xf75/0x36e0 [ 71.930141][ T7414] do_filp_open+0x11e/0x1b0 [ 71.935077][ T7414] do_sys_open+0x3b3/0x4f0 [ 71.940109][ T7414] __x64_sys_open+0x55/0x70 [ 71.944677][ T7414] do_syscall_64+0xcc/0x370 [ 71.949185][ T7414] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.955781][ T7414] [ 71.961313][ T7414] Reported by Kernel Concurrency Sanitizer on: [ 71.967635][ T7414] CPU: 1 PID: 7414 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 71.974389][ T7414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.984439][ T7414] ================================================================== [ 71.992493][ T7414] Kernel panic - not syncing: panic_on_warn set ... [ 71.999076][ T7414] CPU: 1 PID: 7414 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 72.005826][ T7414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.015963][ T7414] Call Trace: [ 72.019279][ T7414] dump_stack+0xf5/0x159 [ 72.023533][ T7414] panic+0x210/0x640 [ 72.027428][ T7414] ? do_filp_open+0x11e/0x1b0 [ 72.032431][ T7414] ? vprintk_func+0x8d/0x140 [ 72.037021][ T7414] kcsan_report.cold+0xc/0x10 [ 72.041710][ T7414] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 72.047259][ T7414] __tsan_read4+0x2c/0x30 [ 72.051586][ T7414] tomoyo_supervisor+0x1b0/0xd20 [ 72.056644][ T7414] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 72.062309][ T7414] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 72.067939][ T7414] ? __tsan_write1+0x32/0x40 [ 72.072530][ T7414] ? tomoyo_compare_name_union+0xa0/0xa0 [ 72.078176][ T7414] tomoyo_path_permission+0x121/0x160 [ 72.083984][ T7414] tomoyo_check_open_permission+0x2fd/0x320 [ 72.089927][ T7414] tomoyo_file_open+0x75/0x90 [ 72.094707][ T7414] security_file_open+0x69/0x210 [ 72.099761][ T7414] do_dentry_open+0x20a/0x8f0 [ 72.104530][ T7414] ? security_inode_permission+0xa5/0xc0 [ 72.110348][ T7414] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 72.116088][ T7414] vfs_open+0x62/0x80 [ 72.120186][ T7414] path_openat+0xf75/0x36e0 [ 72.125249][ T7414] ? __tsan_write4+0x32/0x40 [ 72.129846][ T7414] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 72.136193][ T7414] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 72.142467][ T7414] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 72.148395][ T7414] do_filp_open+0x11e/0x1b0 [ 72.152932][ T7414] ? __alloc_fd+0x316/0x4c0 [ 72.157443][ T7414] do_sys_open+0x3b3/0x4f0 [ 72.161963][ T7414] __x64_sys_open+0x55/0x70 [ 72.166641][ T7414] do_syscall_64+0xcc/0x370 [ 72.171148][ T7414] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 72.177474][ T7414] RIP: 0033:0x7ff0786ea120 [ 72.181891][ T7414] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 72.201515][ T7414] RSP: 002b:00007ffdc382dd08 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 72.209934][ T7414] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007ff0786ea120 [ 72.217903][ T7414] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ff078bb8d00 [ 72.225897][ T7414] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007ff0789b2a10 [ 72.233957][ T7414] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff078bb7d00 [ 72.241931][ T7414] R13: 0000000000ddb1c0 R14: 0000000000000005 R15: 0000000000000000 [ 72.251918][ T7414] Kernel Offset: disabled [ 72.256410][ T7414] Rebooting in 86400 seconds..