[ 36.571361][ T26] audit: type=1800 audit(1550506851.806:26): pid=7537 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 36.608226][ T26] audit: type=1800 audit(1550506851.806:27): pid=7537 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 36.632917][ T26] audit: type=1800 audit(1550506851.806:28): pid=7537 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 37.509684][ T26] audit: type=1800 audit(1550506852.766:29): pid=7537 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.69' (ECDSA) to the list of known hosts. 2019/02/18 16:21:56 parsed 1 programs 2019/02/18 16:21:58 executed programs: 0 syzkaller login: [ 102.946216][ T7702] IPVS: ftp: loaded support on port[0] = 21 [ 103.005926][ T7702] chnl_net:caif_netlink_parms(): no params data found [ 103.039637][ T7702] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.047352][ T7702] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.054986][ T7702] device bridge_slave_0 entered promiscuous mode [ 103.063389][ T7702] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.070748][ T7702] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.078467][ T7702] device bridge_slave_1 entered promiscuous mode [ 103.094390][ T7702] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 103.104990][ T7702] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 103.122465][ T7702] team0: Port device team_slave_0 added [ 103.129354][ T7702] team0: Port device team_slave_1 added [ 103.178437][ T7702] device hsr_slave_0 entered promiscuous mode [ 103.216300][ T7702] device hsr_slave_1 entered promiscuous mode [ 103.262959][ T7702] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.270109][ T7702] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.277668][ T7702] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.284741][ T7702] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.314638][ T7702] 8021q: adding VLAN 0 to HW filter on device bond0 [ 103.327448][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 103.347613][ T2986] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.355529][ T2986] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.364873][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 103.376479][ T7702] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.385178][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.393747][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.400831][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.422529][ T7702] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 103.433118][ T7702] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 103.445530][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.454523][ T2986] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.461607][ T2986] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.469728][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 103.478490][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 103.486900][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.495087][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.503309][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 103.510917][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 103.528207][ T7702] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 105.340926][ T8210] [ 105.343385][ T8210] ===================================== [ 105.348904][ T8210] WARNING: bad unlock balance detected! [ 105.354469][ T8210] 5.0.0-rc6-next-20190218 #37 Not tainted [ 105.360155][ T8210] ------------------------------------- [ 105.365670][ T8210] syz-executor.0/8210 is trying to release lock (&file->mut) at: [ 105.373369][ T8210] [] ucma_destroy_id+0x24c/0x4a0 [ 105.379839][ T8210] but there are no more locks to release! [ 105.385525][ T8210] [ 105.385525][ T8210] other info that might help us debug this: [ 105.393558][ T8210] 1 lock held by syz-executor.0/8210: [ 105.398899][ T8210] #0: 0000000047ee5b05 (&file->mut){+.+.}, at: ucma_destroy_id+0x1e9/0x4a0 [ 105.407558][ T8210] [ 105.407558][ T8210] stack backtrace: [ 105.413428][ T8210] CPU: 1 PID: 8210 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190218 #37 [ 105.422419][ T8210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.432452][ T8210] Call Trace: [ 105.435721][ T8210] dump_stack+0x172/0x1f0 [ 105.440062][ T8210] ? ucma_destroy_id+0x24c/0x4a0 [ 105.444986][ T8210] print_unlock_imbalance_bug.cold+0x114/0x123 [ 105.451114][ T8210] ? ucma_destroy_id+0x24c/0x4a0 [ 105.456031][ T8210] lock_release+0x67e/0xa00 [ 105.460510][ T8210] ? lock_downgrade+0x880/0x880 [ 105.465346][ T8210] ? mutex_trylock+0x1e0/0x1e0 [ 105.470088][ T8210] __mutex_unlock_slowpath+0x8e/0x6b0 [ 105.475437][ T8210] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 105.481660][ T8210] ? wait_for_completion+0x440/0x440 [ 105.486943][ T8210] mutex_unlock+0xd/0x10 [ 105.491164][ T8210] ucma_destroy_id+0x24c/0x4a0 [ 105.495904][ T8210] ? ucma_close+0x320/0x320 [ 105.500384][ T8210] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 105.506601][ T8210] ? _copy_from_user+0xdd/0x150 [ 105.511427][ T8210] ucma_write+0x2da/0x3c0 [ 105.515732][ T8210] ? ucma_close+0x320/0x320 [ 105.520209][ T8210] ? ucma_open+0x290/0x290 [ 105.524602][ T8210] ? apparmor_file_permission+0x25/0x30 [ 105.530125][ T8210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 105.536349][ T8210] ? security_file_permission+0x94/0x380 [ 105.541958][ T8210] __vfs_write+0x8d/0x110 [ 105.546266][ T8210] ? ucma_open+0x290/0x290 [ 105.550659][ T8210] vfs_write+0x20c/0x580 [ 105.554877][ T8210] ksys_write+0xea/0x1f0 [ 105.559103][ T8210] ? __ia32_sys_read+0xb0/0xb0 [ 105.563843][ T8210] ? do_syscall_64+0x26/0x610 [ 105.568498][ T8210] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 105.574546][ T8210] ? do_syscall_64+0x26/0x610 [ 105.579210][ T8210] __x64_sys_write+0x73/0xb0 [ 105.583774][ T8210] do_syscall_64+0x103/0x610 [ 105.588347][ T8210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 105.594218][ T8210] RIP: 0033:0x457e29 [ 105.598100][ T8210] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 105.617677][ T8210] RSP: 002b:00007fc2629f8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 105.626062][ T8210] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 105.634011][ T8210] RDX: 0000000000000018 RSI: 0000000020000180 RDI: 0000000000000005 [ 105.641956][ T8210] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 105.649901][ T8210] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc2629f96d4 [ 105.657846][ T8210] R13: 00000000004cd790 R14: 00000000004dc9d0 R15: 00000000ffffffff