[info] Using makefile-style concurrent boot in runlevel 2. [ 43.489094][ T25] audit: type=1800 audit(1570531774.330:21): pid=7143 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 43.536225][ T25] audit: type=1800 audit(1570531774.330:22): pid=7143 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.33' (ECDSA) to the list of known hosts. 2019/10/08 10:49:44 fuzzer started 2019/10/08 10:49:45 dialing manager at 10.128.0.105:33861 2019/10/08 10:49:45 syscalls: 2523 2019/10/08 10:49:45 code coverage: enabled 2019/10/08 10:49:45 comparison tracing: enabled 2019/10/08 10:49:45 extra coverage: extra coverage is not supported by the kernel 2019/10/08 10:49:45 setuid sandbox: enabled 2019/10/08 10:49:45 namespace sandbox: enabled 2019/10/08 10:49:45 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/08 10:49:45 fault injection: enabled 2019/10/08 10:49:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/08 10:49:45 net packet injection: enabled 2019/10/08 10:49:45 net device setup: enabled 2019/10/08 10:49:45 concurrency sanitizer: enabled 10:49:46 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30}, 0x30) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30}, 0x30) syzkaller login: [ 55.855007][ T7311] IPVS: ftp: loaded support on port[0] = 21 10:49:46 executing program 1: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) pipe(0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 55.941716][ T7311] chnl_net:caif_netlink_parms(): no params data found [ 55.950607][ T7298] ================================================================== [ 55.958934][ T7298] BUG: KCSAN: data-race in tomoyo_supervisor / tomoyo_supervisor [ 55.966796][ T7298] [ 55.969119][ T7298] read to 0xffffffff860bff44 of 4 bytes by task 7292 on cpu 1: [ 55.976658][ T7298] tomoyo_supervisor+0x1b0/0xd20 [ 55.980111][ T7311] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.981589][ T7298] tomoyo_path_number_perm+0x323/0x3c0 [ 55.981603][ T7298] tomoyo_path_mkdir+0x6e/0xa0 [ 55.981670][ T7298] security_path_mkdir+0xb8/0xf0 [ 55.989000][ T7311] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.994392][ T7298] do_mkdirat+0xef/0x1f0 [ 55.994405][ T7298] __x64_sys_mkdirat+0x4d/0x60 [ 55.994418][ T7298] do_syscall_64+0xcf/0x2f0 [ 55.994489][ T7298] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 56.003035][ T7311] device bridge_slave_0 entered promiscuous mode [ 56.004149][ T7298] [ 56.012651][ T7311] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.015383][ T7298] write to 0xffffffff860bff44 of 4 bytes by task 7298 on cpu 0: [ 56.020159][ T7311] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.024604][ T7298] tomoyo_supervisor+0x1c9/0xd20 [ 56.024617][ T7298] tomoyo_path_permission+0x121/0x160 [ 56.024630][ T7298] tomoyo_check_open_permission+0x2fd/0x320 [ 56.024654][ T7298] tomoyo_file_open+0x75/0x90 [ 56.031565][ T7311] device bridge_slave_1 entered promiscuous mode [ 56.036833][ T7298] security_file_open+0x69/0x210 [ 56.055184][ T7311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.060748][ T7298] do_dentry_open+0x20a/0x900 [ 56.067038][ T7311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.071013][ T7298] vfs_open+0x62/0x80 [ 56.071024][ T7298] path_openat+0xf75/0x3530 [ 56.071036][ T7298] do_filp_open+0x11e/0x1b0 [ 56.071058][ T7298] do_sys_open+0x3b3/0x4f0 [ 56.089395][ T7311] team0: Port device team_slave_0 added [ 56.092794][ T7298] __x64_sys_openat+0x62/0x80 [ 56.092809][ T7298] do_syscall_64+0xcf/0x2f0 [ 56.092827][ T7298] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 56.092830][ T7298] [ 56.092847][ T7298] Reported by Kernel Concurrency Sanitizer on: [ 56.105909][ T7311] team0: Port device team_slave_1 added [ 56.106607][ T7298] CPU: 0 PID: 7298 Comm: syz-fuzzer Not tainted 5.3.0+ #0 [ 56.175294][ T7298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.185343][ T7298] ================================================================== [ 56.193396][ T7298] Kernel panic - not syncing: panic_on_warn set ... [ 56.199973][ T7298] CPU: 0 PID: 7298 Comm: syz-fuzzer Not tainted 5.3.0+ #0 [ 56.207067][ T7298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.217464][ T7298] Call Trace: [ 56.220748][ T7298] dump_stack+0xf5/0x159 [ 56.224989][ T7298] panic+0x209/0x639 [ 56.228882][ T7298] ? vprintk_func+0x8d/0x140 [ 56.233474][ T7298] kcsan_report.cold+0x57/0xeb [ 56.238240][ T7298] __kcsan_setup_watchpoint+0x342/0x500 [ 56.243781][ T7298] __tsan_write4+0x32/0x40 [ 56.248192][ T7298] tomoyo_supervisor+0x1c9/0xd20 [ 56.253126][ T7298] ? tomoyo_path_matches_pattern+0xa1/0x160 [ 56.259025][ T7298] ? __tsan_write1+0x32/0x40 [ 56.263611][ T7298] ? tomoyo_compare_name_union+0xa0/0xa0 [ 56.269252][ T7298] tomoyo_path_permission+0x121/0x160 [ 56.274624][ T7298] tomoyo_check_open_permission+0x2fd/0x320 [ 56.280530][ T7298] tomoyo_file_open+0x75/0x90 [ 56.285317][ T7298] security_file_open+0x69/0x210 [ 56.290243][ T7298] do_dentry_open+0x20a/0x900 [ 56.294900][ T7298] ? security_inode_permission+0xa5/0xc0 [ 56.300511][ T7298] vfs_open+0x62/0x80 [ 56.304471][ T7298] path_openat+0xf75/0x3530 [ 56.308962][ T7298] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 56.314846][ T7298] do_filp_open+0x11e/0x1b0 [ 56.319334][ T7298] ? _raw_spin_unlock+0x4b/0x60 [ 56.324203][ T7298] ? __alloc_fd+0x316/0x4c0 [ 56.328707][ T7298] ? get_unused_fd_flags+0x93/0xc0 [ 56.333823][ T7298] do_sys_open+0x3b3/0x4f0 [ 56.338268][ T7298] __x64_sys_openat+0x62/0x80 [ 56.342978][ T7298] do_syscall_64+0xcf/0x2f0 [ 56.347472][ T7298] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 56.353354][ T7298] RIP: 0033:0x47c5aa [ 56.357271][ T7298] Code: e8 7b 6b fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 56.377049][ T7298] RSP: 002b:000000c4200517c0 EFLAGS: 00000206 ORIG_RAX: 0000000000000101 [ 56.385568][ T7298] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047c5aa [ 56.393519][ T7298] RDX: 00000000000800c2 RSI: 000000c420098fa0 RDI: ffffffffffffff9c [ 56.401468][ T7298] RBP: 000000c420051840 R08: 0000000000000000 R09: 0000000000000000 [ 56.409435][ T7298] R10: 0000000000000180 R11: 0000000000000206 R12: ffffffffffffffff [ 56.417448][ T7298] R13: 000000000000007e R14: 000000000000007d R15: 0000000000000100 [ 56.426893][ T7298] Kernel Offset: disabled [ 56.431221][ T7298] Rebooting in 86400 seconds..