[ 36.087219][ T26] audit: type=1800 audit(1572774327.364:24): pid=7200 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="sudo" dev="sda1" ino=2487 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 36.556798][ T26] audit: type=1800 audit(1572774327.914:25): pid=7200 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 36.594141][ T26] audit: type=1800 audit(1572774327.914:26): pid=7200 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.49' (ECDSA) to the list of known hosts. 2019/11/03 09:45:39 fuzzer started 2019/11/03 09:45:41 dialing manager at 10.128.0.105:43165 2019/11/03 09:45:41 syscalls: 2554 2019/11/03 09:45:41 code coverage: enabled 2019/11/03 09:45:41 comparison tracing: enabled 2019/11/03 09:45:41 extra coverage: extra coverage is not supported by the kernel 2019/11/03 09:45:41 setuid sandbox: enabled 2019/11/03 09:45:41 namespace sandbox: enabled 2019/11/03 09:45:41 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/03 09:45:41 fault injection: enabled 2019/11/03 09:45:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/03 09:45:41 net packet injection: enabled 2019/11/03 09:45:41 net device setup: enabled 2019/11/03 09:45:41 concurrency sanitizer: enabled 2019/11/03 09:45:49 adding functions to KCSAN blacklist: 'tcp_add_backlog' 'ktime_get_real_seconds' 'pipe_poll' 'xas_find_marked' '__hrtimer_run_queues' 'tcp_poll' 'generic_permission' 'find_next_bit' 'mod_timer' 'tick_sched_do_timer' 'echo_char' 'add_timer' '__nf_conntrack_find_get' '__ext4_new_inode' 'update_defense_level' 'install_new_memslots' 'tick_do_update_jiffies64' 'rcu_gp_fqs_loop' 'snd_seq_check_queue' 'generic_write_end' '__dentry_kill' '__tcp_select_window' 'run_timer_softirq' '__nf_ct_refresh_acct' 'ext4_has_free_clusters' 'ext4_free_inode' 'task_dump_owner' 'tomoyo_supervisor' 'taskstats_exit' 'do_nanosleep' 'ep_poll' '__splice_from_pipe' 09:46:07 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) chdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x60000011}) timerfd_settime(r3, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, 0x0) epoll_pwait(r2, &(0x7f0000000100)=[{}], 0x1, 0xffffffffffffffff, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000001c0)={0x2001}) [ 76.492328][ T7372] device hsr_slave_0 entered promiscuous mode [ 76.559185][ T7372] device hsr_slave_1 entered promiscuous mode [ 76.682802][ T7377] IPVS: ftp: loaded support on port[0] = 21 [ 76.750360][ T7372] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.757652][ T7372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.765025][ T7372] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.772152][ T7372] bridge0: port 1(bridge_slave_0) entered forwarding state 09:46:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x24a080, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000002c0)) fcntl$setflags(r1, 0x2, 0x1) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f0000001e00)=[{&(0x7f0000000900)=""/242, 0xf2}, {&(0x7f0000000a00)=""/229, 0xe5}, {&(0x7f0000000b00)=""/115, 0x73}, {&(0x7f0000000b80)=""/30, 0x1e}, {&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000001bc0)=""/135, 0x87}, {&(0x7f0000001c80)=""/119, 0x77}, {&(0x7f0000001d00)=""/244, 0xf4}], 0x8}, 0xf55}, {{&(0x7f0000001e80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000003400)=[{&(0x7f0000001f00)=""/46, 0x2e}, {&(0x7f0000001f40)=""/15, 0xf}, {&(0x7f0000001f80)=""/181, 0xb5}, {&(0x7f0000002040)=""/69, 0x45}, {&(0x7f00000020c0)=""/3, 0x3}, {&(0x7f0000002100)=""/232, 0xe8}, {&(0x7f0000002200)=""/135, 0x87}, {&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f00000032c0)=""/217, 0xd9}, {0x0}], 0xa, &(0x7f00000034c0)=""/92, 0x5c}, 0x4}, {{&(0x7f0000003540)=@hci, 0x80, &(0x7f00000036c0)=[{&(0x7f00000035c0)=""/209, 0xd1}], 0x1}, 0xe5}, {{0x0, 0x0, &(0x7f00000039c0)=[{&(0x7f0000003700)=""/3, 0x3}, {&(0x7f0000003740)=""/65, 0x41}, {&(0x7f00000037c0)=""/196, 0xc4}, {&(0x7f00000038c0)=""/247, 0xf7}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000003a00)=""/148, 0x94}, {&(0x7f0000003ac0)=""/195, 0xc3}, {&(0x7f0000003bc0)=""/97, 0x61}, {&(0x7f0000003c40)=""/183, 0xb7}, {&(0x7f0000003d00)=""/43, 0x2b}, {&(0x7f0000003d40)=""/248, 0xf8}, {&(0x7f0000003e40)=""/131, 0x83}], 0x7, &(0x7f0000003f80)=""/65, 0x41}, 0x3}, {{&(0x7f0000004000)=@nfc, 0x80, &(0x7f00000040c0)=[{&(0x7f0000004080)=""/32, 0x20}], 0x1, &(0x7f0000004100)=""/97, 0x61}, 0x1f}, {{&(0x7f0000004180)=@caif=@rfm, 0x80, &(0x7f0000004400)=[{&(0x7f0000004200)=""/66, 0x42}, {&(0x7f0000004280)=""/119, 0x77}, {&(0x7f0000004300)=""/253, 0xfd}], 0x3, &(0x7f0000004440)=""/4, 0x4}, 0x28}], 0x7, 0x1, &(0x7f0000004640)) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 77.012503][ T7375] chnl_net:caif_netlink_parms(): no params data found [ 77.210758][ T2948] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.239034][ T2948] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.283132][ T7375] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.308770][ T7375] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.316781][ T7375] device bridge_slave_0 entered promiscuous mode [ 77.363432][ T7372] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.400584][ T7375] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.407677][ T7375] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.449639][ T7375] device bridge_slave_1 entered promiscuous mode [ 77.497128][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.519602][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.569660][ T7375] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.610252][ T7375] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.614882][ T7404] IPVS: ftp: loaded support on port[0] = 21 [ 77.696530][ T7375] team0: Port device team_slave_0 added [ 77.771963][ T7372] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.790391][ T7375] team0: Port device team_slave_1 added [ 77.846709][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.857275][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.889256][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.896445][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.940693][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.960911][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 09:46:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8000}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000240)=@allocspi={0xf8, 0x12, 0x201, 0x0, 0x0, {{{@in6=@ipv4={[0xa], [], @multicast2}, @in=@remote}, {@in6=@ipv4={[], [], @multicast2}}, @in6=@mcast1}}}, 0xf8}}, 0x0) [ 77.989124][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.996212][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.049249][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 78.079980][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 78.141111][ T7377] chnl_net:caif_netlink_parms(): no params data found [ 78.194176][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.209687][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.292442][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 78.311053][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.350368][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 78.462014][ T7375] device hsr_slave_0 entered promiscuous mode [ 78.499009][ T7375] device hsr_slave_1 entered promiscuous mode [ 78.538589][ T7375] debugfs: Directory 'hsr0' with parent '/' already present! [ 78.548821][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 78.557639][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 78.609523][ T7409] IPVS: ftp: loaded support on port[0] = 21 [ 78.624590][ T7372] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 78.652384][ T7372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 78.702551][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 78.712232][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.838012][ T7372] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.866398][ T7377] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.927173][ T7377] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.961243][ T7377] device bridge_slave_0 entered promiscuous mode [ 78.987537][ T7377] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.000882][ T7377] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.023339][ T7377] device bridge_slave_1 entered promiscuous mode [ 79.164093][ T7377] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.229267][ T7377] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.326558][ T7377] team0: Port device team_slave_0 added [ 79.364400][ T7404] chnl_net:caif_netlink_parms(): no params data found [ 79.409134][ T7375] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.417516][ T7377] team0: Port device team_slave_1 added [ 79.691768][ T7377] device hsr_slave_0 entered promiscuous mode [ 79.728911][ T7377] device hsr_slave_1 entered promiscuous mode [ 79.768719][ T7377] debugfs: Directory 'hsr0' with parent '/' already present! [ 79.783975][ T7375] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.819306][ T7404] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.826577][ T7404] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.861739][ T7404] device bridge_slave_0 entered promiscuous mode [ 79.898674][ T7404] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.905867][ T7404] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.952620][ T7404] device bridge_slave_1 entered promiscuous mode [ 80.005440][ T7390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 80.031958][ T7390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 80.066255][ T7409] chnl_net:caif_netlink_parms(): no params data found [ 80.122089][ T7390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 80.139436][ T7390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 80.178364][ T7390] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.185512][ T7390] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.234367][ T7390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 80.277644][ T7390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 80.307869][ T7390] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.315078][ T7390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.354011][ T7390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 80.386817][ T7390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 80.427281][ T7390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 80.457140][ T7390] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 80.487586][ T7390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 80.500855][ T7390] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 80.518198][ T7404] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.559559][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 80.579077][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 80.599704][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 80.633016][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 09:46:12 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) chdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x60000011}) timerfd_settime(r3, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, 0x0) epoll_pwait(r2, &(0x7f0000000100)=[{}], 0x1, 0xffffffffffffffff, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000001c0)={0x2001}) [ 84.527807][ T7489] device bridge_slave_0 entered promiscuous mode [ 84.577712][ T7445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 84.609900][ T7445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 84.679465][ T7445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 84.739502][ T7445] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 84.810018][ T7489] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.817122][ T7489] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.870604][ T7489] device bridge_slave_1 entered promiscuous mode [ 84.955974][ T7445] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 84.969675][ T7445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 09:46:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x60000011}) timerfd_settime(r3, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, 0x0) epoll_pwait(r2, &(0x7f0000000100)=[{}], 0x1, 0xffffffffffffffff, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000001c0)={0x2001}) [ 85.043341][ T7445] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 85.079904][ T7445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 85.138683][ T7445] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 85.193787][ T7445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 85.242557][ T7445] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 85.311953][ T7489] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.389753][ T7404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 85.480851][ T7489] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.587000][ T7404] 8021q: adding VLAN 0 to HW filter on device batadv0 09:46:17 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x60000011}) timerfd_settime(r3, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, 0x0) epoll_pwait(r2, &(0x7f0000000100)=[{}], 0x1, 0xffffffffffffffff, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000001c0)={0x2001}) [ 85.658014][ T7409] 8021q: adding VLAN 0 to HW filter on device bond0 09:46:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x60000011}) timerfd_settime(r3, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, 0x0) epoll_pwait(r2, &(0x7f0000000100)=[{}], 0x1, 0xffffffffffffffff, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000001c0)={0x2001}) [ 85.745502][ T7489] team0: Port device team_slave_0 added [ 85.844747][ T7445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 85.869414][ T7445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 85.879664][ T7409] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.888068][ T7489] team0: Port device team_slave_1 added [ 85.951186][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 86.006417][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 86.070793][ T3500] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.077915][ T3500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.159378][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 09:46:17 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) chdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x60000011}) timerfd_settime(r3, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, 0x0) epoll_pwait(r2, &(0x7f0000000100)=[{}], 0x1, 0xffffffffffffffff, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000001c0)={0x2001}) 09:46:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x60000011}) timerfd_settime(r3, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, 0x0) epoll_pwait(r2, &(0x7f0000000100)=[{}], 0x1, 0xffffffffffffffff, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000001c0)={0x2001}) [ 88.978902][ T7631] netlink: 216 bytes leftover after parsing attributes in process `syz-executor.4'. [ 88.989003][ C1] hrtimer: interrupt took 30106 ns [ 89.088866][ T7641] netlink: 216 bytes leftover after parsing attributes in process `syz-executor.4'. [ 90.058337][ T7610] ================================================================== [ 90.066490][ T7610] BUG: KCSAN: data-race in pid_update_inode / tomoyo_get_local_path [ 90.074481][ T7610] [ 90.076822][ T7610] read to 0xffff888125a692d8 of 2 bytes by task 7549 on cpu 0: [ 90.084373][ T7610] tomoyo_get_local_path+0x403/0x470 [ 90.089689][ T7610] tomoyo_realpath_from_path+0x288/0x4c0 [ 90.095338][ T7610] tomoyo_path_perm+0x15d/0x390 [ 90.100191][ T7610] tomoyo_inode_getattr+0x26/0x40 [ 90.105223][ T7610] security_inode_getattr+0x9b/0xd0 [ 90.110420][ T7610] vfs_getattr+0x2e/0x70 [ 90.114680][ T7610] vfs_statx+0x102/0x190 [ 90.118931][ T7610] __do_sys_newstat+0x51/0xb0 [ 90.123616][ T7610] __x64_sys_newstat+0x3a/0x50 [ 90.128381][ T7610] do_syscall_64+0xcc/0x370 [ 90.132888][ T7610] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 90.138776][ T7610] [ 90.141117][ T7610] write to 0xffff888125a692d8 of 2 bytes by task 7610 on cpu 1: [ 90.148761][ T7610] pid_update_inode+0x51/0x70 [ 90.153450][ T7610] pid_revalidate+0x91/0xd0 [ 90.157969][ T7610] lookup_fast+0x6f2/0x700 [ 90.162424][ T7610] walk_component+0x6d/0xe80 [ 90.167056][ T7610] link_path_walk.part.0+0x5d3/0xa90 [ 90.172356][ T7610] path_openat+0x14f/0x36e0 [ 90.176857][ T7610] do_filp_open+0x11e/0x1b0 [ 90.181363][ T7610] do_sys_open+0x3b3/0x4f0 [ 90.185774][ T7610] __x64_sys_open+0x55/0x70 [ 90.190290][ T7610] do_syscall_64+0xcc/0x370 [ 90.194807][ T7610] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 90.200708][ T7610] [ 90.203030][ T7610] Reported by Kernel Concurrency Sanitizer on: [ 90.209182][ T7610] CPU: 1 PID: 7610 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 90.215936][ T7610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.225989][ T7610] ================================================================== [ 90.234085][ T7610] Kernel panic - not syncing: panic_on_warn set ... [ 90.240684][ T7610] CPU: 1 PID: 7610 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 90.247539][ T7610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.257592][ T7610] Call Trace: [ 90.260896][ T7610] dump_stack+0xf5/0x159 [ 90.265139][ T7610] panic+0x210/0x640 [ 90.269139][ T7610] ? __x64_sys_open+0x55/0x70 [ 90.273824][ T7610] ? vprintk_func+0x8d/0x140 [ 90.278434][ T7610] kcsan_report.cold+0xc/0x10 [ 90.283133][ T7610] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 90.288686][ T7610] ? task_dump_owner+0xf7/0x260 [ 90.293547][ T7610] __tsan_write2+0x32/0x40 [ 90.297980][ T7610] pid_update_inode+0x51/0x70 [ 90.302675][ T7610] pid_revalidate+0x91/0xd0 [ 90.307199][ T7610] lookup_fast+0x6f2/0x700 [ 90.311650][ T7610] walk_component+0x6d/0xe80 [ 90.316245][ T7610] ? __tsan_read8+0x2c/0x30 [ 90.320790][ T7610] ? security_inode_permission+0xa5/0xc0 [ 90.326466][ T7610] link_path_walk.part.0+0x5d3/0xa90 [ 90.331767][ T7610] path_openat+0x14f/0x36e0 [ 90.336277][ T7610] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 90.341924][ T7610] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 90.347562][ T7610] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 90.353320][ T7610] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 90.359079][ T7610] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 90.364708][ T7610] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 90.370352][ T7610] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 90.376025][ T7610] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 90.381665][ T7610] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 90.387559][ T7610] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 90.393197][ T7610] do_filp_open+0x11e/0x1b0 [ 90.397729][ T7610] ? __alloc_fd+0x316/0x4c0 [ 90.402244][ T7610] do_sys_open+0x3b3/0x4f0 [ 90.406668][ T7610] __x64_sys_open+0x55/0x70 [ 90.411198][ T7610] do_syscall_64+0xcc/0x370 [ 90.415710][ T7610] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 90.421604][ T7610] RIP: 0033:0x7fd4da28f120 [ 90.426019][ T7610] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 90.445712][ T7610] RSP: 002b:00007ffd2add0668 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 90.454121][ T7610] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007fd4da28f120 [ 90.462084][ T7610] RDX: 00007ffd2add06a2 RSI: 0000000000000000 RDI: 00007ffd2add0690 [ 90.470058][ T7610] RBP: 0000000000020000 R08: 0000000000000000 R09: 00007fd4da55755f [ 90.478029][ T7610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001aad220 [ 90.485995][ T7610] R13: 0000000000000020 R14: 00007fd4da944010 R15: 0000000000000000 [ 90.495383][ T7610] Kernel Offset: disabled [ 90.499725][ T7610] Rebooting in 86400 seconds..