[ 51.367623][ T25] audit: type=1800 audit(1573095076.023:27): pid=7815 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 51.388411][ T25] audit: type=1800 audit(1573095076.023:28): pid=7815 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.131299][ T25] audit: type=1800 audit(1573095076.863:29): pid=7815 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 52.154561][ T25] audit: type=1800 audit(1573095076.863:30): pid=7815 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.27' (ECDSA) to the list of known hosts. 2019/11/07 02:51:26 fuzzer started 2019/11/07 02:51:29 dialing manager at 10.128.0.105:34849 2019/11/07 02:51:29 syscalls: 2553 2019/11/07 02:51:29 code coverage: enabled 2019/11/07 02:51:29 comparison tracing: enabled 2019/11/07 02:51:29 extra coverage: extra coverage is not supported by the kernel 2019/11/07 02:51:29 setuid sandbox: enabled 2019/11/07 02:51:29 namespace sandbox: enabled 2019/11/07 02:51:29 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/07 02:51:29 fault injection: enabled 2019/11/07 02:51:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/07 02:51:29 net packet injection: enabled 2019/11/07 02:51:29 net device setup: enabled 2019/11/07 02:51:29 concurrency sanitizer: enabled 2019/11/07 02:51:29 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/07 02:51:30 adding functions to KCSAN blacklist: 'tick_do_update_jiffies64' 'tcp_add_backlog' '__hrtimer_run_queues' 'tomoyo_supervisor' 'run_timer_softirq' 02:51:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x18475140f06794e8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000006000, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x600) sendfile(r1, r2, 0x0, 0x10000) perf_event_open$cgroup(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) times(0x0) r3 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000580)=ANY=[@ANYBLOB="c4008cf8", @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x800}, 0x4018000) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x14, 0x5e, 0x1}, 0x14}}, 0x0) ioctl$VFIO_SET_IOMMU(0xffffffffffffffff, 0x3b66, 0x1) accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000100)=0x10) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000049000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000240)={0x0, 'syz1\x00'}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) syzkaller login: [ 69.143899][ T7982] IPVS: ftp: loaded support on port[0] = 21 02:51:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="30000000330019010000a3e10000000002000000ffd39d9b1800010014001900ff010000000000000000000000000001"], 0x30}}, 0x0) [ 69.237851][ T7982] chnl_net:caif_netlink_parms(): no params data found [ 69.295916][ T7982] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.324596][ T7982] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.333714][ T7982] device bridge_slave_0 entered promiscuous mode [ 69.341614][ T7982] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.349749][ T7982] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.358494][ T7982] device bridge_slave_1 entered promiscuous mode [ 69.388521][ T7982] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.391871][ T7985] IPVS: ftp: loaded support on port[0] = 21 [ 69.399683][ T7982] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.429209][ T7982] team0: Port device team_slave_0 added [ 69.437452][ T7982] team0: Port device team_slave_1 added 02:51:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201fdffffff00ae0000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 69.549566][ T7982] device hsr_slave_0 entered promiscuous mode [ 69.637502][ T7982] device hsr_slave_1 entered promiscuous mode [ 69.724200][ T7987] IPVS: ftp: loaded support on port[0] = 21 [ 69.783922][ T7982] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.791118][ T7982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.798498][ T7982] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.805721][ T7982] bridge0: port 1(bridge_slave_0) entered forwarding state 02:51:34 executing program 3: fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000480)=@sha1={0x1, "9d1c2183f4ea901f598512221cb3974ca5c7679b"}, 0x15, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f00000021c0)=[{{&(0x7f0000000c80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, 0x0}, 0x40007}], 0x1, 0x143, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0)="21bd518d6cb75c7cfb689606c5148a95b8c8e72ce8b421c83d89801bdcb9b53d1e06c4975a9cae224feb1485d19b90aebac46cc90250bf04153dc2b3d5b3286e5c8321b86403d9106cce4a8fcd4b0e9f22ec2d823aaaafefaaf3698bcc50c92c61a7ba63c33f25df0916e0798b920fca9058a675833d7ac271633f1ebbc9e39769e61933d04790634550e8adf988589435c73332a2f64e35a7b367a04c03fe2d9c680a7ec75ec30641e8edba0ff68504c7e5791a28285139f0eedcc1bb141cab193978e3eac1c8d3add7", 0xca, 0x44800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='maps\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) link(0x0, &(0x7f0000000280)='./file0\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) [ 69.995156][ T7982] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.026881][ T7985] chnl_net:caif_netlink_parms(): no params data found [ 70.088182][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.099581][ T2855] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.157283][ T2855] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.187679][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 70.231672][ T7982] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.290411][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.301460][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.338646][ T2855] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.345884][ T2855] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.428292][ T7987] chnl_net:caif_netlink_parms(): no params data found [ 70.440378][ T8017] IPVS: ftp: loaded support on port[0] = 21 [ 70.451387][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.479483][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.498538][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.505662][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.557180][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.577677][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.603886][ T7995] ================================================================== [ 70.612172][ T7995] BUG: KCSAN: data-race in pid_update_inode / process_measurement [ 70.617827][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 70.620353][ T7995] [ 70.630954][ T7995] write to 0xffff8881244ee318 of 2 bytes by task 8006 on cpu 0: [ 70.638603][ T7995] pid_update_inode+0x51/0x70 [ 70.643293][ T7995] pid_revalidate+0x91/0xd0 [ 70.647436][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.647904][ T7995] lookup_fast+0x618/0x700 [ 70.660475][ T7995] path_openat+0x2ac/0x36e0 [ 70.664994][ T7995] do_filp_open+0x11e/0x1b0 [ 70.669518][ T7995] do_sys_open+0x3b3/0x4f0 [ 70.673960][ T7995] __x64_sys_open+0x55/0x70 [ 70.677461][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 70.678574][ T7995] do_syscall_64+0xcc/0x370 [ 70.691098][ T7995] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 70.697084][ T7995] [ 70.699436][ T7995] read to 0xffff8881244ee318 of 2 bytes by task 7995 on cpu 1: [ 70.707000][ T7995] process_measurement+0x106/0xff0 [ 70.707566][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.712420][ T7995] ima_file_check+0x7e/0xb0 [ 70.724765][ T7995] path_openat+0xfaf/0x36e0 [ 70.729280][ T7995] do_filp_open+0x11e/0x1b0 [ 70.733792][ T7995] do_sys_open+0x3b3/0x4f0 [ 70.738213][ T7995] __x64_sys_open+0x55/0x70 [ 70.742848][ T7995] do_syscall_64+0xcc/0x370 [ 70.747395][ T7995] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 70.753452][ T7995] [ 70.755787][ T7995] Reported by Kernel Concurrency Sanitizer on: [ 70.762164][ T7995] CPU: 1 PID: 7995 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 70.769020][ T7995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.771054][ T7982] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 70.779177][ T7995] ================================================================== [ 70.779189][ T7995] Kernel panic - not syncing: panic_on_warn set ... [ 70.779208][ T7995] CPU: 1 PID: 7995 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 70.779229][ T7995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.821056][ T7995] Call Trace: [ 70.824378][ T7995] dump_stack+0xf5/0x159 [ 70.826578][ T7982] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 70.828643][ T7995] panic+0x210/0x640 [ 70.843272][ T7995] ? vprintk_func+0x8d/0x140 [ 70.847890][ T7995] kcsan_report.cold+0xc/0xe [ 70.852584][ T7995] kcsan_setup_watchpoint+0x3fe/0x410 [ 70.857980][ T7995] __tsan_read2+0x145/0x1f0 [ 70.862508][ T7995] process_measurement+0x106/0xff0 [ 70.867643][ T7995] ? __read_once_size.constprop.0+0x12/0x20 [ 70.867790][ T7985] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.873565][ T7995] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 70.886823][ T7995] ? __read_once_size.constprop.0+0x12/0x20 [ 70.893951][ T7995] ? __rcu_read_unlock+0x66/0x3c0 [ 70.896561][ T7985] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.899001][ T7995] ? __read_once_size.constprop.0+0x12/0x20 [ 70.911919][ T7995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 70.918174][ T7995] ? refcount_sub_and_test_checked+0xc8/0x190 [ 70.924270][ T7995] ? refcount_dec_and_test_checked+0x2c/0x40 [ 70.930265][ T7995] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 70.936524][ T7995] ? apparmor_task_getsecid+0x6c/0x90 [ 70.936880][ T7985] device bridge_slave_0 entered promiscuous mode [ 70.941915][ T7995] ima_file_check+0x7e/0xb0 [ 70.952801][ T7995] path_openat+0xfaf/0x36e0 [ 70.957329][ T7995] ? proc_pid_status+0xee1/0x1000 [ 70.962392][ T7995] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 70.968340][ T7995] ? __read_once_size+0x41/0xe0 [ 70.970761][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.973203][ T7995] do_filp_open+0x11e/0x1b0 [ 70.973234][ T7995] ? __alloc_fd+0x2ef/0x3b0 [ 70.987833][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.989854][ T7995] do_sys_open+0x3b3/0x4f0 [ 71.002072][ T7995] __x64_sys_open+0x55/0x70 [ 71.006605][ T7995] do_syscall_64+0xcc/0x370 [ 71.011134][ T7995] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.017161][ T7995] RIP: 0033:0x7f9d90fb0120 [ 71.017287][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.021603][ T7995] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 71.049020][ T7995] RSP: 002b:00007ffc0c565848 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 71.057574][ T7995] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f9d90fb0120 [ 71.065648][ T7995] RDX: 00007ffc0c565882 RSI: 0000000000000000 RDI: 00007ffc0c565870 [ 71.067809][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.073714][ T7995] RBP: 0000000000020000 R08: 0000000000000000 R09: 00007f9d9127855f [ 71.073737][ T7995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001eb1220 [ 71.097485][ T7995] R13: 0000000000000020 R14: 00007f9d91665010 R15: 0000000000000000 [ 71.107112][ T7995] Kernel Offset: disabled [ 71.111441][ T7995] Rebooting in 86400 seconds..