[info] Using makefile-style concurrent boot in runlevel 2. [ 43.437506][ T25] audit: type=1800 audit(1575473173.275:21): pid=7536 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 43.489341][ T25] audit: type=1800 audit(1575473173.285:22): pid=7536 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.220' (ECDSA) to the list of known hosts. 2019/12/04 15:26:24 fuzzer started 2019/12/04 15:26:26 dialing manager at 10.128.0.105:44241 2019/12/04 15:26:27 syscalls: 2684 2019/12/04 15:26:27 code coverage: enabled 2019/12/04 15:26:27 comparison tracing: enabled 2019/12/04 15:26:27 extra coverage: extra coverage is not supported by the kernel 2019/12/04 15:26:27 setuid sandbox: enabled 2019/12/04 15:26:27 namespace sandbox: enabled 2019/12/04 15:26:27 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/04 15:26:27 fault injection: enabled 2019/12/04 15:26:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/04 15:26:27 net packet injection: enabled 2019/12/04 15:26:27 net device setup: enabled 2019/12/04 15:26:27 concurrency sanitizer: enabled 2019/12/04 15:26:27 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 63.559957][ T7700] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/04 15:26:35 adding functions to KCSAN blacklist: 'tick_sched_do_timer' 'page_counter_try_charge' 'pipe_poll' 'kauditd_thread' 'tomoyo_check_path_acl' 'audit_log_start' 'add_timer' '__splice_from_pipe' 'dd_has_work' 'ext4_nonda_switch' 'sctp_assoc_migrate' 'find_next_bit' 'tcp_add_backlog' 'n_tty_receive_buf_common' 'pipe_wait' 'xas_find_marked' 'blk_mq_run_hw_queue' 'mod_timer' 'tick_do_update_jiffies64' 'fprop_fraction_percpu' 'lruvec_lru_size' 'tomoyo_supervisor' '__hrtimer_run_queues' 'ep_poll' 'rcu_gp_fqs_check_wake' 'pid_update_inode' '__snd_rawmidi_transmit_ack' 'blk_mq_get_request' '__writeback_single_inode' 'sit_tunnel_xmit' '__ext4_new_inode' 'blk_mq_dispatch_rq_list' 'ext4_has_free_clusters' 'ext4_free_inodes_count' 'poll_schedule_timeout' '__rb_insert_augmented' '__filemap_fdatawrite_range' 'xas_clear_mark' 'generic_fillattr' 'wbt_done' 'taskstats_exit' 'copy_process' 'do_nanosleep' 'tick_nohz_idle_stop_tick' 'futex_wait_queue_me' 'shmem_getpage_gfp' 'run_timer_softirq' 'generic_write_end' 'find_get_pages_range_tag' 'ext4_free_inode' 'do_exit' 15:27:38 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x3f, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000080)={0x0, 0x1, 0x0, [0x7000000], &(0x7f0000000200)={0x980913, 0x0, [], @p_u32=0x0}}) [ 128.393915][ T7703] IPVS: ftp: loaded support on port[0] = 21 15:27:38 executing program 1: socket$kcm(0x10, 0x2, 0x10) bind$alg(0xffffffffffffffff, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, &(0x7f0000000500)) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000540)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000002c0)=""/161, 0xa1}], 0x1}, 0x3}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f00000007c0)=""/163, 0xa3}, {&(0x7f0000000900)=""/233, 0xe9}, {&(0x7f0000000380)=""/31, 0x1f}, {&(0x7f0000000a00)=""/213, 0xd5}, {0x0}], 0x6, &(0x7f0000000b00)=""/200, 0xc8}, 0x773}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000c80)=""/104, 0x68}, {&(0x7f0000000d00)=""/212, 0xd4}], 0x2, &(0x7f0000001380)=""/175, 0xaf}, 0x800}, {{&(0x7f0000000ec0)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000002400)=[{0x0}, {&(0x7f0000001000)=""/45, 0x2d}, {&(0x7f0000001040)=""/95, 0x5f}, {&(0x7f00000010c0)=""/30, 0x1e}, {&(0x7f0000001100)=""/188, 0xbc}, {&(0x7f00000011c0)=""/37, 0x25}, {&(0x7f0000001440)=""/201, 0xc9}, {&(0x7f0000002380)=""/77, 0x4d}], 0x8, &(0x7f0000002480)=""/105, 0x69}, 0x4}], 0x4, 0xf3b6ccdc400cd531, &(0x7f0000002d40)={0x0, 0x989680}) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(r1) fcntl$setstatus(r2, 0x4, 0x42000) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) [ 128.470811][ T7703] chnl_net:caif_netlink_parms(): no params data found [ 128.530563][ T7703] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.537681][ T7703] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.560223][ T7703] device bridge_slave_0 entered promiscuous mode [ 128.567572][ T7703] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.579625][ T7703] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.599214][ T7703] device bridge_slave_1 entered promiscuous mode [ 128.635224][ T7703] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 128.650563][ T7706] IPVS: ftp: loaded support on port[0] = 21 [ 128.661015][ T7703] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 128.680125][ T7703] team0: Port device team_slave_0 added [ 128.688422][ T7703] team0: Port device team_slave_1 added 15:27:38 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 128.761926][ T7703] device hsr_slave_0 entered promiscuous mode [ 128.809961][ T7703] device hsr_slave_1 entered promiscuous mode [ 128.905205][ T7708] IPVS: ftp: loaded support on port[0] = 21 [ 128.979148][ T7703] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.986244][ T7703] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.993616][ T7703] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.000735][ T7703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.048516][ T7706] chnl_net:caif_netlink_parms(): no params data found 15:27:39 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000180), 0x214, 0x0, 0x0, 0x31b) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x0, 0xd243}, 0x8) sendmmsg$alg(r1, &(0x7f0000002b00)=[{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000180)="99", 0x1}], 0x1}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240), 0x8) [ 129.160853][ T7703] 8021q: adding VLAN 0 to HW filter on device bond0 [ 129.199999][ T7706] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.210026][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.249918][ T7706] device bridge_slave_0 entered promiscuous mode [ 129.276142][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.290515][ T3018] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.316036][ T3018] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.350728][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 129.383316][ T7703] 8021q: adding VLAN 0 to HW filter on device team0 [ 129.411760][ T7706] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.418846][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.461116][ T7706] device bridge_slave_1 entered promiscuous mode [ 129.500404][ T7706] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 129.531447][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.561201][ T3018] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.568288][ T3018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.600628][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.629393][ T3018] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.636460][ T3018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.680708][ T7708] chnl_net:caif_netlink_parms(): no params data found [ 129.704857][ T7706] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 129.754518][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 129.782140][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 129.824856][ T7736] IPVS: ftp: loaded support on port[0] = 21 [ 129.840214][ T7706] team0: Port device team_slave_0 added [ 129.846855][ T7706] team0: Port device team_slave_1 added [ 129.911413][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 129.930614][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 15:27:39 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) shutdown(r0, 0x400000000000001) [ 129.959959][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 130.043048][ T7703] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 130.089183][ T7703] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 130.131944][ T7735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 130.150365][ T7735] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.181928][ T7735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 130.211420][ T7735] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.239974][ T7708] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.247065][ T7708] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.279915][ T7708] device bridge_slave_0 entered promiscuous mode [ 130.353323][ T7706] device hsr_slave_0 entered promiscuous mode [ 130.420989][ T7706] device hsr_slave_1 entered promiscuous mode [ 130.460939][ T7706] debugfs: Directory 'hsr0' with parent '/' already present! 15:27:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) stat(0x0, &(0x7f00000000c0)) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f00000000c0)=0x2, 0x4) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000000)={0x0, 0x4}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) r3 = socket(0x11, 0x0, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000140)) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 130.477366][ T7703] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 130.488416][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 130.497254][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 130.514022][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 130.525745][ T7708] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.539289][ T7708] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.547000][ T7708] device bridge_slave_1 entered promiscuous mode [ 130.615942][ T7740] IPVS: ftp: loaded support on port[0] = 21 [ 130.661855][ T7750] IPVS: ftp: loaded support on port[0] = 21 [ 130.680807][ T7708] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 130.806374][ T7708] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 130.835570][ T7774] ================================================================== [ 130.843713][ T7774] BUG: KCSAN: data-race in common_perm_cond / task_dump_owner [ 130.851414][ T7774] [ 130.853745][ T7774] read to 0xffff88812522682c of 4 bytes by task 7770 on cpu 0: [ 130.861293][ T7774] common_perm_cond+0x65/0x110 [ 130.866060][ T7774] apparmor_inode_getattr+0x2b/0x40 [ 130.871263][ T7774] security_inode_getattr+0x9b/0xd0 [ 130.876458][ T7774] vfs_getattr+0x2e/0x70 [ 130.880805][ T7774] vfs_statx+0x102/0x190 [ 130.885041][ T7774] __do_sys_newstat+0x51/0xb0 [ 130.889715][ T7774] __x64_sys_newstat+0x3a/0x50 [ 130.894480][ T7774] do_syscall_64+0xcc/0x370 [ 130.899001][ T7774] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 130.904880][ T7774] [ 130.907207][ T7774] write to 0xffff88812522682c of 4 bytes by task 7774 on cpu 1: [ 130.914833][ T7774] task_dump_owner+0x237/0x260 [ 130.919590][ T7774] pid_update_inode+0x3c/0x70 [ 130.924257][ T7774] pid_revalidate+0x91/0xd0 [ 130.928759][ T7774] lookup_fast+0x6f2/0x700 [ 130.933174][ T7774] walk_component+0x6d/0xe70 [ 130.937764][ T7774] link_path_walk.part.0+0x5d3/0xa90 [ 130.943222][ T7774] path_openat+0x14f/0x36e0 [ 130.947723][ T7774] do_filp_open+0x11e/0x1b0 [ 130.952233][ T7774] do_sys_open+0x3b3/0x4f0 [ 130.956644][ T7774] __x64_sys_open+0x55/0x70 [ 130.961147][ T7774] do_syscall_64+0xcc/0x370 [ 130.965652][ T7774] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 130.971527][ T7774] [ 130.973849][ T7774] Reported by Kernel Concurrency Sanitizer on: [ 130.980001][ T7774] CPU: 1 PID: 7774 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 130.987188][ T7774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.991963][ T7736] chnl_net:caif_netlink_parms(): no params data found [ 130.997940][ T7774] ================================================================== [ 131.012751][ T7774] Kernel panic - not syncing: panic_on_warn set ... [ 131.019338][ T7774] CPU: 1 PID: 7774 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 131.026519][ T7774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.036567][ T7774] Call Trace: [ 131.039863][ T7774] dump_stack+0x11d/0x181 [ 131.044203][ T7774] panic+0x210/0x640 [ 131.048107][ T7774] ? vprintk_func+0x8d/0x140 [ 131.051396][ T7708] team0: Port device team_slave_0 added [ 131.052702][ T7774] kcsan_report.cold+0xc/0xd [ 131.052791][ T7774] kcsan_setup_watchpoint+0x3fe/0x460 [ 131.063510][ T7706] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.068257][ T7774] __tsan_unaligned_write4+0xc4/0x100 [ 131.080184][ T7774] task_dump_owner+0x237/0x260 [ 131.084966][ T7774] ? __rcu_read_unlock+0x66/0x3c0 [ 131.089999][ T7774] pid_update_inode+0x3c/0x70 [ 131.094174][ T7708] team0: Port device team_slave_1 added [ 131.094708][ T7774] pid_revalidate+0x91/0xd0 [ 131.104730][ T7774] lookup_fast+0x6f2/0x700 [ 131.109171][ T7774] walk_component+0x6d/0xe70 [ 131.114304][ T7774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.120569][ T7774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.126972][ T7774] ? security_inode_permission+0xa5/0xc0 [ 131.132612][ T7774] ? inode_permission+0xa0/0x3c0 [ 131.137555][ T7774] link_path_walk.part.0+0x5d3/0xa90 [ 131.142855][ T7774] path_openat+0x14f/0x36e0 [ 131.147371][ T7774] ? proc_pid_status+0xee1/0x1000 [ 131.152402][ T7774] ? __read_once_size.constprop.0+0x12/0x20 [ 131.158304][ T7774] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 131.164557][ T7774] ? __virt_addr_valid+0x126/0x190 [ 131.169685][ T7774] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 131.175924][ T7774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.182174][ T7774] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 131.188068][ T7774] ? __read_once_size+0x41/0xe0 [ 131.193890][ T7774] do_filp_open+0x11e/0x1b0 [ 131.198405][ T7774] ? __alloc_fd+0x2ef/0x3b0 [ 131.202923][ T7774] do_sys_open+0x3b3/0x4f0 [ 131.207345][ T7774] __x64_sys_open+0x55/0x70 [ 131.211851][ T7774] do_syscall_64+0xcc/0x370 [ 131.216361][ T7774] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 131.222253][ T7774] RIP: 0033:0x7fb58b39e120 [ 131.226677][ T7774] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 131.246383][ T7774] RSP: 002b:00007ffe82c65c28 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 131.254798][ T7774] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007fb58b39e120 [ 131.262779][ T7774] RDX: 00007ffe82c65c60 RSI: 0000000000000000 RDI: 00007ffe82c65c50 [ 131.270752][ T7774] RBP: 0000000000020000 R08: 0000000000000000 R09: 00007fb58b66655f [ 131.278721][ T7774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000b91220 [ 131.286701][ T7774] R13: 0000000000000020 R14: 00007fb58ba53010 R15: 0000000000000000 [ 131.296148][ T7774] Kernel Offset: disabled [ 131.300481][ T7774] Rebooting in 86400 seconds..