[ 51.877184][ T25] audit: type=1800 audit(1573008292.600:27): pid=7835 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 51.926966][ T25] audit: type=1800 audit(1573008292.700:28): pid=7835 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.764162][ T25] audit: type=1800 audit(1573008293.540:29): pid=7835 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 52.787135][ T25] audit: type=1800 audit(1573008293.540:30): pid=7835 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.5' (ECDSA) to the list of known hosts. 2019/11/06 02:45:02 fuzzer started 2019/11/06 02:45:04 dialing manager at 10.128.0.105:39303 2019/11/06 02:45:05 syscalls: 2553 2019/11/06 02:45:05 code coverage: enabled 2019/11/06 02:45:05 comparison tracing: enabled 2019/11/06 02:45:05 extra coverage: extra coverage is not supported by the kernel 2019/11/06 02:45:05 setuid sandbox: enabled 2019/11/06 02:45:05 namespace sandbox: enabled 2019/11/06 02:45:05 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/06 02:45:05 fault injection: enabled 2019/11/06 02:45:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/06 02:45:05 net packet injection: enabled 2019/11/06 02:45:05 net device setup: enabled 2019/11/06 02:45:05 concurrency sanitizer: enabled 2019/11/06 02:45:05 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/06 02:45:08 adding functions to KCSAN blacklist: 'ext4_free_inode' 'ktime_get_real_seconds' 'tomoyo_supervisor' 'vm_area_dup' 'sit_tunnel_xmit' '__hrtimer_run_queues' 'run_timer_softirq' 'do_nanosleep' 'tcp_add_backlog' 'ext4_free_inodes_count' 'ext4_has_free_clusters' 'task_dump_owner' 'generic_write_end' 'tick_nohz_next_event' 'ep_poll' 'generic_permission' 'wbt_done' 'find_next_bit' 'tick_do_update_jiffies64' 02:45:16 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0xd, &(0x7f0000000080), 0x2cb) close(r0) 02:45:16 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=0xffffffffffffffff, 0x4) r1 = fcntl$getown(0xffffffffffffffff, 0x9) r2 = getpgid(r1) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r3 = socket$inet6(0xa, 0x6, 0x7f) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000001180)=ANY=[]) ioctl(r4, 0x4, &(0x7f0000000a40)="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") syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000640)='./file0\x00', 0xe005, 0x1, &(0x7f0000000380)=[{&(0x7f00000006c0)="eb3c130105a4874e97bfeb58906d6b66732e6461740002", 0x17, 0x2000000000}], 0x1010802, 0x0) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x0) removexattr(&(0x7f0000000140)='./file1\x00', &(0x7f0000000800)=ANY=[]) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x24000000, 0x0, 0x642086af446b9594, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x110, r0, 0x8000000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, &(0x7f0000001140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x9) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x2, r2) capset(&(0x7f00000002c0)={0x19980330, r1}, &(0x7f0000000580)={0xc, 0x2, 0x89, 0x3, 0xca, 0xca2c}) r7 = perf_event_open(&(0x7f0000c86f88)={0x3, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfd, 0xfd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff00000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_config_ext={0x3, 0x3}, 0x1e, 0x0, 0x0, 0x4, 0x2}, 0x0, 0x9, r6, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x1, 0x2080000000, 0xfffffffffefffc01, 0x9}, 0xfffffffffffffe5f) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000540)='threaded\x00', 0x399) mkdirat(r5, &(0x7f00000004c0)='./file1\x00', 0x100000000) creat(&(0x7f0000000a00)='./file0/file0\x00', 0x44) fchdir(r7) fstatfs(r5, &(0x7f0000000400)=""/128) syzkaller login: [ 75.886280][ T8006] IPVS: ftp: loaded support on port[0] = 21 [ 76.025936][ T8006] chnl_net:caif_netlink_parms(): no params data found [ 76.058280][ T8008] IPVS: ftp: loaded support on port[0] = 21 02:45:16 executing program 2: r0 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x200, &(0x7f0000000080)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1000010001}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10600}]) [ 76.070452][ T8006] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.079737][ T8006] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.087457][ T8006] device bridge_slave_0 entered promiscuous mode [ 76.101091][ T8006] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.108259][ T8006] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.120374][ T8006] device bridge_slave_1 entered promiscuous mode [ 76.173328][ T8006] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.192178][ T8006] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.246897][ T8006] team0: Port device team_slave_0 added [ 76.253584][ T8006] team0: Port device team_slave_1 added 02:45:17 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa) [ 76.371932][ T8006] device hsr_slave_0 entered promiscuous mode [ 76.419602][ T8006] device hsr_slave_1 entered promiscuous mode [ 76.538350][ T8011] IPVS: ftp: loaded support on port[0] = 21 [ 76.569671][ T8008] chnl_net:caif_netlink_parms(): no params data found [ 76.620042][ T8006] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.627216][ T8006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.634678][ T8006] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.641753][ T8006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.755829][ T8020] IPVS: ftp: loaded support on port[0] = 21 [ 76.838219][ T8008] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.869746][ T8008] bridge0: port 1(bridge_slave_0) entered disabled state 02:45:17 executing program 4: r0 = socket(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x3, 0x0, &(0x7f00000000c0)) [ 76.900678][ T8008] device bridge_slave_0 entered promiscuous mode [ 76.953824][ T8008] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.969635][ T8008] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.000916][ T8008] device bridge_slave_1 entered promiscuous mode [ 77.028812][ T8006] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.079067][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.110078][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.140944][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 77.193689][ T8006] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.223858][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.241938][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.291682][ T8008] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.332794][ T8008] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.421089][ T8008] team0: Port device team_slave_0 added [ 77.456317][ T8042] IPVS: ftp: loaded support on port[0] = 21 [ 77.480546][ T8008] team0: Port device team_slave_1 added [ 77.500360][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.521509][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.551262][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.558319][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.591160][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.620084][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.651123][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.658189][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.699920][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.731717][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 02:45:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) set_mempolicy(0x4002, &(0x7f0000000000)=0x3, 0x54) set_mempolicy(0x0, 0x0, 0x0) [ 77.814175][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.830927][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.870339][ T8039] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.991711][ T8008] device hsr_slave_0 entered promiscuous mode [ 78.020892][ T8008] device hsr_slave_1 entered promiscuous mode [ 78.049302][ T8008] debugfs: Directory 'hsr0' with parent '/' already present! [ 78.059844][ T8011] chnl_net:caif_netlink_parms(): no params data found [ 78.098591][ T8020] chnl_net:caif_netlink_parms(): no params data found [ 78.203495][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.220220][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 78.229198][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 78.270021][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 78.380528][ T8011] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.387646][ T8011] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.438217][ T8011] device bridge_slave_0 entered promiscuous mode [ 78.487899][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 78.488046][ T8047] IPVS: ftp: loaded support on port[0] = 21 [ 78.513209][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.552691][ T8020] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.559937][ T8020] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.582164][ T8074] ================================================================== [ 78.590301][ T8074] BUG: KCSAN: data-race in generic_fillattr / pid_update_inode [ 78.597829][ T8074] [ 78.599426][ T8020] device bridge_slave_0 entered promiscuous mode [ 78.600170][ T8074] write to 0xffff8881240c52d8 of 2 bytes by task 8068 on cpu 0: [ 78.614163][ T8074] pid_update_inode+0x51/0x70 [ 78.618849][ T8074] pid_revalidate+0x91/0xd0 [ 78.623366][ T8074] lookup_fast+0x6f2/0x700 [ 78.627794][ T8074] walk_component+0x6d/0xe70 [ 78.632397][ T8074] path_lookupat.isra.0+0x13a/0x5a0 [ 78.634126][ T8006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 78.637721][ T8074] filename_lookup+0x145/0x2b0 [ 78.637736][ T8074] user_path_at_empty+0x4c/0x70 [ 78.637762][ T8074] vfs_statx+0xd9/0x190 [ 78.658579][ T8074] __do_sys_newstat+0x51/0xb0 [ 78.663270][ T8074] __x64_sys_newstat+0x3a/0x50 [ 78.668045][ T8074] do_syscall_64+0xcc/0x370 [ 78.672571][ T8074] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 78.673986][ T8011] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.678455][ T8074] [ 78.687782][ T8074] read to 0xffff8881240c52d8 of 2 bytes by task 8074 on cpu 1: [ 78.695335][ T8074] generic_fillattr+0x6a/0x1e0 [ 78.699352][ T8011] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.700128][ T8074] pid_getattr+0x74/0x1a0 [ 78.711608][ T8074] vfs_getattr_nosec+0x12e/0x170 [ 78.716545][ T8074] vfs_getattr+0x54/0x70 [ 78.720803][ T8074] vfs_statx+0x102/0x190 [ 78.725040][ T8074] __do_sys_newstat+0x51/0xb0 [ 78.729719][ T8074] __x64_sys_newstat+0x3a/0x50 [ 78.731691][ T8011] device bridge_slave_1 entered promiscuous mode [ 78.734486][ T8074] do_syscall_64+0xcc/0x370 [ 78.734519][ T8074] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 78.752008][ T8074] [ 78.754333][ T8074] Reported by Kernel Concurrency Sanitizer on: [ 78.760494][ T8074] CPU: 1 PID: 8074 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 78.767260][ T8074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.777332][ T8074] ================================================================== [ 78.785679][ T8074] Kernel panic - not syncing: panic_on_warn set ... [ 78.792363][ T8074] CPU: 1 PID: 8074 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 78.799127][ T8074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.809182][ T8074] Call Trace: [ 78.812489][ T8074] dump_stack+0xf5/0x159 [ 78.816738][ T8074] panic+0x210/0x640 [ 78.820653][ T8074] ? vprintk_func+0x8d/0x140 [ 78.825257][ T8074] kcsan_report.cold+0xc/0xe [ 78.829873][ T8074] kcsan_setup_watchpoint+0x3fe/0x410 [ 78.835255][ T8074] __tsan_read2+0x145/0x1f0 [ 78.839766][ T8074] generic_fillattr+0x6a/0x1e0 [ 78.844546][ T8074] pid_getattr+0x74/0x1a0 [ 78.848888][ T8074] vfs_getattr_nosec+0x12e/0x170 [ 78.852753][ T8008] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.853841][ T8074] ? task_dump_owner+0x260/0x260 [ 78.865328][ T8074] vfs_getattr+0x54/0x70 [ 78.869580][ T8074] vfs_statx+0x102/0x190 [ 78.873843][ T8074] __do_sys_newstat+0x51/0xb0 [ 78.878554][ T8074] __x64_sys_newstat+0x3a/0x50 [ 78.883361][ T8074] do_syscall_64+0xcc/0x370 [ 78.886344][ T8008] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.887892][ T8074] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 78.900330][ T8074] RIP: 0033:0x7fe9ec874c65 [ 78.904767][ T8074] Code: 00 00 00 e8 5d 01 00 00 48 83 c4 18 c3 90 90 90 90 90 90 90 90 83 ff 01 48 89 f0 77 18 48 89 c7 48 89 d6 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 17 f3 c3 90 48 8b 05 a1 51 2b 00 64 c7 00 16 [ 78.924990][ T8074] RSP: 002b:00007ffe68c8d848 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 78.933419][ T8074] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007fe9ec874c65 [ 78.941398][ T8074] RDX: 00007fe9ecd42c60 RSI: 00007fe9ecd42c60 RDI: 00000000021bb220 [ 78.949375][ T8074] RBP: 0000000000020062 R08: 00007fe9ecb2a5a0 R09: 0000000000000000 [ 78.957351][ T8074] R10: 1999999999999999 R11: 0000000000000246 R12: 00000000021bb220 [ 78.965329][ T8074] R13: 00000000021bb1c0 R14: 0000000000000005 R15: 0000000000000000 [ 78.974686][ T8074] Kernel Offset: disabled [ 78.979006][ T8074] Rebooting in 86400 seconds..