[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.30' (ECDSA) to the list of known hosts. 2020/06/24 19:39:58 fuzzer started 2020/06/24 19:39:58 dialing manager at 10.128.0.105:46449 2020/06/24 19:39:58 syscalls: 3105 2020/06/24 19:39:58 code coverage: enabled 2020/06/24 19:39:58 comparison tracing: enabled 2020/06/24 19:39:58 extra coverage: enabled 2020/06/24 19:39:58 setuid sandbox: enabled 2020/06/24 19:39:58 namespace sandbox: enabled 2020/06/24 19:39:58 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/24 19:39:58 fault injection: enabled 2020/06/24 19:39:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/24 19:39:58 net packet injection: enabled 2020/06/24 19:39:58 net device setup: enabled 2020/06/24 19:39:58 concurrency sanitizer: enabled 2020/06/24 19:39:58 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/24 19:39:58 USB emulation: enabled 2020/06/24 19:39:58 suppressing KCSAN reports in functions: '__xa_clear_mark' 'alloc_pid' 19:40:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0xfffa, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000280)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0xe, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={r5, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x3, @mcast2, 0x100}]}, &(0x7f0000000140)=0xfffffffffffffec9) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB="9153279972241028ad8dab73fec126cb2696986b74bc88a00644c04bdf83dcb25764c83639a4cd28d619384f04c067a72afe07caa7de7b9dab968329d5597f56ce4ff8b6de3db9567a993fadaa8c6d931eb97aa71180c61aa5879f66d2e5", @ANYRES16=r6, @ANYBLOB="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"], 0x2a4}, 0x1, 0x0, 0x0, 0xc01}, 0x200008c0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x40, 0x6) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) syzkaller login: [ 33.295115][ T8647] IPVS: ftp: loaded support on port[0] = 21 [ 33.352449][ T8647] chnl_net:caif_netlink_parms(): no params data found [ 33.387804][ T8647] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.394874][ T8647] bridge0: port 1(bridge_slave_0) entered disabled state 19:40:00 executing program 1: getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000240)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) [ 33.403156][ T8647] device bridge_slave_0 entered promiscuous mode [ 33.411129][ T8647] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.418729][ T8647] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.426713][ T8647] device bridge_slave_1 entered promiscuous mode [ 33.442476][ T8647] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.452932][ T8647] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.469708][ T8647] team0: Port device team_slave_0 added [ 33.476610][ T8647] team0: Port device team_slave_1 added [ 33.489988][ T8647] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.497063][ T8647] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.522981][ T8647] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.534912][ T8647] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.541851][ T8647] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.576072][ T8647] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.591057][ T8803] IPVS: ftp: loaded support on port[0] = 21 19:40:00 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/82, 0x52) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001145042, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x12, r1, 0x0) getdents64(r0, &(0x7f0000000540)=""/188, 0x724) [ 33.646669][ T8647] device hsr_slave_0 entered promiscuous mode [ 33.695721][ T8647] device hsr_slave_1 entered promiscuous mode [ 33.772930][ T8815] IPVS: ftp: loaded support on port[0] = 21 19:40:00 executing program 3: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) [ 33.879634][ T3521] ================================================================== [ 33.887749][ T3521] BUG: KCSAN: data-race in copy_process / release_task [ 33.894575][ T3521] [ 33.896894][ T3521] write to 0xffffffff89280410 of 4 bytes by task 8920 on cpu 1: [ 33.904512][ T3521] release_task+0x6c8/0xb90 [ 33.909004][ T3521] do_exit+0x1140/0x16e0 [ 33.913237][ T3521] call_usermodehelper_exec_async+0x2da/0x2e0 [ 33.919287][ T3521] ret_from_fork+0x1f/0x30 [ 33.923681][ T3521] [ 33.925998][ T3521] read to 0xffffffff89280410 of 4 bytes by task 3521 on cpu 0: [ 33.933527][ T3521] copy_process+0xab5/0x32b0 [ 33.938097][ T3521] _do_fork+0xf1/0x660 [ 33.942149][ T3521] kernel_thread+0x85/0xb0 [ 33.946570][ T3521] call_usermodehelper_exec_work+0x4f/0x1b0 [ 33.951798][ T8803] chnl_net:caif_netlink_parms(): no params data found [ 33.952469][ T3521] process_one_work+0x3cb/0x990 [ 33.964040][ T3521] worker_thread+0x665/0xbe0 [ 33.968640][ T3521] kthread+0x210/0x220 [ 33.972700][ T3521] ret_from_fork+0x1f/0x30 [ 33.977101][ T3521] [ 33.979413][ T3521] Reported by Kernel Concurrency Sanitizer on: [ 33.983899][ T8815] chnl_net:caif_netlink_parms(): no params data found [ 33.985551][ T3521] CPU: 0 PID: 3521 Comm: kworker/u4:4 Not tainted 5.8.0-rc2-syzkaller #0 [ 33.985556][ T3521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.985571][ T3521] Workqueue: events_unbound call_usermodehelper_exec_work [ 33.985576][ T3521] ================================================================== [ 33.985581][ T3521] Kernel panic - not syncing: panic_on_warn set ... [ 33.985590][ T3521] CPU: 0 PID: 3521 Comm: kworker/u4:4 Not tainted 5.8.0-rc2-syzkaller #0 [ 33.985595][ T3521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.985604][ T3521] Workqueue: events_unbound call_usermodehelper_exec_work [ 34.007001][ T8647] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 34.010769][ T3521] Call Trace: [ 34.068504][ T3521] dump_stack+0x10f/0x19d [ 34.072820][ T3521] panic+0x1f8/0x63a [ 34.076704][ T3521] ? vprintk_emit+0x44a/0x4f0 [ 34.081369][ T3521] kcsan_report+0x684/0x690 [ 34.085871][ T3521] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 34.091402][ T3521] ? copy_process+0xab5/0x32b0 [ 34.096152][ T3521] ? _do_fork+0xf1/0x660 [ 34.100379][ T3521] ? kernel_thread+0x85/0xb0 [ 34.104961][ T3521] ? call_usermodehelper_exec_work+0x4f/0x1b0 [ 34.111010][ T3521] ? process_one_work+0x3cb/0x990 [ 34.116030][ T3521] ? worker_thread+0x665/0xbe0 [ 34.120780][ T3521] ? kthread+0x210/0x220 [ 34.125532][ T3521] ? ret_from_fork+0x1f/0x30 [ 34.130121][ T3521] ? debug_smp_processor_id+0x18/0x20 [ 34.135478][ T3521] ? printk_nmi_enter+0x20/0x20 [ 34.140313][ T3521] ? copy_creds+0x280/0x350 [ 34.144804][ T3521] ? copy_creds+0x280/0x350 [ 34.149295][ T3521] kcsan_setup_watchpoint+0x453/0x4d0 [ 34.154651][ T3521] ? copy_creds+0x280/0x350 [ 34.159139][ T3521] copy_process+0xab5/0x32b0 [ 34.163724][ T3521] ? check_preempt_wakeup+0x1cb/0x370 [ 34.169089][ T3521] ? proc_cap_handler+0x280/0x280 [ 34.174097][ T3521] _do_fork+0xf1/0x660 [ 34.178160][ T3521] ? check_preemption_disabled+0x3f/0x1a0 [ 34.183868][ T3521] ? proc_cap_handler+0x280/0x280 [ 34.188875][ T3521] kernel_thread+0x85/0xb0 [ 34.193279][ T3521] ? proc_cap_handler+0x280/0x280 [ 34.198294][ T3521] call_usermodehelper_exec_work+0x4f/0x1b0 [ 34.204173][ T3521] ? __list_del_entry_valid+0x54/0xc0 [ 34.209528][ T3521] process_one_work+0x3cb/0x990 [ 34.214367][ T3521] worker_thread+0x665/0xbe0 [ 34.218952][ T3521] ? finish_task_switch+0x8b/0x270 [ 34.224474][ T3521] ? process_one_work+0x990/0x990 [ 34.229493][ T3521] kthread+0x210/0x220 [ 34.233550][ T3521] ? process_one_work+0x990/0x990 [ 34.238564][ T3521] ? constant_test_bit+0x30/0x30 [ 34.243493][ T3521] ret_from_fork+0x1f/0x30 [ 34.248897][ T3521] Kernel Offset: disabled [ 34.253250][ T3521] Rebooting in 86400 seconds..