[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.250' (ECDSA) to the list of known hosts. 2020/06/27 16:33:45 fuzzer started 2020/06/27 16:33:45 dialing manager at 10.128.0.105:34177 2020/06/27 16:33:46 syscalls: 3105 2020/06/27 16:33:46 code coverage: enabled 2020/06/27 16:33:46 comparison tracing: enabled 2020/06/27 16:33:46 extra coverage: enabled 2020/06/27 16:33:46 setuid sandbox: enabled 2020/06/27 16:33:46 namespace sandbox: enabled 2020/06/27 16:33:46 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/27 16:33:46 fault injection: enabled 2020/06/27 16:33:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/27 16:33:46 net packet injection: enabled 2020/06/27 16:33:46 net device setup: enabled 2020/06/27 16:33:46 concurrency sanitizer: enabled 2020/06/27 16:33:46 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/27 16:33:46 USB emulation: enabled 2020/06/27 16:33:46 suppressing KCSAN reports in functions: 'ext4_free_inode' 'snd_seq_oss_readq_poll' 'generic_write_end' '__xa_clear_mark' '__ext4_new_inode' 'pcpu_alloc' 'find_get_pages_range_tag' 16:33:52 executing program 0: unshare(0x600) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x2, 0x0, 0x2, 0x2, {0xa, 0x0, 0x0, @mcast1}}, 0x24) syzkaller login: [ 36.976834][ T8657] IPVS: ftp: loaded support on port[0] = 21 [ 37.034359][ T8657] chnl_net:caif_netlink_parms(): no params data found [ 37.068244][ T8657] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.075662][ T8657] bridge0: port 1(bridge_slave_0) entered disabled state 16:33:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$update(0x13, 0x0, 0x0, 0x204) [ 37.083071][ T8657] device bridge_slave_0 entered promiscuous mode [ 37.091304][ T8657] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.098965][ T8657] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.107318][ T8657] device bridge_slave_1 entered promiscuous mode [ 37.125675][ T8657] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.157208][ T8657] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.205708][ T8657] team0: Port device team_slave_0 added [ 37.214279][ T8657] team0: Port device team_slave_1 added [ 37.242525][ T8657] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.265427][ T8657] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.293282][ T8657] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.307700][ T8803] IPVS: ftp: loaded support on port[0] = 21 16:33:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = dup2(r1, r0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x65, 0x2, 0x0, 0x0) [ 37.316747][ T8657] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.324074][ T8657] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.352594][ T8657] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.446913][ T8657] device hsr_slave_0 entered promiscuous mode [ 37.475778][ T8657] device hsr_slave_1 entered promiscuous mode 16:33:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port1\x00', 0xbb}) socket$inet_udp(0x2, 0x2, 0x0) [ 37.561279][ T8845] IPVS: ftp: loaded support on port[0] = 21 [ 37.631602][ T8803] chnl_net:caif_netlink_parms(): no params data found [ 37.746752][ T8803] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.753941][ T8803] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.775759][ T8803] device bridge_slave_0 entered promiscuous mode 16:33:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f000000ec00)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)="25e174ad8aa40b95c648e5b4db269f34", 0x10}], 0x1}}, {{&(0x7f0000000600)=@phonet, 0x80, 0x0, 0x0, &(0x7f0000000c00)=[{0x2}], 0x10}}], 0x2, 0x0) [ 37.795267][ T8803] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.802978][ T8803] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.816215][ T8803] device bridge_slave_1 entered promiscuous mode [ 37.835970][ T7] ================================================================== [ 37.844165][ T7] BUG: KCSAN: data-race in copy_process / copy_process [ 37.844854][ T9018] IPVS: ftp: loaded support on port[0] = 21 [ 37.851771][ T7] [ 37.851780][ T7] write to 0xffffffff89281410 of 4 bytes by task 21 on cpu 0: [ 37.851789][ T7] copy_process+0x2e53/0x32b0 [ 37.851796][ T7] _do_fork+0xf1/0x660 [ 37.851803][ T7] kernel_thread+0x85/0xb0 [ 37.851814][ T7] call_usermodehelper_exec_work+0x4f/0x1b0 [ 37.851821][ T7] process_one_work+0x3cb/0x990 [ 37.851834][ T7] worker_thread+0x665/0xbe0 [ 37.865492][ T8657] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 37.867536][ T7] kthread+0x210/0x220 [ 37.867551][ T7] ret_from_fork+0x1f/0x30 [ 37.912046][ T7] [ 37.914450][ T7] read to 0xffffffff89281410 of 4 bytes by task 7 on cpu 1: [ 37.921718][ T7] copy_process+0xab5/0x32b0 [ 37.926320][ T7] _do_fork+0xf1/0x660 [ 37.930384][ T7] kernel_thread+0x85/0xb0 [ 37.934790][ T7] call_usermodehelper_exec_work+0x4f/0x1b0 [ 37.941279][ T7] process_one_work+0x3cb/0x990 [ 37.946124][ T7] worker_thread+0x665/0xbe0 [ 37.950696][ T7] kthread+0x210/0x220 [ 37.954747][ T7] ret_from_fork+0x1f/0x30 [ 37.959140][ T7] [ 37.961449][ T7] Reported by Kernel Concurrency Sanitizer on: [ 37.967584][ T7] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 5.8.0-rc2-syzkaller #0 [ 37.976505][ T7] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.987179][ T7] Workqueue: events_unbound call_usermodehelper_exec_work [ 37.994275][ T7] ================================================================== [ 38.002317][ T7] Kernel panic - not syncing: panic_on_warn set ... [ 38.008877][ T7] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 5.8.0-rc2-syzkaller #0 [ 38.017344][ T7] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.027378][ T7] Workqueue: events_unbound call_usermodehelper_exec_work [ 38.034543][ T7] Call Trace: [ 38.037807][ T7] dump_stack+0x10f/0x19d [ 38.042108][ T7] panic+0x1f8/0x63a [ 38.046495][ T7] ? vprintk_emit+0x44a/0x4f0 [ 38.051152][ T7] kcsan_report+0x684/0x690 [ 38.055648][ T7] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 38.061163][ T7] ? copy_process+0xab5/0x32b0 [ 38.065900][ T7] ? _do_fork+0xf1/0x660 [ 38.070112][ T7] ? kernel_thread+0x85/0xb0 [ 38.075131][ T7] ? call_usermodehelper_exec_work+0x4f/0x1b0 [ 38.081199][ T7] ? process_one_work+0x3cb/0x990 [ 38.086192][ T7] ? worker_thread+0x665/0xbe0 [ 38.090943][ T7] ? kthread+0x210/0x220 [ 38.095165][ T7] ? ret_from_fork+0x1f/0x30 [ 38.099849][ T7] ? debug_smp_processor_id+0x18/0x20 [ 38.105297][ T7] ? sysvec_hyperv_callback+0x90/0x140 [ 38.110725][ T7] ? copy_creds+0x280/0x350 [ 38.115460][ T7] ? copy_creds+0x280/0x350 [ 38.120110][ T7] kcsan_setup_watchpoint+0x453/0x4d0 [ 38.125455][ T7] ? copy_creds+0x280/0x350 [ 38.130155][ T7] copy_process+0xab5/0x32b0 [ 38.137862][ T7] ? check_preempt_wakeup+0x1cb/0x370 [ 38.143219][ T7] ? proc_cap_handler+0x280/0x280 [ 38.148393][ T7] _do_fork+0xf1/0x660 [ 38.152605][ T7] ? enqueue_entity+0x25a/0x480 [ 38.157555][ T7] ? proc_cap_handler+0x280/0x280 [ 38.163093][ T7] kernel_thread+0x85/0xb0 [ 38.167990][ T7] ? proc_cap_handler+0x280/0x280 [ 38.173268][ T7] call_usermodehelper_exec_work+0x4f/0x1b0 [ 38.179155][ T7] process_one_work+0x3cb/0x990 [ 38.183995][ T7] worker_thread+0x665/0xbe0 [ 38.188646][ T7] ? process_one_work+0x990/0x990 [ 38.193735][ T7] kthread+0x210/0x220 [ 38.197774][ T7] ? process_one_work+0x990/0x990 [ 38.202834][ T7] ? constant_test_bit+0x30/0x30 [ 38.207935][ T7] ret_from_fork+0x1f/0x30 [ 38.214000][ T7] Kernel Offset: disabled [ 38.218310][ T7] Rebooting in 86400 seconds..