[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.6' (ECDSA) to the list of known hosts. 2020/06/25 12:51:05 fuzzer started 2020/06/25 12:51:06 dialing manager at 10.128.0.105:36851 2020/06/25 12:51:06 syscalls: 3105 2020/06/25 12:51:06 code coverage: enabled 2020/06/25 12:51:06 comparison tracing: enabled 2020/06/25 12:51:06 extra coverage: enabled 2020/06/25 12:51:06 setuid sandbox: enabled 2020/06/25 12:51:06 namespace sandbox: enabled 2020/06/25 12:51:06 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/25 12:51:06 fault injection: enabled 2020/06/25 12:51:06 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/25 12:51:06 net packet injection: enabled 2020/06/25 12:51:06 net device setup: enabled 2020/06/25 12:51:06 concurrency sanitizer: enabled 2020/06/25 12:51:06 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/25 12:51:06 USB emulation: enabled 2020/06/25 12:51:06 suppressing KCSAN reports in functions: '__ext4_new_inode' 'do_epoll_wait' '__add_to_page_cache_locked' '__xa_clear_mark' 'alloc_pid' 'blk_mq_sched_dispatch_requests' 12:51:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={@rand_addr=0x64010102, @multicast1}, 0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000004c0)={[0x0, 0x0, 0x40000007, 0x4000, 0x0, 0x0, 0x800000004cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syzkaller login: [ 35.997040][ T8644] IPVS: ftp: loaded support on port[0] = 21 [ 36.046115][ T8644] chnl_net:caif_netlink_parms(): no params data found [ 36.076338][ T8644] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.083504][ T8644] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.090977][ T8644] device bridge_slave_0 entered promiscuous mode [ 36.099112][ T8644] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.106370][ T8644] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.113952][ T8644] device bridge_slave_1 entered promiscuous mode [ 36.128687][ T8644] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 12:51:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[@ANYBLOB="c3a2f2c69f398446040907cca5e3044ef434a4ad46fdf93b080f000000000000fee345a2abf08fa77f29a55fe1461cac6b67ff90c29af34179bcb49d"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000002000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f0000000000)="0f22270fc76ca7baa00066ed66b91e0100000f320f20d8b135200000000f20d80f22d8f30fbcf80f3581d90c0066f2ba5f57160fc77c01", 0x37}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @xdp, @ipx={0x4, 0x0, 0x0, "a87620abc9c6"}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='syz_tun\x00'}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 36.139343][ T8644] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.156015][ T8644] team0: Port device team_slave_0 added [ 36.163045][ T8644] team0: Port device team_slave_1 added [ 36.176149][ T8644] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.183328][ T8644] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.209724][ T8644] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.221758][ T8644] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.228684][ T8644] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.255047][ T8644] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.312859][ T8644] device hsr_slave_0 entered promiscuous mode 12:51:10 executing program 2: r0 = socket(0x2, 0xa, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) [ 36.381506][ T8644] device hsr_slave_1 entered promiscuous mode [ 36.478123][ T8806] IPVS: ftp: loaded support on port[0] = 21 [ 36.488445][ T8810] IPVS: ftp: loaded support on port[0] = 21 12:51:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) [ 36.595630][ T8644] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 36.691363][ T8644] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 36.723771][ T8644] netdevsim netdevsim0 netdevsim2: renamed from eth2 12:51:11 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000040), 0x8b, 0x0, 0x0, &(0x7f00000001c0), 0x0) [ 36.763397][ T8644] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 36.838670][ T8911] IPVS: ftp: loaded support on port[0] = 21 [ 36.856385][ T8806] chnl_net:caif_netlink_parms(): no params data found [ 36.872766][ T8810] chnl_net:caif_netlink_parms(): no params data found [ 36.885767][ T8644] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.892833][ T8644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.900048][ T8644] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.907098][ T8644] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.995390][ T9065] IPVS: ftp: loaded support on port[0] = 21 [ 37.041954][ T8806] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.049098][ T8806] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.057958][ T8806] device bridge_slave_0 entered promiscuous mode [ 37.075913][ T8810] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.084192][ T8810] bridge0: port 1(bridge_slave_0) entered disabled state 12:51:11 executing program 5: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 37.093982][ T8810] device bridge_slave_0 entered promiscuous mode [ 37.104511][ T4734] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.112505][ T4734] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.124613][ T8911] chnl_net:caif_netlink_parms(): no params data found [ 37.133440][ T8806] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.140656][ T8806] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.149217][ T8806] device bridge_slave_1 entered promiscuous mode [ 37.165618][ T8810] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.172731][ T8810] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.180257][ T8810] device bridge_slave_1 entered promiscuous mode [ 37.203516][ T8806] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.217607][ T8644] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.229623][ T8806] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.239672][ T8810] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.265650][ T8911] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.272978][ T8911] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.280252][ T8911] device bridge_slave_0 entered promiscuous mode [ 37.288071][ T8911] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.295448][ T8911] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.303134][ T8911] device bridge_slave_1 entered promiscuous mode [ 37.310536][ T8810] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.322628][ T9239] IPVS: ftp: loaded support on port[0] = 21 [ 37.330001][ T7] ================================================================== [ 37.338063][ T7] BUG: KCSAN: data-race in copy_process / release_task [ 37.344872][ T7] [ 37.347171][ T7] write to 0xffffffff89280410 of 4 bytes by task 9291 on cpu 0: [ 37.354777][ T7] release_task+0x6c8/0xb90 [ 37.359303][ T7] do_exit+0x1140/0x16e0 [ 37.363515][ T7] call_usermodehelper_exec_async+0x2da/0x2e0 [ 37.369548][ T7] ret_from_fork+0x1f/0x30 [ 37.373926][ T7] [ 37.376338][ T7] read to 0xffffffff89280410 of 4 bytes by task 7 on cpu 1: [ 37.383618][ T7] copy_process+0xab5/0x32b0 [ 37.388172][ T7] _do_fork+0xf1/0x660 [ 37.392206][ T7] kernel_thread+0x85/0xb0 [ 37.396595][ T7] call_usermodehelper_exec_work+0x4f/0x1b0 [ 37.402454][ T7] process_one_work+0x3cb/0x990 [ 37.407356][ T7] worker_thread+0x665/0xbe0 [ 37.411921][ T7] kthread+0x210/0x220 [ 37.415998][ T7] ret_from_fork+0x1f/0x30 [ 37.420376][ T7] [ 37.422670][ T7] Reported by Kernel Concurrency Sanitizer on: [ 37.428790][ T7] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 5.8.0-rc2-syzkaller #0 [ 37.436902][ T7] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.446929][ T7] Workqueue: events_unbound call_usermodehelper_exec_work [ 37.454001][ T7] ================================================================== [ 37.462029][ T7] Kernel panic - not syncing: panic_on_warn set ... [ 37.468580][ T7] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 5.8.0-rc2-syzkaller #0 [ 37.476692][ T7] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.486729][ T7] Workqueue: events_unbound call_usermodehelper_exec_work [ 37.493839][ T7] Call Trace: [ 37.497098][ T7] dump_stack+0x10f/0x19d [ 37.501398][ T7] panic+0x1f8/0x63a [ 37.505259][ T7] ? vprintk_emit+0x44a/0x4f0 [ 37.509907][ T7] kcsan_report+0x684/0x690 [ 37.514382][ T7] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 37.519892][ T7] ? copy_process+0xab5/0x32b0 [ 37.524622][ T7] ? _do_fork+0xf1/0x660 [ 37.528832][ T7] ? kernel_thread+0x85/0xb0 [ 37.533391][ T7] ? call_usermodehelper_exec_work+0x4f/0x1b0 [ 37.539422][ T7] ? process_one_work+0x3cb/0x990 [ 37.544414][ T7] ? worker_thread+0x665/0xbe0 [ 37.549184][ T7] ? kthread+0x210/0x220 [ 37.553411][ T7] ? ret_from_fork+0x1f/0x30 [ 37.557976][ T7] ? debug_smp_processor_id+0x18/0x20 [ 37.563316][ T7] ? printk_nmi_enter+0x20/0x20 [ 37.568134][ T7] ? copy_creds+0x280/0x350 [ 37.572603][ T7] ? copy_creds+0x280/0x350 [ 37.577076][ T7] kcsan_setup_watchpoint+0x453/0x4d0 [ 37.582429][ T7] ? copy_creds+0x280/0x350 [ 37.586897][ T7] copy_process+0xab5/0x32b0 [ 37.591458][ T7] ? check_preempt_wakeup+0x1cb/0x370 [ 37.596799][ T7] ? proc_cap_handler+0x280/0x280 [ 37.601791][ T7] _do_fork+0xf1/0x660 [ 37.605830][ T7] ? check_preemption_disabled+0x3f/0x1a0 [ 37.611522][ T7] ? proc_cap_handler+0x280/0x280 [ 37.616516][ T7] kernel_thread+0x85/0xb0 [ 37.620931][ T7] ? proc_cap_handler+0x280/0x280 [ 37.625922][ T7] call_usermodehelper_exec_work+0x4f/0x1b0 [ 37.631828][ T7] ? __list_del_entry_valid+0x54/0xc0 [ 37.637166][ T7] process_one_work+0x3cb/0x990 [ 37.641985][ T7] worker_thread+0x665/0xbe0 [ 37.646544][ T7] ? process_one_work+0x990/0x990 [ 37.651541][ T7] kthread+0x210/0x220 [ 37.655577][ T7] ? process_one_work+0x990/0x990 [ 37.660569][ T7] ? constant_test_bit+0x30/0x30 [ 37.665472][ T7] ret_from_fork+0x1f/0x30 [ 37.670896][ T7] Kernel Offset: disabled [ 37.675205][ T7] Rebooting in 86400 seconds..