Warning: Permanently added '10.128.0.218' (ECDSA) to the list of known hosts. 2020/06/30 12:02:25 fuzzer started 2020/06/30 12:02:26 dialing manager at 10.128.0.105:42491 2020/06/30 12:02:28 syscalls: 3106 2020/06/30 12:02:28 code coverage: enabled 2020/06/30 12:02:28 comparison tracing: enabled 2020/06/30 12:02:28 extra coverage: enabled 2020/06/30 12:02:28 setuid sandbox: enabled 2020/06/30 12:02:28 namespace sandbox: enabled 2020/06/30 12:02:28 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/30 12:02:28 fault injection: enabled 2020/06/30 12:02:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/30 12:02:28 net packet injection: enabled 2020/06/30 12:02:28 net device setup: enabled 2020/06/30 12:02:28 concurrency sanitizer: enabled 2020/06/30 12:02:28 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/30 12:02:28 USB emulation: enabled 2020/06/30 12:02:30 suppressing KCSAN reports in functions: 'ext4_mark_iloc_dirty' '__xa_clear_mark' 'find_get_pages_range_tag' 'alloc_pid' 'ext4_free_inodes_count' 'page_counter_charge' 'ext4_writepages' 'snd_rawmidi_transmit' 'iptunnel_xmit' 'blk_mq_rq_ctx_init' '__ext4_new_inode' 'pcpu_alloc' 'do_nanosleep' 'ext4_free_inode' 'futex_wait_queue_me' 'do_epoll_wait' 12:02:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x4, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getdents64(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x20}, 0xc) rt_sigaction(0x1f, &(0x7f00000001c0)={&(0x7f0000000140)="f2ab40de9200c00000f30fa7c0f28d07f24c0f2d47d6c4e2b3f710f3f3406804000000430f0f47998e66f3430f1efe8f4978c1c7", 0x0, 0x0, {[0x1000]}}, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000380)) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) syzkaller login: [ 59.841981][ T8676] IPVS: ftp: loaded support on port[0] = 21 [ 59.889573][ T24] ================================================================== [ 59.897694][ T24] BUG: KCSAN: data-race in copy_process / release_task [ 59.904526][ T24] [ 59.906843][ T24] write to 0xffffffff8927a410 of 4 bytes by task 8748 on cpu 1: [ 59.914500][ T24] release_task+0x6c8/0xb90 [ 59.919600][ T24] do_exit+0x1140/0x16e0 [ 59.923924][ T24] call_usermodehelper_exec_async+0x2da/0x2e0 [ 59.930090][ T24] ret_from_fork+0x1f/0x30 [ 59.934673][ T24] [ 59.937176][ T24] read to 0xffffffff8927a410 of 4 bytes by task 24 on cpu 0: [ 59.944824][ T24] copy_process+0xac4/0x3300 [ 59.949414][ T24] _do_fork+0xf1/0x660 [ 59.953471][ T24] kernel_thread+0x85/0xb0 [ 59.957883][ T24] call_usermodehelper_exec_work+0x4f/0x1b0 [ 59.963765][ T24] process_one_work+0x3e1/0x9a0 [ 59.968609][ T24] worker_thread+0x665/0xbe0 [ 59.973189][ T24] kthread+0x20d/0x230 [ 59.977243][ T24] ret_from_fork+0x1f/0x30 [ 59.982987][ T24] [ 59.985308][ T24] Reported by Kernel Concurrency Sanitizer on: [ 59.991452][ T24] CPU: 0 PID: 24 Comm: kworker/u4:2 Not tainted 5.8.0-rc3-syzkaller #0 [ 59.999667][ T24] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.009722][ T24] Workqueue: events_unbound call_usermodehelper_exec_work [ 60.016904][ T24] ================================================================== [ 60.025478][ T24] Kernel panic - not syncing: panic_on_warn set ... [ 60.032080][ T24] CPU: 0 PID: 24 Comm: kworker/u4:2 Not tainted 5.8.0-rc3-syzkaller #0 [ 60.040297][ T24] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.050622][ T24] Workqueue: events_unbound call_usermodehelper_exec_work [ 60.051273][ T8676] chnl_net:caif_netlink_parms(): no params data found [ 60.057723][ T24] Call Trace: [ 60.057737][ T24] dump_stack+0x10f/0x19d [ 60.057752][ T24] panic+0x207/0x64a [ 60.076372][ T24] ? vprintk_emit+0x44a/0x4f0 [ 60.081126][ T24] kcsan_report+0x684/0x690 12:02:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) clock_gettime(0x0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000100)=0x3) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, 0x0, 0x0) [ 60.085629][ T24] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 60.091253][ T24] ? copy_process+0xac4/0x3300 [ 60.096000][ T24] ? _do_fork+0xf1/0x660 [ 60.100227][ T24] ? kernel_thread+0x85/0xb0 [ 60.105492][ T24] ? call_usermodehelper_exec_work+0x4f/0x1b0 [ 60.111554][ T24] ? process_one_work+0x3e1/0x9a0 [ 60.116576][ T24] ? worker_thread+0x665/0xbe0 [ 60.121331][ T24] ? kthread+0x20d/0x230 [ 60.125555][ T24] ? ret_from_fork+0x1f/0x30 [ 60.130156][ T24] ? debug_smp_processor_id+0x18/0x20 [ 60.135696][ T24] ? copy_creds+0x280/0x350 [ 60.140188][ T24] ? copy_creds+0x280/0x350 [ 60.145335][ T24] kcsan_setup_watchpoint+0x453/0x4d0 [ 60.150701][ T24] ? copy_creds+0x280/0x350 [ 60.155221][ T24] copy_process+0xac4/0x3300 [ 60.159897][ T24] ? check_preempt_wakeup+0x1cb/0x370 [ 60.165258][ T24] ? proc_cap_handler+0x280/0x280 [ 60.170273][ T24] _do_fork+0xf1/0x660 [ 60.174329][ T24] ? proc_cap_handler+0x280/0x280 [ 60.179341][ T24] kernel_thread+0x85/0xb0 [ 60.183748][ T24] ? proc_cap_handler+0x280/0x280 [ 60.188768][ T24] call_usermodehelper_exec_work+0x4f/0x1b0 [ 60.195383][ T24] ? __list_del_entry_valid+0x54/0xc0 [ 60.201082][ T24] process_one_work+0x3e1/0x9a0 [ 60.206181][ T24] worker_thread+0x665/0xbe0 [ 60.210958][ T24] ? finish_task_switch+0x8b/0x270 [ 60.216144][ T24] ? process_one_work+0x9a0/0x9a0 [ 60.221152][ T24] kthread+0x20d/0x230 [ 60.225210][ T24] ? process_one_work+0x9a0/0x9a0 [ 60.230223][ T24] ? kthread_blkcg+0x80/0x80 [ 60.234994][ T24] ret_from_fork+0x1f/0x30 [ 60.241508][ T24] Kernel Offset: disabled [ 60.245923][ T24] Rebooting in 86400 seconds..