[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.236' (ECDSA) to the list of known hosts. 2020/07/09 18:56:48 fuzzer started 2020/07/09 18:56:48 dialing manager at 10.128.0.105:46001 2020/07/09 18:56:48 syscalls: 3134 2020/07/09 18:56:48 code coverage: enabled 2020/07/09 18:56:48 comparison tracing: enabled 2020/07/09 18:56:48 extra coverage: enabled 2020/07/09 18:56:48 setuid sandbox: enabled 2020/07/09 18:56:48 namespace sandbox: enabled 2020/07/09 18:56:48 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/09 18:56:48 fault injection: enabled 2020/07/09 18:56:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/09 18:56:48 net packet injection: enabled 2020/07/09 18:56:48 net device setup: enabled 2020/07/09 18:56:48 concurrency sanitizer: enabled 2020/07/09 18:56:48 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/09 18:56:48 USB emulation: enabled 2020/07/09 18:56:48 suppressing KCSAN reports in functions: 'blk_mq_sched_dispatch_requests' 18:56:50 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) syzkaller login: [ 32.089645][ T8644] IPVS: ftp: loaded support on port[0] = 21 [ 32.150925][ T8644] chnl_net:caif_netlink_parms(): no params data found [ 32.183320][ T8644] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.190428][ T8644] bridge0: port 1(bridge_slave_0) entered disabled state 18:56:50 executing program 1: unshare(0x2a000400) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = mq_open(&(0x7f0000000080)='eth0\xd2\x84{;\x8b\xe51Cp\x97\xc3\xbf\xed\x02\xb7\xf8\xb4\x83i;pW<\x8a\xa7\'\x9b\x92-\xe7\x94\xfb\xdcP?\x1c\xc4\x03\x17\v\xd36\xd7\xd8\xbf\x89\xb9\xcb\x86\xd2\xca\xf2I\x18\x95K\xbf\xb9s\xf9\x92;\x02\xbcIPb5=\x19\xc4\xfa\x11m\x82\xf4\x92\xe3$\x1fe\xa4\x9e\xb7;\xf7B\xad