Warning: Permanently added '10.128.0.103' (ECDSA) to the list of known hosts. 2021/05/03 13:25:07 fuzzer started 2021/05/03 13:25:07 dialing manager at 10.128.0.163:42831 2021/05/03 13:25:08 syscalls: 1997 2021/05/03 13:25:08 code coverage: enabled 2021/05/03 13:25:08 comparison tracing: enabled 2021/05/03 13:25:08 extra coverage: enabled 2021/05/03 13:25:08 setuid sandbox: enabled 2021/05/03 13:25:08 namespace sandbox: enabled 2021/05/03 13:25:08 Android sandbox: enabled 2021/05/03 13:25:08 fault injection: enabled 2021/05/03 13:25:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/03 13:25:08 net packet injection: /dev/net/tun does not exist 2021/05/03 13:25:08 net device setup: enabled 2021/05/03 13:25:08 concurrency sanitizer: enabled 2021/05/03 13:25:08 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/03 13:25:08 USB emulation: /dev/raw-gadget does not exist 2021/05/03 13:25:08 hci packet injection: /dev/vhci does not exist 2021/05/03 13:25:08 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/05/03 13:25:08 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2021/05/03 13:25:08 suppressing KCSAN reports in functions: 'xas_clear_mark' '__mark_inode_dirty' '__xa_set_mark' 'blk_mq_dispatch_rq_list' 'step_into' 'generic_write_end' 'do_sys_poll' 'shmem_getpage_gfp' '__xa_clear_mark' 'blk_mq_rq_ctx_init' 'ext4_free_inode' 'n_tty_receive_buf_common' '__ext4_new_inode' 2021/05/03 13:25:08 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/03 13:25:09 fetching corpus: 48, signal 13237/16809 (executing program) 2021/05/03 13:25:09 fetching corpus: 97, signal 25365/30119 (executing program) 2021/05/03 13:25:09 fetching corpus: 146, signal 33022/38861 (executing program) 2021/05/03 13:25:09 fetching corpus: 195, signal 37909/44825 (executing program) 2021/05/03 13:25:09 fetching corpus: 245, signal 43864/51522 (executing program) 2021/05/03 13:25:09 fetching corpus: 294, signal 47115/55719 (executing program) 2021/05/03 13:25:09 fetching corpus: 343, signal 50471/59891 (executing program) 2021/05/03 13:25:09 fetching corpus: 393, signal 53607/63712 (executing program) 2021/05/03 13:25:09 fetching corpus: 443, signal 56880/67535 (executing program) 2021/05/03 13:25:09 fetching corpus: 493, signal 59442/70746 (executing program) 2021/05/03 13:25:09 fetching corpus: 543, signal 63706/75172 (executing program) 2021/05/03 13:25:10 fetching corpus: 593, signal 66473/78313 (executing program) 2021/05/03 13:25:10 fetching corpus: 643, signal 68719/80903 (executing program) 2021/05/03 13:25:10 fetching corpus: 693, signal 71656/83994 (executing program) 2021/05/03 13:25:10 fetching corpus: 743, signal 74262/86703 (executing program) 2021/05/03 13:25:10 fetching corpus: 793, signal 76350/88990 (executing program) 2021/05/03 13:25:10 fetching corpus: 843, signal 78356/91170 (executing program) 2021/05/03 13:25:10 fetching corpus: 893, signal 80063/93053 (executing program) 2021/05/03 13:25:10 fetching corpus: 943, signal 81566/94784 (executing program) 2021/05/03 13:25:10 fetching corpus: 991, signal 82715/96226 (executing program) 2021/05/03 13:25:10 fetching corpus: 1041, signal 85006/98336 (executing program) 2021/05/03 13:25:10 fetching corpus: 1090, signal 86214/99674 (executing program) 2021/05/03 13:25:11 fetching corpus: 1139, signal 87556/101033 (executing program) 2021/05/03 13:25:11 fetching corpus: 1189, signal 88204/101998 (executing program) 2021/05/03 13:25:11 fetching corpus: 1239, signal 90172/103688 (executing program) 2021/05/03 13:25:11 fetching corpus: 1287, signal 91175/104792 (executing program) 2021/05/03 13:25:11 fetching corpus: 1337, signal 92401/105965 (executing program) 2021/05/03 13:25:11 fetching corpus: 1387, signal 93736/107148 (executing program) 2021/05/03 13:25:11 fetching corpus: 1436, signal 95209/108372 (executing program) 2021/05/03 13:25:11 fetching corpus: 1486, signal 96508/109469 (executing program) [ 20.892119][ T1762] ================================================================== [ 20.893839][ T1762] BUG: KCSAN: data-race in complete_signal / futex_wait_queue_me [ 20.895211][ T1762] [ 20.895565][ T1762] write to 0xffff8881056c002c of 4 bytes by task 1760 on cpu 0: [ 20.897021][ T1762] futex_wait_queue_me+0x198/0x260 [ 20.898238][ T1762] futex_wait+0x143/0x430 [ 20.898962][ T1762] do_futex+0x9e8/0x1ee0 [ 20.899918][ T1762] __se_sys_futex+0x2a8/0x390 [ 20.900720][ T1762] __x64_sys_futex+0x74/0x80 [ 20.901590][ T1762] do_syscall_64+0x4a/0x90 [ 20.902360][ T1762] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 20.903391][ T1762] [ 20.903918][ T1762] read to 0xffff8881056c002c of 4 bytes by task 1762 on cpu 1: [ 20.905031][ T1762] complete_signal+0x7c/0x600 [ 20.905964][ T1762] __send_signal+0x680/0x760 [ 20.906734][ T1762] send_signal+0x281/0x390 [ 20.907341][ T1762] do_send_specific+0x13d/0x1c0 [ 20.908074][ T1762] __x64_sys_tgkill+0x108/0x140 [ 20.909037][ T1762] do_syscall_64+0x4a/0x90 [ 20.909769][ T1762] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 20.910718][ T1762] [ 20.911070][ T1762] Reported by Kernel Concurrency Sanitizer on: [ 20.912007][ T1762] CPU: 1 PID: 1762 Comm: syz-fuzzer Not tainted 5.12.0-syzkaller #0 [ 20.918765][ T1762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 20.928834][ T1762] ================================================================== 2021/05/03 13:25:11 fetching corpus: 1536, signal 97528/110368 (executing program) 2021/05/03 13:25:11 fetching corpus: 1586, signal 98973/111425 (executing program) 2021/05/03 13:25:12 fetching corpus: 1636, signal 101356/112791 (executing program) 2021/05/03 13:25:12 fetching corpus: 1686, signal 102472/113584 (executing program) 2021/05/03 13:25:12 fetching corpus: 1736, signal 103610/114385 (executing program) 2021/05/03 13:25:12 fetching corpus: 1785, signal 104582/115056 (executing program) 2021/05/03 13:25:12 fetching corpus: 1834, signal 105370/115648 (executing program) 2021/05/03 13:25:12 fetching corpus: 1884, signal 106757/116408 (executing program) 2021/05/03 13:25:12 fetching corpus: 1934, signal 107460/116893 (executing program) 2021/05/03 13:25:12 fetching corpus: 1984, signal 108812/117593 (executing program) 2021/05/03 13:25:12 fetching corpus: 2034, signal 110081/118236 (executing program) 2021/05/03 13:25:12 fetching corpus: 2082, signal 110764/118631 (executing program) 2021/05/03 13:25:12 fetching corpus: 2132, signal 111406/119016 (executing program) 2021/05/03 13:25:12 fetching corpus: 2182, signal 112323/119436 (executing program) 2021/05/03 13:25:13 fetching corpus: 2232, signal 113094/119790 (executing program) 2021/05/03 13:25:13 fetching corpus: 2282, signal 113882/120121 (executing program) 2021/05/03 13:25:13 fetching corpus: 2332, signal 114785/120470 (executing program) 2021/05/03 13:25:13 fetching corpus: 2382, signal 115341/120711 (executing program) 2021/05/03 13:25:13 fetching corpus: 2432, signal 116268/120985 (executing program) 2021/05/03 13:25:13 fetching corpus: 2482, signal 116874/121180 (executing program) 2021/05/03 13:25:13 fetching corpus: 2532, signal 117839/121408 (executing program) 2021/05/03 13:25:13 fetching corpus: 2582, signal 118916/121643 (executing program) 2021/05/03 13:25:13 fetching corpus: 2630, signal 119377/121772 (executing program) 2021/05/03 13:25:13 fetching corpus: 2638, signal 119433/121830 (executing program) 2021/05/03 13:25:13 fetching corpus: 2638, signal 119433/121873 (executing program) 2021/05/03 13:25:13 fetching corpus: 2638, signal 119433/121919 (executing program) 2021/05/03 13:25:13 fetching corpus: 2638, signal 119433/121962 (executing program) 2021/05/03 13:25:13 fetching corpus: 2638, signal 119433/122009 (executing program) 2021/05/03 13:25:13 fetching corpus: 2638, signal 119433/122047 (executing program) 2021/05/03 13:25:13 fetching corpus: 2638, signal 119433/122079 (executing program) 2021/05/03 13:25:13 fetching corpus: 2638, signal 119433/122079 (executing program) 2021/05/03 13:25:15 starting 6 fuzzer processes 13:25:15 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) unshare(0x20020600) ioctl$EVIOCGMTSLOTS(r0, 0x40084504, 0x0) 13:25:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r1) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xe, 0x1, ':-[\'$@$%}\x00'}]}, 0x24}}, 0x0) 13:25:15 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=ANY=[@ANYBLOB='nr_inodes=1']) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 13:25:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000013c0)="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") 13:25:15 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000280)={0x4000}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0xffffffffffffff4a, &(0x7f0000000200)={&(0x7f0000000080)={0x17, 0x16, 0xa01, 0x0, 0x0, {0x2}}, 0x78}}, 0x0) 13:25:15 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) readv(r0, 0x0, 0xffffffffffffff0d) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1d) writev(r0, 0x0, 0x0) [ 24.453249][ T25] audit: type=1400 audit(1620048315.197:8): avc: denied { execmem } for pid=1770 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 24.643199][ T1776] cgroup: Unknown subsys name 'perf_event' [ 24.667935][ T1776] cgroup: Unknown subsys name 'net_cls' [ 24.694106][ T1779] cgroup: Unknown subsys name 'perf_event' [ 24.697992][ T1778] cgroup: Unknown subsys name 'perf_event' [ 24.706141][ T1778] cgroup: Unknown subsys name 'net_cls' [ 24.707557][ T1779] cgroup: Unknown subsys name 'net_cls' [ 24.727781][ T1781] cgroup: Unknown subsys name 'perf_event' [ 24.733887][ T1781] cgroup: Unknown subsys name 'net_cls' [ 24.753370][ T1791] cgroup: Unknown subsys name 'perf_event' [ 24.769159][ T1791] cgroup: Unknown subsys name 'net_cls' [ 24.778334][ T1798] cgroup: Unknown subsys name 'perf_event' [ 24.802945][ T1798] cgroup: Unknown subsys name 'net_cls' 13:25:19 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=ANY=[@ANYBLOB='nr_inodes=1']) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 13:25:19 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r1) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xe, 0x1, ':-[\'$@$%}\x00'}]}, 0x24}}, 0x0) 13:25:19 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) unshare(0x20020600) ioctl$EVIOCGMTSLOTS(r0, 0x40084504, 0x0) 13:25:19 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r1) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xe, 0x1, ':-[\'$@$%}\x00'}]}, 0x24}}, 0x0) 13:25:19 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=ANY=[@ANYBLOB='nr_inodes=1']) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 13:25:19 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) unshare(0x20020600) ioctl$EVIOCGMTSLOTS(r0, 0x40084504, 0x0) 13:25:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000013c0)="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") 13:25:19 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r1) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xe, 0x1, ':-[\'$@$%}\x00'}]}, 0x24}}, 0x0) 13:25:19 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) readv(r0, 0x0, 0xffffffffffffff0d) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1d) writev(r0, 0x0, 0x0) 13:25:19 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=ANY=[@ANYBLOB='nr_inodes=1']) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 13:25:19 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000280)={0x4000}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0xffffffffffffff4a, &(0x7f0000000200)={&(0x7f0000000080)={0x17, 0x16, 0xa01, 0x0, 0x0, {0x2}}, 0x78}}, 0x0) 13:25:19 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) unshare(0x20020600) ioctl$EVIOCGMTSLOTS(r0, 0x40084504, 0x0) 13:25:19 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=ANY=[@ANYBLOB='nr_inodes=1']) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 13:25:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000013c0)="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") 13:25:19 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=ANY=[@ANYBLOB='nr_inodes=1']) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 13:25:19 executing program 1: io_setup(0x7f, &(0x7f0000000000)=0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = eventfd(0x0) io_submit(r0, 0x2, &(0x7f0000000200)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x3e8b, r1, 0x0, 0x0, 0x0, 0x0, 0x3, r2}]) 13:25:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000013c0)="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") 13:25:19 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000280)={0x4000}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0xffffffffffffff4a, &(0x7f0000000200)={&(0x7f0000000080)={0x17, 0x16, 0xa01, 0x0, 0x0, {0x2}}, 0x78}}, 0x0) 13:25:19 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x1a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='!\x00') 13:25:19 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=ANY=[@ANYBLOB='nr_inodes=1']) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00')