Warning: Permanently added '10.128.0.31' (ECDSA) to the list of known hosts. 2020/06/25 11:05:37 fuzzer started 2020/06/25 11:05:37 dialing manager at 10.128.0.105:38037 2020/06/25 11:05:37 syscalls: 3105 2020/06/25 11:05:37 code coverage: enabled 2020/06/25 11:05:37 comparison tracing: enabled 2020/06/25 11:05:37 extra coverage: enabled 2020/06/25 11:05:37 setuid sandbox: enabled 2020/06/25 11:05:37 namespace sandbox: enabled 2020/06/25 11:05:37 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/25 11:05:37 fault injection: enabled 2020/06/25 11:05:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/25 11:05:37 net packet injection: enabled 2020/06/25 11:05:37 net device setup: enabled 2020/06/25 11:05:37 concurrency sanitizer: enabled 2020/06/25 11:05:37 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/25 11:05:37 USB emulation: enabled 2020/06/25 11:05:38 suppressing KCSAN reports in functions: 'dd_has_work' 'generic_write_end' '__xa_clear_mark' 'kauditd_thread' 'do_epoll_wait' '__ext4_new_inode' 'ext4_free_inode' 'page_counter_charge' 11:05:42 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e000709000000000000000001000000", @ANYRES32], 0x2}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4bfdc, 0x0) [ 36.530154][ T8673] IPVS: ftp: loaded support on port[0] = 21 [ 36.578891][ T8673] chnl_net:caif_netlink_parms(): no params data found [ 36.610211][ T8673] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.617465][ T8673] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.625395][ T8673] device bridge_slave_0 entered promiscuous mode [ 36.633480][ T8673] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.640515][ T8673] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.648604][ T8673] device bridge_slave_1 entered promiscuous mode [ 36.664242][ T8673] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 11:05:42 executing program 1: unshare(0x20000400) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/zoneinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) [ 36.674674][ T8673] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.694687][ T8673] team0: Port device team_slave_0 added [ 36.701902][ T8673] team0: Port device team_slave_1 added [ 36.715827][ T8673] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.722977][ T8673] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.749289][ T8673] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.761249][ T8673] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.768568][ T8673] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.795121][ T8673] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 11:05:43 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x0, 0x1, 0x0, &(0x7f00000000c0)=""/100, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x1, 0x0, 0x0, &(0x7f0000000580)=""/156, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000300)=ANY=[@ANYBLOB="18"]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000003c0)=0x1) [ 36.863842][ T8673] device hsr_slave_0 entered promiscuous mode [ 36.922871][ T8673] device hsr_slave_1 entered promiscuous mode [ 37.006297][ T8835] IPVS: ftp: loaded support on port[0] = 21 [ 37.026898][ T8839] IPVS: ftp: loaded support on port[0] = 21 [ 37.065747][ T7] ================================================================== [ 37.073860][ T7] BUG: KCSAN: data-race in copy_process / release_task [ 37.080703][ T7] [ 37.083022][ T7] write to 0xffffffff89280410 of 4 bytes by task 8889 on cpu 1: [ 37.090642][ T7] release_task+0x6c8/0xb90 [ 37.095262][ T7] do_exit+0x1140/0x16e0 [ 37.099503][ T7] call_usermodehelper_exec_async+0x2da/0x2e0 [ 37.105565][ T7] ret_from_fork+0x1f/0x30 [ 37.109963][ T7] [ 37.112275][ T7] read to 0xffffffff89280410 of 4 bytes by task 7 on cpu 0: [ 37.119544][ T7] copy_process+0xab5/0x32b0 [ 37.122206][ T8673] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 37.124118][ T7] _do_fork+0xf1/0x660 [ 37.134810][ T7] kernel_thread+0x85/0xb0 [ 37.139216][ T7] call_usermodehelper_exec_work+0x4f/0x1b0 [ 37.145098][ T7] process_one_work+0x3cb/0x990 [ 37.149932][ T7] worker_thread+0x665/0xbe0 [ 37.154517][ T7] kthread+0x210/0x220 [ 37.158580][ T7] ret_from_fork+0x1f/0x30 [ 37.162975][ T7] [ 37.165285][ T7] Reported by Kernel Concurrency Sanitizer on: [ 37.171419][ T7] CPU: 0 PID: 7 Comm: kworker/u4:0 Not tainted 5.8.0-rc2-syzkaller #0 [ 37.179538][ T7] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.189574][ T7] Workqueue: events_unbound call_usermodehelper_exec_work [ 37.196687][ T7] ================================================================== [ 37.204716][ T7] Kernel panic - not syncing: panic_on_warn set ... [ 37.211302][ T7] CPU: 0 PID: 7 Comm: kworker/u4:0 Not tainted 5.8.0-rc2-syzkaller #0 [ 37.219438][ T7] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.229466][ T7] Workqueue: events_unbound call_usermodehelper_exec_work [ 37.236551][ T7] Call Trace: [ 37.239819][ T7] dump_stack+0x10f/0x19d [ 37.244127][ T7] panic+0x1f8/0x63a [ 37.247992][ T7] ? vprintk_emit+0x44a/0x4f0 [ 37.252638][ T7] kcsan_report+0x684/0x690 [ 37.257109][ T7] ? kcsan_setup_watchpoint+0x453/0x4d0 11:05:43 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) [ 37.262620][ T7] ? copy_process+0xab5/0x32b0 [ 37.267347][ T7] ? _do_fork+0xf1/0x660 [ 37.271554][ T7] ? kernel_thread+0x85/0xb0 [ 37.276119][ T7] ? call_usermodehelper_exec_work+0x4f/0x1b0 [ 37.282175][ T7] ? process_one_work+0x3cb/0x990 [ 37.287184][ T7] ? worker_thread+0x665/0xbe0 [ 37.291939][ T7] ? kthread+0x210/0x220 [ 37.296176][ T7] ? ret_from_fork+0x1f/0x30 [ 37.300782][ T7] ? debug_smp_processor_id+0x18/0x20 [ 37.306145][ T7] ? printk_nmi_enter+0x20/0x20 [ 37.310985][ T7] ? copy_creds+0x280/0x350 [ 37.315477][ T7] ? copy_creds+0x280/0x350 [ 37.319973][ T7] kcsan_setup_watchpoint+0x453/0x4d0 [ 37.325333][ T7] ? copy_creds+0x280/0x350 [ 37.329825][ T7] copy_process+0xab5/0x32b0 [ 37.334409][ T7] ? select_idle_sibling+0x258/0x430 [ 37.339689][ T7] ? __rcu_read_unlock+0x4b/0x260 [ 37.344709][ T7] ? check_preemption_disabled+0x3f/0x1a0 [ 37.350420][ T7] ? proc_cap_handler+0x280/0x280 [ 37.355434][ T7] _do_fork+0xf1/0x660 [ 37.359494][ T7] ? enqueue_entity+0x25a/0x480 [ 37.364337][ T7] ? proc_cap_handler+0x280/0x280 [ 37.369523][ T7] kernel_thread+0x85/0xb0 [ 37.373929][ T7] ? proc_cap_handler+0x280/0x280 [ 37.378944][ T7] call_usermodehelper_exec_work+0x4f/0x1b0 [ 37.384826][ T7] process_one_work+0x3cb/0x990 [ 37.389670][ T7] worker_thread+0x665/0xbe0 [ 37.394253][ T7] ? process_one_work+0x990/0x990 [ 37.399273][ T7] kthread+0x210/0x220 [ 37.403327][ T7] ? process_one_work+0x990/0x990 [ 37.408340][ T7] ? constant_test_bit+0x30/0x30 [ 37.413297][ T7] ret_from_fork+0x1f/0x30 [ 37.418767][ T7] Kernel Offset: disabled [ 37.423077][ T7] Rebooting in 86400 seconds..