[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.178' (ECDSA) to the list of known hosts. 2020/08/21 06:51:32 fuzzer started 2020/08/21 06:51:32 dialing manager at 10.128.0.105:42795 2020/08/21 06:51:36 syscalls: 3326 2020/08/21 06:51:36 code coverage: enabled 2020/08/21 06:51:36 comparison tracing: enabled 2020/08/21 06:51:36 extra coverage: enabled 2020/08/21 06:51:36 setuid sandbox: enabled 2020/08/21 06:51:36 namespace sandbox: enabled 2020/08/21 06:51:36 Android sandbox: /sys/fs/selinux/policy does not exist 2020/08/21 06:51:36 fault injection: enabled 2020/08/21 06:51:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/08/21 06:51:36 net packet injection: enabled 2020/08/21 06:51:36 net device setup: enabled 2020/08/21 06:51:36 concurrency sanitizer: enabled 2020/08/21 06:51:36 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/08/21 06:51:36 USB emulation: enabled 2020/08/21 06:51:36 hci packet injection: enabled 2020/08/21 06:51:38 suppressing KCSAN reports in functions: 'kauditd_thread' '__xa_clear_mark' '__ext4_new_inode' 'ext4_free_inodes_count' 'snd_rawmidi_poll' 'do_sys_poll' 'mark_buffer_dirty_inode' '__ext4_update_other_inode_time' 'snd_rawmidi_kernel_write1' 'find_get_pages_range_tag' 'ext4_mb_good_group' 'generic_write_end' 'generic_file_buffered_read' 'blk_mq_dispatch_rq_list' 'ext4_free_inode' 'expire_timers' '__delete_from_page_cache' 'do_syslog' 'ondemand_readahead' 'futex_wait_queue_me' 'blk_mq_rq_ctx_init' 'blk_mq_sched_dispatch_requests' 'xas_find_marked' 'dd_has_work' 06:52:15 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 06:52:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0xc01, 0x3, 0x240, 0x0, 0x5002004a, 0x0, 0xf0, 0x0, 0x1a8, 0x3c8, 0x3c8, 0x1a8, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @remote, 0x0, 0x0, 'erspan0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xf0, 0x0, {}, [@common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'netbios-ns\x00'}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'netdevsim0\x00', 'vlan0\x00'}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2a0) 06:52:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x400, 0x0, &(0x7f0000000140)) 06:52:16 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)='4', 0x1}], 0x1) r1 = inotify_init1(0x0) r2 = inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x20000051) readv(r1, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r1, r2) 06:52:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x420, [0x0, 0x200002c0, 0x200004d0, 0x20000610], 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]}, 0x498) 06:52:16 executing program 5: r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000003c0)={0xffffffff, 0x24b, 0x3ff, 0x7be, 0x3}, 0x14) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(r1, 0x1269, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) socket$unix(0x1, 0x2, 0x0) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 'dummy0\x00'}}, 0x1e) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000480)="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", 0xfd}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) r4 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, r4) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r6, 0x6612, &(0x7f0000000240)={0x0, 0x252a, 0x0, 0x0, [], [{0x0, 0x0, 0x0, 0x4968, 0xffffffffffffffff}, {0x801}]}) ioctl$FS_IOC_GETFSMAP(r6, 0x6612, &(0x7f00000004c0)=ANY=[@ANYBLOB="000000002a25000008000000000000000000000000000000000000000000000000130ccbe0515bb48c00000000000000eeff00000000000000000000000000000000000000000000ff01000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001080000c4a2d2750002000000000000001000"/180]) dup(r5) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) syzkaller login: [ 79.666617][ T8737] IPVS: ftp: loaded support on port[0] = 21 [ 79.754974][ T8737] chnl_net:caif_netlink_parms(): no params data found [ 79.783917][ T8737] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.790960][ T8737] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.800972][ T8737] device bridge_slave_0 entered promiscuous mode [ 79.825296][ T8737] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.832522][ T8737] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.845774][ T8739] IPVS: ftp: loaded support on port[0] = 21 [ 79.854661][ T8737] device bridge_slave_1 entered promiscuous mode [ 79.870338][ T8737] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.882483][ T8737] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.902364][ T8737] team0: Port device team_slave_0 added [ 79.912174][ T8737] team0: Port device team_slave_1 added [ 79.929999][ T8737] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 79.937356][ T8737] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 79.969674][ T8737] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 79.982444][ T8737] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 79.989778][ T8737] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 80.025648][ T8737] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 80.069616][ T8741] IPVS: ftp: loaded support on port[0] = 21 [ 80.070158][ T8739] chnl_net:caif_netlink_parms(): no params data found [ 80.088950][ T8737] device hsr_slave_0 entered promiscuous mode [ 80.095779][ T8737] device hsr_slave_1 entered promiscuous mode [ 80.125625][ T8743] ================================================================== [ 80.133750][ T8743] BUG: KCSAN: data-race in __hci_req_sync / hci_req_sync_complete [ 80.141536][ T8743] [ 80.143853][ T8743] write to 0xffff8880b2d74a70 of 4 bytes by task 2338 on cpu 0: [ 80.151474][ T8743] hci_req_sync_complete+0x5c/0x110 [ 80.156663][ T8743] hci_event_packet+0xe6b9/0x10060 [ 80.161763][ T8743] hci_rx_work+0x344/0x4a0 [ 80.166254][ T8743] process_one_work+0x3e1/0x9a0 [ 80.171106][ T8743] worker_thread+0x665/0xbe0 [ 80.175689][ T8743] kthread+0x20d/0x230 [ 80.179748][ T8743] ret_from_fork+0x1f/0x30 [ 80.184138][ T8743] [ 80.186460][ T8743] read to 0xffff8880b2d74a70 of 4 bytes by task 8743 on cpu 1: [ 80.193986][ T8743] __hci_req_sync+0xdc/0x420 [ 80.198557][ T8743] hci_req_sync+0x71/0x90 [ 80.202874][ T8743] hci_dev_cmd+0x244/0x590 [ 80.207282][ T8743] hci_sock_ioctl+0x2e4/0x630 [ 80.211948][ T8743] sock_do_ioctl+0x4d/0x210 [ 80.216436][ T8743] sock_ioctl+0x36b/0x5b0 [ 80.220751][ T8743] __se_sys_ioctl+0xcb/0x140 [ 80.221018][ T8739] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.226280][ T8743] __x64_sys_ioctl+0x3f/0x50 [ 80.226289][ T8743] do_syscall_64+0x39/0x80 [ 80.226301][ T8743] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 80.226303][ T8743] [ 80.226306][ T8743] Reported by Kernel Concurrency Sanitizer on: [ 80.226321][ T8743] CPU: 1 PID: 8743 Comm: syz-executor.3 Not tainted 5.9.0-rc1-syzkaller #0 [ 80.233678][ T8739] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.237883][ T8743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.247520][ T8739] device bridge_slave_0 entered promiscuous mode [ 80.248213][ T8743] ================================================================== [ 80.282075][ T8737] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.282235][ T8743] Kernel panic - not syncing: panic_on_warn set ... [ 80.309858][ T8743] CPU: 1 PID: 8743 Comm: syz-executor.3 Not tainted 5.9.0-rc1-syzkaller #0 [ 80.318430][ T8743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.328472][ T8743] Call Trace: [ 80.331753][ T8743] dump_stack+0x10f/0x19d [ 80.336060][ T8743] panic+0x207/0x64a [ 80.339934][ T8743] ? vprintk_emit+0x44a/0x4f0 [ 80.344595][ T8743] kcsan_report+0x684/0x690 [ 80.349081][ T8743] ? kcsan_setup_watchpoint+0x41e/0x4a0 [ 80.354600][ T8743] ? __hci_req_sync+0xdc/0x420 [ 80.359336][ T8743] ? hci_req_sync+0x71/0x90 [ 80.363815][ T8743] ? hci_dev_cmd+0x244/0x590 [ 80.368377][ T8743] ? hci_sock_ioctl+0x2e4/0x630 [ 80.373208][ T8743] ? sock_do_ioctl+0x4d/0x210 [ 80.377856][ T8743] ? sock_ioctl+0x36b/0x5b0 [ 80.382331][ T8743] ? __se_sys_ioctl+0xcb/0x140 [ 80.387069][ T8743] ? __x64_sys_ioctl+0x3f/0x50 [ 80.391806][ T8743] ? do_syscall_64+0x39/0x80 [ 80.396372][ T8743] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 80.402422][ T8743] kcsan_setup_watchpoint+0x41e/0x4a0 [ 80.407771][ T8743] ? hci_encrypt_req+0x70/0x70 [ 80.412510][ T8743] __hci_req_sync+0xdc/0x420 [ 80.417075][ T8743] ? __srcu_read_unlock+0x1f/0x40 [ 80.422076][ T8743] ? hci_encrypt_req+0x70/0x70 [ 80.426810][ T8743] hci_req_sync+0x71/0x90 [ 80.431112][ T8743] hci_dev_cmd+0x244/0x590 [ 80.435502][ T8743] hci_sock_ioctl+0x2e4/0x630 [ 80.440154][ T8743] sock_do_ioctl+0x4d/0x210 [ 80.444650][ T8743] ? name_to_dev_t+0x274/0x840 [ 80.449386][ T8743] ? sock_poll+0x1a0/0x1a0 [ 80.453776][ T8743] sock_ioctl+0x36b/0x5b0 [ 80.458081][ T8743] ? tomoyo_file_ioctl+0x1c/0x20 [ 80.462992][ T8743] ? sock_poll+0x1a0/0x1a0 [ 80.467384][ T8743] __se_sys_ioctl+0xcb/0x140 [ 80.471950][ T8743] __x64_sys_ioctl+0x3f/0x50 [ 80.476514][ T8743] do_syscall_64+0x39/0x80 [ 80.480906][ T8743] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 80.486770][ T8743] RIP: 0033:0x45d347 [ 80.490642][ T8743] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 80.510221][ T8743] RSP: 002b:00007ffe95414a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 80.518602][ T8743] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045d347 [ 80.526551][ T8743] RDX: 00007ffe95414a40 RSI: 00000000400448dd RDI: 0000000000000003 [ 80.534497][ T8743] RBP: 00000000000000f8 R08: 0000000000000000 R09: 00007fd74d5af700 [ 80.544457][ T8743] R10: 00007fd74d5af9d0 R11: 0000000000000246 R12: 0000000000418d90 [ 80.552439][ T8743] R13: 00007ffe95414d18 R14: 0000000000000000 R15: 0000000000000000 [ 80.561873][ T8743] Kernel Offset: disabled [ 80.566197][ T8743] Rebooting in 86400 seconds..