[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.226' (ECDSA) to the list of known hosts. 2020/06/30 04:42:46 fuzzer started 2020/06/30 04:42:47 dialing manager at 10.128.0.105:42015 2020/06/30 04:42:47 syscalls: 3106 2020/06/30 04:42:47 code coverage: enabled 2020/06/30 04:42:47 comparison tracing: enabled 2020/06/30 04:42:47 extra coverage: enabled 2020/06/30 04:42:47 setuid sandbox: enabled 2020/06/30 04:42:47 namespace sandbox: enabled 2020/06/30 04:42:47 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/30 04:42:47 fault injection: enabled 2020/06/30 04:42:47 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/30 04:42:47 net packet injection: enabled 2020/06/30 04:42:47 net device setup: enabled 2020/06/30 04:42:47 concurrency sanitizer: enabled 2020/06/30 04:42:47 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/30 04:42:47 USB emulation: enabled 04:42:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) syzkaller login: [ 32.705269][ T8640] IPVS: ftp: loaded support on port[0] = 21 [ 32.762008][ T8640] chnl_net:caif_netlink_parms(): no params data found 04:42:48 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={0x0, 0x1c}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100), 0xc, &(0x7f00000005c0)={0x0, 0x58}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000c00)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000b00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/140, 0x8c}], 0x1}}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000480)=""/29, 0x1d}, {&(0x7f0000000dc0)=""/160, 0xa0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)=""/91, 0x5b}], 0x1}}], 0x3, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 32.803260][ T8640] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.811668][ T8640] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.819628][ T8640] device bridge_slave_0 entered promiscuous mode [ 32.846681][ T8640] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.853963][ T8640] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.865517][ T8640] device bridge_slave_1 entered promiscuous mode [ 32.894498][ T8640] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.911128][ T8640] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.931434][ T8640] team0: Port device team_slave_0 added [ 32.941297][ T8778] IPVS: ftp: loaded support on port[0] = 21 [ 32.949472][ T8640] team0: Port device team_slave_1 added [ 32.974869][ T8640] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.981834][ T8640] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.008989][ T8640] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.031164][ T8640] batman_adv: batadv0: Adding interface: batadv_slave_1 04:42:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x38}}, 0x0) [ 33.038697][ T8640] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.065963][ T8640] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.116134][ T8640] device hsr_slave_0 entered promiscuous mode [ 33.164830][ T8640] device hsr_slave_1 entered promiscuous mode 04:42:49 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={0x0, 0x1c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000005cc0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/140, 0x8c}], 0x1}}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000480)=""/29, 0x1d}, {&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000c80)=""/137, 0x89}, {&(0x7f0000000ac0)=""/151, 0x97}], 0x4}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000001c0)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}], 0x2}}], 0x3, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000280), 0xc, &(0x7f0000000a40)={0x0, 0x1a4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 33.266332][ T8834] IPVS: ftp: loaded support on port[0] = 21 [ 33.309428][ T8778] chnl_net:caif_netlink_parms(): no params data found [ 33.369597][ T8943] IPVS: ftp: loaded support on port[0] = 21 [ 33.441620][ T8778] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.452586][ T8778] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.460788][ T8778] device bridge_slave_0 entered promiscuous mode [ 33.482565][ T8834] chnl_net:caif_netlink_parms(): no params data found [ 33.492685][ T8640] netdevsim netdevsim0 netdevsim0: renamed from eth0 04:42:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@private1}, {@in=@remote, 0x0, 0x32}, @in, {}, {}, {}, 0x0, 0x0, 0xa, 0x1, 0x0, 0x8c0e946769b73622}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}]}, 0x138}}, 0x0) [ 33.586910][ T8778] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.594101][ T8778] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.614906][ T8778] device bridge_slave_1 entered promiscuous mode [ 33.653440][ T8640] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 33.699705][ T8640] netdevsim netdevsim0 netdevsim2: renamed from eth2 04:42:49 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={0x0, 0x0, 0x8}, 0x10) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, 0x0, 0x5}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000700)={@in6={{0xa, 0x4e21, 0x1f, @private2, 0x2}}}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0xfffffffd, @empty}}, 0x0, 0x5}, 0xd8) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101140, 0x0) ioctl$KDDELIO(r2, 0x4b35, 0x8) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000080)={@local}, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/dlm_plock\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000300)={0x8, 0x120, 0xfa00, {0x1000, {0x0, 0x0, "d4d9555c7493900e8fca36117aaad1e04b13c6563e692554223bde6b665498a5da3279a9ec12f428fc01cfe93bdc65c43e18383242571f0a284393bdb6520d648f243408f9c330b42dff6af66cb970b7b4aba153fadaafe1311599e664cc74973d682e590c1b7346bc73b2e766611a6ba29f0b2045565b8aa1677b7dc14295cf8e39279f6016c36b6231a3c5bfb6e3346e523bd4c0810df2e6499a59a5cc4c1dc4599b22ccf1d3939290f9b23dabc0c07cae6fe3380b9535a0c51aa60997e5b1eb904d3b01252c1d74de4bc2f0f8b2638a15faaec456600d56e0db131664f21927eb9f9a3435fe283327e2258b1ef611cf0fc81e6edff49848cbcfe1dca0552f", 0x0, 0xc}}}, 0x128) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000580)={@in={{0x2, 0x4e21, @multicast2}}, 0x0, 0x0, 0x7, 0x0, "af5eb3f3133f7ba636f2c92800b6b7facc62c3c4e2d6b785ea8b418853c9ced33554bd04cdee3b09603605073a60c9f564e92085e5c30039f7cdbaa76f010c7766e90988eb751136bbbf1135a26b317a"}, 0xd8) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getresgid(&(0x7f00000000c0), &(0x7f00000003c0)=0x0, &(0x7f0000000680)) r6 = getegid() getgroups(0x2, &(0x7f0000000540)=[r5, r6]) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) connect$llc(r7, &(0x7f0000000380)={0x1a, 0x1, 0x0, 0x9}, 0x10) sendmmsg(r7, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 33.826123][ T8778] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.846353][ T8640] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 33.900681][ T9147] IPVS: ftp: loaded support on port[0] = 21 [ 33.908769][ T8943] chnl_net:caif_netlink_parms(): no params data found [ 33.920994][ T8778] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.969774][ T8778] team0: Port device team_slave_0 added [ 33.976861][ T8778] team0: Port device team_slave_1 added [ 33.978231][ T9202] IPVS: ftp: loaded support on port[0] = 21 [ 33.996956][ T8834] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.005092][ T8834] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.012641][ T8834] device bridge_slave_0 entered promiscuous mode [ 34.020796][ T8778] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.028123][ T8778] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.054376][ T8778] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.066562][ T8778] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.073578][ T8778] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.099988][ T8778] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.126996][ T8834] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.134775][ T8834] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.142472][ T8834] device bridge_slave_1 entered promiscuous mode [ 34.164553][ T8834] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.215284][ T8778] device hsr_slave_0 entered promiscuous mode [ 34.264183][ T8778] device hsr_slave_1 entered promiscuous mode [ 34.294025][ T8778] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 34.301582][ T8778] Cannot create hsr debugfs directory [ 34.308864][ T8834] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.318218][ T8943] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.326184][ T8943] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.333645][ T8943] device bridge_slave_0 entered promiscuous mode [ 34.368696][ T8943] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.376088][ T8943] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.383781][ T8943] device bridge_slave_1 entered promiscuous mode [ 34.427273][ T8834] team0: Port device team_slave_0 added [ 34.438138][ T8943] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.449594][ T8943] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.467766][ T9147] chnl_net:caif_netlink_parms(): no params data found [ 34.483946][ T8834] team0: Port device team_slave_1 added [ 34.499037][ T8834] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.506224][ T8834] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.532145][ T8834] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.543636][ T8943] team0: Port device team_slave_0 added [ 34.553061][ T8943] team0: Port device team_slave_1 added [ 34.563290][ T8778] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 34.616659][ T8834] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.623629][ T8834] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.649908][ T8834] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.671767][ T8778] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 34.735594][ T8778] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 34.776755][ T8778] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 34.827240][ T7] ================================================================== [ 34.835378][ T7] BUG: KCSAN: data-race in copy_process / copy_process [ 34.842203][ T7] [ 34.844513][ T7] write to 0xffffffff8927a410 of 4 bytes by task 390 on cpu 0: [ 34.852092][ T7] copy_process+0x2e84/0x3300 [ 34.856795][ T7] _do_fork+0xf1/0x660 [ 34.861013][ T7] kernel_thread+0x85/0xb0 [ 34.865481][ T7] call_usermodehelper_exec_work+0x4f/0x1b0 [ 34.871458][ T7] process_one_work+0x3e1/0x9a0 [ 34.876283][ T7] worker_thread+0x665/0xbe0 [ 34.880891][ T7] kthread+0x20d/0x230 [ 34.884934][ T7] ret_from_fork+0x1f/0x30 [ 34.889346][ T7] [ 34.891651][ T7] read to 0xffffffff8927a410 of 4 bytes by task 7 on cpu 1: [ 34.898906][ T7] copy_process+0xac4/0x3300 [ 34.903467][ T7] _do_fork+0xf1/0x660 [ 34.907536][ T7] kernel_thread+0x85/0xb0 [ 34.911931][ T7] call_usermodehelper_exec_work+0x4f/0x1b0 [ 34.917801][ T7] process_one_work+0x3e1/0x9a0 [ 34.922636][ T7] worker_thread+0x665/0xbe0 [ 34.927200][ T7] kthread+0x20d/0x230 [ 34.931270][ T7] ret_from_fork+0x1f/0x30 [ 34.935672][ T7] [ 34.937975][ T7] Reported by Kernel Concurrency Sanitizer on: [ 34.944122][ T7] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 5.8.0-rc3-syzkaller #0 [ 34.952262][ T7] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.962337][ T7] Workqueue: events_unbound call_usermodehelper_exec_work [ 34.969471][ T7] ================================================================== [ 34.977512][ T7] Kernel panic - not syncing: panic_on_warn set ... [ 34.984073][ T7] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 5.8.0-rc3-syzkaller #0 [ 34.992192][ T7] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.002255][ T7] Workqueue: events_unbound call_usermodehelper_exec_work [ 35.009337][ T7] Call Trace: [ 35.012604][ T7] dump_stack+0x10f/0x19d [ 35.016908][ T7] panic+0x207/0x64a [ 35.020783][ T7] ? vprintk_emit+0x44a/0x4f0 [ 35.025434][ T7] kcsan_report+0x684/0x690 [ 35.029913][ T7] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 35.035452][ T7] ? copy_process+0xac4/0x3300 [ 35.040191][ T7] ? _do_fork+0xf1/0x660 [ 35.044407][ T7] ? kernel_thread+0x85/0xb0 [ 35.048971][ T7] ? call_usermodehelper_exec_work+0x4f/0x1b0 [ 35.055032][ T7] ? process_one_work+0x3e1/0x9a0 [ 35.060052][ T7] ? worker_thread+0x665/0xbe0 [ 35.064814][ T7] ? kthread+0x20d/0x230 [ 35.069030][ T7] ? ret_from_fork+0x1f/0x30 [ 35.073624][ T7] ? debug_smp_processor_id+0x18/0x20 [ 35.079003][ T7] ? copy_creds+0x280/0x350 [ 35.083488][ T7] ? copy_creds+0x280/0x350 [ 35.087973][ T7] kcsan_setup_watchpoint+0x453/0x4d0 [ 35.093348][ T7] ? copy_creds+0x280/0x350 [ 35.097829][ T7] copy_process+0xac4/0x3300 [ 35.102419][ T7] ? check_preempt_wakeup+0x1cb/0x370 [ 35.107831][ T7] ? proc_cap_handler+0x280/0x280 [ 35.112882][ T7] _do_fork+0xf1/0x660 [ 35.116947][ T7] ? enqueue_entity+0x25a/0x480 [ 35.121773][ T7] ? proc_cap_handler+0x280/0x280 [ 35.126843][ T7] kernel_thread+0x85/0xb0 [ 35.131299][ T7] ? proc_cap_handler+0x280/0x280 [ 35.136355][ T7] call_usermodehelper_exec_work+0x4f/0x1b0 [ 35.142223][ T7] process_one_work+0x3e1/0x9a0 [ 35.147092][ T7] worker_thread+0x665/0xbe0 [ 35.151682][ T7] ? process_one_work+0x9a0/0x9a0 [ 35.156706][ T7] kthread+0x20d/0x230 [ 35.160751][ T7] ? process_one_work+0x9a0/0x9a0 [ 35.165751][ T7] ? kthread_blkcg+0x80/0x80 [ 35.170337][ T7] ret_from_fork+0x1f/0x30 [ 35.175498][ T7] Kernel Offset: disabled [ 35.179813][ T7] Rebooting in 86400 seconds..