[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.42' (ECDSA) to the list of known hosts. 2020/06/28 22:38:57 fuzzer started 2020/06/28 22:38:57 dialing manager at 10.128.0.105:37633 2020/06/28 22:38:57 syscalls: 3105 2020/06/28 22:38:57 code coverage: enabled 2020/06/28 22:38:57 comparison tracing: enabled 2020/06/28 22:38:57 extra coverage: enabled 2020/06/28 22:38:57 setuid sandbox: enabled 2020/06/28 22:38:57 namespace sandbox: enabled 2020/06/28 22:38:57 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/28 22:38:57 fault injection: enabled 2020/06/28 22:38:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/28 22:38:57 net packet injection: enabled 2020/06/28 22:38:57 net device setup: enabled 2020/06/28 22:38:57 concurrency sanitizer: enabled 2020/06/28 22:38:57 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/28 22:38:57 USB emulation: enabled 2020/06/28 22:38:58 suppressing KCSAN reports in functions: '__ext4_new_inode' 'ext4_free_inode' 'ext4_mark_iloc_dirty' '__send_signal' '__xa_clear_mark' 'ext4_writepages' 'do_epoll_wait' 22:39:03 executing program 0: ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0, 0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) syzkaller login: [ 38.897100][ T8643] IPVS: ftp: loaded support on port[0] = 21 [ 38.953819][ T8643] chnl_net:caif_netlink_parms(): no params data found [ 38.995419][ T8643] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.017985][ T8643] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.025663][ T8643] device bridge_slave_0 entered promiscuous mode [ 39.034418][ T8643] bridge0: port 2(bridge_slave_1) entered blocking state 22:39:04 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x10010000004e20}, 0x1c) syz_emit_ethernet(0x83, &(0x7f0000000480)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bf897004d8880fe800001000000000000000000000600ff02000000000000000000000000000101004e20004590"], 0x0) recvfrom$inet6(r0, 0x0, 0x96, 0x7, 0x0, 0x36) [ 39.042008][ T8643] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.050460][ T8643] device bridge_slave_1 entered promiscuous mode [ 39.065751][ T8643] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 39.077222][ T8643] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.094534][ T8643] team0: Port device team_slave_0 added [ 39.102798][ T8643] team0: Port device team_slave_1 added [ 39.124559][ T8643] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.147912][ T8643] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.198016][ T8643] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.213464][ T8799] IPVS: ftp: loaded support on port[0] = 21 [ 39.221175][ T8643] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.231442][ T8643] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.258482][ T8643] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 22:39:04 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}, @restrict]}}, &(0x7f0000000340)=""/142, 0x32, 0x8e, 0x8}, 0x20) [ 39.329305][ T8643] device hsr_slave_0 entered promiscuous mode [ 39.378007][ T8643] device hsr_slave_1 entered promiscuous mode 22:39:04 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x0) [ 39.452722][ T8825] IPVS: ftp: loaded support on port[0] = 21 [ 39.513997][ T8799] chnl_net:caif_netlink_parms(): no params data found [ 39.582463][ T8643] netdevsim netdevsim0 netdevsim0: renamed from eth0 22:39:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x74, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_TUN_PORT={0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x74}}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e03000023000535d25a80648c63940d0624fc60100002400a000200051a82c137153e670402018003000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 39.661902][ T8643] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 39.765468][ T8994] IPVS: ftp: loaded support on port[0] = 21 [ 39.782321][ T8643] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 39.846830][ T8643] netdevsim netdevsim0 netdevsim3: renamed from eth3 22:39:05 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180), 0x4) [ 39.923493][ T9041] IPVS: ftp: loaded support on port[0] = 21 [ 39.926156][ T8825] chnl_net:caif_netlink_parms(): no params data found [ 39.947728][ T8799] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.955471][ T8799] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.963750][ T8799] device bridge_slave_0 entered promiscuous mode [ 40.003908][ T8799] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.014860][ T8799] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.023245][ T8799] device bridge_slave_1 entered promiscuous mode [ 40.031209][ T8643] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.038529][ T8643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.046803][ T8643] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.054020][ T8643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.064324][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.073366][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.102538][ T9134] IPVS: ftp: loaded support on port[0] = 21 [ 40.115224][ T8799] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 40.139407][ T8799] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 40.164868][ T8799] team0: Port device team_slave_0 added [ 40.173235][ T8799] team0: Port device team_slave_1 added [ 40.180117][ T8825] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.191484][ T8825] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.202995][ T8825] device bridge_slave_0 entered promiscuous mode [ 40.212691][ T8825] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.220426][ T8825] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.227987][ T8825] device bridge_slave_1 entered promiscuous mode [ 40.235371][ T8994] chnl_net:caif_netlink_parms(): no params data found [ 40.264791][ T8825] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 40.280905][ T8799] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 40.288801][ T8799] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.318841][ T8799] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 40.331631][ T8799] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 40.339128][ T8799] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.367830][ T8799] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 40.383485][ T8825] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 40.414908][ T8994] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.423568][ T8994] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.432107][ T8994] device bridge_slave_0 entered promiscuous mode [ 40.441699][ T8994] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.449097][ T8994] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.456578][ T8994] device bridge_slave_1 entered promiscuous mode [ 40.519077][ T8799] device hsr_slave_0 entered promiscuous mode [ 40.547696][ T8799] device hsr_slave_1 entered promiscuous mode [ 40.587680][ T8799] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 40.595325][ T8799] Cannot create hsr debugfs directory [ 40.613753][ T8994] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 40.628215][ T25] ================================================================== [ 40.634040][ T8825] team0: Port device team_slave_0 added [ 40.638444][ T25] BUG: KCSAN: data-race in copy_process / copy_process [ 40.638446][ T25] [ 40.638455][ T25] write to 0xffffffff89279410 of 4 bytes by task 3362 on cpu 1: [ 40.638464][ T25] copy_process+0x2e84/0x3300 [ 40.638473][ T25] _do_fork+0xf1/0x660 [ 40.638488][ T25] kernel_thread+0x85/0xb0 [ 40.649213][ T8825] team0: Port device team_slave_1 added [ 40.651543][ T25] call_usermodehelper_exec_work+0x4f/0x1b0 [ 40.667278][ T8825] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 40.670184][ T25] process_one_work+0x3e1/0x9a0 [ 40.670194][ T25] worker_thread+0x665/0xbe0 [ 40.670202][ T25] kthread+0x20d/0x230 [ 40.670212][ T25] ret_from_fork+0x1f/0x30 [ 40.670219][ T25] [ 40.674813][ T8825] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.684472][ T25] read to 0xffffffff89279410 of 4 bytes by task 25 on cpu 0: [ 40.684483][ T25] copy_process+0xac4/0x3300 [ 40.684492][ T25] _do_fork+0xf1/0x660 [ 40.684501][ T25] kernel_thread+0x85/0xb0 [ 40.684511][ T25] call_usermodehelper_exec_work+0x4f/0x1b0 [ 40.684521][ T25] process_one_work+0x3e1/0x9a0 [ 40.684540][ T25] worker_thread+0x665/0xbe0 [ 40.694434][ T8825] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 40.697906][ T25] kthread+0x20d/0x230 [ 40.697917][ T25] ret_from_fork+0x1f/0x30 [ 40.697919][ T25] [ 40.697922][ T25] Reported by Kernel Concurrency Sanitizer on: [ 40.697931][ T25] CPU: 0 PID: 25 Comm: kworker/u4:2 Not tainted 5.8.0-rc2-syzkaller #0 [ 40.697941][ T25] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 40.705152][ T8825] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 40.707414][ T25] Workqueue: events_unbound call_usermodehelper_exec_work [ 40.713206][ T8825] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.716588][ T25] ================================================================== [ 40.719572][ T8825] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 40.744822][ T25] Kernel panic - not syncing: panic_on_warn set ... [ 40.744833][ T25] CPU: 0 PID: 25 Comm: kworker/u4:2 Not tainted 5.8.0-rc2-syzkaller #0 [ 40.744837][ T25] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 40.744853][ T25] Workqueue: events_unbound call_usermodehelper_exec_work [ 40.744857][ T25] Call Trace: [ 40.744871][ T25] dump_stack+0x10f/0x19d [ 40.744878][ T25] panic+0x207/0x64a [ 40.744895][ T25] ? vprintk_emit+0x44a/0x4f0 [ 40.936685][ T25] kcsan_report+0x684/0x690 [ 40.941161][ T25] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 40.947120][ T25] ? copy_process+0xac4/0x3300 [ 40.952124][ T25] ? _do_fork+0xf1/0x660 [ 40.956341][ T25] ? kernel_thread+0x85/0xb0 [ 40.961143][ T25] ? call_usermodehelper_exec_work+0x4f/0x1b0 [ 40.967621][ T25] ? process_one_work+0x3e1/0x9a0 [ 40.972624][ T25] ? worker_thread+0x665/0xbe0 [ 40.977361][ T25] ? kthread+0x20d/0x230 [ 40.981618][ T25] ? ret_from_fork+0x1f/0x30 [ 40.986277][ T25] ? debug_smp_processor_id+0x18/0x20 [ 40.991820][ T25] ? copy_creds+0x280/0x350 [ 40.996306][ T25] ? copy_creds+0x280/0x350 [ 41.000923][ T25] kcsan_setup_watchpoint+0x453/0x4d0 [ 41.006276][ T25] ? copy_creds+0x280/0x350 [ 41.011018][ T25] copy_process+0xac4/0x3300 [ 41.015657][ T25] ? check_preempt_wakeup+0x1cb/0x370 [ 41.021161][ T25] ? proc_cap_handler+0x280/0x280 [ 41.026277][ T25] _do_fork+0xf1/0x660 [ 41.030333][ T25] ? proc_cap_handler+0x280/0x280 [ 41.035459][ T25] kernel_thread+0x85/0xb0 [ 41.039876][ T25] ? proc_cap_handler+0x280/0x280 [ 41.044919][ T25] call_usermodehelper_exec_work+0x4f/0x1b0 [ 41.051245][ T25] process_one_work+0x3e1/0x9a0 [ 41.056159][ T25] worker_thread+0x665/0xbe0 [ 41.060880][ T25] ? finish_task_switch+0x8b/0x270 [ 41.066060][ T25] ? process_one_work+0x9a0/0x9a0 [ 41.071102][ T25] kthread+0x20d/0x230 [ 41.075176][ T25] ? process_one_work+0x9a0/0x9a0 [ 41.080268][ T25] ? kthread_blkcg+0x80/0x80 [ 41.085622][ T25] ret_from_fork+0x1f/0x30 [ 41.091324][ T25] Kernel Offset: disabled [ 41.096197][ T25] Rebooting in 86400 seconds..