Warning: Permanently added '10.128.0.169' (ECDSA) to the list of known hosts. 2020/06/27 19:15:29 fuzzer started 2020/06/27 19:15:29 dialing manager at 10.128.0.105:33431 2020/06/27 19:15:29 syscalls: 3105 2020/06/27 19:15:29 code coverage: enabled 2020/06/27 19:15:29 comparison tracing: enabled 2020/06/27 19:15:29 extra coverage: enabled 2020/06/27 19:15:29 setuid sandbox: enabled 2020/06/27 19:15:29 namespace sandbox: enabled 2020/06/27 19:15:29 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/27 19:15:29 fault injection: enabled 2020/06/27 19:15:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/27 19:15:29 net packet injection: enabled 2020/06/27 19:15:29 net device setup: enabled 2020/06/27 19:15:29 concurrency sanitizer: enabled 2020/06/27 19:15:29 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/27 19:15:29 USB emulation: enabled 2020/06/27 19:15:29 suppressing KCSAN reports in functions: 'ext4_free_inode' 'do_epoll_wait' '__xa_clear_mark' 19:15:33 executing program 0: set_mempolicy(0x40000000004003, &(0x7f00000000c0)=0x8, 0xc2) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) syzkaller login: [ 35.551287][ T8673] IPVS: ftp: loaded support on port[0] = 21 19:15:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/current\x00') seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') sendfile(r0, r1, 0x0, 0x1) [ 35.607816][ T8673] chnl_net:caif_netlink_parms(): no params data found [ 35.639500][ T8673] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.646884][ T8673] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.654667][ T8673] device bridge_slave_0 entered promiscuous mode [ 35.662575][ T8673] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.669778][ T8673] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.678209][ T8673] device bridge_slave_1 entered promiscuous mode [ 35.710804][ T8673] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.733680][ T8673] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.769759][ T8811] IPVS: ftp: loaded support on port[0] = 21 [ 35.777137][ T8673] team0: Port device team_slave_0 added [ 35.784095][ T8673] team0: Port device team_slave_1 added 19:15:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x13, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000151b00003d030100000000009500000000000000bc26000000000000bf67000000000000070600000fff07006706000002000000160600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0000001f75000000000000bf54000000000000070500000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 35.820322][ T8673] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.828954][ T8673] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.855714][ T8673] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.881960][ T8673] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.889701][ T8673] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.916776][ T8673] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.954375][ T29] ================================================================== [ 35.962662][ T29] BUG: KCSAN: data-race in copy_process / copy_process [ 35.969488][ T29] [ 35.971923][ T29] write to 0xffffffff89281410 of 4 bytes by task 8389 on cpu 1: [ 35.980516][ T29] copy_process+0x2e53/0x32b0 [ 35.985185][ T29] _do_fork+0xf1/0x660 [ 35.989242][ T29] kernel_thread+0x85/0xb0 [ 35.993649][ T29] call_usermodehelper_exec_work+0x4f/0x1b0 [ 35.999609][ T29] process_one_work+0x3cb/0x990 [ 36.004441][ T29] worker_thread+0x665/0xbe0 [ 36.009015][ T29] kthread+0x210/0x220 [ 36.013073][ T29] ret_from_fork+0x1f/0x30 [ 36.017560][ T29] [ 36.019875][ T29] read to 0xffffffff89281410 of 4 bytes by task 29 on cpu 0: [ 36.027324][ T29] copy_process+0xab5/0x32b0 [ 36.031907][ T29] _do_fork+0xf1/0x660 [ 36.035968][ T29] kernel_thread+0x85/0xb0 [ 36.040374][ T29] call_usermodehelper_exec_work+0x4f/0x1b0 [ 36.047652][ T29] process_one_work+0x3cb/0x990 [ 36.052489][ T29] worker_thread+0x665/0xbe0 [ 36.057055][ T29] kthread+0x210/0x220 [ 36.062488][ T29] ret_from_fork+0x1f/0x30 [ 36.066870][ T29] [ 36.069182][ T29] Reported by Kernel Concurrency Sanitizer on: [ 36.075395][ T29] CPU: 0 PID: 29 Comm: kworker/u4:2 Not tainted 5.8.0-rc2-syzkaller #0 [ 36.083601][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.093730][ T29] Workqueue: events_unbound call_usermodehelper_exec_work [ 36.100821][ T29] ================================================================== [ 36.108854][ T29] Kernel panic - not syncing: panic_on_warn set ... [ 36.115419][ T29] CPU: 0 PID: 29 Comm: kworker/u4:2 Not tainted 5.8.0-rc2-syzkaller #0 [ 36.123650][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.133706][ T29] Workqueue: events_unbound call_usermodehelper_exec_work [ 36.140809][ T29] Call Trace: [ 36.144077][ T29] dump_stack+0x10f/0x19d [ 36.148406][ T29] panic+0x1f8/0x63a [ 36.152281][ T29] ? vprintk_emit+0x44a/0x4f0 [ 36.156940][ T29] kcsan_report+0x684/0x690 [ 36.161442][ T29] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 36.166967][ T29] ? copy_process+0xab5/0x32b0 [ 36.171706][ T29] ? _do_fork+0xf1/0x660 [ 36.175923][ T29] ? kernel_thread+0x85/0xb0 [ 36.180497][ T29] ? call_usermodehelper_exec_work+0x4f/0x1b0 [ 36.186553][ T29] ? process_one_work+0x3cb/0x990 [ 36.191569][ T29] ? worker_thread+0x665/0xbe0 [ 36.196323][ T29] ? kthread+0x210/0x220 [ 36.200662][ T29] ? ret_from_fork+0x1f/0x30 [ 36.205252][ T29] ? debug_smp_processor_id+0x18/0x20 [ 36.210977][ T29] ? sysvec_hyperv_callback+0x90/0x140 [ 36.216505][ T29] ? copy_creds+0x280/0x350 [ 36.221084][ T29] ? copy_creds+0x280/0x350 [ 36.225567][ T29] kcsan_setup_watchpoint+0x453/0x4d0 [ 36.230917][ T29] ? copy_creds+0x280/0x350 [ 36.235587][ T29] copy_process+0xab5/0x32b0 [ 36.240162][ T29] ? check_preempt_wakeup+0x1cb/0x370 [ 36.245512][ T29] ? proc_cap_handler+0x280/0x280 [ 36.250526][ T29] _do_fork+0xf1/0x660 [ 36.254676][ T29] ? debug_smp_processor_id+0x18/0x20 [ 36.260113][ T29] ? delay_tsc+0x96/0xe0 [ 36.264342][ T29] ? proc_cap_handler+0x280/0x280 [ 36.269344][ T29] kernel_thread+0x85/0xb0 [ 36.273839][ T29] ? proc_cap_handler+0x280/0x280 [ 36.278840][ T29] call_usermodehelper_exec_work+0x4f/0x1b0 [ 36.284796][ T29] process_one_work+0x3cb/0x990 [ 36.289745][ T29] worker_thread+0x665/0xbe0 [ 36.294315][ T29] ? process_one_work+0x990/0x990 [ 36.299315][ T29] kthread+0x210/0x220 [ 36.303358][ T29] ? process_one_work+0x990/0x990 [ 36.308358][ T29] ? constant_test_bit+0x30/0x30 [ 36.313273][ T29] ret_from_fork+0x1f/0x30 [ 36.318950][ T29] Kernel Offset: disabled [ 36.323263][ T29] Rebooting in 86400 seconds..