[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.48' (ECDSA) to the list of known hosts. 2020/07/01 10:45:51 fuzzer started 2020/07/01 10:45:51 dialing manager at 10.128.0.105:40363 2020/07/01 10:45:51 syscalls: 3106 2020/07/01 10:45:51 code coverage: enabled 2020/07/01 10:45:51 comparison tracing: enabled 2020/07/01 10:45:51 extra coverage: enabled 2020/07/01 10:45:51 setuid sandbox: enabled 2020/07/01 10:45:51 namespace sandbox: enabled 2020/07/01 10:45:51 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/01 10:45:51 fault injection: enabled 2020/07/01 10:45:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/01 10:45:51 net packet injection: enabled 2020/07/01 10:45:51 net device setup: enabled 2020/07/01 10:45:51 concurrency sanitizer: enabled 2020/07/01 10:45:51 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/01 10:45:51 USB emulation: enabled 2020/07/01 10:45:52 suppressing KCSAN reports in functions: 'futex_wait_queue_me' '__xa_clear_mark' 10:45:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x14, r3, 0x1}, 0x14}}, 0x0) syzkaller login: [ 32.133058][ T8672] IPVS: ftp: loaded support on port[0] = 21 [ 32.148541][ T21] ================================================================== [ 32.156626][ T21] BUG: KCSAN: data-race in copy_process / copy_process [ 32.163449][ T21] [ 32.165762][ T21] write to 0xffffffff8927a410 of 4 bytes by task 973 on cpu 0: [ 32.173288][ T21] copy_process+0x2e84/0x3300 [ 32.178037][ T21] _do_fork+0xf1/0x660 [ 32.182090][ T21] kernel_thread+0x85/0xb0 [ 32.186491][ T21] call_usermodehelper_exec_work+0x4f/0x1b0 [ 32.186962][ T8672] chnl_net:caif_netlink_parms(): no params data found [ 32.192448][ T21] process_one_work+0x3e1/0x9a0 [ 32.192457][ T21] worker_thread+0x665/0xbe0 [ 32.192496][ T21] kthread+0x20d/0x230 [ 32.212648][ T21] ret_from_fork+0x1f/0x30 [ 32.217037][ T21] [ 32.219341][ T21] read to 0xffffffff8927a410 of 4 bytes by task 21 on cpu 1: [ 32.226679][ T21] copy_process+0xac4/0x3300 [ 32.231236][ T21] _do_fork+0xf1/0x660 [ 32.235271][ T21] kernel_thread+0x85/0xb0 [ 32.239655][ T21] call_usermodehelper_exec_work+0x4f/0x1b0 [ 32.245514][ T21] process_one_work+0x3e1/0x9a0 [ 32.250332][ T21] worker_thread+0x665/0xbe0 [ 32.254888][ T21] kthread+0x20d/0x230 [ 32.258925][ T21] ret_from_fork+0x1f/0x30 [ 32.263302][ T21] [ 32.265597][ T21] Reported by Kernel Concurrency Sanitizer on: [ 32.271717][ T21] CPU: 1 PID: 21 Comm: kworker/u4:1 Not tainted 5.8.0-rc3-syzkaller #0 [ 32.279916][ T21] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 32.289943][ T21] Workqueue: events_unbound call_usermodehelper_exec_work [ 32.297013][ T21] ================================================================== [ 32.305038][ T21] Kernel panic - not syncing: panic_on_warn set ... [ 32.311591][ T21] CPU: 1 PID: 21 Comm: kworker/u4:1 Not tainted 5.8.0-rc3-syzkaller #0 [ 32.319797][ T21] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 32.329859][ T21] Workqueue: events_unbound call_usermodehelper_exec_work [ 32.336931][ T21] Call Trace: [ 32.340191][ T21] dump_stack+0x10f/0x19d [ 32.344576][ T21] panic+0x207/0x64a [ 32.348476][ T21] ? vprintk_emit+0x44a/0x4f0 [ 32.353121][ T21] kcsan_report+0x684/0x690 [ 32.357592][ T21] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 32.363102][ T21] ? copy_process+0xac4/0x3300 [ 32.367832][ T21] ? _do_fork+0xf1/0x660 [ 32.372041][ T21] ? kernel_thread+0x85/0xb0 [ 32.376597][ T21] ? call_usermodehelper_exec_work+0x4f/0x1b0 [ 32.382629][ T21] ? process_one_work+0x3e1/0x9a0 [ 32.387617][ T21] ? worker_thread+0x665/0xbe0 [ 32.392378][ T21] ? kthread+0x20d/0x230 [ 32.396622][ T21] ? ret_from_fork+0x1f/0x30 [ 32.404260][ T21] ? debug_smp_processor_id+0x18/0x20 [ 32.409600][ T21] ? copy_creds+0x280/0x350 [ 32.414108][ T21] ? copy_creds+0x280/0x350 [ 32.418576][ T21] kcsan_setup_watchpoint+0x453/0x4d0 [ 32.423914][ T21] ? copy_creds+0x280/0x350 [ 32.428385][ T21] copy_process+0xac4/0x3300 [ 32.432944][ T21] ? check_preempt_wakeup+0x1cb/0x370 [ 32.438293][ T21] ? proc_cap_handler+0x280/0x280 [ 32.443293][ T21] _do_fork+0xf1/0x660 [ 32.447339][ T21] ? enqueue_entity+0x25a/0x480 [ 32.452013][ T8672] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.452174][ T21] ? proc_cap_handler+0x280/0x280 [ 32.459424][ T8672] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.464158][ T21] kernel_thread+0x85/0xb0 [ 32.464169][ T21] ? proc_cap_handler+0x280/0x280 [ 32.464180][ T21] call_usermodehelper_exec_work+0x4f/0x1b0 [ 32.464196][ T21] process_one_work+0x3e1/0x9a0 [ 32.481481][ T8672] device bridge_slave_0 entered promiscuous mode [ 32.486425][ T21] worker_thread+0x665/0xbe0 [ 32.492878][ T8672] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.497544][ T21] ? process_one_work+0x9a0/0x9a0 [ 32.502620][ T8672] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.509137][ T21] kthread+0x20d/0x230 [ 32.515227][ T8672] device bridge_slave_1 entered promiscuous mode [ 32.521114][ T21] ? process_one_work+0x9a0/0x9a0 [ 32.521123][ T21] ? kthread_blkcg+0x80/0x80 [ 32.521139][ T21] ret_from_fork+0x1f/0x30 [ 32.533875][ T8672] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.542169][ T21] Kernel Offset: disabled [ 32.559877][ T21] Rebooting in 86400 seconds..