Warning: Permanently added '10.128.0.63' (ECDSA) to the list of known hosts. 2020/06/29 04:14:58 fuzzer started 2020/06/29 04:14:58 dialing manager at 10.128.0.105:41769 2020/06/29 04:14:59 syscalls: 3105 2020/06/29 04:14:59 code coverage: enabled 2020/06/29 04:14:59 comparison tracing: enabled 2020/06/29 04:14:59 extra coverage: enabled 2020/06/29 04:14:59 setuid sandbox: enabled 2020/06/29 04:14:59 namespace sandbox: enabled 2020/06/29 04:14:59 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/29 04:14:59 fault injection: enabled 2020/06/29 04:14:59 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/29 04:14:59 net packet injection: enabled 2020/06/29 04:14:59 net device setup: enabled 2020/06/29 04:14:59 concurrency sanitizer: enabled 2020/06/29 04:14:59 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/29 04:14:59 USB emulation: enabled 2020/06/29 04:14:59 suppressing KCSAN reports in functions: 'n_tty_receive_buf_common' 'filemap_map_pages' '__ext4_new_inode' 'expire_timers' 'af_alg_sendpage' 'alloc_pid' 'do_epoll_wait' 04:15:03 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000024) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000000)) ioctl$LOOP_CLR_FD(r0, 0x4c01) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) getsockopt$sock_cred(r4, 0x1, 0x3b, &(0x7f0000caaffb), &(0x7f0000000040)=0xf0) ioctl$EVIOCSFF(r4, 0x40304580, &(0x7f0000000040)={0x57, 0x400, 0x401, {0x8, 0xffff}, {0x4, 0x8}, @const={0x8001, {0xd447, 0x20, 0x5}}}) [ 36.050954][ T8673] IPVS: ftp: loaded support on port[0] = 21 04:15:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x2c, 0x0, 0xb, 0x401, 0x0, 0x0, {0x3}, [@NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_REV={0x8}, @NFTA_COMPAT_NAME={0x6, 0x1, '}\x00'}]}, 0x2c}}, 0x0) [ 36.116315][ T8673] chnl_net:caif_netlink_parms(): no params data found [ 36.149830][ T8673] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.157022][ T8673] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.164513][ T8673] device bridge_slave_0 entered promiscuous mode [ 36.173768][ T8673] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.181993][ T8673] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.190753][ T8673] device bridge_slave_1 entered promiscuous mode [ 36.206887][ T8673] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.217597][ T8673] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.235609][ T8673] team0: Port device team_slave_0 added [ 36.243535][ T8673] team0: Port device team_slave_1 added [ 36.269757][ T8673] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.276886][ T8673] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.304824][ T8673] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.317239][ T8673] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.324469][ T8673] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.352803][ T8673] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.373289][ T8827] IPVS: ftp: loaded support on port[0] = 21 [ 36.397713][ T8673] device hsr_slave_0 entered promiscuous mode 04:15:03 executing program 2: sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0xfffffffc}}}}, 0x30}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r1, 0x5, 0x0, 0x0, {{}, {}, {0xc, 0x18, {0x0, @bearer=@l2={'ib'}}}}}, 0x28}}, 0x0) [ 36.425864][ T8673] device hsr_slave_1 entered promiscuous mode [ 36.476133][ T3327] ================================================================== [ 36.484256][ T3327] BUG: KCSAN: data-race in copy_process / copy_process [ 36.491612][ T3327] [ 36.493938][ T3327] write to 0xffffffff8927a410 of 4 bytes by task 281 on cpu 1: [ 36.501474][ T3327] copy_process+0x2e84/0x3300 [ 36.506145][ T3327] _do_fork+0xf1/0x660 [ 36.510297][ T3327] kernel_thread+0x85/0xb0 [ 36.514719][ T3327] call_usermodehelper_exec_work+0x4f/0x1b0 [ 36.520824][ T3327] process_one_work+0x3e1/0x9a0 [ 36.525698][ T3327] worker_thread+0x665/0xbe0 [ 36.530460][ T3327] kthread+0x20d/0x230 [ 36.534810][ T3327] ret_from_fork+0x1f/0x30 [ 36.539331][ T3327] [ 36.541913][ T3327] read to 0xffffffff8927a410 of 4 bytes by task 3327 on cpu 0: [ 36.549787][ T3327] copy_process+0xac4/0x3300 [ 36.554389][ T3327] _do_fork+0xf1/0x660 [ 36.558471][ T3327] kernel_thread+0x85/0xb0 [ 36.562896][ T3327] call_usermodehelper_exec_work+0x4f/0x1b0 [ 36.568925][ T3327] process_one_work+0x3e1/0x9a0 [ 36.573791][ T3327] worker_thread+0x665/0xbe0 [ 36.578420][ T3327] kthread+0x20d/0x230 [ 36.582489][ T3327] ret_from_fork+0x1f/0x30 [ 36.587159][ T3327] [ 36.589520][ T3327] Reported by Kernel Concurrency Sanitizer on: [ 36.596188][ T3327] CPU: 0 PID: 3327 Comm: kworker/u4:4 Not tainted 5.8.0-rc3-syzkaller #0 [ 36.604970][ T3327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.615211][ T3327] Workqueue: events_unbound call_usermodehelper_exec_work [ 36.622394][ T3327] ================================================================== [ 36.630626][ T3327] Kernel panic - not syncing: panic_on_warn set ... [ 36.637610][ T3327] CPU: 0 PID: 3327 Comm: kworker/u4:4 Not tainted 5.8.0-rc3-syzkaller #0 [ 36.646187][ T3327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.656390][ T3327] Workqueue: events_unbound call_usermodehelper_exec_work [ 36.656804][ T8827] chnl_net:caif_netlink_parms(): no params data found [ 36.663971][ T3327] Call Trace: [ 36.674432][ T3327] dump_stack+0x10f/0x19d [ 36.679472][ T3327] panic+0x207/0x64a [ 36.684435][ T3327] ? vprintk_emit+0x44a/0x4f0 [ 36.689119][ T3327] kcsan_report+0x684/0x690 [ 36.693821][ T3327] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 36.699367][ T3327] ? copy_process+0xac4/0x3300 [ 36.704222][ T3327] ? _do_fork+0xf1/0x660 [ 36.708642][ T3327] ? kernel_thread+0x85/0xb0 [ 36.713335][ T3327] ? call_usermodehelper_exec_work+0x4f/0x1b0 [ 36.719590][ T3327] ? process_one_work+0x3e1/0x9a0 [ 36.724707][ T3327] ? worker_thread+0x665/0xbe0 [ 36.729567][ T3327] ? kthread+0x20d/0x230 [ 36.734034][ T3327] ? ret_from_fork+0x1f/0x30 [ 36.738717][ T3327] ? debug_smp_processor_id+0x18/0x20 [ 36.744160][ T3327] ? copy_creds+0x280/0x350 [ 36.748641][ T3327] ? copy_creds+0x280/0x350 [ 36.753129][ T3327] kcsan_setup_watchpoint+0x453/0x4d0 [ 36.758567][ T3327] ? copy_creds+0x280/0x350 [ 36.763061][ T3327] copy_process+0xac4/0x3300 [ 36.767633][ T3327] ? check_preempt_wakeup+0x1cb/0x370 [ 36.773265][ T3327] ? proc_cap_handler+0x280/0x280 [ 36.778417][ T3327] _do_fork+0xf1/0x660 [ 36.782569][ T3327] ? debug_smp_processor_id+0x18/0x20 [ 36.787969][ T3327] ? delay_tsc+0x96/0xe0 [ 36.792293][ T3327] ? proc_cap_handler+0x280/0x280 [ 36.797430][ T3327] kernel_thread+0x85/0xb0 [ 36.802091][ T3327] ? proc_cap_handler+0x280/0x280 [ 36.807820][ T3327] call_usermodehelper_exec_work+0x4f/0x1b0 [ 36.813864][ T3327] process_one_work+0x3e1/0x9a0 [ 36.819007][ T3327] worker_thread+0x665/0xbe0 [ 36.823823][ T3327] ? finish_task_switch+0x8b/0x270 [ 36.829089][ T3327] ? process_one_work+0x9a0/0x9a0 [ 36.834409][ T3327] kthread+0x20d/0x230 [ 36.838578][ T3327] ? process_one_work+0x9a0/0x9a0 [ 36.843603][ T3327] ? kthread_blkcg+0x80/0x80 [ 36.848185][ T3327] ret_from_fork+0x1f/0x30 [ 36.855057][ T3327] Kernel Offset: disabled [ 36.859376][ T3327] Rebooting in 86400 seconds..