[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.193' (ECDSA) to the list of known hosts. 2020/12/28 15:38:58 fuzzer started 2020/12/28 15:38:59 dialing manager at 10.128.0.105:34665 2020/12/28 15:38:59 syscalls: 3466 2020/12/28 15:38:59 code coverage: enabled 2020/12/28 15:38:59 comparison tracing: enabled 2020/12/28 15:38:59 extra coverage: enabled 2020/12/28 15:38:59 setuid sandbox: enabled 2020/12/28 15:38:59 namespace sandbox: enabled 2020/12/28 15:38:59 Android sandbox: /sys/fs/selinux/policy does not exist 2020/12/28 15:38:59 fault injection: enabled 2020/12/28 15:38:59 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/12/28 15:38:59 net packet injection: enabled 2020/12/28 15:38:59 net device setup: enabled 2020/12/28 15:38:59 concurrency sanitizer: enabled 2020/12/28 15:38:59 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/12/28 15:38:59 USB emulation: enabled 2020/12/28 15:38:59 hci packet injection: enabled 2020/12/28 15:38:59 wifi device emulation: enabled 2020/12/28 15:38:59 suppressing KCSAN reports in functions: 'n_tty_receive_buf_common' 15:39:01 executing program 0: set_mempolicy(0x1, &(0x7f00000001c0)=0xfe, 0x32e1) r0 = socket(0x400000000000010, 0x802, 0x0) write(r0, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) syzkaller login: [ 33.044614][ T8427] ================================================================== [ 33.053675][ T8427] BUG: KCSAN: data-race in atime_needs_update / propagate_one [ 33.061232][ T8427] [ 33.063551][ T8427] read-write to 0xffff88810146c7b0 of 4 bytes by task 8444 on cpu 1: [ 33.071667][ T8427] propagate_one+0x323/0x3f0 [ 33.076252][ T8427] propagate_mnt+0x2f8/0x650 [ 33.080951][ T8427] attach_recursive_mnt+0x4fb/0x1180 [ 33.086322][ T8427] path_mount+0x1aed/0x1c10 [ 33.090924][ T8427] __se_sys_mount+0x23d/0x2e0 [ 33.095596][ T8427] __x64_sys_mount+0x63/0x70 [ 33.105153][ T8427] do_syscall_64+0x39/0x80 [ 33.110323][ T8427] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 33.116552][ T8427] [ 33.118884][ T8427] read to 0xffff88810146c7b0 of 4 bytes by task 8427 on cpu 0: [ 33.126495][ T8427] atime_needs_update+0x133/0x370 [ 33.131787][ T8427] touch_atime+0x55/0x2d0 [ 33.136582][ T8427] generic_file_buffered_read+0x92b/0x9a0 [ 33.142839][ T8427] generic_file_read_iter+0x80/0x3d0 [ 33.148795][ T8427] ext4_file_read_iter+0x2d0/0x420 [ 33.153900][ T8427] __kernel_read+0x307/0x560 [ 33.158679][ T8427] integrity_kernel_read+0x4c/0x70 [ 33.163784][ T8427] ima_calc_file_hash+0x956/0x1390 [ 33.168883][ T8427] ima_collect_measurement+0x168/0x300 [ 33.174383][ T8427] process_measurement+0x9f1/0x1050 [ 33.179578][ T8427] ima_file_check+0x72/0xa0 [ 33.184073][ T8427] path_openat+0x1887/0x20a0 [ 33.188649][ T8427] do_filp_open+0xbd/0x1d0 [ 33.193096][ T8427] do_sys_openat2+0xa3/0x240 [ 33.197857][ T8427] __x64_sys_openat+0xef/0x110 [ 33.206453][ T8427] do_syscall_64+0x39/0x80 [ 33.210970][ T8427] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 33.219472][ T8427] [ 33.221791][ T8427] Reported by Kernel Concurrency Sanitizer on: [ 33.228006][ T8427] CPU: 0 PID: 8427 Comm: syz-fuzzer Not tainted 5.11.0-rc1-syzkaller #0 [ 33.236480][ T8427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.246538][ T8427] ================================================================== [ 33.254853][ T8427] Kernel panic - not syncing: panic_on_warn set ... [ 33.261551][ T8427] CPU: 0 PID: 8427 Comm: syz-fuzzer Not tainted 5.11.0-rc1-syzkaller #0 [ 33.270026][ T8427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.280171][ T8427] Call Trace: [ 33.284507][ T8427] dump_stack+0x116/0x15d [ 33.289005][ T8427] panic+0x1e7/0x5fa [ 33.293075][ T8427] ? vprintk_emit+0x2e2/0x360 [ 33.298265][ T8427] kcsan_report+0x67b/0x680 [ 33.302861][ T8427] ? kcsan_setup_watchpoint+0x47b/0x4e0 [ 33.309809][ T8427] ? atime_needs_update+0x133/0x370 [ 33.315013][ T8427] ? touch_atime+0x55/0x2d0 [ 33.319837][ T8427] ? generic_file_buffered_read+0x92b/0x9a0 [ 33.325829][ T8427] ? generic_file_read_iter+0x80/0x3d0 [ 33.331280][ T8427] ? ext4_file_read_iter+0x2d0/0x420 [ 33.336601][ T8427] ? __kernel_read+0x307/0x560 [ 33.341586][ T8427] ? integrity_kernel_read+0x4c/0x70 [ 33.347194][ T8427] ? ima_calc_file_hash+0x956/0x1390 [ 33.352767][ T8427] ? ima_collect_measurement+0x168/0x300 [ 33.358499][ T8427] ? process_measurement+0x9f1/0x1050 [ 33.363874][ T8427] ? ima_file_check+0x72/0xa0 [ 33.368815][ T8427] ? path_openat+0x1887/0x20a0 [ 33.373666][ T8427] ? do_filp_open+0xbd/0x1d0 [ 33.378259][ T8427] ? do_sys_openat2+0xa3/0x240 [ 33.383012][ T8427] ? __x64_sys_openat+0xef/0x110 [ 33.388308][ T8427] ? do_syscall_64+0x39/0x80 [ 33.392927][ T8427] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 33.399450][ T8427] kcsan_setup_watchpoint+0x47b/0x4e0 [ 33.404825][ T8427] ? __check_object_size+0x253/0x310 [ 33.410194][ T8427] atime_needs_update+0x133/0x370 [ 33.415211][ T8427] touch_atime+0x55/0x2d0 [ 33.419548][ T8427] generic_file_buffered_read+0x92b/0x9a0 [ 33.425265][ T8427] generic_file_read_iter+0x80/0x3d0 [ 33.430862][ T8427] ext4_file_read_iter+0x2d0/0x420 [ 33.435974][ T8427] __kernel_read+0x307/0x560 [ 33.440557][ T8427] integrity_kernel_read+0x4c/0x70 [ 33.445928][ T8427] ima_calc_file_hash+0x956/0x1390 [ 33.451057][ T8427] ? integrity_audit_message+0x7b/0x280 [ 33.456708][ T8427] ? widen_string+0x3a/0x280 [ 33.461314][ T8427] ? format_decode+0x1d3/0x840 [ 33.466358][ T8427] ? string+0x1f9/0x210 [ 33.470770][ T8427] ? __down_read_common+0x14e/0x510 [ 33.476069][ T8427] ? ext4_xattr_ibody_get+0x68/0x630 [ 33.481365][ T8427] ? aa_get_newest_label+0x74/0x250 [ 33.486587][ T8427] ? apparmor_capable+0xfe/0x160 [ 33.491621][ T8427] ? ext4_xattr_get+0x27d/0x580 [ 33.496467][ T8427] ? ima_match_policy+0xa80/0xab0 [ 33.501499][ T8427] ima_collect_measurement+0x168/0x300 [ 33.506972][ T8427] process_measurement+0x9f1/0x1050 [ 33.512215][ T8427] ? dquot_file_open+0x68/0x80 [ 33.518101][ T8427] ? ext4_file_open+0x186/0x4f0 [ 33.522952][ T8427] ? aa_get_newest_label+0x74/0x250 [ 33.528160][ T8427] ? __rcu_read_unlock+0x51/0x250 [ 33.533266][ T8427] ? fsnotify_perm+0x296/0x2d0 [ 33.538101][ T8427] ? aa_get_task_label+0x72/0xc0 [ 33.543037][ T8427] ? apparmor_task_getsecid+0x81/0xa0 [ 33.548657][ T8427] ima_file_check+0x72/0xa0 [ 33.553161][ T8427] path_openat+0x1887/0x20a0 [ 33.557756][ T8427] ? up_write+0x25/0xc0 [ 33.561934][ T8427] do_filp_open+0xbd/0x1d0 [ 33.566367][ T8427] ? _raw_spin_unlock+0x22/0x40 [ 33.571558][ T8427] ? alloc_fd+0x35d/0x3b0 [ 33.575979][ T8427] do_sys_openat2+0xa3/0x240 [ 33.580574][ T8427] ? mem_cgroup_handle_over_high+0x34/0x4d0 [ 33.586496][ T8427] __x64_sys_openat+0xef/0x110 [ 33.591637][ T8427] do_syscall_64+0x39/0x80 [ 33.596161][ T8427] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 33.602575][ T8427] RIP: 0033:0x4b113a [ 33.606620][ T8427] Code: e8 1b c2 f8 ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 33.626500][ T8427] RSP: 002b:000000c0002ff7c8 EFLAGS: 00000216 ORIG_RAX: 0000000000000101 [ 33.634901][ T8427] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004b113a [ 33.642988][ T8427] RDX: 0000000000080002 RSI: 000000c00015a680 RDI: ffffffffffffff9c [ 33.650956][ T8427] RBP: 000000c0002ff840 R08: 0000000000000000 R09: 0000000000000000 [ 33.658917][ T8427] R10: 00000000000001a4 R11: 0000000000000216 R12: ffffffffffffffff [ 33.666889][ T8427] R13: 0000000000000035 R14: 0000000000000034 R15: 0000000000000100 [ 33.675597][ T8427] Kernel Offset: disabled [ 33.679938][ T8427] Rebooting in 86400 seconds..