[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 syzkaller login: [ 28.858641][ T8611] bash (8611) used greatest stack depth: 10328 bytes left Warning: Permanently added '10.128.0.96' (ECDSA) to the list of known hosts. 2020/06/23 18:45:38 fuzzer started 2020/06/23 18:45:38 dialing manager at 10.128.0.105:45811 2020/06/23 18:45:39 syscalls: 3103 2020/06/23 18:45:39 code coverage: enabled 2020/06/23 18:45:39 comparison tracing: enabled 2020/06/23 18:45:39 extra coverage: enabled 2020/06/23 18:45:39 setuid sandbox: enabled 2020/06/23 18:45:39 namespace sandbox: enabled 2020/06/23 18:45:39 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/23 18:45:39 fault injection: enabled 2020/06/23 18:45:39 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/23 18:45:39 net packet injection: enabled 2020/06/23 18:45:39 net device setup: enabled 2020/06/23 18:45:39 concurrency sanitizer: enabled 2020/06/23 18:45:39 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/23 18:45:39 USB emulation: enabled 2020/06/23 18:45:40 suppressing KCSAN reports in functions: '__mod_timer' 'dd_has_work' 'do_epoll_wait' '__xa_clear_mark' 'futex_wait_queue_me' 'n_tty_receive_buf_common' 'complete_signal' 'wg_packet_decrypt_worker' 'blk_mq_dispatch_rq_list' 'copy_process' 'blk_mq_rq_ctx_init' 'find_get_pages_range_tag' 'ext4_free_inode' 'generic_write_end' '__ext4_new_inode' 18:45:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r1 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000240)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400283}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x400, 0x0, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast2=0xe000000f, 0x0, 0x0, 'rr\x00', 0x0, 0x0, 0x66}, 0x2c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) r2 = gettid() r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0xb2bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x3, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000)={0x1}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x428, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x100000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x7, &(0x7f0000000380)=ANY=[@ANYRESDEC=r4, @ANYRESDEC=r3, @ANYRES64, @ANYRES64], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100)={0x2, 0x5, 0x2}, 0x10}, 0x78) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r6, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r6) r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000300)={0xa, 0x4e22, 0x1ff, @dev, 0x6}, 0x1c) splice(r5, 0x0, r6, 0x0, 0x100000002, 0x0) [ 47.070198][ T8653] ================================================================== [ 47.078419][ T8653] BUG: KCSAN: data-race in atime_needs_update / propagate_one [ 47.081823][ T8660] IPVS: ftp: loaded support on port[0] = 21 [ 47.085859][ T8653] [ 47.094100][ T8653] write to 0xffff88821a1df330 of 4 bytes by task 8660 on cpu 1: [ 47.101892][ T8653] propagate_one+0x32d/0x400 [ 47.106500][ T8653] propagate_mnt+0x2f8/0x640 [ 47.111074][ T8653] attach_recursive_mnt+0x519/0x1210 [ 47.116612][ T8653] do_mount+0x1aa8/0x1bd0 [ 47.120972][ T8653] __se_sys_mount+0xd3/0x100 [ 47.125550][ T8653] __x64_sys_mount+0x63/0x70 [ 47.130126][ T8653] do_syscall_64+0x71/0x120 [ 47.134890][ T8653] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 47.140769][ T8653] [ 47.143080][ T8653] read to 0xffff88821a1df330 of 4 bytes by task 8653 on cpu 0: [ 47.143620][ T8660] chnl_net:caif_netlink_parms(): no params data found [ 47.150606][ T8653] atime_needs_update+0x1b7/0x370 [ 47.150616][ T8653] touch_atime+0x53/0x1a0 [ 47.150632][ T8653] generic_file_buffered_read+0x167e/0x1750 [ 47.172554][ T8653] generic_file_read_iter+0x7d/0x3e0 [ 47.178001][ T8653] ext4_file_read_iter+0x2dd/0x410 [ 47.183459][ T8653] __vfs_read+0x2d5/0x330 [ 47.188549][ T8653] integrity_kernel_read+0xb4/0x100 [ 47.193734][ T8653] ima_calc_file_hash+0x9bf/0x13e0 [ 47.198834][ T8653] ima_collect_measurement+0x168/0x310 [ 47.202615][ T8660] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.204454][ T8653] process_measurement+0x9fc/0x1040 [ 47.212159][ T8660] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.216615][ T8653] ima_file_check+0x75/0xa0 [ 47.226245][ T8660] device bridge_slave_0 entered promiscuous mode [ 47.228096][ T8653] path_openat+0x18a2/0x20e0 [ 47.228105][ T8653] do_filp_open+0xbd/0x1d0 [ 47.228113][ T8653] do_sys_openat2+0x33c/0x4a0 [ 47.228202][ T8653] __x64_sys_openat+0xef/0x110 [ 47.236819][ T8660] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.239177][ T8653] do_syscall_64+0x71/0x120 [ 47.239190][ T8653] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 47.239197][ T8653] [ 47.245345][ T8660] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.248242][ T8653] Reported by Kernel Concurrency Sanitizer on: [ 47.248253][ T8653] CPU: 0 PID: 8653 Comm: syz-fuzzer Not tainted 5.8.0-rc2-syzkaller #0 [ 47.248258][ T8653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 47.248262][ T8653] ================================================================== [ 47.248267][ T8653] Kernel panic - not syncing: panic_on_warn set ... [ 47.248275][ T8653] CPU: 0 PID: 8653 Comm: syz-fuzzer Not tainted 5.8.0-rc2-syzkaller #0 [ 47.248280][ T8653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 47.248283][ T8653] Call Trace: [ 47.248302][ T8653] dump_stack+0x10f/0x19d [ 47.256887][ T8660] device bridge_slave_1 entered promiscuous mode [ 47.260141][ T8653] panic+0x1f8/0x63a [ 47.260151][ T8653] ? vprintk_emit+0x44a/0x4f0 [ 47.260170][ T8653] kcsan_report+0x684/0x690 [ 47.275016][ T8660] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 47.280220][ T8653] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 47.280232][ T8653] ? atime_needs_update+0x1b7/0x370 [ 47.280247][ T8653] ? touch_atime+0x53/0x1a0 [ 47.288665][ T8660] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 47.294688][ T8653] ? generic_file_buffered_read+0x167e/0x1750 [ 47.313164][ T8660] team0: Port device team_slave_0 added [ 47.319726][ T8653] ? generic_file_read_iter+0x7d/0x3e0 [ 47.319738][ T8653] ? ext4_file_read_iter+0x2dd/0x410 [ 47.319753][ T8653] ? __vfs_read+0x2d5/0x330 [ 47.329727][ T8660] team0: Port device team_slave_1 added [ 47.338113][ T8653] ? integrity_kernel_read+0xb4/0x100 [ 47.338123][ T8653] ? ima_calc_file_hash+0x9bf/0x13e0 [ 47.338133][ T8653] ? ima_collect_measurement+0x168/0x310 [ 47.338141][ T8653] ? process_measurement+0x9fc/0x1040 [ 47.338155][ T8653] ? ima_file_check+0x75/0xa0 [ 47.352500][ T8660] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 47.356352][ T8653] ? path_openat+0x18a2/0x20e0 [ 47.361138][ T8660] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 47.365595][ T8653] ? do_filp_open+0xbd/0x1d0 [ 47.375654][ T8660] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 47.380207][ T8653] ? do_sys_openat2+0x33c/0x4a0 [ 47.380216][ T8653] ? __x64_sys_openat+0xef/0x110 [ 47.380225][ T8653] ? do_syscall_64+0x71/0x120 [ 47.380244][ T8653] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 47.388637][ T8660] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 47.390523][ T8653] kcsan_setup_watchpoint+0x453/0x4d0 [ 47.400036][ T8660] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 47.405554][ T8653] atime_needs_update+0x1b7/0x370 [ 47.411557][ T8660] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 47.416498][ T8653] touch_atime+0x53/0x1a0 [ 47.590137][ T8653] generic_file_buffered_read+0x167e/0x1750 [ 47.596007][ T8653] generic_file_read_iter+0x7d/0x3e0 [ 47.601269][ T8653] ext4_file_read_iter+0x2dd/0x410 [ 47.606366][ T8653] __vfs_read+0x2d5/0x330 [ 47.610689][ T8653] integrity_kernel_read+0xb4/0x100 [ 47.615869][ T8653] ima_calc_file_hash+0x9bf/0x13e0 [ 47.621658][ T8653] ? __kmalloc+0x164/0x2d0 [ 47.626058][ T8653] ? __list_add_valid+0x28/0x90 [ 47.630883][ T8653] ? _raw_spin_unlock+0x2e/0x50 [ 47.635703][ T8653] ? cache_alloc_refill+0x2cd/0x3e0 [ 47.640891][ T8653] ? check_preemption_disabled+0x8f/0x1a0 [ 47.646579][ T8653] ? widen_string+0x3a/0x280 [ 47.651182][ T8653] ? constant_test_bit+0x25/0x30 [ 47.656101][ T8653] ? ext4_xattr_ibody_get+0x6e/0x610 [ 47.661358][ T8653] ? __rcu_read_unlock+0x34/0x260 [ 47.666365][ T8653] ? aa_get_newest_label+0x71/0x250 [ 47.671535][ T8653] ? apparmor_capable+0xfb/0x160 [ 47.676575][ T8653] ? ext4_xattr_get+0x268/0x560 [ 47.681705][ T8653] ? ima_match_policy+0xac0/0xb00 [ 47.686705][ T8653] ima_collect_measurement+0x168/0x310 [ 47.692311][ T8653] process_measurement+0x9fc/0x1040 [ 47.697484][ T8653] ? lockref_put_return+0xed/0x140 [ 47.702587][ T8653] ? dquot_file_open+0x68/0x80 [ 47.707327][ T8653] ? ext4_file_open+0x19f/0x3e0 [ 47.712150][ T8653] ? fsnotify_perm+0x1f6/0x250 [ 47.716887][ T8653] ? __rcu_read_unlock+0x4b/0x260 [ 47.721890][ T8653] ? aa_get_task_label+0x72/0xc0 [ 47.726889][ T8653] ? apparmor_task_getsecid+0x7e/0xa0 [ 47.732846][ T8653] ima_file_check+0x75/0xa0 [ 47.737326][ T8653] path_openat+0x18a2/0x20e0 [ 47.742191][ T8653] ? __ext4_mark_inode_dirty+0x2cf/0x3f0 [ 47.747801][ T8653] ? _raw_spin_unlock+0x2e/0x50 [ 47.752622][ T8653] ? __mark_inode_dirty+0x415/0x7d0 [ 47.757794][ T8653] do_filp_open+0xbd/0x1d0 [ 47.762199][ T8653] ? __check_object_size+0x237/0x2f0 [ 47.767559][ T8653] ? _raw_spin_unlock+0x2e/0x50 [ 47.772679][ T8653] ? __alloc_fd+0x33c/0x390 [ 47.777264][ T8653] do_sys_openat2+0x33c/0x4a0 [ 47.781915][ T8653] __x64_sys_openat+0xef/0x110 [ 47.786651][ T8653] do_syscall_64+0x71/0x120 [ 47.791199][ T8653] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 47.797075][ T8653] RIP: 0033:0x4b3d4a [ 47.800948][ T8653] Code: Bad RIP value. [ 47.804988][ T8653] RSP: 002b:000000c0000f1830 EFLAGS: 00000206 ORIG_RAX: 0000000000000101 [ 47.813384][ T8653] RAX: ffffffffffffffda RBX: 000000c00002c000 RCX: 00000000004b3d4a [ 47.821588][ T8653] RDX: 0000000000080002 RSI: 000000c0022e4460 RDI: ffffffffffffff9c [ 47.829750][ T8653] RBP: 000000c0000f18a8 R08: 0000000000000000 R09: 0000000000000000 [ 47.837908][ T8653] R10: 00000000000001a4 R11: 0000000000000206 R12: ffffffffffffffff [ 47.845874][ T8653] R13: 0000000000000024 R14: 0000000000000023 R15: 0000000000000100 [ 47.856703][ T8653] Kernel Offset: disabled [ 47.861362][ T8653] Rebooting in 86400 seconds..