Warning: Permanently added '10.128.0.204' (ECDSA) to the list of known hosts. 2020/06/28 02:15:43 fuzzer started 2020/06/28 02:15:43 dialing manager at 10.128.0.105:41961 2020/06/28 02:15:43 syscalls: 3105 2020/06/28 02:15:43 code coverage: enabled 2020/06/28 02:15:43 comparison tracing: enabled 2020/06/28 02:15:43 extra coverage: enabled 2020/06/28 02:15:43 setuid sandbox: enabled 2020/06/28 02:15:43 namespace sandbox: enabled 2020/06/28 02:15:43 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/28 02:15:43 fault injection: enabled 2020/06/28 02:15:43 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/28 02:15:43 net packet injection: enabled 2020/06/28 02:15:43 net device setup: enabled 2020/06/28 02:15:43 concurrency sanitizer: enabled 2020/06/28 02:15:43 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/28 02:15:43 USB emulation: enabled 2020/06/28 02:15:45 suppressing KCSAN reports in functions: 'n_tty_receive_buf_common' '__xa_clear_mark' 'ext4_free_inodes_count' 'do_epoll_wait' 'page_counter_charge' 'fsnotify' 'sit_tunnel_xmit' '__delete_from_page_cache' 'copy_process' '__mark_inode_dirty' 'do_nanosleep' 'ext4_free_inode' 'xas_clear_mark' 'do_syslog' 'blk_mq_sched_dispatch_requests' 'blk_mq_rq_ctx_init' 'complete_signal' 'ext4_mark_iloc_dirty' 'pcpu_alloc' '__ext4_new_inode' 'generic_file_buffered_read' 'generic_write_end' '__mod_timer' 02:16:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x64}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) syzkaller login: [ 68.473470][ T8628] ================================================================== [ 68.481591][ T8628] BUG: KCSAN: data-race in atime_needs_update / propagate_one [ 68.485370][ T8647] IPVS: ftp: loaded support on port[0] = 21 [ 68.489032][ T8628] [ 68.497214][ T8628] write to 0xffff888217eaa0b0 of 4 bytes by task 8647 on cpu 0: [ 68.504836][ T8628] propagate_one+0x32d/0x400 [ 68.509416][ T8628] propagate_mnt+0x2f8/0x640 [ 68.513995][ T8628] attach_recursive_mnt+0x519/0x1210 [ 68.519268][ T8628] do_mount+0x1aa8/0x1bd0 [ 68.523589][ T8628] __se_sys_mount+0xd3/0x100 [ 68.528162][ T8628] __x64_sys_mount+0x63/0x70 [ 68.532738][ T8628] do_syscall_64+0x71/0x120 [ 68.535034][ T8647] chnl_net:caif_netlink_parms(): no params data found [ 68.537230][ T8628] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 68.549912][ T8628] [ 68.552222][ T8628] read to 0xffff888217eaa0b0 of 4 bytes by task 8628 on cpu 1: [ 68.559758][ T8628] atime_needs_update+0x1b7/0x370 [ 68.564774][ T8628] touch_atime+0x53/0x1a0 [ 68.566752][ T8647] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.569096][ T8628] generic_file_buffered_read+0x167e/0x1750 [ 68.576140][ T8647] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.581958][ T8628] generic_file_read_iter+0x7d/0x3e0 [ 68.589791][ T8647] device bridge_slave_0 entered promiscuous mode [ 68.594247][ T8628] ext4_file_read_iter+0x2dd/0x410 [ 68.594257][ T8628] __vfs_read+0x2d5/0x330 [ 68.594267][ T8628] integrity_kernel_read+0xb4/0x100 [ 68.594282][ T8628] ima_calc_file_hash+0x9bf/0x13e0 [ 68.602132][ T8647] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.605677][ T8628] ima_collect_measurement+0x168/0x310 [ 68.610845][ T8647] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.615194][ T8628] process_measurement+0x9fc/0x1040 [ 68.615207][ T8628] ima_file_check+0x75/0xa0 [ 68.615225][ T8628] path_openat+0x18a2/0x20e0 [ 68.620789][ T8647] device bridge_slave_1 entered promiscuous mode [ 68.627300][ T8628] do_filp_open+0xbd/0x1d0 [ 68.627309][ T8628] do_sys_openat2+0x33c/0x4a0 [ 68.627322][ T8628] __x64_sys_openat+0xef/0x110 [ 68.641635][ T8647] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.644918][ T8628] do_syscall_64+0x71/0x120 [ 68.644928][ T8628] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 68.644930][ T8628] [ 68.644932][ T8628] Reported by Kernel Concurrency Sanitizer on: [ 68.644949][ T8628] CPU: 1 PID: 8628 Comm: syz-fuzzer Not tainted 5.8.0-rc2-syzkaller #0 [ 68.651364][ T8647] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.653982][ T8628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.653986][ T8628] ================================================================== [ 68.653991][ T8628] Kernel panic - not syncing: panic_on_warn set ... [ 68.654001][ T8628] CPU: 1 PID: 8628 Comm: syz-fuzzer Not tainted 5.8.0-rc2-syzkaller #0 [ 68.654021][ T8628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.668587][ T8647] team0: Port device team_slave_0 added [ 68.669474][ T8628] Call Trace: [ 68.677065][ T8647] team0: Port device team_slave_1 added [ 68.683219][ T8628] dump_stack+0x10f/0x19d [ 68.683228][ T8628] panic+0x1f8/0x63a [ 68.683243][ T8628] ? vprintk_emit+0x44a/0x4f0 [ 68.695417][ T8647] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.695899][ T8628] kcsan_report+0x684/0x690 [ 68.702028][ T8647] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.710237][ T8628] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 68.719229][ T8647] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.729251][ T8628] ? atime_needs_update+0x1b7/0x370 [ 68.729262][ T8628] ? touch_atime+0x53/0x1a0 [ 68.729280][ T8628] ? generic_file_buffered_read+0x167e/0x1750 [ 68.738740][ T8647] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.744099][ T8628] ? generic_file_read_iter+0x7d/0x3e0 [ 68.744111][ T8628] ? ext4_file_read_iter+0x2dd/0x410 [ 68.744126][ T8628] ? __vfs_read+0x2d5/0x330 [ 68.752517][ T8647] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.762383][ T8628] ? integrity_kernel_read+0xb4/0x100 [ 68.762393][ T8628] ? ima_calc_file_hash+0x9bf/0x13e0 [ 68.762409][ T8628] ? ima_collect_measurement+0x168/0x310 [ 68.768371][ T8647] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.771205][ T8628] ? process_measurement+0x9fc/0x1040 [ 68.938481][ T8628] ? ima_file_check+0x75/0xa0 [ 68.943129][ T8628] ? path_openat+0x18a2/0x20e0 [ 68.947863][ T8628] ? do_filp_open+0xbd/0x1d0 [ 68.952425][ T8628] ? do_sys_openat2+0x33c/0x4a0 [ 68.957250][ T8628] ? __x64_sys_openat+0xef/0x110 [ 68.962158][ T8628] ? do_syscall_64+0x71/0x120 [ 68.966808][ T8628] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 68.972852][ T8628] kcsan_setup_watchpoint+0x453/0x4d0 [ 68.978198][ T8628] atime_needs_update+0x1b7/0x370 [ 68.983195][ T8628] touch_atime+0x53/0x1a0 [ 68.987512][ T8628] generic_file_buffered_read+0x167e/0x1750 [ 68.993380][ T8628] generic_file_read_iter+0x7d/0x3e0 [ 68.998643][ T8628] ext4_file_read_iter+0x2dd/0x410 [ 69.003724][ T8628] __vfs_read+0x2d5/0x330 [ 69.008029][ T8628] integrity_kernel_read+0xb4/0x100 [ 69.013198][ T8628] ima_calc_file_hash+0x9bf/0x13e0 [ 69.018278][ T8628] ? __kmalloc+0x164/0x2d0 [ 69.022668][ T8628] ? should_fail+0x2a/0x250 [ 69.027143][ T8628] ? check_preemption_disabled+0x8f/0x1a0 [ 69.032833][ T8628] ? widen_string+0x3a/0x280 [ 69.037392][ T8628] ? constant_test_bit+0x25/0x30 [ 69.042301][ T8628] ? ext4_xattr_ibody_get+0x6e/0x610 [ 69.047555][ T8628] ? __rcu_read_unlock+0x34/0x260 [ 69.052555][ T8628] ? aa_get_newest_label+0x71/0x250 [ 69.057740][ T8628] ? apparmor_capable+0xfb/0x160 [ 69.062648][ T8628] ? ext4_xattr_get+0x268/0x560 [ 69.067470][ T8628] ? ima_match_policy+0xac0/0xb00 [ 69.072467][ T8628] ima_collect_measurement+0x168/0x310 [ 69.077895][ T8628] process_measurement+0x9fc/0x1040 [ 69.083062][ T8628] ? lockref_put_return+0xed/0x140 [ 69.088158][ T8628] ? dquot_file_open+0x68/0x80 [ 69.092903][ T8628] ? ext4_file_open+0x19f/0x3e0 [ 69.097739][ T8628] ? fsnotify_perm+0x1f6/0x250 [ 69.102476][ T8628] ? __rcu_read_unlock+0x4b/0x260 [ 69.107472][ T8628] ? aa_get_task_label+0x72/0xc0 [ 69.112381][ T8628] ? apparmor_task_getsecid+0x7e/0xa0 [ 69.117722][ T8628] ima_file_check+0x75/0xa0 [ 69.122198][ T8628] path_openat+0x18a2/0x20e0 [ 69.126774][ T8628] ? __ext4_mark_inode_dirty+0x2cf/0x3f0 [ 69.133004][ T8628] ? _raw_spin_unlock+0x2e/0x50 [ 69.137841][ T8628] ? __mark_inode_dirty+0x415/0x7d0 [ 69.143013][ T8628] do_filp_open+0xbd/0x1d0 [ 69.147398][ T8628] ? __check_object_size+0x237/0x2f0 [ 69.152655][ T8628] ? _raw_spin_unlock+0x2e/0x50 [ 69.157474][ T8628] ? __alloc_fd+0x33c/0x390 [ 69.161947][ T8628] do_sys_openat2+0x33c/0x4a0 [ 69.166611][ T8628] __x64_sys_openat+0xef/0x110 [ 69.171345][ T8628] do_syscall_64+0x71/0x120 [ 69.175823][ T8628] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 69.181685][ T8628] RIP: 0033:0x4b3d4a [ 69.185545][ T8628] Code: Bad RIP value. [ 69.189582][ T8628] RSP: 002b:000000c000327830 EFLAGS: 00000206 ORIG_RAX: 0000000000000101 [ 69.197960][ T8628] RAX: ffffffffffffffda RBX: 000000c00002c000 RCX: 00000000004b3d4a [ 69.205903][ T8628] RDX: 0000000000080002 RSI: 000000c009254420 RDI: ffffffffffffff9c [ 69.213847][ T8628] RBP: 000000c0003278a8 R08: 0000000000000000 R09: 0000000000000000 [ 69.221789][ T8628] R10: 00000000000001a4 R11: 0000000000000206 R12: ffffffffffffffff [ 69.229736][ T8628] R13: 0000000000000022 R14: 0000000000000021 R15: 0000000000000100 [ 69.239056][ T8628] Kernel Offset: disabled [ 69.243367][ T8628] Rebooting in 86400 seconds..