[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.35' (ECDSA) to the list of known hosts. 2020/11/24 15:39:40 fuzzer started 2020/11/24 15:39:40 dialing manager at 10.128.0.105:40135 2020/11/24 15:39:40 syscalls: 3448 2020/11/24 15:39:40 code coverage: enabled 2020/11/24 15:39:40 comparison tracing: enabled 2020/11/24 15:39:40 extra coverage: enabled 2020/11/24 15:39:40 setuid sandbox: enabled 2020/11/24 15:39:40 namespace sandbox: enabled 2020/11/24 15:39:40 Android sandbox: /sys/fs/selinux/policy does not exist 2020/11/24 15:39:40 fault injection: enabled 2020/11/24 15:39:40 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/11/24 15:39:40 net packet injection: enabled 2020/11/24 15:39:40 net device setup: enabled 2020/11/24 15:39:40 concurrency sanitizer: enabled 2020/11/24 15:39:40 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/11/24 15:39:40 USB emulation: enabled 2020/11/24 15:39:40 hci packet injection: enabled 2020/11/24 15:39:40 wifi device emulation: enabled 2020/11/24 15:39:41 suppressing KCSAN reports in functions: 'ext4_free_inode' 'blk_mq_dispatch_rq_list' 'generic_write_end' 'blk_mq_sched_dispatch_requests' '__send_signal' 'ext4_ext_insert_extent' 'pcpu_alloc' 'dd_has_work' 'alloc_pid' '__xa_clear_mark' 15:39:48 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='xfrm0\x00', 0x10) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$kcm(0x2, 0x2, 0x73) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='veth1_to_team\x00', 0x10) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, 0x10) syzkaller login: [ 36.304422][ T8445] ================================================================== [ 36.312597][ T8445] BUG: KCSAN: data-race in atime_needs_update / propagate_one [ 36.320188][ T8445] [ 36.322494][ T8445] read-write to 0xffff888100d01830 of 4 bytes by task 8453 on cpu 1: [ 36.330535][ T8445] propagate_one+0x323/0x3f0 [ 36.335277][ T8445] propagate_mnt+0x2f8/0x650 [ 36.339848][ T8445] attach_recursive_mnt+0x4fb/0x1180 [ 36.345106][ T8445] path_mount+0x1aed/0x1c10 [ 36.349699][ T8445] __se_sys_mount+0x23d/0x2e0 [ 36.354476][ T8445] __x64_sys_mount+0x63/0x70 [ 36.359046][ T8445] do_syscall_64+0x39/0x80 [ 36.363440][ T8445] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 36.369302][ T8445] [ 36.371619][ T8445] read to 0xffff888100d01830 of 4 bytes by task 8445 on cpu 0: [ 36.379284][ T8445] atime_needs_update+0x133/0x370 [ 36.384418][ T8445] touch_atime+0x55/0x2d0 [ 36.388722][ T8445] generic_file_buffered_read+0x1b30/0x23a0 [ 36.394641][ T8445] generic_file_read_iter+0x80/0x3d0 [ 36.399930][ T8445] ext4_file_read_iter+0x2d0/0x420 [ 36.405011][ T8445] __kernel_read+0x307/0x560 [ 36.409644][ T8445] integrity_kernel_read+0x4c/0x70 [ 36.414755][ T8445] ima_calc_file_hash+0x9c7/0x1430 [ 36.419839][ T8445] ima_collect_measurement+0x168/0x300 [ 36.425267][ T8445] process_measurement+0x9f1/0x1050 [ 36.430438][ T8445] ima_file_check+0x72/0xa0 [ 36.434922][ T8445] path_openat+0x1887/0x20a0 [ 36.439494][ T8445] do_filp_open+0xbd/0x1d0 [ 36.443906][ T8445] do_sys_openat2+0xa3/0x240 [ 36.448486][ T8445] __x64_sys_openat+0xef/0x110 [ 36.453245][ T8445] do_syscall_64+0x39/0x80 [ 36.457633][ T8445] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 36.463509][ T8445] [ 36.465823][ T8445] Reported by Kernel Concurrency Sanitizer on: [ 36.471951][ T8445] CPU: 0 PID: 8445 Comm: syz-fuzzer Not tainted 5.10.0-rc5-syzkaller #0 [ 36.480254][ T8445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.490470][ T8445] ================================================================== [ 36.498514][ T8445] Kernel panic - not syncing: panic_on_warn set ... [ 36.505075][ T8445] CPU: 0 PID: 8445 Comm: syz-fuzzer Not tainted 5.10.0-rc5-syzkaller #0 [ 36.513367][ T8445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.523394][ T8445] Call Trace: [ 36.526705][ T8445] dump_stack+0x116/0x15d [ 36.531015][ T8445] panic+0x1e7/0x5fa [ 36.534884][ T8445] ? vprintk_emit+0x2f2/0x370 [ 36.539546][ T8445] kcsan_report+0x67b/0x680 [ 36.544025][ T8445] ? kcsan_setup_watchpoint+0x46a/0x4d0 [ 36.549541][ T8445] ? atime_needs_update+0x133/0x370 [ 36.554710][ T8445] ? touch_atime+0x55/0x2d0 [ 36.559290][ T8445] ? generic_file_buffered_read+0x1b30/0x23a0 [ 36.565332][ T8445] ? generic_file_read_iter+0x80/0x3d0 [ 36.570775][ T8445] ? ext4_file_read_iter+0x2d0/0x420 [ 36.576035][ T8445] ? __kernel_read+0x307/0x560 [ 36.581320][ T8445] ? integrity_kernel_read+0x4c/0x70 [ 36.586600][ T8445] ? ima_calc_file_hash+0x9c7/0x1430 [ 36.591857][ T8445] ? ima_collect_measurement+0x168/0x300 [ 36.597478][ T8445] ? process_measurement+0x9f1/0x1050 [ 36.602825][ T8445] ? ima_file_check+0x72/0xa0 [ 36.607475][ T8445] ? path_openat+0x1887/0x20a0 [ 36.612228][ T8445] ? do_filp_open+0xbd/0x1d0 [ 36.616814][ T8445] ? do_sys_openat2+0xa3/0x240 [ 36.621593][ T8445] ? __x64_sys_openat+0xef/0x110 [ 36.626666][ T8445] ? do_syscall_64+0x39/0x80 [ 36.631360][ T8445] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 36.637415][ T8445] ? page_cache_ra_unbounded+0x484/0x4c0 [ 36.643026][ T8445] kcsan_setup_watchpoint+0x46a/0x4d0 [ 36.648373][ T8445] ? __check_object_size+0x253/0x310 [ 36.653651][ T8445] atime_needs_update+0x133/0x370 [ 36.658652][ T8445] touch_atime+0x55/0x2d0 [ 36.662959][ T8445] ? mark_page_accessed+0x529/0x5e0 [ 36.668474][ T8445] generic_file_buffered_read+0x1b30/0x23a0 [ 36.674361][ T8445] generic_file_read_iter+0x80/0x3d0 [ 36.679657][ T8445] ext4_file_read_iter+0x2d0/0x420 [ 36.684749][ T8445] __kernel_read+0x307/0x560 [ 36.689318][ T8445] integrity_kernel_read+0x4c/0x70 [ 36.694449][ T8445] ima_calc_file_hash+0x9c7/0x1430 [ 36.699601][ T8445] ? __should_failslab+0x81/0x90 [ 36.704519][ T8445] ? integrity_audit_message+0x7b/0x280 [ 36.710372][ T8445] ? should_failslab+0x5/0x20 [ 36.715030][ T8445] ? slab_pre_alloc_hook+0x20/0xb0 [ 36.720135][ T8445] ? widen_string+0x3a/0x280 [ 36.724806][ T8445] ? format_decode+0x1d3/0x840 [ 36.730090][ T8445] ? string+0x1f9/0x210 [ 36.734218][ T8445] ? __rcu_read_unlock+0x3a/0x220 [ 36.739217][ T8445] ? ext4_xattr_ibody_get+0x68/0x630 [ 36.744500][ T8445] ? aa_get_newest_label+0x74/0x250 [ 36.749672][ T8445] ? apparmor_capable+0xfe/0x160 [ 36.754583][ T8445] ? __rcu_read_unlock+0x3a/0x220 [ 36.759580][ T8445] ? ext4_xattr_get+0x27d/0x580 [ 36.764419][ T8445] ? ima_match_policy+0xa54/0xa90 [ 36.769418][ T8445] ima_collect_measurement+0x168/0x300 [ 36.774853][ T8445] process_measurement+0x9f1/0x1050 [ 36.780131][ T8445] ? dquot_file_open+0x68/0x80 [ 36.784872][ T8445] ? ext4_file_open+0x186/0x4f0 [ 36.789700][ T8445] ? aa_get_newest_label+0x74/0x250 [ 36.794970][ T8445] ? __rcu_read_unlock+0x51/0x220 [ 36.799985][ T8445] ? fsnotify_perm+0x296/0x2d0 [ 36.804738][ T8445] ? aa_get_task_label+0x72/0xc0 [ 36.810518][ T8445] ? apparmor_task_getsecid+0x81/0xa0 [ 36.815877][ T8445] ima_file_check+0x72/0xa0 [ 36.820358][ T8445] path_openat+0x1887/0x20a0 [ 36.824924][ T8445] ? __ext4_mark_inode_dirty+0x46a/0x610 [ 36.830545][ T8445] do_filp_open+0xbd/0x1d0 [ 36.835098][ T8445] ? _raw_spin_unlock+0x22/0x40 [ 36.839947][ T8445] ? __alloc_fd+0x33c/0x390 [ 36.844603][ T8445] do_sys_openat2+0xa3/0x240 [ 36.849170][ T8445] ? mem_cgroup_handle_over_high+0x34/0x4d0 [ 36.855048][ T8445] __x64_sys_openat+0xef/0x110 [ 36.859788][ T8445] do_syscall_64+0x39/0x80 [ 36.864968][ T8445] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 36.870918][ T8445] RIP: 0033:0x4b3d4a [ 36.874790][ T8445] Code: e8 5b a1 f8 ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 36.894386][ T8445] RSP: 002b:000000c0000c5808 EFLAGS: 00000216 ORIG_RAX: 0000000000000101 [ 36.902786][ T8445] RAX: ffffffffffffffda RBX: 000000c00002e800 RCX: 00000000004b3d4a [ 36.910742][ T8445] RDX: 0000000000080002 RSI: 000000c0022bc400 RDI: ffffffffffffff9c [ 36.918819][ T8445] RBP: 000000c0000c5880 R08: 0000000000000000 R09: 0000000000000000 [ 36.926779][ T8445] R10: 00000000000001a4 R11: 0000000000000216 R12: ffffffffffffffff [ 36.934967][ T8445] R13: 0000000000000021 R14: 0000000000000020 R15: 0000000000000100 [ 36.942974][ T8445] Kernel Offset: disabled [ 36.947320][ T8445] Rebooting in 86400 seconds..