[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.49' (ECDSA) to the list of known hosts. 2020/06/25 21:26:53 fuzzer started 2020/06/25 21:26:54 dialing manager at 10.128.0.105:44465 2020/06/25 21:26:54 syscalls: 3105 2020/06/25 21:26:54 code coverage: enabled 2020/06/25 21:26:54 comparison tracing: enabled 2020/06/25 21:26:54 extra coverage: enabled 2020/06/25 21:26:54 setuid sandbox: enabled 2020/06/25 21:26:54 namespace sandbox: enabled 2020/06/25 21:26:54 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/25 21:26:54 fault injection: enabled 2020/06/25 21:26:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/25 21:26:54 net packet injection: enabled 2020/06/25 21:26:54 net device setup: enabled 2020/06/25 21:26:54 concurrency sanitizer: enabled 2020/06/25 21:26:54 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/25 21:26:54 USB emulation: enabled 2020/06/25 21:26:56 suppressing KCSAN reports in functions: '__ext4_new_inode' 'ext4_free_inode' '__xa_set_mark' 'generic_write_end' 'blk_mq_do_dispatch_sched' 'pcpu_alloc' 'dput' 'do_epoll_wait' 'blk_mq_rq_ctx_init' 'shmem_unlink' 'copy_process' '__blkdev_put' 'ext4_mb_regular_allocator' '__xa_clear_mark' 'expire_timers' 'do_nanosleep' '__filemap_fdatawrite_range' 'kauditd_thread' 'find_get_pages_range_tag' 'ext4_free_inodes_count' 'futex_wait_queue_me' '__ext4_update_other_inode_time' '__delayacct_blkio_end' 'kvm_mmu_notifier_invalidate_range_end' 'dd_has_work' 'do_signal_stop' 'blk_mq_dispatch_rq_list' '__mark_inode_dirty' 'xas_clear_mark' 'do_select' 'io_sq_thread' 'ext4_handle_inode_extension' 'do_sys_poll' 'page_counter_charge' 'step_into' 'alloc_pid' 'ext4_mark_iloc_dirty' 'n_tty_receive_buf_common' 'blk_mq_sched_dispatch_requests' 21:28:12 executing program 0: r0 = epoll_create(0x1) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) syzkaller login: [ 109.986984][ T8632] ================================================================== [ 109.995117][ T8632] BUG: KCSAN: data-race in atime_needs_update / propagate_one [ 109.999026][ T8654] IPVS: ftp: loaded support on port[0] = 21 [ 110.002555][ T8632] [ 110.010733][ T8632] write to 0xffff88812b395830 of 4 bytes by task 8654 on cpu 1: [ 110.018368][ T8632] propagate_one+0x32d/0x400 [ 110.022959][ T8632] propagate_mnt+0x2f8/0x640 [ 110.027539][ T8632] attach_recursive_mnt+0x519/0x1210 [ 110.032805][ T8632] do_mount+0x1aa8/0x1bd0 [ 110.037118][ T8632] __se_sys_mount+0xd3/0x100 [ 110.041691][ T8632] __x64_sys_mount+0x63/0x70 [ 110.045898][ T8654] chnl_net:caif_netlink_parms(): no params data found [ 110.046268][ T8632] do_syscall_64+0x71/0x120 [ 110.057505][ T8632] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 110.063370][ T8632] [ 110.065682][ T8632] read to 0xffff88812b395830 of 4 bytes by task 8632 on cpu 0: [ 110.073208][ T8632] atime_needs_update+0x1b7/0x370 [ 110.075222][ T8654] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.078217][ T8632] touch_atime+0x53/0x1a0 [ 110.078228][ T8632] generic_file_buffered_read+0x167e/0x1750 [ 110.078243][ T8632] generic_file_read_iter+0x7d/0x3e0 [ 110.085347][ T8654] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.089539][ T8632] ext4_file_read_iter+0x2dd/0x410 [ 110.095816][ T8654] device bridge_slave_0 entered promiscuous mode [ 110.100692][ T8632] __vfs_read+0x2d5/0x330 [ 110.108731][ T8654] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.112771][ T8632] integrity_kernel_read+0xb4/0x100 [ 110.119089][ T8654] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.123363][ T8632] ima_calc_file_hash+0x9bf/0x13e0 [ 110.130778][ T8654] device bridge_slave_1 entered promiscuous mode [ 110.135513][ T8632] ima_collect_measurement+0x168/0x310 [ 110.135521][ T8632] process_measurement+0x9fc/0x1040 [ 110.135535][ T8632] ima_file_check+0x75/0xa0 [ 110.150776][ T8654] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 110.153917][ T8632] path_openat+0x18a2/0x20e0 [ 110.160655][ T8654] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 110.164518][ T8632] do_filp_open+0xbd/0x1d0 [ 110.177604][ T8654] team0: Port device team_slave_0 added [ 110.178007][ T8632] do_sys_openat2+0x33c/0x4a0 [ 110.183754][ T8654] team0: Port device team_slave_1 added [ 110.191552][ T8632] __x64_sys_openat+0xef/0x110 [ 110.191562][ T8632] do_syscall_64+0x71/0x120 [ 110.191581][ T8632] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 110.203003][ T8654] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 110.206121][ T8632] [ 110.206124][ T8632] Reported by Kernel Concurrency Sanitizer on: [ 110.206134][ T8632] CPU: 0 PID: 8632 Comm: syz-fuzzer Not tainted 5.8.0-rc2-syzkaller #0 [ 110.206139][ T8632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.206156][ T8632] ================================================================== [ 110.211677][ T8654] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 110.216398][ T8632] Kernel panic - not syncing: panic_on_warn set ... [ 110.216408][ T8632] CPU: 0 PID: 8632 Comm: syz-fuzzer Not tainted 5.8.0-rc2-syzkaller #0 [ 110.216418][ T8632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.220889][ T8654] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 110.226740][ T8632] Call Trace: [ 110.226755][ T8632] dump_stack+0x10f/0x19d [ 110.226801][ T8632] panic+0x1f8/0x63a [ 110.234881][ T8654] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 110.236017][ T8632] ? vprintk_emit+0x44a/0x4f0 [ 110.236037][ T8632] kcsan_report+0x684/0x690 [ 110.242158][ T8654] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 110.250360][ T8632] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 110.250381][ T8632] ? atime_needs_update+0x1b7/0x370 [ 110.260404][ T8654] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 110.268430][ T8632] ? touch_atime+0x53/0x1a0 [ 110.268450][ T8632] ? generic_file_buffered_read+0x167e/0x1750 [ 110.414508][ T8632] ? generic_file_read_iter+0x7d/0x3e0 [ 110.419958][ T8632] ? ext4_file_read_iter+0x2dd/0x410 [ 110.425210][ T8632] ? __vfs_read+0x2d5/0x330 [ 110.429682][ T8632] ? integrity_kernel_read+0xb4/0x100 [ 110.435024][ T8632] ? ima_calc_file_hash+0x9bf/0x13e0 [ 110.440278][ T8632] ? ima_collect_measurement+0x168/0x310 [ 110.445877][ T8632] ? process_measurement+0x9fc/0x1040 [ 110.451214][ T8632] ? ima_file_check+0x75/0xa0 [ 110.455859][ T8632] ? path_openat+0x18a2/0x20e0 [ 110.460596][ T8632] ? do_filp_open+0xbd/0x1d0 [ 110.465210][ T8632] ? do_sys_openat2+0x33c/0x4a0 [ 110.470029][ T8632] ? __x64_sys_openat+0xef/0x110 [ 110.474936][ T8632] ? do_syscall_64+0x71/0x120 [ 110.479580][ T8632] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 110.485621][ T8632] kcsan_setup_watchpoint+0x453/0x4d0 [ 110.490964][ T8632] atime_needs_update+0x1b7/0x370 [ 110.495958][ T8632] touch_atime+0x53/0x1a0 [ 110.500345][ T8632] generic_file_buffered_read+0x167e/0x1750 [ 110.506209][ T8632] generic_file_read_iter+0x7d/0x3e0 [ 110.511464][ T8632] ext4_file_read_iter+0x2dd/0x410 [ 110.516542][ T8632] __vfs_read+0x2d5/0x330 [ 110.520842][ T8632] integrity_kernel_read+0xb4/0x100 [ 110.526009][ T8632] ima_calc_file_hash+0x9bf/0x13e0 [ 110.531217][ T8632] ? __kmalloc+0x164/0x2d0 [ 110.535605][ T8632] ? debug_smp_processor_id+0x18/0x20 [ 110.540990][ T8632] ? delay_tsc+0x96/0xe0 [ 110.545203][ T8632] ? constant_test_bit+0x25/0x30 [ 110.550108][ T8632] ? ext4_xattr_ibody_get+0x6e/0x610 [ 110.555361][ T8632] ? aa_get_newest_label+0x71/0x250 [ 110.560526][ T8632] ? apparmor_capable+0xfb/0x160 [ 110.565446][ T8632] ? ext4_xattr_get+0x268/0x560 [ 110.570265][ T8632] ? ima_match_policy+0xac0/0xb00 [ 110.575271][ T8632] ima_collect_measurement+0x168/0x310 [ 110.580721][ T8632] process_measurement+0x9fc/0x1040 [ 110.585922][ T8632] ? lockref_put_return+0xed/0x140 [ 110.591004][ T8632] ? dquot_file_open+0x68/0x80 [ 110.595737][ T8632] ? ext4_file_open+0x19f/0x3e0 [ 110.600555][ T8632] ? fsnotify_perm+0x1f6/0x250 [ 110.605286][ T8632] ? __rcu_read_unlock+0x4b/0x260 [ 110.610278][ T8632] ? aa_get_task_label+0x72/0xc0 [ 110.615184][ T8632] ? apparmor_task_getsecid+0x7e/0xa0 [ 110.620525][ T8632] ima_file_check+0x75/0xa0 [ 110.624996][ T8632] path_openat+0x18a2/0x20e0 [ 110.629553][ T8632] ? __ext4_mark_inode_dirty+0x2cf/0x3f0 [ 110.635156][ T8632] ? _raw_spin_unlock+0x2e/0x50 [ 110.639975][ T8632] ? __mark_inode_dirty+0x415/0x7d0 [ 110.645140][ T8632] do_filp_open+0xbd/0x1d0 [ 110.649527][ T8632] ? __check_object_size+0x237/0x2f0 [ 110.654780][ T8632] ? _raw_spin_unlock+0x2e/0x50 [ 110.659593][ T8632] ? __alloc_fd+0x33c/0x390 [ 110.664062][ T8632] do_sys_openat2+0x33c/0x4a0 [ 110.668704][ T8632] __x64_sys_openat+0xef/0x110 [ 110.673453][ T8632] do_syscall_64+0x71/0x120 [ 110.677927][ T8632] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 110.683799][ T8632] RIP: 0033:0x4b3d4a [ 110.687671][ T8632] Code: Bad RIP value. [ 110.691703][ T8632] RSP: 002b:000000c000245830 EFLAGS: 00000206 ORIG_RAX: 0000000000000101 [ 110.700086][ T8632] RAX: ffffffffffffffda RBX: 000000c00002e800 RCX: 00000000004b3d4a [ 110.708022][ T8632] RDX: 0000000000080002 RSI: 000000c0158fe420 RDI: ffffffffffffff9c [ 110.715962][ T8632] RBP: 000000c0002458a8 R08: 0000000000000000 R09: 0000000000000000 [ 110.723901][ T8632] R10: 00000000000001a4 R11: 0000000000000206 R12: ffffffffffffffff [ 110.731842][ T8632] R13: 0000000000000022 R14: 0000000000000021 R15: 0000000000000100 [ 110.741088][ T8632] Kernel Offset: disabled [ 110.745396][ T8632] Rebooting in 86400 seconds..