[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.43' (ECDSA) to the list of known hosts. 2020/12/28 22:11:25 fuzzer started 2020/12/28 22:11:25 dialing manager at 10.128.0.105:45639 2020/12/28 22:11:26 syscalls: 3466 2020/12/28 22:11:26 code coverage: enabled 2020/12/28 22:11:26 comparison tracing: enabled 2020/12/28 22:11:26 extra coverage: enabled 2020/12/28 22:11:26 setuid sandbox: enabled 2020/12/28 22:11:26 namespace sandbox: enabled 2020/12/28 22:11:26 Android sandbox: /sys/fs/selinux/policy does not exist 2020/12/28 22:11:26 fault injection: enabled 2020/12/28 22:11:26 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/12/28 22:11:26 net packet injection: enabled 2020/12/28 22:11:26 net device setup: enabled 2020/12/28 22:11:26 concurrency sanitizer: enabled 2020/12/28 22:11:26 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/12/28 22:11:26 USB emulation: enabled 2020/12/28 22:11:26 hci packet injection: enabled 2020/12/28 22:11:26 wifi device emulation: enabled 2020/12/28 22:11:27 suppressing KCSAN reports in functions: '__ext4_new_inode' '__send_signal' '__xa_clear_mark' 'blk_mq_dispatch_rq_list' '__xa_set_mark' 'blk_mq_rq_ctx_init' 'ext4_writepages' 'find_get_pages_range_tag' 'ext4_free_inode' '__mark_inode_dirty' 'ext4_free_inodes_count' 'ext4_setattr' 'ext4_mark_iloc_dirty' 'pcpu_alloc' 'generic_write_end' 22:11:36 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x22a780, 0x0) fchown(r0, 0x0, 0x0) syzkaller login: [ 38.106948][ T8434] ================================================================== [ 38.115099][ T8434] BUG: KCSAN: data-race in atime_needs_update / propagate_one [ 38.122614][ T8434] [ 38.124944][ T8434] read-write to 0xffff8881015c2b70 of 4 bytes by task 8454 on cpu 1: [ 38.132978][ T8434] propagate_one+0x323/0x3f0 [ 38.137594][ T8434] propagate_mnt+0x2f8/0x650 [ 38.142157][ T8434] attach_recursive_mnt+0x4fb/0x1180 [ 38.147457][ T8434] path_mount+0x1aed/0x1c10 [ 38.151936][ T8434] __se_sys_mount+0x23d/0x2e0 [ 38.156588][ T8434] __x64_sys_mount+0x63/0x70 [ 38.161187][ T8434] do_syscall_64+0x39/0x80 [ 38.165576][ T8434] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 38.171446][ T8434] [ 38.173746][ T8434] read to 0xffff8881015c2b70 of 4 bytes by task 8434 on cpu 0: [ 38.181259][ T8434] atime_needs_update+0x1b7/0x370 [ 38.186346][ T8434] touch_atime+0x55/0x2d0 [ 38.190656][ T8434] generic_file_buffered_read+0x92b/0x9a0 [ 38.196392][ T8434] generic_file_read_iter+0x80/0x3d0 [ 38.201652][ T8434] ext4_file_read_iter+0x2d0/0x420 [ 38.206741][ T8434] __kernel_read+0x307/0x560 [ 38.211308][ T8434] integrity_kernel_read+0x4c/0x70 [ 38.216407][ T8434] ima_calc_file_hash+0x956/0x1390 [ 38.221495][ T8434] ima_collect_measurement+0x168/0x300 [ 38.226928][ T8434] process_measurement+0x9f1/0x1050 [ 38.232101][ T8434] ima_file_check+0x72/0xa0 [ 38.236579][ T8434] path_openat+0x1887/0x20a0 [ 38.241139][ T8434] do_filp_open+0xbd/0x1d0 [ 38.245528][ T8434] do_sys_openat2+0xa3/0x240 [ 38.250123][ T8434] __x64_sys_openat+0xef/0x110 [ 38.254860][ T8434] do_syscall_64+0x39/0x80 [ 38.259252][ T8434] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 38.265156][ T8434] [ 38.267489][ T8434] Reported by Kernel Concurrency Sanitizer on: [ 38.273610][ T8434] CPU: 0 PID: 8434 Comm: syz-fuzzer Not tainted 5.11.0-rc1-syzkaller #0 [ 38.281919][ T8434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.291946][ T8434] ================================================================== [ 38.299976][ T8434] Kernel panic - not syncing: panic_on_warn set ... [ 38.306530][ T8434] CPU: 0 PID: 8434 Comm: syz-fuzzer Not tainted 5.11.0-rc1-syzkaller #0 [ 38.314826][ T8434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.324854][ T8434] Call Trace: [ 38.328123][ T8434] dump_stack+0x116/0x15d [ 38.332442][ T8434] panic+0x1e7/0x5fa [ 38.336312][ T8434] ? vprintk_emit+0x2e2/0x360 [ 38.340962][ T8434] kcsan_report+0x67b/0x680 [ 38.345438][ T8434] ? kcsan_setup_watchpoint+0x47b/0x4e0 [ 38.350956][ T8434] ? atime_needs_update+0x1b7/0x370 [ 38.356137][ T8434] ? touch_atime+0x55/0x2d0 [ 38.360612][ T8434] ? generic_file_buffered_read+0x92b/0x9a0 [ 38.366478][ T8434] ? generic_file_read_iter+0x80/0x3d0 [ 38.371909][ T8434] ? ext4_file_read_iter+0x2d0/0x420 [ 38.377167][ T8434] ? __kernel_read+0x307/0x560 [ 38.381910][ T8434] ? integrity_kernel_read+0x4c/0x70 [ 38.387182][ T8434] ? ima_calc_file_hash+0x956/0x1390 [ 38.392440][ T8434] ? ima_collect_measurement+0x168/0x300 [ 38.398054][ T8434] ? process_measurement+0x9f1/0x1050 [ 38.403402][ T8434] ? ima_file_check+0x72/0xa0 [ 38.408064][ T8434] ? path_openat+0x1887/0x20a0 [ 38.412800][ T8434] ? do_filp_open+0xbd/0x1d0 [ 38.417376][ T8434] ? do_sys_openat2+0xa3/0x240 [ 38.422124][ T8434] ? __x64_sys_openat+0xef/0x110 [ 38.427044][ T8434] ? do_syscall_64+0x39/0x80 [ 38.431612][ T8434] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 38.437676][ T8434] kcsan_setup_watchpoint+0x47b/0x4e0 [ 38.443023][ T8434] atime_needs_update+0x1b7/0x370 [ 38.448029][ T8434] touch_atime+0x55/0x2d0 [ 38.452336][ T8434] generic_file_buffered_read+0x92b/0x9a0 [ 38.458057][ T8434] generic_file_read_iter+0x80/0x3d0 [ 38.463316][ T8434] ext4_file_read_iter+0x2d0/0x420 [ 38.468402][ T8434] __kernel_read+0x307/0x560 [ 38.472981][ T8434] integrity_kernel_read+0x4c/0x70 [ 38.478068][ T8434] ima_calc_file_hash+0x956/0x1390 [ 38.483168][ T8434] ? integrity_audit_message+0x7b/0x280 [ 38.488688][ T8434] ? widen_string+0x3a/0x280 [ 38.493253][ T8434] ? format_decode+0x1d3/0x840 [ 38.498002][ T8434] ? string+0x1f9/0x210 [ 38.502132][ T8434] ? __down_read_common+0x14e/0x510 [ 38.507314][ T8434] ? ext4_xattr_ibody_get+0x68/0x630 [ 38.512572][ T8434] ? aa_get_newest_label+0x74/0x250 [ 38.517748][ T8434] ? apparmor_capable+0xfe/0x160 [ 38.522660][ T8434] ? ext4_xattr_get+0x27d/0x580 [ 38.527497][ T8434] ? ima_match_policy+0xa80/0xab0 [ 38.532583][ T8434] ima_collect_measurement+0x168/0x300 [ 38.538018][ T8434] process_measurement+0x9f1/0x1050 [ 38.543197][ T8434] ? dquot_file_open+0x68/0x80 [ 38.547941][ T8434] ? ext4_file_open+0x186/0x4f0 [ 38.552775][ T8434] ? aa_get_newest_label+0x74/0x250 [ 38.557956][ T8434] ? __rcu_read_unlock+0x51/0x250 [ 38.562960][ T8434] ? fsnotify_perm+0x296/0x2d0 [ 38.567699][ T8434] ? aa_get_task_label+0x72/0xc0 [ 38.573041][ T8434] ? apparmor_task_getsecid+0x81/0xa0 [ 38.578405][ T8434] ima_file_check+0x72/0xa0 [ 38.582885][ T8434] path_openat+0x1887/0x20a0 [ 38.587450][ T8434] ? up_write+0x25/0xc0 [ 38.591633][ T8434] do_filp_open+0xbd/0x1d0 [ 38.596025][ T8434] ? _raw_spin_unlock+0x22/0x40 [ 38.600856][ T8434] ? alloc_fd+0x35d/0x3b0 [ 38.605161][ T8434] do_sys_openat2+0xa3/0x240 [ 38.609725][ T8434] ? mem_cgroup_handle_over_high+0x34/0x4d0 [ 38.615592][ T8434] __x64_sys_openat+0xef/0x110 [ 38.620347][ T8434] do_syscall_64+0x39/0x80 [ 38.624744][ T8434] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 38.630615][ T8434] RIP: 0033:0x4b113a [ 38.634486][ T8434] Code: e8 1b c2 f8 ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 38.654067][ T8434] RSP: 002b:000000c00003b7c8 EFLAGS: 00000216 ORIG_RAX: 0000000000000101 [ 38.662465][ T8434] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004b113a [ 38.670411][ T8434] RDX: 0000000000080002 RSI: 000000c0002a8ae0 RDI: ffffffffffffff9c [ 38.678358][ T8434] RBP: 000000c00003b840 R08: 0000000000000000 R09: 0000000000000000 [ 38.686320][ T8434] R10: 00000000000001a4 R11: 0000000000000216 R12: ffffffffffffffff [ 38.694277][ T8434] R13: 0000000000000058 R14: 0000000000000057 R15: 0000000000000100 [ 38.704467][ T8434] Kernel Offset: disabled [ 38.708770][ T8434] Rebooting in 86400 seconds..