Warning: Permanently added '10.128.10.13' (ECDSA) to the list of known hosts. 2020/06/23 16:40:08 fuzzer started 2020/06/23 16:40:08 dialing manager at 10.128.0.105:44391 2020/06/23 16:40:09 syscalls: 3103 2020/06/23 16:40:09 code coverage: enabled 2020/06/23 16:40:09 comparison tracing: enabled 2020/06/23 16:40:09 extra coverage: enabled 2020/06/23 16:40:09 setuid sandbox: enabled 2020/06/23 16:40:09 namespace sandbox: enabled 2020/06/23 16:40:09 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/23 16:40:09 fault injection: enabled 2020/06/23 16:40:09 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/23 16:40:09 net packet injection: enabled 2020/06/23 16:40:09 net device setup: enabled 2020/06/23 16:40:09 concurrency sanitizer: enabled 2020/06/23 16:40:09 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/23 16:40:09 USB emulation: enabled 2020/06/23 16:40:10 suppressing KCSAN reports in functions: '__mod_timer' '__xa_clear_mark' 'copy_process' 'ext4_mb_regular_allocator' 'dd_has_work' 'do_epoll_wait' 'ext4_free_inodes_count' 'ext4_mb_good_group' '__ext4_new_inode' 'futex_wait_queue_me' '__delete_from_page_cache' 'exit_mm' 'generic_write_end' 'do_signal_stop' 16:40:20 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x1, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, 0x0, 0x0, 0x0) [ 47.662409][ T8628] ================================================================== [ 47.670527][ T8628] BUG: KCSAN: data-race in atime_needs_update / propagate_one [ 47.677958][ T8628] [ 47.680275][ T8628] write to 0xffff88812b743070 of 4 bytes by task 8647 on cpu 0: [ 47.682930][ T8647] IPVS: ftp: loaded support on port[0] = 21 [ 47.687895][ T8628] propagate_one+0x32d/0x400 [ 47.698326][ T8628] propagate_mnt+0x2f8/0x640 [ 47.702904][ T8628] attach_recursive_mnt+0x519/0x1210 [ 47.708177][ T8628] do_mount+0x1aa8/0x1bd0 [ 47.712493][ T8628] __se_sys_mount+0xd3/0x100 [ 47.717154][ T8628] __x64_sys_mount+0x63/0x70 [ 47.721726][ T8628] do_syscall_64+0x71/0x120 [ 47.726215][ T8628] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 47.732102][ T8628] [ 47.734437][ T8628] read to 0xffff88812b743070 of 4 bytes by task 8628 on cpu 1: [ 47.741969][ T8628] atime_needs_update+0x1b7/0x370 [ 47.744819][ T8647] chnl_net:caif_netlink_parms(): no params data found [ 47.747047][ T8628] touch_atime+0x53/0x1a0 [ 47.758091][ T8628] generic_file_buffered_read+0x167e/0x1750 [ 47.763967][ T8628] generic_file_read_iter+0x7d/0x3e0 [ 47.769236][ T8628] ext4_file_read_iter+0x2dd/0x410 [ 47.774325][ T8628] __vfs_read+0x2d5/0x330 [ 47.778623][ T8628] integrity_kernel_read+0xb4/0x100 [ 47.783817][ T8628] ima_calc_file_hash+0x9bf/0x13e0 [ 47.788912][ T8628] ima_collect_measurement+0x168/0x310 [ 47.794373][ T8628] process_measurement+0x9fc/0x1040 [ 47.795620][ T8647] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.799552][ T8628] ima_file_check+0x75/0xa0 [ 47.807153][ T8647] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.811022][ T8628] path_openat+0x18a2/0x20e0 [ 47.811032][ T8628] do_filp_open+0xbd/0x1d0 [ 47.811039][ T8628] do_sys_openat2+0x33c/0x4a0 [ 47.811052][ T8628] __x64_sys_openat+0xef/0x110 [ 47.820933][ T8647] device bridge_slave_0 entered promiscuous mode [ 47.822608][ T8628] do_syscall_64+0x71/0x120 [ 47.828347][ T8647] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.831682][ T8628] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 47.831684][ T8628] [ 47.831687][ T8628] Reported by Kernel Concurrency Sanitizer on: [ 47.831697][ T8628] CPU: 1 PID: 8628 Comm: syz-fuzzer Not tainted 5.8.0-rc2-syzkaller #0 [ 47.831707][ T8628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 47.838204][ T8647] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.842748][ T8628] ================================================================== [ 47.842753][ T8628] Kernel panic - not syncing: panic_on_warn set ... [ 47.842763][ T8628] CPU: 1 PID: 8628 Comm: syz-fuzzer Not tainted 5.8.0-rc2-syzkaller #0 [ 47.842768][ T8628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 47.842775][ T8628] Call Trace: [ 47.848584][ T8647] device bridge_slave_1 entered promiscuous mode [ 47.854260][ T8628] dump_stack+0x10f/0x19d [ 47.854268][ T8628] panic+0x1f8/0x63a [ 47.854282][ T8628] ? vprintk_emit+0x44a/0x4f0 [ 47.869902][ T8647] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 47.876796][ T8628] kcsan_report+0x684/0x690 [ 47.876809][ T8628] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 47.876825][ T8628] ? atime_needs_update+0x1b7/0x370 [ 47.889215][ T8647] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 47.893847][ T8628] ? touch_atime+0x53/0x1a0 [ 47.893858][ T8628] ? generic_file_buffered_read+0x167e/0x1750 [ 47.893872][ T8628] ? generic_file_read_iter+0x7d/0x3e0 [ 47.910978][ T8647] team0: Port device team_slave_0 added [ 47.916766][ T8628] ? ext4_file_read_iter+0x2dd/0x410 [ 47.928244][ T8647] team0: Port device team_slave_1 added [ 47.930067][ T8628] ? __vfs_read+0x2d5/0x330 [ 47.946572][ T8647] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 47.949378][ T8628] ? integrity_kernel_read+0xb4/0x100 [ 47.958382][ T8647] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 47.962840][ T8628] ? ima_calc_file_hash+0x9bf/0x13e0 [ 47.962850][ T8628] ? ima_collect_measurement+0x168/0x310 [ 47.962865][ T8628] ? process_measurement+0x9fc/0x1040 [ 47.969631][ T8647] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 47.973543][ T8628] ? ima_file_check+0x75/0xa0 [ 47.973553][ T8628] ? path_openat+0x18a2/0x20e0 [ 47.973563][ T8628] ? do_filp_open+0xbd/0x1d0 [ 47.973570][ T8628] ? do_sys_openat2+0x33c/0x4a0 [ 47.973583][ T8628] ? __x64_sys_openat+0xef/0x110 [ 47.984738][ T8647] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 47.987081][ T8628] ? do_syscall_64+0x71/0x120 [ 47.993503][ T8647] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 47.998562][ T8628] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 48.004481][ T8647] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 48.009362][ T8628] kcsan_setup_watchpoint+0x453/0x4d0 [ 48.167005][ T8628] atime_needs_update+0x1b7/0x370 [ 48.172042][ T8628] touch_atime+0x53/0x1a0 [ 48.176345][ T8628] generic_file_buffered_read+0x167e/0x1750 [ 48.182224][ T8628] generic_file_read_iter+0x7d/0x3e0 [ 48.187493][ T8628] ext4_file_read_iter+0x2dd/0x410 [ 48.192573][ T8628] __vfs_read+0x2d5/0x330 [ 48.196886][ T8628] integrity_kernel_read+0xb4/0x100 [ 48.202065][ T8628] ima_calc_file_hash+0x9bf/0x13e0 [ 48.207166][ T8628] ? __kmalloc+0x164/0x2d0 [ 48.211564][ T8628] ? should_fail+0x2a/0x250 [ 48.216038][ T8628] ? check_preemption_disabled+0x8f/0x1a0 [ 48.221727][ T8628] ? widen_string+0x3a/0x280 [ 48.226287][ T8628] ? check_preemption_disabled+0x3f/0x1a0 [ 48.231993][ T8628] ? constant_test_bit+0x25/0x30 [ 48.236900][ T8628] ? ext4_xattr_ibody_get+0x6e/0x610 [ 48.242169][ T8628] ? __rcu_read_unlock+0x34/0x260 [ 48.247181][ T8628] ? aa_get_newest_label+0x71/0x250 [ 48.252348][ T8628] ? apparmor_capable+0xfb/0x160 [ 48.257268][ T8628] ? ext4_xattr_get+0x268/0x560 [ 48.262103][ T8628] ? ima_match_policy+0xac0/0xb00 [ 48.267110][ T8628] ima_collect_measurement+0x168/0x310 [ 48.272553][ T8628] process_measurement+0x9fc/0x1040 [ 48.277730][ T8628] ? lockref_put_return+0xed/0x140 [ 48.282810][ T8628] ? dquot_file_open+0x68/0x80 [ 48.287541][ T8628] ? ext4_file_open+0x19f/0x3e0 [ 48.292361][ T8628] ? fsnotify_perm+0x1f6/0x250 [ 48.297094][ T8628] ? __rcu_read_unlock+0x4b/0x260 [ 48.302100][ T8628] ? aa_get_task_label+0x72/0xc0 [ 48.307005][ T8628] ? apparmor_task_getsecid+0x7e/0xa0 [ 48.312363][ T8628] ima_file_check+0x75/0xa0 [ 48.316838][ T8628] path_openat+0x18a2/0x20e0 [ 48.321413][ T8628] ? __ext4_mark_inode_dirty+0x2cf/0x3f0 [ 48.327020][ T8628] ? _raw_spin_unlock+0x2e/0x50 [ 48.331840][ T8628] ? __mark_inode_dirty+0x415/0x7d0 [ 48.337031][ T8628] do_filp_open+0xbd/0x1d0 [ 48.341425][ T8628] ? __check_object_size+0x237/0x2f0 [ 48.346681][ T8628] ? _raw_spin_unlock+0x2e/0x50 [ 48.351500][ T8628] ? __alloc_fd+0x33c/0x390 [ 48.355974][ T8628] do_sys_openat2+0x33c/0x4a0 [ 48.360620][ T8628] __x64_sys_openat+0xef/0x110 [ 48.365352][ T8628] do_syscall_64+0x71/0x120 [ 48.369825][ T8628] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 48.375685][ T8628] RIP: 0033:0x4b3d4a [ 48.379544][ T8628] Code: Bad RIP value. [ 48.383589][ T8628] RSP: 002b:000000c00031f830 EFLAGS: 00000206 ORIG_RAX: 0000000000000101 [ 48.391980][ T8628] RAX: ffffffffffffffda RBX: 000000c00002c000 RCX: 00000000004b3d4a [ 48.399922][ T8628] RDX: 0000000000080002 RSI: 000000c0025fa420 RDI: ffffffffffffff9c [ 48.407879][ T8628] RBP: 000000c00031f8a8 R08: 0000000000000000 R09: 0000000000000000 [ 48.415835][ T8628] R10: 00000000000001a4 R11: 0000000000000206 R12: ffffffffffffffff [ 48.423794][ T8628] R13: 0000000000000022 R14: 0000000000000021 R15: 0000000000000100 [ 48.432947][ T8628] Kernel Offset: disabled [ 48.437269][ T8628] Rebooting in 86400 seconds..