[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 syzkaller login: [ 22.600532][ T8349] sshd (8349) used greatest stack depth: 10128 bytes left Warning: Permanently added '10.128.0.98' (ECDSA) to the list of known hosts. 2020/12/17 22:17:39 fuzzer started 2020/12/17 22:17:39 dialing manager at 10.128.0.105:35879 2020/12/17 22:17:39 syscalls: 3466 2020/12/17 22:17:39 code coverage: enabled 2020/12/17 22:17:39 comparison tracing: enabled 2020/12/17 22:17:39 extra coverage: enabled 2020/12/17 22:17:39 setuid sandbox: enabled 2020/12/17 22:17:39 namespace sandbox: enabled 2020/12/17 22:17:39 Android sandbox: /sys/fs/selinux/policy does not exist 2020/12/17 22:17:39 fault injection: enabled 2020/12/17 22:17:39 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/12/17 22:17:39 net packet injection: enabled 2020/12/17 22:17:39 net device setup: enabled 2020/12/17 22:17:39 concurrency sanitizer: enabled 2020/12/17 22:17:39 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/12/17 22:17:39 USB emulation: enabled 2020/12/17 22:17:39 hci packet injection: enabled 2020/12/17 22:17:39 wifi device emulation: enabled 2020/12/17 22:17:40 suppressing KCSAN reports in functions: '__xa_clear_mark' 'isolate_migratepages_block' 'do_nanosleep' 'filemap_map_pages' 22:17:43 executing program 0: r0 = socket$kcm(0x10, 0x10000000000003, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="2e00000018008103e00f80ecdb4cb92e0a000b2c000cd307e8bd6efb1200697ba00cba82bd81c933de71da06000e", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) [ 33.540077][ T8472] ================================================================== [ 33.548203][ T8472] BUG: KCSAN: data-race in atime_needs_update / propagate_one [ 33.555681][ T8472] [ 33.557992][ T8472] read-write to 0xffff888100cee0b0 of 4 bytes by task 8486 on cpu 1: [ 33.566078][ T8472] propagate_one+0x323/0x3f0 [ 33.570653][ T8472] propagate_mnt+0x2f8/0x650 [ 33.575217][ T8472] attach_recursive_mnt+0x4fb/0x1180 [ 33.580487][ T8472] path_mount+0x1aed/0x1c10 [ 33.585013][ T8472] __se_sys_mount+0x23d/0x2e0 [ 33.589694][ T8472] __x64_sys_mount+0x63/0x70 [ 33.594270][ T8472] do_syscall_64+0x39/0x80 [ 33.598784][ T8472] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 33.604664][ T8472] [ 33.608024][ T8472] read to 0xffff888100cee0b0 of 4 bytes by task 8472 on cpu 0: [ 33.615579][ T8472] atime_needs_update+0x1b7/0x370 [ 33.620595][ T8472] touch_atime+0x55/0x2d0 [ 33.624905][ T8472] generic_file_buffered_read+0x905/0x980 [ 33.630690][ T8472] generic_file_read_iter+0x80/0x3d0 [ 33.635966][ T8472] ext4_file_read_iter+0x2d0/0x420 [ 33.641052][ T8472] __kernel_read+0x307/0x560 [ 33.645630][ T8472] integrity_kernel_read+0x4c/0x70 [ 33.650715][ T8472] ima_calc_file_hash+0x956/0x1390 [ 33.655801][ T8472] ima_collect_measurement+0x168/0x300 [ 33.661239][ T8472] process_measurement+0x9f1/0x1050 [ 33.666419][ T8472] ima_file_check+0x72/0xa0 [ 33.670915][ T8472] path_openat+0x1887/0x20a0 [ 33.675483][ T8472] do_filp_open+0xbd/0x1d0 [ 33.679875][ T8472] do_sys_openat2+0xa3/0x240 [ 33.684442][ T8472] __x64_sys_openat+0xef/0x110 [ 33.689179][ T8472] do_syscall_64+0x39/0x80 [ 33.693569][ T8472] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 33.699454][ T8472] [ 33.701752][ T8472] Reported by Kernel Concurrency Sanitizer on: [ 33.707890][ T8472] CPU: 0 PID: 8472 Comm: syz-fuzzer Not tainted 5.10.0-syzkaller #0 [ 33.715851][ T8472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.725882][ T8472] ================================================================== [ 33.733927][ T8472] Kernel panic - not syncing: panic_on_warn set ... [ 33.740483][ T8472] CPU: 0 PID: 8472 Comm: syz-fuzzer Not tainted 5.10.0-syzkaller #0 [ 33.748434][ T8472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.758476][ T8472] Call Trace: [ 33.761745][ T8472] dump_stack+0x116/0x15d [ 33.766072][ T8472] panic+0x1e7/0x5fa [ 33.769954][ T8472] ? vprintk_emit+0x2e2/0x360 [ 33.774609][ T8472] kcsan_report+0x67b/0x680 [ 33.779117][ T8472] ? kcsan_setup_watchpoint+0x47b/0x4e0 [ 33.784652][ T8472] ? atime_needs_update+0x1b7/0x370 [ 33.789869][ T8472] ? touch_atime+0x55/0x2d0 [ 33.794398][ T8472] ? generic_file_buffered_read+0x905/0x980 [ 33.800282][ T8472] ? generic_file_read_iter+0x80/0x3d0 [ 33.805718][ T8472] ? ext4_file_read_iter+0x2d0/0x420 [ 33.811157][ T8472] ? __kernel_read+0x307/0x560 [ 33.815913][ T8472] ? integrity_kernel_read+0x4c/0x70 [ 33.821172][ T8472] ? ima_calc_file_hash+0x956/0x1390 [ 33.826440][ T8472] ? ima_collect_measurement+0x168/0x300 [ 33.832054][ T8472] ? process_measurement+0x9f1/0x1050 [ 33.837413][ T8472] ? ima_file_check+0x72/0xa0 [ 33.842076][ T8472] ? path_openat+0x1887/0x20a0 [ 33.846818][ T8472] ? do_filp_open+0xbd/0x1d0 [ 33.851384][ T8472] ? do_sys_openat2+0xa3/0x240 [ 33.856123][ T8472] ? __x64_sys_openat+0xef/0x110 [ 33.861122][ T8472] ? do_syscall_64+0x39/0x80 [ 33.865692][ T8472] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 33.871926][ T8472] kcsan_setup_watchpoint+0x47b/0x4e0 [ 33.877293][ T8472] atime_needs_update+0x1b7/0x370 [ 33.882305][ T8472] touch_atime+0x55/0x2d0 [ 33.886615][ T8472] generic_file_buffered_read+0x905/0x980 [ 33.892320][ T8472] generic_file_read_iter+0x80/0x3d0 [ 33.897584][ T8472] ext4_file_read_iter+0x2d0/0x420 [ 33.902690][ T8472] __kernel_read+0x307/0x560 [ 33.907285][ T8472] integrity_kernel_read+0x4c/0x70 [ 33.912375][ T8472] ima_calc_file_hash+0x956/0x1390 [ 33.917470][ T8472] ? integrity_audit_message+0x7b/0x280 [ 33.922992][ T8472] ? widen_string+0x3a/0x280 [ 33.927567][ T8472] ? format_decode+0x1d3/0x840 [ 33.932447][ T8472] ? string+0x1f9/0x210 [ 33.936586][ T8472] ? __down_read_common+0x14e/0x510 [ 33.941766][ T8472] ? ext4_xattr_ibody_get+0x68/0x630 [ 33.947052][ T8472] ? aa_get_newest_label+0x74/0x250 [ 33.952242][ T8472] ? apparmor_capable+0xfe/0x160 [ 33.957171][ T8472] ? ext4_xattr_get+0x27d/0x580 [ 33.962002][ T8472] ? ima_match_policy+0xa80/0xab0 [ 33.967018][ T8472] ima_collect_measurement+0x168/0x300 [ 33.972465][ T8472] process_measurement+0x9f1/0x1050 [ 33.977658][ T8472] ? dquot_file_open+0x68/0x80 [ 33.982401][ T8472] ? ext4_file_open+0x186/0x4f0 [ 33.987237][ T8472] ? aa_get_newest_label+0x74/0x250 [ 33.992517][ T8472] ? __rcu_read_unlock+0x51/0x250 [ 33.997517][ T8472] ? fsnotify_perm+0x296/0x2d0 [ 34.002260][ T8472] ? aa_get_task_label+0x72/0xc0 [ 34.007175][ T8472] ? apparmor_task_getsecid+0x81/0xa0 [ 34.012527][ T8472] ima_file_check+0x72/0xa0 [ 34.017008][ T8472] path_openat+0x1887/0x20a0 [ 34.021589][ T8472] do_filp_open+0xbd/0x1d0 [ 34.026504][ T8472] ? _raw_spin_unlock+0x22/0x40 [ 34.031345][ T8472] ? alloc_fd+0x35d/0x3b0 [ 34.035658][ T8472] do_sys_openat2+0xa3/0x240 [ 34.040261][ T8472] ? mem_cgroup_handle_over_high+0x34/0x4d0 [ 34.046272][ T8472] __x64_sys_openat+0xef/0x110 [ 34.051036][ T8472] do_syscall_64+0x39/0x80 [ 34.055428][ T8472] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 34.061338][ T8472] RIP: 0033:0x4b3d4a [ 34.065210][ T8472] Code: e8 5b a1 f8 ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 34.084884][ T8472] RSP: 002b:000000c0000ab808 EFLAGS: 00000216 ORIG_RAX: 0000000000000101 [ 34.093280][ T8472] RAX: ffffffffffffffda RBX: 000000c00002c000 RCX: 00000000004b3d4a [ 34.101233][ T8472] RDX: 0000000000080002 RSI: 000000c000874400 RDI: ffffffffffffff9c [ 34.109183][ T8472] RBP: 000000c0000ab880 R08: 0000000000000000 R09: 0000000000000000 [ 34.117130][ T8472] R10: 00000000000001a4 R11: 0000000000000216 R12: ffffffffffffffff [ 34.125093][ T8472] R13: 0000000000000021 R14: 0000000000000020 R15: 0000000000000100 [ 34.133580][ T8472] Kernel Offset: disabled [ 34.137893][ T8472] Rebooting in 86400 seconds..