[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.62' (ECDSA) to the list of known hosts. 2020/06/28 08:50:46 fuzzer started 2020/06/28 08:50:46 dialing manager at 10.128.0.105:43125 2020/06/28 08:50:46 syscalls: 3105 2020/06/28 08:50:46 code coverage: enabled 2020/06/28 08:50:46 comparison tracing: enabled 2020/06/28 08:50:46 extra coverage: enabled 2020/06/28 08:50:46 setuid sandbox: enabled 2020/06/28 08:50:46 namespace sandbox: enabled 2020/06/28 08:50:46 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/28 08:50:46 fault injection: enabled 2020/06/28 08:50:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/28 08:50:46 net packet injection: enabled 2020/06/28 08:50:46 net device setup: enabled 2020/06/28 08:50:46 concurrency sanitizer: enabled 2020/06/28 08:50:46 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/28 08:50:46 USB emulation: enabled 2020/06/28 08:50:47 suppressing KCSAN reports in functions: '__ext4_new_inode' 'ext4_free_inode' 'blk_mq_sched_dispatch_requests' 'do_epoll_wait' 08:50:50 executing program 0: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000001ffb)={'syz', 0x3, 0xd}, &(0x7f0000001fee)='R\trus\xac\x84cusgrVex:De', 0xfffffffffffffffe) syzkaller login: [ 36.552673][ T8652] ================================================================== [ 36.560781][ T8652] BUG: KCSAN: data-race in atime_needs_update / propagate_one [ 36.568215][ T8652] [ 36.570531][ T8652] write to 0xffff88812ac8c0b0 of 4 bytes by task 8669 on cpu 1: [ 36.576790][ T8669] IPVS: ftp: loaded support on port[0] = 21 [ 36.578145][ T8652] propagate_one+0x32d/0x400 [ 36.578157][ T8652] propagate_mnt+0x2f8/0x640 [ 36.578183][ T8652] attach_recursive_mnt+0x519/0x1210 [ 36.598449][ T8652] do_mount+0x1aa8/0x1bd0 [ 36.602767][ T8652] __se_sys_mount+0xd3/0x100 [ 36.607344][ T8652] __x64_sys_mount+0x63/0x70 [ 36.611924][ T8652] do_syscall_64+0x71/0x120 [ 36.616417][ T8652] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 36.622289][ T8652] [ 36.624607][ T8652] read to 0xffff88812ac8c0b0 of 4 bytes by task 8652 on cpu 0: [ 36.632140][ T8652] atime_needs_update+0x1b7/0x370 [ 36.637154][ T8652] touch_atime+0x53/0x1a0 [ 36.641471][ T8652] generic_file_buffered_read+0x167e/0x1750 [ 36.647359][ T8652] generic_file_read_iter+0x7d/0x3e0 [ 36.650906][ T8669] chnl_net:caif_netlink_parms(): no params data found [ 36.652667][ T8652] ext4_file_read_iter+0x2dd/0x410 [ 36.664485][ T8652] __vfs_read+0x2d5/0x330 [ 36.668801][ T8652] integrity_kernel_read+0xb4/0x100 [ 36.673984][ T8652] ima_calc_file_hash+0x9bf/0x13e0 [ 36.679086][ T8652] ima_collect_measurement+0x168/0x310 [ 36.684533][ T8652] process_measurement+0x9fc/0x1040 [ 36.689717][ T8652] ima_file_check+0x75/0xa0 [ 36.694232][ T8652] path_openat+0x18a2/0x20e0 [ 36.696370][ T8669] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.698806][ T8652] do_filp_open+0xbd/0x1d0 [ 36.698816][ T8652] do_sys_openat2+0x33c/0x4a0 [ 36.698831][ T8652] __x64_sys_openat+0xef/0x110 [ 36.705840][ T8669] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.710219][ T8652] do_syscall_64+0x71/0x120 [ 36.710230][ T8652] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 36.710239][ T8652] [ 36.719679][ T8669] device bridge_slave_0 entered promiscuous mode [ 36.726616][ T8652] Reported by Kernel Concurrency Sanitizer on: [ 36.732949][ T8669] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.736966][ T8652] CPU: 0 PID: 8652 Comm: syz-fuzzer Not tainted 5.8.0-rc2-syzkaller #0 [ 36.739895][ T8669] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.745569][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.752810][ T8669] device bridge_slave_1 entered promiscuous mode [ 36.758700][ T8652] ================================================================== [ 36.758707][ T8652] Kernel panic - not syncing: panic_on_warn set ... [ 36.758719][ T8652] CPU: 0 PID: 8652 Comm: syz-fuzzer Not tainted 5.8.0-rc2-syzkaller #0 [ 36.758740][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.778850][ T8669] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.784062][ T8652] Call Trace: [ 36.791948][ T8669] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.798415][ T8652] dump_stack+0x10f/0x19d [ 36.798434][ T8652] panic+0x1f8/0x63a [ 36.815907][ T8669] team0: Port device team_slave_0 added [ 36.823237][ T8652] ? vprintk_emit+0x44a/0x4f0 [ 36.823261][ T8652] kcsan_report+0x684/0x690 [ 36.833597][ T8669] team0: Port device team_slave_1 added [ 36.835530][ T8652] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 36.854532][ T8669] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.858198][ T8652] ? atime_needs_update+0x1b7/0x370 [ 36.858217][ T8652] ? touch_atime+0x53/0x1a0 [ 36.862870][ T8669] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.867344][ T8652] ? generic_file_buffered_read+0x167e/0x1750 [ 36.867356][ T8652] ? generic_file_read_iter+0x7d/0x3e0 [ 36.867377][ T8652] ? ext4_file_read_iter+0x2dd/0x410 [ 36.875177][ T8669] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.878406][ T8652] ? __vfs_read+0x2d5/0x330 [ 36.878419][ T8652] ? integrity_kernel_read+0xb4/0x100 [ 36.878436][ T8652] ? ima_calc_file_hash+0x9bf/0x13e0 [ 36.887929][ T8669] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.890543][ T8652] ? ima_collect_measurement+0x168/0x310 [ 36.895080][ T8669] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.920856][ T8652] ? process_measurement+0x9fc/0x1040 [ 36.920867][ T8652] ? ima_file_check+0x75/0xa0 [ 36.920884][ T8652] ? path_openat+0x18a2/0x20e0 [ 36.920902][ T8652] ? do_filp_open+0xbd/0x1d0 [ 36.928489][ T8669] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.932374][ T8652] ? do_sys_openat2+0x33c/0x4a0 [ 37.036027][ T8652] ? __x64_sys_openat+0xef/0x110 [ 37.040936][ T8652] ? do_syscall_64+0x71/0x120 [ 37.045597][ T8652] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 37.051644][ T8652] kcsan_setup_watchpoint+0x453/0x4d0 [ 37.056988][ T8652] atime_needs_update+0x1b7/0x370 [ 37.061994][ T8652] touch_atime+0x53/0x1a0 [ 37.066296][ T8652] generic_file_buffered_read+0x167e/0x1750 [ 37.072173][ T8652] generic_file_read_iter+0x7d/0x3e0 [ 37.077433][ T8652] ext4_file_read_iter+0x2dd/0x410 [ 37.082513][ T8652] __vfs_read+0x2d5/0x330 [ 37.086814][ T8652] integrity_kernel_read+0xb4/0x100 [ 37.091982][ T8652] ima_calc_file_hash+0x9bf/0x13e0 [ 37.097064][ T8652] ? __kmalloc+0x164/0x2d0 [ 37.101452][ T8652] ? should_fail+0x2a/0x250 [ 37.105928][ T8652] ? check_preemption_disabled+0x3f/0x1a0 [ 37.111618][ T8652] ? check_preemption_disabled+0x3f/0x1a0 [ 37.117309][ T8652] ? widen_string+0x3a/0x280 [ 37.121871][ T8652] ? constant_test_bit+0x25/0x30 [ 37.126798][ T8652] ? ext4_xattr_ibody_get+0x6e/0x610 [ 37.132053][ T8652] ? __rcu_read_unlock+0x34/0x260 [ 37.137047][ T8652] ? aa_get_newest_label+0x71/0x250 [ 37.142214][ T8652] ? apparmor_capable+0xfb/0x160 [ 37.147130][ T8652] ? ext4_xattr_get+0x268/0x560 [ 37.151958][ T8652] ? ima_match_policy+0xac0/0xb00 [ 37.156967][ T8652] ima_collect_measurement+0x168/0x310 [ 37.162397][ T8652] process_measurement+0x9fc/0x1040 [ 37.167590][ T8652] ? lockref_put_return+0xed/0x140 [ 37.172671][ T8652] ? dquot_file_open+0x68/0x80 [ 37.177407][ T8652] ? ext4_file_open+0x19f/0x3e0 [ 37.182244][ T8652] ? fsnotify_perm+0x1f6/0x250 [ 37.186988][ T8652] ? __rcu_read_unlock+0x4b/0x260 [ 37.191984][ T8652] ? aa_get_task_label+0x72/0xc0 [ 37.196891][ T8652] ? apparmor_task_getsecid+0x7e/0xa0 [ 37.202231][ T8652] ima_file_check+0x75/0xa0 [ 37.206718][ T8652] path_openat+0x18a2/0x20e0 [ 37.211278][ T8652] ? __ext4_mark_inode_dirty+0x2cf/0x3f0 [ 37.216884][ T8652] ? _raw_spin_unlock+0x2e/0x50 [ 37.221720][ T8652] ? __mark_inode_dirty+0x415/0x7d0 [ 37.226889][ T8652] do_filp_open+0xbd/0x1d0 [ 37.231276][ T8652] ? __check_object_size+0x237/0x2f0 [ 37.236534][ T8652] ? _raw_spin_unlock+0x2e/0x50 [ 37.241354][ T8652] ? __alloc_fd+0x33c/0x390 [ 37.245841][ T8652] do_sys_openat2+0x33c/0x4a0 [ 37.250489][ T8652] __x64_sys_openat+0xef/0x110 [ 37.255223][ T8652] do_syscall_64+0x71/0x120 [ 37.259696][ T8652] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 37.265557][ T8652] RIP: 0033:0x4b3d4a [ 37.269417][ T8652] Code: Bad RIP value. [ 37.273468][ T8652] RSP: 002b:000000c000203830 EFLAGS: 00000206 ORIG_RAX: 0000000000000101 [ 37.281859][ T8652] RAX: ffffffffffffffda RBX: 000000c00002c000 RCX: 00000000004b3d4a [ 37.289805][ T8652] RDX: 0000000000080002 RSI: 000000c00067e400 RDI: ffffffffffffff9c [ 37.297746][ T8652] RBP: 000000c0002038a8 R08: 0000000000000000 R09: 0000000000000000 [ 37.305685][ T8652] R10: 00000000000001a4 R11: 0000000000000206 R12: ffffffffffffffff [ 37.313638][ T8652] R13: 0000000000000021 R14: 0000000000000020 R15: 0000000000000100 [ 37.322167][ T8652] Kernel Offset: disabled [ 37.326472][ T8652] Rebooting in 86400 seconds..