[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.14' (ECDSA) to the list of known hosts. 2020/12/07 19:14:27 fuzzer started 2020/12/07 19:14:28 dialing manager at 10.128.0.105:38951 2020/12/07 19:14:28 syscalls: 3454 2020/12/07 19:14:28 code coverage: enabled 2020/12/07 19:14:28 comparison tracing: enabled 2020/12/07 19:14:28 extra coverage: enabled 2020/12/07 19:14:28 setuid sandbox: enabled 2020/12/07 19:14:28 namespace sandbox: enabled 2020/12/07 19:14:28 Android sandbox: /sys/fs/selinux/policy does not exist 2020/12/07 19:14:28 fault injection: enabled 2020/12/07 19:14:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/12/07 19:14:28 net packet injection: enabled 2020/12/07 19:14:28 net device setup: enabled 2020/12/07 19:14:28 concurrency sanitizer: enabled 2020/12/07 19:14:28 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/12/07 19:14:28 USB emulation: enabled 2020/12/07 19:14:28 hci packet injection: enabled 2020/12/07 19:14:28 wifi device emulation: enabled 2020/12/07 19:14:33 suppressing KCSAN reports in functions: '__io_cqring_fill_event' 'blk_mq_dispatch_rq_list' 'futex_wait_queue_me' '__delete_from_page_cache' 'iptunnel_xmit' 'exit_mm' 'pcpu_alloc' 'audit_log_start' 'shmem_unlink' 'wg_packet_decrypt_worker' 'io_sq_thread' 'blk_stat_add' 'tick_nohz_stop_tick' 'ondemand_readahead' 'n_tty_receive_buf_common' 'do_sys_poll' '__mod_timer' '_prb_read_valid' 'dd_has_work' '__ext4_update_other_inode_time' 'ext4_file_write_iter' 'ext4_mb_good_group' 'blk_mq_rq_ctx_init' 'alloc_pid' 'generic_write_end' '__mark_inode_dirty' '__send_signal' 'ext4_ext_insert_extent' 'snd_rawmidi_poll' 'xas_find_marked' 'lookup_fast' 'ext4_writepages' '__snd_pcm_lib_xfer' 'ext4_free_inodes_count' 'do_select' 'ext4_mb_regular_allocator' 'xas_clear_mark' 'ext4_ext_try_to_merge_right' 'lru_add_drain_all' 'generic_file_buffered_read' '__bpf_lru_list_rotate' 'ext4_mark_iloc_dirty' '__blkdev_put' '__xa_clear_mark' '__ext4_new_inode' 'complete_signal' 'blk_mq_sched_dispatch_requests' '__writeback_single_inode' 'bond_enslave' 'ext4_setattr' 'expire_timers' '__dentry_kill' 'dev_fetch_sw_netstats' 'n_tty_receive_char_inline' 'do_signal_stop' 'isolate_migratepages_block' 'bpf_lru_pop_free' 'kauditd_thread' '__add_to_page_cache_locked' '__blk_mq_sched_dispatch_requests' '__filemap_fdatawrite_range' 'file_remove_privs' 'do_nanosleep' 'fsnotify' 'ext4_mb_initialize_context' 'shmem_getpage_gfp' 'dput' 'ext4_free_inode' 'find_get_pages_range_tag' '__fsnotify_parent' 'shmem_mknod' 19:16:09 executing program 0: syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x0, 0x0) 19:16:09 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f00000017c0)='ns/user\x00') 19:16:09 executing program 2: pipe(&(0x7f00000021c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 19:16:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, 0x0, 0x0, 0x0) 19:16:10 executing program 4: timer_create(0x0, 0x0, &(0x7f0000000180)=0x0) timer_settime(r0, 0x1, &(0x7f00000001c0)={{}, {0x77359400}}, &(0x7f0000000200)) 19:16:10 executing program 5: pipe(&(0x7f00000021c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_INIT(r0, 0x0, 0x0) syzkaller login: [ 133.329483][ T8468] IPVS: ftp: loaded support on port[0] = 21 [ 133.358359][ T4888] ================================================================== [ 133.366467][ T4888] BUG: KCSAN: data-race in page_cache_ra_unbounded / proc_task_name [ 133.374432][ T4888] [ 133.376747][ T4888] write to 0xffff888100be4064 of 4 bytes by task 1 on cpu 1: [ 133.384105][ T4888] page_cache_ra_unbounded+0x484/0x4c0 [ 133.389553][ T4888] ondemand_readahead+0x560/0x780 [ 133.394559][ T4888] page_cache_sync_ra+0x1ab/0x1c0 [ 133.399568][ T4888] generic_file_buffered_read+0x388/0x23a0 [ 133.405467][ T4888] generic_file_read_iter+0x80/0x3d0 [ 133.411608][ T4888] ext4_file_read_iter+0x2d0/0x420 [ 133.415128][ T8468] chnl_net:caif_netlink_parms(): no params data found [ 133.416732][ T4888] __kernel_read+0x307/0x560 [ 133.416743][ T4888] integrity_kernel_read+0x4c/0x70 [ 133.416758][ T4888] ima_calc_file_hash+0x9c7/0x1430 [ 133.416775][ T4888] ima_collect_measurement+0x168/0x300 [ 133.443705][ T4888] process_measurement+0x9f1/0x1050 [ 133.448895][ T4888] ima_file_check+0x72/0xa0 [ 133.453385][ T4888] path_openat+0x1887/0x20a0 [ 133.457958][ T4888] do_filp_open+0xbd/0x1d0 [ 133.462367][ T4888] do_sys_openat2+0xa3/0x240 [ 133.466936][ T4888] __x64_sys_open+0xe2/0x110 [ 133.471511][ T4888] do_syscall_64+0x39/0x80 [ 133.475918][ T4888] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 133.481778][ T4888] [ 133.484095][ T4888] read to 0xffff888100be4064 of 4 bytes by task 4888 on cpu 0: [ 133.491609][ T4888] proc_task_name+0x3b/0x1e0 [ 133.496174][ T4888] comm_show+0x45/0xd0 [ 133.500217][ T4888] seq_read_iter+0x2ef/0x8e0 [ 133.504797][ T4888] seq_read+0x221/0x260 [ 133.508925][ T4888] vfs_read+0x154/0x5c0 [ 133.513082][ T4888] ksys_read+0xce/0x180 [ 133.517226][ T4888] __x64_sys_read+0x3e/0x50 [ 133.521705][ T4888] do_syscall_64+0x39/0x80 [ 133.526272][ T4888] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 133.532145][ T4888] [ 133.534465][ T4888] Reported by Kernel Concurrency Sanitizer on: [ 133.540593][ T4888] CPU: 0 PID: 4888 Comm: systemd-journal Not tainted 5.10.0-rc7-syzkaller #0 [ 133.549320][ T4888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.559349][ T4888] ================================================================== [ 133.567382][ T4888] Kernel panic - not syncing: panic_on_warn set ... [ 133.573944][ T4888] CPU: 0 PID: 4888 Comm: systemd-journal Not tainted 5.10.0-rc7-syzkaller #0 [ 133.582673][ T4888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.592702][ T4888] Call Trace: [ 133.596059][ T4888] dump_stack+0x116/0x15d [ 133.600366][ T4888] panic+0x1e7/0x5fa [ 133.604237][ T4888] ? vprintk_emit+0x2f2/0x370 [ 133.608993][ T4888] kcsan_report+0x67b/0x680 [ 133.613473][ T4888] ? vsnprintf+0xe3f/0xe80 [ 133.617869][ T4888] ? kcsan_setup_watchpoint+0x46a/0x4d0 [ 133.623391][ T4888] ? proc_task_name+0x3b/0x1e0 [ 133.628128][ T4888] ? comm_show+0x45/0xd0 [ 133.632344][ T4888] ? seq_read_iter+0x2ef/0x8e0 [ 133.637080][ T4888] ? seq_read+0x221/0x260 [ 133.641396][ T4888] ? vfs_read+0x154/0x5c0 [ 133.645696][ T4888] ? ksys_read+0xce/0x180 [ 133.649998][ T4888] ? __x64_sys_read+0x3e/0x50 [ 133.654676][ T4888] ? do_syscall_64+0x39/0x80 [ 133.659251][ T4888] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 133.665297][ T4888] kcsan_setup_watchpoint+0x46a/0x4d0 [ 133.670644][ T4888] proc_task_name+0x3b/0x1e0 [ 133.675227][ T4888] ? __rcu_read_unlock+0x51/0x220 [ 133.680227][ T4888] comm_show+0x45/0xd0 [ 133.684285][ T4888] seq_read_iter+0x2ef/0x8e0 [ 133.688849][ T4888] seq_read+0x221/0x260 [ 133.692979][ T4888] ? seq_open+0xe0/0xe0 [ 133.697206][ T4888] vfs_read+0x154/0x5c0 [ 133.701339][ T4888] ? __fget_light+0xd0/0x260 [ 133.705903][ T4888] ksys_read+0xce/0x180 [ 133.710034][ T4888] __x64_sys_read+0x3e/0x50 [ 133.714513][ T4888] do_syscall_64+0x39/0x80 [ 133.718904][ T4888] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 133.724770][ T4888] RIP: 0033:0x7f00f3fc4910 [ 133.729164][ T4888] Code: b6 fe ff ff 48 8d 3d 0f be 08 00 48 83 ec 08 e8 06 db 01 00 66 0f 1f 44 00 00 83 3d f9 2d 2c 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 de 9b 01 00 48 89 04 24 [ 133.748741][ T4888] RSP: 002b:00007ffd6d3aa908 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 133.757228][ T4888] RAX: ffffffffffffffda RBX: 00005560edb523f0 RCX: 00007f00f3fc4910 [ 133.765174][ T4888] RDX: 0000000000000400 RSI: 00005560edb52620 RDI: 0000000000000016 [ 133.773120][ T4888] RBP: 0000000000000d68 R08: 0000000000000003 R09: 0000000000000410 [ 133.781067][ T4888] R10: 0000000000080000 R11: 0000000000000246 R12: 00007f00f427f440 [ 133.789016][ T4888] R13: 00007f00f427e900 R14: 00007ffd6d3ab4e0 R15: 00005560edb523f0 [ 133.797553][ T4888] Kernel Offset: disabled [ 133.801860][ T4888] Rebooting in 86400 seconds..