[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.15.205' (ECDSA) to the list of known hosts. 2020/05/01 10:44:32 fuzzer started 2020/05/01 10:44:33 dialing manager at 10.128.0.105:38857 2020/05/01 10:44:33 syscalls: 2964 2020/05/01 10:44:33 code coverage: enabled 2020/05/01 10:44:33 comparison tracing: enabled 2020/05/01 10:44:33 extra coverage: enabled 2020/05/01 10:44:33 setuid sandbox: enabled 2020/05/01 10:44:33 namespace sandbox: enabled 2020/05/01 10:44:33 Android sandbox: /sys/fs/selinux/policy does not exist 2020/05/01 10:44:33 fault injection: enabled 2020/05/01 10:44:33 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/01 10:44:33 net packet injection: enabled 2020/05/01 10:44:33 net device setup: enabled 2020/05/01 10:44:33 concurrency sanitizer: enabled 2020/05/01 10:44:33 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/01 10:44:33 USB emulation: /dev/raw-gadget does not exist syzkaller login: [ 44.364144][ T6725] KCSAN: could not find function: '_find_next_bit' 2020/05/01 10:44:36 adding functions to KCSAN blacklist: 'mod_timer' 'generic_write_end' 'copy_process' 'tick_sched_do_timer' 'alloc_pid' 'ext4_mark_iloc_dirty' 'generic_fillattr' 'blk_mq_sched_dispatch_requests' 'echo_char' 'page_counter_charge' 'tick_nohz_idle_stop_tick' 'do_nanosleep' '_find_next_bit' 'pipe_double_lock' 'ext4_free_inodes_count' '__delete_from_page_cache' 'blk_mq_request_bypass_insert' 'blk_mq_get_request' 'ep_poll' 'futex_wait_queue_me' 'xas_clear_mark' 'dd_has_work' 'find_get_pages_range_tag' 'blk_mq_dispatch_rq_list' 'run_timer_softirq' 'generic_update_time' '__ext4_new_inode' 'kcm_rfree' 'add_timer' 10:46:51 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0x40001, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x1410c2, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) [ 181.291333][ T6713] ================================================================== [ 181.299487][ T6713] BUG: KCSAN: data-race in atime_needs_update / propagate_one [ 181.306978][ T6713] [ 181.309310][ T6713] write to 0xffff88812b733430 of 4 bytes by task 6729 on cpu 1: [ 181.316939][ T6713] propagate_one+0x3b3/0x550 [ 181.321519][ T6713] propagate_mnt+0x22e/0x270 [ 181.326161][ T6729] IPVS: ftp: loaded support on port[0] = 21 [ 181.326217][ T6713] attach_recursive_mnt+0x66d/0x8a0 [ 181.337273][ T6713] graft_tree+0x107/0x160 [ 181.341620][ T6713] do_add_mount.isra.0+0x102/0x190 [ 181.346729][ T6713] do_mount+0x12d5/0x1590 [ 181.351052][ T6713] __x64_sys_mount+0x12b/0x1a0 [ 181.355828][ T6713] do_syscall_64+0xc7/0x3b0 [ 181.360327][ T6713] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 181.366203][ T6713] [ 181.368530][ T6713] read to 0xffff88812b733430 of 4 bytes by task 6713 on cpu 0: [ 181.376073][ T6713] atime_needs_update+0x13e/0x360 [ 181.381102][ T6713] touch_atime+0x63/0x150 [ 181.385463][ T6713] generic_file_read_iter+0x11b0/0x14e0 [ 181.387527][ T6729] chnl_net:caif_netlink_parms(): no params data found [ 181.391006][ T6713] ext4_file_read_iter+0x103/0x360 [ 181.403290][ T6713] new_sync_read+0x306/0x450 [ 181.407872][ T6713] __vfs_read+0x9e/0xb0 [ 181.412026][ T6713] integrity_kernel_read+0x97/0xe0 [ 181.417133][ T6713] ima_calc_file_hash_tfm+0x18f/0x240 [ 181.422487][ T6713] ima_calc_file_hash+0x147/0xeb0 [ 181.427510][ T6713] ima_collect_measurement+0x385/0x3b0 [ 181.432984][ T6713] process_measurement+0x91a/0x1000 [ 181.438183][ T6713] ima_file_check+0x7e/0xb0 [ 181.442771][ T6713] path_openat+0x176e/0x23d0 [ 181.447363][ T6713] do_filp_open+0x11e/0x1b0 [ 181.451875][ T6713] do_sys_openat2+0x52e/0x680 [ 181.456644][ T6713] do_sys_open+0xa2/0x110 [ 181.460990][ T6713] __x64_sys_openat+0x5d/0x70 [ 181.465722][ T6713] do_syscall_64+0xc7/0x3b0 [ 181.470265][ T6713] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 181.476157][ T6713] [ 181.478480][ T6713] Reported by Kernel Concurrency Sanitizer on: [ 181.484636][ T6713] CPU: 0 PID: 6713 Comm: syz-fuzzer Not tainted 5.7.0-rc1-syzkaller #0 [ 181.493388][ T6713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.504051][ T6713] ================================================================== [ 181.506581][ T6729] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.512458][ T6713] Kernel panic - not syncing: panic_on_warn set ... [ 181.512472][ T6713] CPU: 0 PID: 6713 Comm: syz-fuzzer Not tainted 5.7.0-rc1-syzkaller #0 [ 181.512488][ T6713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.519801][ T6729] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.526071][ T6713] Call Trace: [ 181.526093][ T6713] dump_stack+0x11d/0x187 [ 181.526110][ T6713] panic+0x210/0x640 [ 181.526134][ T6713] ? vprintk_func+0x89/0x13a [ 181.543338][ T6729] device bridge_slave_0 entered promiscuous mode [ 181.544485][ T6713] kcsan_report.cold+0xc/0x1a [ 181.553108][ T6729] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.554770][ T6713] kcsan_setup_watchpoint+0x3fb/0x440 [ 181.554801][ T6713] atime_needs_update+0x13e/0x360 [ 181.560623][ T6729] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.563001][ T6713] touch_atime+0x63/0x150 [ 181.568902][ T6729] device bridge_slave_1 entered promiscuous mode [ 181.573871][ T6713] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 181.573892][ T6713] generic_file_read_iter+0x11b0/0x14e0 [ 181.573993][ T6713] ext4_file_read_iter+0x103/0x360 [ 181.593838][ T6729] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 181.596283][ T6713] new_sync_read+0x306/0x450 [ 181.605248][ T6729] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 181.607632][ T6713] __vfs_read+0x9e/0xb0 [ 181.627659][ T6729] team0: Port device team_slave_0 added [ 181.630477][ T6713] integrity_kernel_read+0x97/0xe0 [ 181.641391][ T6729] team0: Port device team_slave_1 added [ 181.644069][ T6713] ima_calc_file_hash_tfm+0x18f/0x240 [ 181.644098][ T6713] ? should_fail+0x7c/0x2fd [ 181.666717][ T6729] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 181.667843][ T6713] ? widen_string+0x48/0x190 [ 181.673799][ T6729] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.678717][ T6713] ? string_nocheck+0xe1/0x100 [ 181.683188][ T6729] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 181.690096][ T6713] ? format_decode+0x19c/0xaa0 [ 181.690112][ T6713] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 181.690125][ T6713] ? tomoyo_profile+0x3f/0x50 [ 181.690139][ T6713] ? __rcu_read_unlock+0x77/0x390 [ 181.690158][ T6713] ? tomoyo_write_log2+0x64/0x580 [ 181.690183][ T6713] ? setuid_policy_lookup+0xdf/0x110 [ 181.699206][ T6729] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 181.720693][ T6713] ima_calc_file_hash+0x147/0xeb0 [ 181.720715][ T6713] ? up_read+0x42/0x90 [ 181.720733][ T6713] ? ext4_xattr_get+0x10b/0x600 [ 181.720759][ T6713] ima_collect_measurement+0x385/0x3b0 [ 181.726981][ T6729] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.735990][ T6713] process_measurement+0x91a/0x1000 [ 181.736018][ T6713] ? dquot_file_open+0x60/0x80 [ 181.741914][ T6729] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 181.746646][ T6713] ? ext4_file_open+0x109/0x440 [ 181.746664][ T6713] ? __rcu_read_unlock+0x77/0x390 [ 181.746688][ T6713] ? aa_get_task_label+0x1ee/0x370 [ 181.854278][ T6713] ima_file_check+0x7e/0xb0 [ 181.858890][ T6713] path_openat+0x176e/0x23d0 [ 181.863504][ T6713] ? ext4_journal_check_start+0xf8/0x160 [ 181.869636][ T6713] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 181.875554][ T6713] ? constant_test_bit+0xd/0x30 [ 181.880384][ T6713] ? wb_io_lists_populated+0x88/0xa0 [ 181.885655][ T6713] ? _raw_spin_unlock+0x38/0x60 [ 181.890483][ T6713] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 181.896367][ T6713] do_filp_open+0x11e/0x1b0 [ 181.900938][ T6713] ? _find_next_bit.constprop.0+0x126/0x160 [ 181.906839][ T6713] ? __read_once_size+0x2f/0xd0 [ 181.911762][ T6713] ? _raw_spin_unlock+0x38/0x60 [ 181.916592][ T6713] ? __alloc_fd+0x2f3/0x3b0 [ 181.921081][ T6713] do_sys_openat2+0x52e/0x680 [ 181.925756][ T6713] do_sys_open+0xa2/0x110 [ 181.930072][ T6713] __x64_sys_openat+0x5d/0x70 [ 181.934736][ T6713] do_syscall_64+0xc7/0x3b0 [ 181.939230][ T6713] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 181.945724][ T6713] RIP: 0033:0x47c5aa [ 181.949603][ T6713] Code: e8 7b 6b fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 181.969190][ T6713] RSP: 002b:000000c435477850 EFLAGS: 00000206 ORIG_RAX: 0000000000000101 [ 181.977597][ T6713] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047c5aa [ 181.985561][ T6713] RDX: 0000000000080002 RSI: 000000c435026500 RDI: ffffffffffffff9c [ 181.993629][ T6713] RBP: 000000c4354778d0 R08: 0000000000000000 R09: 0000000000000000 [ 182.001582][ T6713] R10: 00000000000001a4 R11: 0000000000000206 R12: ffffffffffffffff [ 182.009932][ T6713] R13: 0000000000000029 R14: 0000000000000028 R15: 0000000000000100 [ 182.019070][ T6713] Kernel Offset: disabled [ 182.023387][ T6713] Rebooting in 86400 seconds..