syzbot


KCSAN: data-race in audit_log_start / audit_receive (2)

Status: moderation: reported on 2024/10/29 00:09
Subsystems: audit
[Documentation on labels]
Reported-by: syzbot+e751e63da0e5582b4021@syzkaller.appspotmail.com
First crash: 37d, last: 7d05h
Similar bugs (1)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream KCSAN: data-race in audit_log_start / audit_receive kernel 1 1095d 1095d 0/28 auto-closed as invalid on 2022/01/10 10:36

Sample crash report:
==================================================================
BUG: KCSAN: data-race in audit_log_start / audit_receive

write to 0xffffffff88bf21e0 of 8 bytes by task 7215 on cpu 0:
 audit_ctl_unlock kernel/audit.c:243 [inline]
 audit_receive+0x28e4/0x2a20 kernel/audit.c:1581
 netlink_unicast_kernel net/netlink/af_netlink.c:1321 [inline]
 netlink_unicast+0x599/0x670 net/netlink/af_netlink.c:1347
 netlink_sendmsg+0x5cc/0x6e0 net/netlink/af_netlink.c:1891
 sock_sendmsg_nosec net/socket.c:711 [inline]
 __sock_sendmsg+0x140/0x180 net/socket.c:726
 ____sys_sendmsg+0x312/0x410 net/socket.c:2583
 ___sys_sendmsg net/socket.c:2637 [inline]
 __sys_sendmsg+0x19d/0x230 net/socket.c:2669
 __do_sys_sendmsg net/socket.c:2674 [inline]
 __se_sys_sendmsg net/socket.c:2672 [inline]
 __x64_sys_sendmsg+0x46/0x50 net/socket.c:2672
 x64_sys_call+0x2734/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:47
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

read to 0xffffffff88bf21e0 of 8 bytes by task 7214 on cpu 1:
 audit_ctl_owner_current kernel/audit.c:256 [inline]
 audit_log_start+0x129/0x6b0 kernel/audit.c:1881
 audit_seccomp+0x4b/0x130 kernel/auditsc.c:3006
 seccomp_log kernel/seccomp.c:1016 [inline]
 __seccomp_filter+0x6fa/0x1180 kernel/seccomp.c:1305
 __secure_computing+0x9f/0x1c0 kernel/seccomp.c:1367
 syscall_trace_enter+0xd1/0x1f0 kernel/entry/common.c:52
 syscall_enter_from_user_mode_work include/linux/entry-common.h:169 [inline]
 syscall_enter_from_user_mode include/linux/entry-common.h:199 [inline]
 do_syscall_64+0xaa/0x1c0 arch/x86/entry/common.c:79
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

value changed: 0xffff888101799080 -> 0x0000000000000000

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 UID: 0 PID: 7214 Comm: syz.1.1408 Not tainted 6.12.0-syzkaller-10553-gb86545e02e8c #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================

Crashes (3):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/11/28 13:47 upstream b86545e02e8c 5df23865 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-kcsan-gce KCSAN: data-race in audit_log_start / audit_receive
2024/10/29 23:19 upstream e42b1a9a2557 66aeb999 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-kcsan-gce KCSAN: data-race in audit_log_start / audit_receive
2024/10/29 00:08 upstream 819837584309 9efb3cc7 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-kcsan-gce KCSAN: data-race in audit_log_start / audit_receive
* Struck through repros no longer work on HEAD.