Warning: Permanently added '10.128.10.17' (ECDSA) to the list of known hosts. 2020/12/31 02:20:05 fuzzer started 2020/12/31 02:20:05 dialing manager at 10.128.0.105:39703 2020/12/31 02:20:08 syscalls: 3466 2020/12/31 02:20:08 code coverage: enabled 2020/12/31 02:20:08 comparison tracing: enabled 2020/12/31 02:20:08 extra coverage: enabled 2020/12/31 02:20:08 setuid sandbox: enabled 2020/12/31 02:20:08 namespace sandbox: enabled 2020/12/31 02:20:08 Android sandbox: /sys/fs/selinux/policy does not exist 2020/12/31 02:20:08 fault injection: enabled 2020/12/31 02:20:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/12/31 02:20:08 net packet injection: enabled 2020/12/31 02:20:08 net device setup: enabled 2020/12/31 02:20:08 concurrency sanitizer: enabled 2020/12/31 02:20:08 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/12/31 02:20:08 USB emulation: enabled 2020/12/31 02:20:08 hci packet injection: enabled 2020/12/31 02:20:08 wifi device emulation: enabled 2020/12/31 02:20:09 suppressing KCSAN reports in functions: 'ext4_free_inode' '__ext4_new_inode' 'futex_wait_queue_me' 'blk_mq_rq_ctx_init' 'ext4_free_inodes_count' '__xa_clear_mark' 'blk_mq_dispatch_rq_list' 'ext4_mb_good_group' 'generic_file_buffered_read' 'dd_has_work' 'wbt_issue' 'complete_signal' 'ext4_writepages' 'do_signal_stop' 'tick_nohz_next_event' 'do_select' 'generic_write_end' 'kauditd_thread' 'blk_mq_request_bypass_insert' '_prb_read_valid' 'audit_log_start' 'blk_mq_sched_dispatch_requests' 'alloc_pid' 'ext4_mark_iloc_dirty' 'n_tty_receive_buf_common' 02:20:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="66530700ae897094e71b0fb1f138a925d86800278dcff47d01000067dd32378f364602812c66538d75000000000000000000bb9fb045f2d1eaa302ab6c2fef23631e3ea1315b9532f3af2f5e153eb78020fa00eb29884a07da1f7cbee7547a405704878afe50a73a66faff77be062c5d8d5ac1adf5ce37ff15e457920611a4210db259a7a63f09bf0945a8e47e4dcfd6d49061492187ca54b888b8cba803db8e99a6ff2b67279214ef6168bf6a4b6d28e4bb588c2cc22aa223418a41d5fcab3cd7c8ea0b08f9dc4087da8ea261471f1d3adf58b585baee2bb43b", 0xda}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) syzkaller login: [ 61.024353][ T8470] ================================================================== [ 61.032511][ T8470] BUG: KCSAN: data-race in tomoyo_domain_quota_is_ok / tomoyo_merge_path_acl [ 61.041270][ T8470] [ 61.043609][ T8470] write to 0xffff88810b78d1da of 2 bytes by task 8453 on cpu 0: [ 61.051245][ T8470] tomoyo_merge_path_acl+0x4c/0x70 [ 61.056351][ T8470] tomoyo_update_domain+0x337/0x3a0 [ 61.061545][ T8470] tomoyo_write_file+0x210/0x910 [ 61.066503][ T8470] tomoyo_supervisor+0xaad/0xb20 [ 61.071443][ T8470] tomoyo_path_perm+0x261/0x330 [ 61.076294][ T8470] tomoyo_path_truncate+0x18/0x20 [ 61.081322][ T8470] security_path_truncate+0x7f/0xd0 [ 61.086517][ T8470] do_sys_ftruncate+0x38d/0x530 [ 61.091371][ T8470] __x64_sys_ftruncate+0x2f/0x40 [ 61.096301][ T8470] do_syscall_64+0x39/0x80 [ 61.100731][ T8470] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 61.106642][ T8470] [ 61.108958][ T8470] read to 0xffff88810b78d1da of 2 bytes by task 8470 on cpu 1: [ 61.116498][ T8470] tomoyo_domain_quota_is_ok+0xd7/0x2d0 [ 61.122041][ T8470] tomoyo_supervisor+0x1f4/0xb20 [ 61.126978][ T8470] tomoyo_execute_permission+0x169/0x190 [ 61.132607][ T8470] tomoyo_find_next_domain+0x213/0x10a0 [ 61.138150][ T8470] tomoyo_bprm_check_security+0x96/0xd0 [ 61.143695][ T8470] security_bprm_check+0x3f/0x90 [ 61.148627][ T8470] exec_binprm+0x143/0x720 [ 61.153042][ T8470] bprm_execve+0x37e/0x4f0 [ 61.157454][ T8470] do_execveat_common+0x60c/0x6c0 [ 61.162484][ T8470] __x64_sys_execve+0x56/0x70 [ 61.167157][ T8470] do_syscall_64+0x39/0x80 [ 61.171574][ T8470] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 61.177465][ T8470] [ 61.179796][ T8470] Reported by Kernel Concurrency Sanitizer on: [ 61.185933][ T8470] CPU: 1 PID: 8470 Comm: syz-fuzzer Not tainted 5.11.0-rc1-syzkaller #0 [ 61.194257][ T8470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.204324][ T8470] ================================================================== [ 61.212987][ T8470] Kernel panic - not syncing: panic_on_warn set ... [ 61.219575][ T8470] CPU: 1 PID: 8470 Comm: syz-fuzzer Not tainted 5.11.0-rc1-syzkaller #0 [ 61.227917][ T8470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.237968][ T8470] Call Trace: [ 61.241243][ T8470] dump_stack+0x116/0x15d [ 61.245573][ T8470] panic+0x1e7/0x5fa [ 61.249471][ T8470] ? vprintk_emit+0x2e2/0x360 [ 61.254151][ T8470] kcsan_report+0x67b/0x680 [ 61.258676][ T8470] ? kcsan_setup_watchpoint+0x47b/0x4e0 [ 61.264219][ T8470] ? tomoyo_domain_quota_is_ok+0xd7/0x2d0 [ 61.269935][ T8470] ? tomoyo_supervisor+0x1f4/0xb20 [ 61.275066][ T8470] ? tomoyo_execute_permission+0x169/0x190 [ 61.280872][ T8470] ? tomoyo_find_next_domain+0x213/0x10a0 [ 61.286587][ T8470] ? tomoyo_bprm_check_security+0x96/0xd0 [ 61.292399][ T8470] ? security_bprm_check+0x3f/0x90 [ 61.297509][ T8470] ? exec_binprm+0x143/0x720 [ 61.302100][ T8470] ? bprm_execve+0x37e/0x4f0 [ 61.306692][ T8470] ? do_execveat_common+0x60c/0x6c0 [ 61.311893][ T8470] ? __x64_sys_execve+0x56/0x70 [ 61.316762][ T8470] ? do_syscall_64+0x39/0x80 [ 61.321352][ T8470] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 61.327430][ T8470] ? irqentry_exit+0x2a/0x40 [ 61.332039][ T8470] ? sysvec_apic_timer_interrupt+0x80/0x90 [ 61.337858][ T8470] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 61.344026][ T8470] kcsan_setup_watchpoint+0x47b/0x4e0 [ 61.349408][ T8470] tomoyo_domain_quota_is_ok+0xd7/0x2d0 [ 61.354970][ T8470] tomoyo_supervisor+0x1f4/0xb20 [ 61.359906][ T8470] ? tomoyo_execute_permission+0x190/0x190 [ 61.365729][ T8470] tomoyo_execute_permission+0x169/0x190 [ 61.371362][ T8470] tomoyo_find_next_domain+0x213/0x10a0 [ 61.376906][ T8470] tomoyo_bprm_check_security+0x96/0xd0 [ 61.382459][ T8470] security_bprm_check+0x3f/0x90 [ 61.387399][ T8470] exec_binprm+0x143/0x720 [ 61.391825][ T8470] bprm_execve+0x37e/0x4f0 [ 61.396244][ T8470] do_execveat_common+0x60c/0x6c0 [ 61.401289][ T8470] __x64_sys_execve+0x56/0x70 [ 61.405967][ T8470] do_syscall_64+0x39/0x80 [ 61.410405][ T8470] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 61.416305][ T8470] RIP: 0033:0x4b1196 [ 61.420194][ T8470] Code: 48 c7 44 24 50 00 00 00 00 e8 96 c5 f8 ff c3 cc cc cc cc cc 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 1b 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 61.439797][ T8470] RSP: 002b:000000c00a305378 EFLAGS: 00000202 ORIG_RAX: 000000000000003b [ 61.448474][ T8470] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004b1196 [ 61.456438][ T8470] RDX: 000000c0045ffab0 RSI: 000000c004838160 RDI: 000000c0076599c0 [ 61.464411][ T8470] RBP: 000000c00a305518 R08: 0000000000000008 R09: 0000000000000000 [ 61.472407][ T8470] R10: 0000000000000000 R11: 0000000000000202 R12: 00000000004a89c7 [ 61.480385][ T8470] R13: 000000000000000b R14: 000000000000000a R15: 00000000000000aa [ 61.488838][ T8470] Kernel Offset: disabled [ 61.493156][ T8470] Rebooting in 86400 seconds..