Warning: Permanently added '10.128.0.250' (ECDSA) to the list of known hosts. 2019/11/05 00:03:01 fuzzer started 2019/11/05 00:03:02 dialing manager at 10.128.0.105:37793 2019/11/05 00:03:02 checking machine... 2019/11/05 00:03:02 checking revisions... 2019/11/05 00:03:02 testing simple program... syzkaller login: [ 62.471734][ T8028] IPVS: ftp: loaded support on port[0] = 21 2019/11/05 00:03:03 building call list... executing program [ 65.574723][ T8015] can: request_module (can-proto-0) failed. [ 65.587111][ T8015] can: request_module (can-proto-0) failed. [ 65.598532][ T8015] can: request_module (can-proto-7) failed. [ 65.610391][ T8015] can: request_module (can-proto-0) failed. 2019/11/05 00:03:09 syscalls: 2553 2019/11/05 00:03:09 code coverage: enabled 2019/11/05 00:03:09 comparison tracing: enabled 2019/11/05 00:03:09 extra coverage: extra coverage is not supported by the kernel 2019/11/05 00:03:09 setuid sandbox: enabled 2019/11/05 00:03:09 namespace sandbox: enabled 2019/11/05 00:03:09 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/05 00:03:09 fault injection: enabled 2019/11/05 00:03:09 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/05 00:03:09 net packet injection: enabled 2019/11/05 00:03:09 net device setup: enabled 2019/11/05 00:03:09 concurrency sanitizer: enabled 2019/11/05 00:03:09 devlink PCI setup: PCI device 0000:00:10.0 is not available 00:03:10 executing program 0: set_mempolicy(0x2, &(0x7f00000000c0)=0x2, 0x8) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) [ 70.119879][ T8074] IPVS: ftp: loaded support on port[0] = 21 00:03:10 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x5514, 0x0) [ 70.198411][ T8074] chnl_net:caif_netlink_parms(): no params data found [ 70.275758][ T8074] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.283245][ T8074] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.306216][ T8074] device bridge_slave_0 entered promiscuous mode [ 70.313780][ T8074] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.326770][ T8074] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.334623][ T8074] device bridge_slave_1 entered promiscuous mode [ 70.348457][ T8078] IPVS: ftp: loaded support on port[0] = 21 [ 70.372719][ T8074] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.393278][ T8074] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.437419][ T8074] team0: Port device team_slave_0 added [ 70.444312][ T8074] team0: Port device team_slave_1 added 00:03:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000000)={0x4, 0x0, [{0x0, 0x0, 0x7}, {0xfde8}, {0x0, 0x0, 0x8000}, {}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 70.538922][ T8074] device hsr_slave_0 entered promiscuous mode [ 70.595801][ T8074] device hsr_slave_1 entered promiscuous mode [ 70.657551][ T8078] chnl_net:caif_netlink_parms(): no params data found [ 70.691733][ T8081] IPVS: ftp: loaded support on port[0] = 21 00:03:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x4004556b, &(0x7f0000000000)={{}, 'syz0\x00'}) [ 70.791427][ T8078] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.872373][ T8078] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.906526][ T8078] device bridge_slave_0 entered promiscuous mode [ 70.936743][ T8074] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.943921][ T8074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.951238][ T8074] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.958374][ T8074] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.096091][ T8078] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.103173][ T8078] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.147645][ T8078] device bridge_slave_1 entered promiscuous mode [ 71.247610][ T37] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.267341][ T37] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.324815][ T8078] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.412155][ T8078] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.460913][ T8106] IPVS: ftp: loaded support on port[0] = 21 [ 71.477382][ T8074] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.563131][ T8081] chnl_net:caif_netlink_parms(): no params data found [ 71.602126][ T8078] team0: Port device team_slave_0 added [ 71.652498][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.666283][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.675259][ T8078] team0: Port device team_slave_1 added [ 71.687424][ T8074] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.777750][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.796356][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.815845][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.822952][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.866121][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.877961][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.906073][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.913208][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.941723][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.953408][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.968514][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.988531][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 00:03:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x4e22, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffd}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="0207000902000000000000000000000092e7ef700021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb19adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1deb2ecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27d0ffc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4c175091f4b7683f771fe3f11274e5d0ff9c9b5297de5a2ad9ff1668c62218381c"], 0x10}}, 0x0) [ 72.063252][ T8104] ================================================================== [ 72.071410][ T8104] BUG: KCSAN: data-race in tomoyo_supervisor / tomoyo_supervisor [ 72.079117][ T8104] [ 72.081459][ T8104] write to 0xffffffff86148088 of 8 bytes by task 8097 on cpu 1: [ 72.089111][ T8104] tomoyo_supervisor+0x1ec/0xd20 [ 72.094059][ T8104] tomoyo_path_permission+0x121/0x160 [ 72.099447][ T8104] tomoyo_check_open_permission+0x2fd/0x320 [ 72.105350][ T8104] tomoyo_file_open+0x75/0x90 [ 72.110055][ T8104] security_file_open+0x69/0x210 [ 72.115878][ T8104] do_dentry_open+0x20a/0x8f0 [ 72.120561][ T8104] vfs_open+0x62/0x80 [ 72.124556][ T8104] path_openat+0xf73/0x36e0 [ 72.129326][ T8104] do_filp_open+0x11e/0x1b0 [ 72.133836][ T8104] do_sys_open+0x3b3/0x4f0 [ 72.138272][ T8104] __x64_sys_open+0x55/0x70 [ 72.142807][ T8104] do_syscall_64+0xcc/0x370 [ 72.147322][ T8104] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 72.153208][ T8104] [ 72.155550][ T8104] write to 0xffffffff86148088 of 8 bytes by task 8104 on cpu 0: [ 72.163210][ T8104] tomoyo_supervisor+0x1ec/0xd20 [ 72.168160][ T8104] tomoyo_path_permission+0x121/0x160 [ 72.173545][ T8104] tomoyo_check_open_permission+0x2fd/0x320 [ 72.179447][ T8104] tomoyo_file_open+0x75/0x90 [ 72.184144][ T8104] security_file_open+0x69/0x210 [ 72.189099][ T8104] do_dentry_open+0x20a/0x8f0 [ 72.193784][ T8104] vfs_open+0x62/0x80 [ 72.197776][ T8104] path_openat+0xf73/0x36e0 [ 72.202309][ T8104] do_filp_open+0x11e/0x1b0 [ 72.206841][ T8104] do_sys_open+0x3b3/0x4f0 [ 72.211269][ T8104] __x64_sys_open+0x55/0x70 [ 72.215789][ T8104] do_syscall_64+0xcc/0x370 [ 72.220326][ T8104] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 72.226210][ T8104] [ 72.228535][ T8104] Reported by Kernel Concurrency Sanitizer on: [ 72.234694][ T8104] CPU: 0 PID: 8104 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 72.241458][ T8104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.251546][ T8104] ================================================================== [ 72.259619][ T8104] Kernel panic - not syncing: panic_on_warn set ... [ 72.266220][ T8104] CPU: 0 PID: 8104 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 72.272988][ T8104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.283576][ T8104] Call Trace: [ 72.286928][ T8104] dump_stack+0xf5/0x159 [ 72.291187][ T8104] panic+0x210/0x640 [ 72.295102][ T8104] ? vprintk_func+0x8d/0x140 [ 72.299714][ T8104] kcsan_report.cold+0xc/0xe [ 72.304335][ T8104] kcsan_setup_watchpoint+0x3fe/0x410 [ 72.309746][ T8104] __tsan_unaligned_write8+0x143/0x1f0 [ 72.315238][ T8104] tomoyo_supervisor+0x1ec/0xd20 [ 72.320204][ T8104] ? tomoyo_path_matches_pattern+0xa1/0x160 [ 72.326123][ T8104] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 72.332378][ T8104] ? tomoyo_compare_name_union+0x4c/0xa0 [ 72.338034][ T8104] ? __read_once_size.constprop.0+0x12/0x20 [ 72.343948][ T8104] ? tomoyo_compare_name_union+0xa0/0xa0 [ 72.349607][ T8104] tomoyo_path_permission+0x121/0x160 [ 72.355006][ T8104] tomoyo_check_open_permission+0x2fd/0x320 [ 72.360949][ T8104] tomoyo_file_open+0x75/0x90 [ 72.365643][ T8104] security_file_open+0x69/0x210 [ 72.370604][ T8104] do_dentry_open+0x20a/0x8f0 [ 72.375295][ T8104] ? security_inode_permission+0xa5/0xc0 [ 72.380952][ T8104] vfs_open+0x62/0x80 [ 72.384956][ T8104] path_openat+0xf73/0x36e0 [ 72.389488][ T8104] ? proc_pid_status+0xee1/0x1000 [ 72.394540][ T8104] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 72.400471][ T8104] ? __read_once_size+0x41/0xe0 [ 72.405339][ T8104] do_filp_open+0x11e/0x1b0 [ 72.409869][ T8104] ? __alloc_fd+0x2ef/0x3b0 [ 72.414404][ T8104] do_sys_open+0x3b3/0x4f0 [ 72.418838][ T8104] __x64_sys_open+0x55/0x70 [ 72.423358][ T8104] do_syscall_64+0xcc/0x370 [ 72.427884][ T8104] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 72.433787][ T8104] RIP: 0033:0x7fcb98e83120 [ 72.438227][ T8104] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 72.457953][ T8104] RSP: 002b:00007ffce4ce4758 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 72.466387][ T8104] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007fcb98e83120 [ 72.474400][ T8104] RDX: 00007ffce4ce4792 RSI: 0000000000000000 RDI: 00007ffce4ce4780 [ 72.482382][ T8104] RBP: 0000000000020000 R08: 0000000000000000 R09: 00007fcb9914b55f [ 72.490363][ T8104] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000015d2220 [ 72.498345][ T8104] R13: 0000000000000020 R14: 00007fcb99538010 R15: 0000000000000000 [ 72.507689][ T8104] Kernel Offset: disabled [ 72.512059][ T8104] Rebooting in 86400 seconds..