Warning: Permanently added '10.128.0.244' (ECDSA) to the list of known hosts. 2020/08/31 09:26:38 fuzzer started 2020/08/31 09:26:38 dialing manager at 10.128.0.105:38657 2020/08/31 09:26:38 syscalls: 3332 2020/08/31 09:26:38 code coverage: enabled 2020/08/31 09:26:38 comparison tracing: enabled 2020/08/31 09:26:38 extra coverage: enabled 2020/08/31 09:26:38 setuid sandbox: enabled 2020/08/31 09:26:38 namespace sandbox: enabled 2020/08/31 09:26:38 Android sandbox: /sys/fs/selinux/policy does not exist 2020/08/31 09:26:38 fault injection: enabled 2020/08/31 09:26:38 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/08/31 09:26:38 net packet injection: enabled 2020/08/31 09:26:38 net device setup: enabled 2020/08/31 09:26:38 concurrency sanitizer: enabled 2020/08/31 09:26:38 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/08/31 09:26:38 USB emulation: enabled 2020/08/31 09:26:38 hci packet injection: enabled 09:26:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x1f) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@ipv6_newaddr={0x40, 0x14, 0x121, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @mcast1}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x3}}]}, 0x40}}, 0x0) syzkaller login: [ 32.464413][ T8702] ================================================================== [ 32.472600][ T8702] BUG: KCSAN: data-race in tomoyo_domain_quota_is_ok / tomoyo_merge_path_acl [ 32.481339][ T8702] [ 32.483662][ T8702] write to 0xffff88812a02141a of 2 bytes by task 8689 on cpu 0: [ 32.491417][ T8702] tomoyo_merge_path_acl+0x4f/0x80 [ 32.496688][ T8702] tomoyo_update_domain+0x337/0x3a0 [ 32.501904][ T8702] tomoyo_write_file+0x210/0x910 [ 32.506825][ T8702] tomoyo_supervisor+0xac5/0xb30 09:26:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0xa, 0x3}, @restrict={0x0, 0x0, 0x0, 0xa}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 32.511837][ T8702] tomoyo_check_open_permission+0x2d0/0x370 [ 32.517716][ T8702] tomoyo_file_open+0xd0/0xe0 [ 32.522387][ T8702] security_file_open+0x3f/0x90 [ 32.527236][ T8702] do_dentry_open+0x22d/0x890 [ 32.531967][ T8702] vfs_open+0x43/0x50 [ 32.535941][ T8702] path_openat+0x1844/0x20a0 [ 32.540520][ T8702] do_filp_open+0xbd/0x1d0 [ 32.544925][ T8702] do_sys_openat2+0x33b/0x500 [ 32.549590][ T8702] __x64_sys_openat+0xef/0x110 [ 32.554348][ T8702] do_syscall_64+0x39/0x80 [ 32.558795][ T8702] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 32.567620][ T8702] [ 32.569935][ T8702] read to 0xffff88812a02141a of 2 bytes by task 8702 on cpu 1: [ 32.577495][ T8702] tomoyo_domain_quota_is_ok+0xd7/0x2d0 [ 32.583117][ T8702] tomoyo_supervisor+0x1f4/0xb30 [ 32.588045][ T8702] tomoyo_path_number_perm+0x227/0x2d0 [ 32.593489][ T8702] tomoyo_path_chmod+0x23/0x30 [ 32.598237][ T8702] security_path_chmod+0x92/0xe0 [ 32.604664][ T8702] chmod_common+0xe6/0x280 [ 32.609069][ T8702] __x64_sys_fchmodat+0x9b/0x120 09:26:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffbfff0f0001000138000008000240000000000b006ae6d3d5dc53fde47e6873d08dc94999ab7e98e21c7b9ad03872d3f820ba6fdf6f8ad9cec56df89449ae2ac6c1487a54820cc6b292675dac2bca78dc9f6a8edac23f2cbda4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda63d9bcbf053630c830bb01269d9591d6c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd777ee6a000000000000844700002aacc6f70ccf52efb122060000"], 0x24}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffffff0f0001000138000008000240000000000b006ae6d3d5dc53fde47e6873d0861aa5d6f0e08319f6c728f11c7b9ad03872d3f820ba6fdf6f8ad9cec56df89449ae2ac6c1487a54820cc6b292675dac2bca78dc9f6a8ef2c23f2cbda4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda63d9bcbf053630c830bb01269d9591d6c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd777ee6a00"/196], 0x24}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x8}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffffff0f0001000240000000000b006ae6d3d5dc53fde4347e6873d0861a94cdf0e08319f6c728f11c7b9ad03872d3f820ba6fdf6f8ad9cec56df8942ac6c1487a549c0ce2d241dbbfb9b4e278dc9f6a8ef2c23f2cada4ba4851618cbf29258bf093f2d1c6e69729af8f0f6040909bda63d9bcbf053630c830bb01269d958100c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd777ee6a000000000000000000150000"], 0x24}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x8}, 0x0) [ 32.613992][ T8702] do_syscall_64+0x39/0x80 [ 32.618394][ T8702] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 32.624271][ T8702] [ 32.626578][ T8702] Reported by Kernel Concurrency Sanitizer on: [ 32.632710][ T8702] CPU: 1 PID: 8702 Comm: syz-fuzzer Not tainted 5.9.0-rc3-syzkaller #0 [ 32.640924][ T8702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 32.650962][ T8702] ================================================================== [ 32.659035][ T8702] Kernel panic - not syncing: panic_on_warn set ... [ 32.665613][ T8702] CPU: 1 PID: 8702 Comm: syz-fuzzer Not tainted 5.9.0-rc3-syzkaller #0 [ 32.673857][ T8702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 32.683988][ T8702] Call Trace: [ 32.687272][ T8702] dump_stack+0x10f/0x19d [ 32.691590][ T8702] panic+0x207/0x64a [ 32.695473][ T8702] ? vprintk_emit+0x44a/0x4f0 [ 32.700137][ T8702] kcsan_report+0x684/0x690 [ 32.704667][ T8702] ? kcsan_setup_watchpoint+0x41e/0x4a0 [ 32.710201][ T8702] ? tomoyo_domain_quota_is_ok+0xd7/0x2d0 [ 32.715907][ T8702] ? tomoyo_supervisor+0x1f4/0xb30 [ 32.721006][ T8702] ? tomoyo_path_number_perm+0x227/0x2d0 [ 32.726619][ T8702] ? tomoyo_path_chmod+0x23/0x30 [ 32.731546][ T8702] ? security_path_chmod+0x92/0xe0 [ 32.736647][ T8702] ? chmod_common+0xe6/0x280 [ 32.741225][ T8702] ? __x64_sys_fchmodat+0x9b/0x120 [ 32.746382][ T8702] ? do_syscall_64+0x39/0x80 [ 32.750960][ T8702] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 32.757024][ T8702] ? tomoyo_profile+0x17/0x30 [ 32.761684][ T8702] ? tomoyo_profile+0x17/0x30 [ 32.766356][ T8702] kcsan_setup_watchpoint+0x41e/0x4a0 [ 32.771722][ T8702] ? tomoyo_profile+0x17/0x30 [ 32.776385][ T8702] tomoyo_domain_quota_is_ok+0xd7/0x2d0 [ 32.781921][ T8702] tomoyo_supervisor+0x1f4/0xb30 [ 32.786843][ T8702] ? snprintf+0x6f/0x90 [ 32.791072][ T8702] tomoyo_path_number_perm+0x227/0x2d0 [ 32.796526][ T8702] ? filename_lookup+0x2b6/0x380 [ 32.801454][ T8702] tomoyo_path_chmod+0x23/0x30 [ 32.806206][ T8702] security_path_chmod+0x92/0xe0 [ 32.812002][ T8702] chmod_common+0xe6/0x280 [ 32.816406][ T8702] __x64_sys_fchmodat+0x9b/0x120 [ 32.821327][ T8702] do_syscall_64+0x39/0x80 [ 32.825737][ T8702] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 32.831610][ T8702] RIP: 0033:0x4b3cdb [ 32.835577][ T8702] Code: ff e9 69 ff ff ff cc cc cc cc cc cc cc cc cc e8 bb a1 f8 ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 32.855175][ T8702] RSP: 002b:000000c0000c7878 EFLAGS: 00000212 ORIG_RAX: 000000000000010c [ 32.863573][ T8702] RAX: ffffffffffffffda RBX: 000000c00002e800 RCX: 00000000004b3cdb [ 32.871537][ T8702] RDX: 00000000000001ff RSI: 000000c00011a1b0 RDI: ffffffffffffff9c [ 32.879516][ T8702] RBP: 000000c0000c78d0 R08: 0000000000873c01 R09: 0000000000000001 [ 32.887475][ T8702] R10: 000000c00011a1b0 R11: 0000000000000212 R12: ffffffffffffffff [ 32.895451][ T8702] R13: 000000000000000a R14: 0000000000000009 R15: 00000000000000aa [ 32.904856][ T8702] Kernel Offset: disabled [ 32.909210][ T8702] Rebooting in 86400 seconds..