[ 18.735684][ T27] audit: type=1400 audit(1708944465.084:81): avc: denied { read } for pid=2756 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.1.108' (ED25519) to the list of known hosts. 2024/02/26 10:47:47 fuzzer started 2024/02/26 10:47:47 dialing manager at 10.128.0.163:30015 2024/02/26 10:47:47 checking machine... 2024/02/26 10:47:47 checking revisions... [ 21.032322][ T27] audit: type=1400 audit(1708944467.374:82): avc: denied { node_bind } for pid=3060 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 21.053170][ T27] audit: type=1400 audit(1708944467.374:83): avc: denied { name_bind } for pid=3060 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 2024/02/26 10:47:47 testing simple program... [ 21.161629][ T27] audit: type=1400 audit(1708944467.504:84): avc: denied { getattr } for pid=3060 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.182017][ T3069] cgroup: Unknown subsys name 'net' [ 21.186655][ T27] audit: type=1400 audit(1708944467.504:85): avc: denied { read } for pid=3060 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.211447][ T27] audit: type=1400 audit(1708944467.504:86): avc: denied { open } for pid=3060 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.234571][ T27] audit: type=1400 audit(1708944467.524:87): avc: denied { mounton } for pid=3069 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.257333][ T27] audit: type=1400 audit(1708944467.524:88): avc: denied { mount } for pid=3069 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.279500][ T27] audit: type=1400 audit(1708944467.534:89): avc: denied { unmount } for pid=3069 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.426808][ T3069] cgroup: Unknown subsys name 'rlimit' [ 21.546822][ T27] audit: type=1400 audit(1708944467.894:90): avc: denied { mounton } for pid=3069 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.581711][ T3073] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.598649][ T3069] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.789542][ T3077] chnl_net:caif_netlink_parms(): no params data found [ 21.823427][ T3077] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.830529][ T3077] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.837781][ T3077] bridge_slave_0: entered allmulticast mode [ 21.844436][ T3077] bridge_slave_0: entered promiscuous mode [ 21.851166][ T3077] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.858377][ T3077] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.865523][ T3077] bridge_slave_1: entered allmulticast mode [ 21.871859][ T3077] bridge_slave_1: entered promiscuous mode [ 21.889147][ T3077] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 21.899389][ T3077] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 21.918369][ T3077] team0: Port device team_slave_0 added [ 21.924715][ T3077] team0: Port device team_slave_1 added [ 21.940798][ T3077] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 21.947779][ T3077] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 21.975004][ T3077] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 21.986008][ T3077] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 21.992998][ T3077] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 22.019079][ T3077] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 22.044600][ T3077] hsr_slave_0: entered promiscuous mode [ 22.050734][ T3077] hsr_slave_1: entered promiscuous mode [ 22.113361][ T3077] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 22.121898][ T3077] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 22.130701][ T3077] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 22.139601][ T3077] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 22.153846][ T3077] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.161213][ T3077] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.168623][ T3077] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.175692][ T3077] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.208155][ T3077] 8021q: adding VLAN 0 to HW filter on device bond0 [ 22.220741][ T33] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.229219][ T33] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.241330][ T3077] 8021q: adding VLAN 0 to HW filter on device team0 [ 22.251524][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.258861][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.276763][ T3070] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.283961][ T3070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.338900][ T3077] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 22.406279][ T3077] veth0_vlan: entered promiscuous mode [ 22.414361][ T3077] veth1_vlan: entered promiscuous mode [ 22.429985][ T3077] veth0_macvtap: entered promiscuous mode [ 22.437309][ T3077] veth1_macvtap: entered promiscuous mode [ 22.448965][ T3077] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 22.460206][ T3077] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 22.470056][ T3077] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 22.478853][ T3077] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 22.487635][ T3077] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 22.496639][ T3077] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 2024/02/26 10:47:48 building call list... executing program [ 25.121246][ T27] kauditd_printk_skb: 23 callbacks suppressed [ 25.121257][ T27] audit: type=1400 audit(1708944471.464:114): avc: denied { read } for pid=3060 comm="syz-fuzzer" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 25.150694][ T27] audit: type=1400 audit(1708944471.474:115): avc: denied { open } for pid=3060 comm="syz-fuzzer" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 25.174300][ T27] audit: type=1400 audit(1708944471.474:116): avc: denied { read } for pid=3060 comm="syz-fuzzer" name="hpet" dev="devtmpfs" ino=97 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 25.197200][ T27] audit: type=1400 audit(1708944471.474:117): avc: denied { open } for pid=3060 comm="syz-fuzzer" path="/dev/hpet" dev="devtmpfs" ino=97 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 25.220609][ T27] audit: type=1400 audit(1708944471.474:118): avc: denied { write } for pid=3060 comm="syz-fuzzer" name="hpet" dev="devtmpfs" ino=97 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 25.243498][ T27] audit: type=1400 audit(1708944471.474:119): avc: denied { read } for pid=3060 comm="syz-fuzzer" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 25.267638][ T27] audit: type=1400 audit(1708944471.474:120): avc: denied { open } for pid=3060 comm="syz-fuzzer" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 25.292438][ T27] audit: type=1400 audit(1708944471.474:121): avc: denied { read } for pid=3060 comm="syz-fuzzer" name="mISDNtimer" dev="devtmpfs" ino=223 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.317025][ T27] audit: type=1400 audit(1708944471.474:122): avc: denied { open } for pid=3060 comm="syz-fuzzer" path="/dev/mISDNtimer" dev="devtmpfs" ino=223 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.340849][ T27] audit: type=1400 audit(1708944471.474:123): avc: denied { write } for pid=3060 comm="syz-fuzzer" name="virtual_nci" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.423895][ T3063] can: request_module (can-proto-0) failed. [ 25.437724][ T3063] can: request_module (can-proto-0) failed. [ 25.451030][ T3063] can: request_module (can-proto-0) failed. [ 25.639387][ T3063] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 25.767182][ T3063] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 26.135369][ T3077] syz-executor.0 (3077) used greatest stack depth: 10600 bytes left [ 26.147891][ T11] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 28.327550][ T11] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 28.417278][ T11] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 28.487583][ T11] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 29.000279][ T11] hsr_slave_0: left promiscuous mode [ 29.006078][ T11] hsr_slave_1: left promiscuous mode [ 29.011815][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 29.019344][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 29.027534][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 29.036051][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 29.043619][ T11] bridge_slave_1: left allmulticast mode [ 29.051965][ T11] bridge_slave_1: left promiscuous mode [ 29.057743][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.066952][ T11] bridge_slave_0: left allmulticast mode [ 29.072715][ T11] bridge_slave_0: left promiscuous mode [ 29.078583][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.089164][ T11] veth1_macvtap: left promiscuous mode [ 29.094687][ T11] veth0_macvtap: left promiscuous mode [ 29.100265][ T11] veth1_vlan: left promiscuous mode [ 29.105646][ T11] veth0_vlan: left promiscuous mode [ 29.186067][ T11] team0 (unregistering): Port device team_slave_1 removed [ 29.195945][ T11] team0 (unregistering): Port device team_slave_0 removed [ 29.205888][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 29.217050][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 29.245100][ T11] bond0 (unregistering): Released all slaves [ 37.653561][ T27] kauditd_printk_skb: 58 callbacks suppressed [ 37.653572][ T27] audit: type=1400 audit(1708944483.994:182): avc: denied { remove_name } for pid=2756 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 37.682474][ T27] audit: type=1400 audit(1708944483.994:183): avc: denied { rename } for pid=2756 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 37.704741][ T27] audit: type=1400 audit(1708944484.004:184): avc: denied { create } for pid=2756 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 43.175027][ T0] ================================================================== [ 43.183226][ T0] BUG: KCSAN: data-race in tick_nohz_idle_stop_tick / tick_nohz_next_event [ 43.192113][ T0] [ 43.194453][ T0] write to 0xffffffff8611ee70 of 4 bytes by task 0 on cpu 0: [ 43.202358][ T0] tick_nohz_idle_stop_tick+0x1d8/0x760 [ 43.208117][ T0] do_idle+0x177/0x230 [ 43.212541][ T0] cpu_startup_entry+0x24/0x30 [ 43.217346][ T0] rest_init+0xf3/0x100 [ 43.221604][ T0] arch_call_rest_init+0x9/0x10 [ 43.226562][ T0] start_kernel+0x57d/0x5e0 [ 43.231171][ T0] x86_64_start_reservations+0x2a/0x30 [ 43.236658][ T0] x86_64_start_kernel+0x94/0xa0 [ 43.241621][ T0] secondary_startup_64_no_verify+0x15f/0x16b [ 43.247704][ T0] [ 43.250114][ T0] read to 0xffffffff8611ee70 of 4 bytes by task 0 on cpu 1: [ 43.257403][ T0] tick_nohz_next_event+0x1f1/0x2d0 [ 43.262629][ T0] tick_nohz_get_sleep_length+0x134/0x2c0 [ 43.268361][ T0] menu_select+0x81a/0x1060 [ 43.272874][ T0] cpuidle_select+0x41/0x50 [ 43.277481][ T0] do_idle+0x160/0x230 [ 43.281574][ T0] cpu_startup_entry+0x24/0x30 [ 43.286368][ T0] start_secondary+0x82/0x90 [ 43.291057][ T0] secondary_startup_64_no_verify+0x15f/0x16b [ 43.297412][ T0] [ 43.299735][ T0] value changed: 0x00000000 -> 0xffffffff [ 43.305486][ T0] [ 43.307815][ T0] Reported by Kernel Concurrency Sanitizer on: [ 43.313965][ T0] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.8.0-rc6-syzkaller #0 [ 43.321956][ T0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 43.332031][ T0] ==================================================================