[ 20.901680][ T29] audit: type=1400 audit(1716402399.072:81): avc: denied { read } for pid=2772 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.1.47' (ED25519) to the list of known hosts. 2024/05/22 18:26:43 fuzzer started 2024/05/22 18:26:43 dialing manager at 10.128.0.163:30030 [ 25.060691][ T29] audit: type=1400 audit(1716402403.222:82): avc: denied { node_bind } for pid=3081 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 25.081356][ T29] audit: type=1400 audit(1716402403.222:83): avc: denied { name_bind } for pid=3081 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 25.125901][ T29] audit: type=1400 audit(1716402403.292:84): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.137079][ T3090] cgroup: Unknown subsys name 'net' [ 25.165128][ T29] audit: type=1400 audit(1716402403.292:85): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.187412][ T29] audit: type=1400 audit(1716402403.322:86): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.199517][ T3099] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.212249][ T29] audit: type=1400 audit(1716402403.322:87): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.244945][ T29] audit: type=1400 audit(1716402403.322:88): avc: denied { create } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.245830][ T3097] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.265606][ T29] audit: type=1400 audit(1716402403.322:89): avc: denied { write } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.294705][ T29] audit: type=1400 audit(1716402403.332:90): avc: denied { read } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.315040][ T29] audit: type=1400 audit(1716402403.332:91): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.454542][ T3090] cgroup: Unknown subsys name 'rlimit' 2024/05/22 18:26:43 suppressing KCSAN reports in functions: 'ext4_fill_raw_inode' 'process_scheduled_works' 'mas_replace_node' 'mas_wr_modify' 'ondemand_readahead' 'xas_clear_mark' 'jbd2_journal_stop' 'jbd2_journal_dirty_metadata' 'alloc_pid' 'pcpu_alloc_noprof' 'do_select' 'atime_needs_update' 'xas_find_marked' 'call_rcu' '_prb_read_valid' '__tmigr_cpu_activate' '__stop_tty' 'mas_wmb_replace' '__xa_clear_mark' 'dont_mount' 'mem_cgroup_flush_stats_ratelimited' 'ext4_free_inodes_count' 'exit_mm' 'do_sys_poll' '__mark_inode_dirty' 'filemap_splice_read' 'vmalloc_info_show' 2024/05/22 18:26:43 starting 5 executor processes [ 26.346243][ T3107] chnl_net:caif_netlink_parms(): no params data found [ 26.411064][ T3127] ================================================================== [ 26.415361][ T3108] chnl_net:caif_netlink_parms(): no params data found [ 26.419178][ T3127] BUG: KCSAN: data-race in __d_lookup / __d_rehash [ 26.433266][ T3127] [ 26.435615][ T3127] write to 0xffff888106570190 of 8 bytes by task 3117 on cpu 0: [ 26.443264][ T3127] __d_rehash+0xc4/0x220 [ 26.447524][ T3127] __d_add+0x36d/0x4a0 [ 26.451618][ T3127] d_splice_alias+0xd6/0x270 [ 26.456235][ T3127] proc_sys_lookup+0x386/0x440 [ 26.461029][ T3127] __lookup_slow+0x184/0x250 [ 26.465632][ T3127] lookup_slow+0x3c/0x60 [ 26.469890][ T3127] link_path_walk+0x621/0x810 [ 26.474598][ T3127] path_openat+0x1a1/0x1da0 [ 26.479109][ T3127] do_filp_open+0xf7/0x200 [ 26.483534][ T3127] do_sys_openat2+0xab/0x120 [ 26.488166][ T3127] __x64_sys_openat+0xf3/0x120 [ 26.492939][ T3127] x64_sys_call+0x2cad/0x2d30 [ 26.497639][ T3127] do_syscall_64+0xcd/0x1d0 [ 26.502148][ T3127] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 26.508043][ T3127] [ 26.510370][ T3127] read to 0xffff888106570190 of 8 bytes by task 3127 on cpu 1: [ 26.517933][ T3127] __d_lookup+0x10e/0x390 [ 26.522267][ T3127] lookup_fast+0x4c/0x2a0 [ 26.526652][ T3127] link_path_walk+0x403/0x810 [ 26.531350][ T3127] path_openat+0x1a1/0x1da0 [ 26.535856][ T3127] do_filp_open+0xf7/0x200 [ 26.540275][ T3127] do_sys_openat2+0xab/0x120 [ 26.544875][ T3127] __x64_sys_openat+0xf3/0x120 [ 26.549649][ T3127] x64_sys_call+0x2cad/0x2d30 [ 26.554355][ T3127] do_syscall_64+0xcd/0x1d0 2024/05/22 18:26:44 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 26.558865][ T3127] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 26.564763][ T3127] [ 26.567080][ T3127] value changed: 0xffff888237b04598 -> 0xffff888106570848 [ 26.574180][ T3127] [ 26.576506][ T3127] Reported by Kernel Concurrency Sanitizer on: [ 26.582654][ T3127] CPU: 1 PID: 3127 Comm: syz-executor.3 Not tainted 6.9.0-syzkaller-10713-g2a8120d7b482 #0 [ 26.592655][ T3127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 26.602711][ T3127] ==================================================================