Warning: Permanently added '10.128.1.3' (ED25519) to the list of known hosts. 2023/09/28 03:05:40 fuzzer started 2023/09/28 03:05:40 dialing manager at 10.128.0.163:30015 2023/09/28 03:05:40 checking machine... 2023/09/28 03:05:40 checking revisions... 2023/09/28 03:05:40 testing simple program... [ 20.170038][ T27] audit: type=1400 audit(1695870340.469:81): avc: denied { getattr } for pid=3066 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.188128][ T3075] cgroup: Unknown subsys name 'net' [ 20.193582][ T27] audit: type=1400 audit(1695870340.469:82): avc: denied { read } for pid=3066 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.219627][ T27] audit: type=1400 audit(1695870340.469:83): avc: denied { open } for pid=3066 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.242736][ T27] audit: type=1400 audit(1695870340.489:84): avc: denied { mounton } for pid=3075 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.265387][ T27] audit: type=1400 audit(1695870340.489:85): avc: denied { mount } for pid=3075 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.287522][ T27] audit: type=1400 audit(1695870340.509:86): avc: denied { unmount } for pid=3075 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.425104][ T3075] cgroup: Unknown subsys name 'rlimit' [ 20.545146][ T27] audit: type=1400 audit(1695870340.849:87): avc: denied { mounton } for pid=3075 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.569919][ T27] audit: type=1400 audit(1695870340.849:88): avc: denied { mount } for pid=3075 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.593141][ T27] audit: type=1400 audit(1695870340.849:89): avc: denied { create } for pid=3075 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 20.605338][ T3079] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.613641][ T27] audit: type=1400 audit(1695870340.849:90): avc: denied { write } for pid=3075 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 20.653488][ T3075] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.664268][ T3073] syz-fuzzer[3073]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 20.814775][ T3081] chnl_net:caif_netlink_parms(): no params data found [ 20.844179][ T3081] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.851253][ T3081] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.858410][ T3081] bridge_slave_0: entered allmulticast mode [ 20.864808][ T3081] bridge_slave_0: entered promiscuous mode [ 20.871425][ T3081] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.878560][ T3081] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.885698][ T3081] bridge_slave_1: entered allmulticast mode [ 20.891948][ T3081] bridge_slave_1: entered promiscuous mode [ 20.906848][ T3081] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 20.916792][ T3081] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 20.933834][ T3081] team0: Port device team_slave_0 added [ 20.939975][ T3081] team0: Port device team_slave_1 added [ 20.953198][ T3081] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 20.960169][ T3081] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 20.986125][ T3081] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 20.997032][ T3081] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 21.003996][ T3081] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 21.029933][ T3081] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 21.053133][ T3081] hsr_slave_0: entered promiscuous mode [ 21.059051][ T3081] hsr_slave_1: entered promiscuous mode [ 21.113658][ T3081] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 21.121928][ T3081] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 21.130394][ T3081] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 21.138823][ T3081] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 21.151651][ T3081] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.158703][ T3081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.166001][ T3081] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.173078][ T3081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.199779][ T3081] 8021q: adding VLAN 0 to HW filter on device bond0 [ 21.210007][ T3077] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.218047][ T3077] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.229833][ T3081] 8021q: adding VLAN 0 to HW filter on device team0 [ 21.239357][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.246590][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.265901][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.273066][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.317260][ T3081] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 21.372246][ T3081] veth0_vlan: entered promiscuous mode [ 21.379675][ T3081] veth1_vlan: entered promiscuous mode [ 21.390616][ T3081] veth0_macvtap: entered promiscuous mode [ 21.400205][ T3081] veth1_macvtap: entered promiscuous mode [ 21.410567][ T3081] batman_adv: batadv0: Interface activated: batadv_slave_0 2023/09/28 03:05:41 building call list... [ 21.420244][ T3081] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 21.428983][ T3081] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 21.437832][ T3081] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 21.446560][ T3081] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 21.455355][ T3081] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 23.610150][ T3073] can: request_module (can-proto-0) failed. [ 23.622626][ T3073] can: request_module (can-proto-0) failed. [ 23.634544][ T3073] can: request_module (can-proto-0) failed. [ 23.789623][ T3073] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 23.896839][ T3073] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 24.914678][ T3081] syz-executor.0 (3081) used greatest stack depth: 10392 bytes left [ 24.925265][ T242] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 27.636256][ T242] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 27.696238][ T242] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 27.756932][ T242] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 27.825220][ T27] kauditd_printk_skb: 74 callbacks suppressed [ 27.825230][ T27] audit: type=1400 audit(1695870348.129:165): avc: denied { search } for pid=2814 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 27.854646][ T27] audit: type=1400 audit(1695870348.129:166): avc: denied { read } for pid=2814 comm="dhcpcd" name="n25" dev="tmpfs" ino=401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 27.876158][ T27] audit: type=1400 audit(1695870348.129:167): avc: denied { open } for pid=2814 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 27.899041][ T27] audit: type=1400 audit(1695870348.129:168): avc: denied { getattr } for pid=2814 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 27.922424][ T27] audit: type=1400 audit(1695870348.159:169): avc: denied { read } for pid=3178 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=343 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 27.945319][ T27] audit: type=1400 audit(1695870348.159:170): avc: denied { open } for pid=3178 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=343 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 27.970257][ T27] audit: type=1400 audit(1695870348.159:171): avc: denied { getattr } for pid=3178 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=343 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 27.995603][ T27] audit: type=1400 audit(1695870348.209:172): avc: denied { write } for pid=3177 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 28.018474][ T27] audit: type=1400 audit(1695870348.209:173): avc: denied { add_name } for pid=3177 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 28.040880][ T27] audit: type=1400 audit(1695870348.209:174): avc: denied { create } for pid=3177 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 28.475827][ T242] hsr_slave_0: left promiscuous mode [ 28.481529][ T242] hsr_slave_1: left promiscuous mode [ 28.487201][ T242] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 28.494670][ T242] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 28.502312][ T242] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 28.509777][ T242] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 28.517445][ T242] bridge_slave_1: left allmulticast mode [ 28.523134][ T242] bridge_slave_1: left promiscuous mode [ 28.528741][ T242] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.536439][ T242] bridge_slave_0: left allmulticast mode [ 28.542052][ T242] bridge_slave_0: left promiscuous mode [ 28.547806][ T242] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.556828][ T242] veth1_macvtap: left promiscuous mode [ 28.562276][ T242] veth0_macvtap: left promiscuous mode [ 28.567855][ T242] veth1_vlan: left promiscuous mode [ 28.573130][ T242] veth0_vlan: left promiscuous mode [ 28.635736][ T242] team0 (unregistering): Port device team_slave_1 removed [ 28.644619][ T242] team0 (unregistering): Port device team_slave_0 removed [ 28.653354][ T242] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 28.665196][ T242] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 28.690232][ T242] bond0 (unregistering): Released all slaves [ 29.833874][ C0] ================================================================== [ 29.841955][ C0] BUG: KCSAN: data-race in tick_sched_timer / tick_sched_timer [ 29.849494][ C0] [ 29.851797][ C0] write to 0xffffffff85f16b00 of 4 bytes by interrupt on cpu 1: [ 29.859404][ C0] tick_sched_timer+0x2ad/0x2c0 [ 29.864432][ C0] __hrtimer_run_queues+0x217/0x700 [ 29.869614][ C0] hrtimer_interrupt+0x20d/0x7b0 [ 29.874553][ C0] __sysvec_apic_timer_interrupt+0x52/0x190 [ 29.880425][ C0] sysvec_apic_timer_interrupt+0x68/0x80 [ 29.886039][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 29.892002][ C0] acpi_safe_halt+0x20/0x30 [ 29.896485][ C0] acpi_idle_do_entry+0x19/0x30 [ 29.901323][ C0] acpi_idle_enter+0x96/0xb0 [ 29.905910][ C0] cpuidle_enter_state+0xc6/0x260 [ 29.910913][ C0] cpuidle_enter+0x40/0x60 [ 29.915316][ C0] do_idle+0x194/0x230 [ 29.919367][ C0] cpu_startup_entry+0x24/0x30 [ 29.924111][ C0] start_secondary+0x82/0x90 [ 29.928677][ C0] secondary_startup_64_no_verify+0x167/0x16b [ 29.934733][ C0] [ 29.937033][ C0] read to 0xffffffff85f16b00 of 4 bytes by interrupt on cpu 0: [ 29.944554][ C0] tick_sched_timer+0x3d/0x2c0 [ 29.949299][ C0] __hrtimer_run_queues+0x217/0x700 [ 29.954473][ C0] hrtimer_interrupt+0x20d/0x7b0 [ 29.959388][ C0] __sysvec_apic_timer_interrupt+0x52/0x190 [ 29.965258][ C0] sysvec_apic_timer_interrupt+0x68/0x80 [ 29.970872][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 29.976858][ C0] acpi_safe_halt+0x20/0x30 [ 29.981343][ C0] acpi_idle_do_entry+0x19/0x30 [ 29.986185][ C0] acpi_idle_enter+0x96/0xb0 [ 29.990781][ C0] cpuidle_enter_state+0xc6/0x260 [ 29.995790][ C0] cpuidle_enter+0x40/0x60 [ 30.000191][ C0] do_idle+0x194/0x230 [ 30.004243][ C0] cpu_startup_entry+0x24/0x30 [ 30.009003][ C0] rest_init+0xf3/0x100 [ 30.013162][ C0] arch_call_rest_init+0x9/0x10 [ 30.017997][ C0] start_kernel+0x57d/0x5d0 [ 30.022518][ C0] x86_64_start_reservations+0x2a/0x30 [ 30.027959][ C0] x86_64_start_kernel+0x94/0xa0 [ 30.032878][ C0] secondary_startup_64_no_verify+0x167/0x16b [ 30.038926][ C0] [ 30.041230][ C0] value changed: 0xffffffff -> 0x00000001 [ 30.046924][ C0] [ 30.049225][ C0] Reported by Kernel Concurrency Sanitizer on: [ 30.055370][ C0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.6.0-rc3-syzkaller-00044-g633b47cb009d #0 [ 30.064976][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 30.075012][ C0] ==================================================================