Warning: Permanently added '10.128.1.189' (ECDSA) to the list of known hosts. 2023/02/15 01:15:30 fuzzer started 2023/02/15 01:15:31 dialing manager at 10.128.0.163:37335 2023/02/15 01:15:31 checking machine... 2023/02/15 01:15:31 checking revisions... 2023/02/15 01:15:31 testing simple program... [ 21.672245][ T23] audit: type=1400 audit(1676423731.190:74): avc: denied { getattr } for pid=3093 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.692803][ T3102] cgroup: Unknown subsys name 'net' [ 21.697336][ T23] audit: type=1400 audit(1676423731.190:75): avc: denied { read } for pid=3093 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.721959][ T23] audit: type=1400 audit(1676423731.190:76): avc: denied { open } for pid=3093 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.745080][ T23] audit: type=1400 audit(1676423731.190:77): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.767858][ T23] audit: type=1400 audit(1676423731.190:78): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.790058][ T23] audit: type=1400 audit(1676423731.220:79): avc: denied { unmount } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.959770][ T3102] cgroup: Unknown subsys name 'rlimit' [ 22.069173][ T23] audit: type=1400 audit(1676423731.590:80): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.094860][ T23] audit: type=1400 audit(1676423731.590:81): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.118167][ T23] audit: type=1400 audit(1676423731.590:82): avc: denied { create } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.138683][ T23] audit: type=1400 audit(1676423731.590:83): avc: denied { write } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.288075][ T3106] chnl_net:caif_netlink_parms(): no params data found [ 22.321436][ T3106] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.328623][ T3106] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.336276][ T3106] device bridge_slave_0 entered promiscuous mode [ 22.343646][ T3106] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.350740][ T3106] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.358737][ T3106] device bridge_slave_1 entered promiscuous mode [ 22.375099][ T3106] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 22.385347][ T3106] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 22.403888][ T3106] team0: Port device team_slave_0 added [ 22.410406][ T3106] team0: Port device team_slave_1 added [ 22.424138][ T3106] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 22.431211][ T3106] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 22.457512][ T3106] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 22.468554][ T3106] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 22.475601][ T3106] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 22.501595][ T3106] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 22.525606][ T3106] device hsr_slave_0 entered promiscuous mode [ 22.532307][ T3106] device hsr_slave_1 entered promiscuous mode [ 22.597427][ T3106] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 22.606025][ T3106] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 22.614837][ T3106] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 22.623535][ T3106] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 22.637570][ T3106] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.644643][ T3106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.651951][ T3106] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.659010][ T3106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.688436][ T3106] 8021q: adding VLAN 0 to HW filter on device bond0 [ 22.698682][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.706970][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.715348][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.723932][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 22.734376][ T3106] 8021q: adding VLAN 0 to HW filter on device team0 [ 22.744064][ T3124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.752504][ T3124] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.759571][ T3124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.769507][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.777822][ T3125] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.784913][ T3125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.803251][ T3106] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 22.813752][ T3106] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 22.827868][ T3124] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 22.836934][ T3124] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 22.845784][ T3124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.854245][ T3124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.862921][ T3124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 22.870542][ T3124] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 22.920891][ T3106] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 22.928234][ T3124] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 22.935598][ T3124] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 22.949370][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.016590][ T3106] device veth0_vlan entered promiscuous mode [ 23.023694][ T883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.032641][ T883] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.040377][ T883] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.051016][ T3106] device veth1_vlan entered promiscuous mode [ 23.063753][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 23.071801][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 23.080265][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.090098][ T3106] device veth0_macvtap entered promiscuous mode [ 23.097924][ T3106] device veth1_macvtap entered promiscuous mode [ 23.109932][ T3106] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 23.117270][ T883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.126633][ T883] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 23.137566][ T3106] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 23.145585][ T883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.155553][ T3106] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 23.164543][ T3106] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 23.173357][ T3106] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 23.182092][ T3106] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 2023/02/15 01:15:32 building call list... executing program [ 25.841865][ T3098] can: request_module (can-proto-0) failed. [ 25.856354][ T3098] can: request_module (can-proto-0) failed. [ 25.870981][ T3098] can: request_module (can-proto-0) failed. [ 26.588415][ T3106] syz-executor.0 (3106) used greatest stack depth: 10776 bytes left [ 26.599839][ T25] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 29.331078][ T25] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 29.390675][ T25] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 29.451910][ T25] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 30.080575][ T25] device hsr_slave_0 left promiscuous mode [ 30.086729][ T25] device hsr_slave_1 left promiscuous mode [ 30.094533][ T25] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 30.102041][ T25] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 30.110162][ T25] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 30.117641][ T25] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 30.125345][ T25] device bridge_slave_1 left promiscuous mode [ 30.131610][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.139272][ T25] device bridge_slave_0 left promiscuous mode [ 30.145420][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.154714][ T25] device veth1_macvtap left promiscuous mode [ 30.160739][ T25] device veth0_macvtap left promiscuous mode [ 30.166732][ T25] device veth1_vlan left promiscuous mode [ 30.172505][ T25] device veth0_vlan left promiscuous mode [ 30.244270][ T25] team0 (unregistering): Port device team_slave_1 removed [ 30.253664][ T25] team0 (unregistering): Port device team_slave_0 removed [ 30.263433][ T25] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 30.274165][ T25] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 30.299990][ T25] bond0 (unregistering): Released all slaves [ 43.105039][ T23] kauditd_printk_skb: 67 callbacks suppressed [ 43.105054][ T23] audit: type=1400 audit(1676423752.620:151): avc: denied { remove_name } for pid=2718 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 43.134078][ T23] audit: type=1400 audit(1676423752.620:152): avc: denied { rename } for pid=2718 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 43.156352][ T23] audit: type=1400 audit(1676423752.620:153): avc: denied { create } for pid=2718 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 91.778117][ C0] ================================================================== [ 91.786245][ C0] BUG: KCSAN: data-race in tick_nohz_idle_stop_tick / tick_sched_timer [ 91.794503][ C0] [ 91.796823][ C0] write to 0xffffffff85ef9db0 of 4 bytes by task 0 on cpu 1: [ 91.804187][ C0] tick_nohz_idle_stop_tick+0x1fe/0x6e0 [ 91.809738][ C0] do_idle+0x17d/0x240 [ 91.813817][ C0] cpu_startup_entry+0x18/0x20 [ 91.818590][ C0] start_secondary+0x7c/0x80 [ 91.823187][ C0] secondary_startup_64_no_verify+0xcf/0xdb [ 91.829079][ C0] [ 91.831390][ C0] read to 0xffffffff85ef9db0 of 4 bytes by interrupt on cpu 0: [ 91.838923][ C0] tick_sched_timer+0x46/0x2c0 [ 91.843689][ C0] __hrtimer_run_queues+0x217/0x700 [ 91.848885][ C0] hrtimer_interrupt+0x224/0x7c0 [ 91.853816][ C0] __sysvec_apic_timer_interrupt+0xa7/0x250 [ 91.859716][ C0] sysvec_apic_timer_interrupt+0x8c/0xb0 [ 91.865342][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 91.871392][ C0] acpi_idle_enter+0x282/0x360 [ 91.876157][ C0] cpuidle_enter_state+0x2de/0x9c0 [ 91.881272][ C0] cpuidle_enter+0x40/0x60 [ 91.885687][ C0] do_idle+0x19a/0x240 [ 91.889774][ C0] cpu_startup_entry+0x18/0x20 [ 91.894558][ C0] rest_init+0xef/0xf0 [ 91.898624][ C0] arch_call_rest_init+0x9/0x10 [ 91.903473][ C0] start_kernel+0x58a/0x610 [ 91.907978][ C0] secondary_startup_64_no_verify+0xcf/0xdb [ 91.913903][ C0] [ 91.916222][ C0] value changed: 0x00000001 -> 0xffffffff [ 91.922109][ C0] [ 91.924454][ C0] Reported by Kernel Concurrency Sanitizer on: [ 91.930602][ C0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.2.0-rc8-syzkaller-00021-ge1c04510f521-dirty #0 [ 91.940759][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 [ 91.950815][ C0] ==================================================================