Warning: Permanently added '10.128.0.103' (ED25519) to the list of known hosts. 2023/10/06 13:31:53 fuzzer started 2023/10/06 13:31:54 dialing manager at 10.128.0.163:30015 2023/10/06 13:31:54 checking machine... 2023/10/06 13:31:54 checking revisions... 2023/10/06 13:31:54 testing simple program... [ 19.767369][ T27] audit: type=1400 audit(1696599114.095:81): avc: denied { getattr } for pid=3067 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 19.770540][ T27] audit: type=1400 audit(1696599114.095:82): avc: denied { read } for pid=3067 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 19.773310][ T27] audit: type=1400 audit(1696599114.095:83): avc: denied { open } for pid=3067 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 19.776680][ T27] audit: type=1400 audit(1696599114.105:84): avc: denied { read } for pid=2759 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 19.781824][ T27] audit: type=1400 audit(1696599114.105:85): avc: denied { mounton } for pid=3075 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.782733][ T3075] cgroup: Unknown subsys name 'net' [ 19.784809][ T27] audit: type=1400 audit(1696599114.105:86): avc: denied { mount } for pid=3075 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.788430][ T27] audit: type=1400 audit(1696599114.115:87): avc: denied { unmount } for pid=3075 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.924347][ T3075] cgroup: Unknown subsys name 'rlimit' [ 20.044384][ T27] audit: type=1400 audit(1696599114.375:88): avc: denied { mounton } for pid=3075 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.073172][ T27] audit: type=1400 audit(1696599114.375:89): avc: denied { mount } for pid=3075 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.074952][ T3078] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.096361][ T27] audit: type=1400 audit(1696599114.375:90): avc: denied { create } for pid=3075 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 20.132045][ T3075] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.142554][ T3067] syz-fuzzer[3067]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 20.294293][ T3081] chnl_net:caif_netlink_parms(): no params data found [ 20.323108][ T3081] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.330254][ T3081] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.337454][ T3081] bridge_slave_0: entered allmulticast mode [ 20.343617][ T3081] bridge_slave_0: entered promiscuous mode [ 20.350027][ T3081] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.357150][ T3081] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.364232][ T3081] bridge_slave_1: entered allmulticast mode [ 20.370623][ T3081] bridge_slave_1: entered promiscuous mode [ 20.385444][ T3081] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 20.395187][ T3081] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 20.412349][ T3081] team0: Port device team_slave_0 added [ 20.418548][ T3081] team0: Port device team_slave_1 added [ 20.431493][ T3081] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 20.438432][ T3081] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 20.464365][ T3081] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 20.475302][ T3081] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 20.482242][ T3081] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 20.508199][ T3081] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 20.530633][ T3081] hsr_slave_0: entered promiscuous mode [ 20.536476][ T3081] hsr_slave_1: entered promiscuous mode [ 20.588216][ T3081] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 20.596207][ T3081] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 20.604410][ T3081] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 20.613009][ T3081] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 20.626203][ T3081] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.633341][ T3081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.640580][ T3081] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.647755][ T3081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.675123][ T3081] 8021q: adding VLAN 0 to HW filter on device bond0 [ 20.685834][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.693529][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.704491][ T3081] 8021q: adding VLAN 0 to HW filter on device team0 [ 20.713862][ T3098] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.720923][ T3098] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.734351][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.741389][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.758789][ T3081] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 20.800301][ T3081] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 20.851201][ T3081] veth0_vlan: entered promiscuous mode [ 20.860110][ T3081] veth1_vlan: entered promiscuous mode [ 20.873504][ T3081] veth0_macvtap: entered promiscuous mode [ 20.880181][ T3081] veth1_macvtap: entered promiscuous mode [ 20.890962][ T3081] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 20.901744][ T3081] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 20.910313][ T3081] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 20.919057][ T3081] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 20.927850][ T3081] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 20.936538][ T3081] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 2023/10/06 13:31:55 building call list... executing program [ 23.097390][ T3069] can: request_module (can-proto-0) failed. [ 23.108750][ T3069] can: request_module (can-proto-0) failed. [ 23.120755][ T3069] can: request_module (can-proto-0) failed. [ 23.271975][ T3069] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 23.376258][ T3069] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 24.633707][ T3081] syz-executor.0 (3081) used greatest stack depth: 10656 bytes left [ 24.644276][ T1626] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 26.835817][ T1626] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 26.885761][ T1626] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 26.946280][ T1626] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 27.025070][ T27] kauditd_printk_skb: 72 callbacks suppressed [ 27.025087][ T27] audit: type=1400 audit(1696599121.355:163): avc: denied { search } for pid=2815 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 27.052354][ T27] audit: type=1400 audit(1696599121.355:164): avc: denied { read } for pid=2815 comm="dhcpcd" name="n25" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 27.073806][ T27] audit: type=1400 audit(1696599121.355:165): avc: denied { open } for pid=2815 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 27.096632][ T27] audit: type=1400 audit(1696599121.355:166): avc: denied { getattr } for pid=2815 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 27.119918][ T27] audit: type=1400 audit(1696599121.375:167): avc: denied { read } for pid=3182 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 27.142974][ T27] audit: type=1400 audit(1696599121.375:168): avc: denied { open } for pid=3182 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 27.167857][ T27] audit: type=1400 audit(1696599121.375:169): avc: denied { getattr } for pid=3182 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 27.193128][ T27] audit: type=1400 audit(1696599121.415:170): avc: denied { write } for pid=3181 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=341 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 27.216018][ T27] audit: type=1400 audit(1696599121.415:171): avc: denied { add_name } for pid=3181 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 27.238361][ T27] audit: type=1400 audit(1696599121.415:172): avc: denied { create } for pid=3181 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 27.665187][ T1626] hsr_slave_0: left promiscuous mode [ 27.670803][ T1626] hsr_slave_1: left promiscuous mode [ 27.676748][ T1626] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 27.684283][ T1626] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 27.692039][ T1626] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 27.699460][ T1626] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 27.707392][ T1626] bridge_slave_1: left allmulticast mode [ 27.713027][ T1626] bridge_slave_1: left promiscuous mode [ 27.718647][ T1626] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.726617][ T1626] bridge_slave_0: left allmulticast mode [ 27.732251][ T1626] bridge_slave_0: left promiscuous mode [ 27.737945][ T1626] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.747702][ T1626] veth1_macvtap: left promiscuous mode [ 27.753201][ T1626] veth0_macvtap: left promiscuous mode [ 27.758701][ T1626] veth1_vlan: left promiscuous mode [ 27.763993][ T1626] veth0_vlan: left promiscuous mode [ 27.826108][ T1626] team0 (unregistering): Port device team_slave_1 removed [ 27.835296][ T1626] team0 (unregistering): Port device team_slave_0 removed [ 27.844167][ T1626] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 27.854903][ T1626] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 27.878817][ T1626] bond0 (unregistering): Released all slaves [ 34.153233][ C1] ================================================================== [ 34.161314][ C1] BUG: KCSAN: data-race in tick_sched_timer / tick_sched_timer [ 34.168843][ C1] [ 34.171140][ C1] write to 0xffffffff85f16b00 of 4 bytes by interrupt on cpu 0: [ 34.178741][ C1] tick_sched_timer+0x2ad/0x2c0 [ 34.183917][ C1] __hrtimer_run_queues+0x217/0x700 [ 34.189086][ C1] hrtimer_interrupt+0x20d/0x7b0 [ 34.194006][ C1] __sysvec_apic_timer_interrupt+0x52/0x190 [ 34.199898][ C1] sysvec_apic_timer_interrupt+0x68/0x80 [ 34.205510][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 34.211467][ C1] acpi_safe_halt+0x20/0x30 [ 34.215951][ C1] acpi_idle_do_entry+0x19/0x30 [ 34.220796][ C1] acpi_idle_enter+0x96/0xb0 [ 34.225361][ C1] cpuidle_enter_state+0xc6/0x260 [ 34.230362][ C1] cpuidle_enter+0x40/0x60 [ 34.234751][ C1] do_idle+0x194/0x230 [ 34.238796][ C1] cpu_startup_entry+0x24/0x30 [ 34.243534][ C1] rest_init+0xf3/0x100 [ 34.247679][ C1] arch_call_rest_init+0x9/0x10 [ 34.252503][ C1] start_kernel+0x57d/0x5d0 [ 34.256981][ C1] x86_64_start_reservations+0x2a/0x30 [ 34.262411][ C1] x86_64_start_kernel+0x94/0xa0 [ 34.267323][ C1] secondary_startup_64_no_verify+0x167/0x16b [ 34.273368][ C1] [ 34.275667][ C1] read to 0xffffffff85f16b00 of 4 bytes by interrupt on cpu 1: [ 34.283184][ C1] tick_sched_timer+0x3d/0x2c0 [ 34.287928][ C1] __hrtimer_run_queues+0x217/0x700 [ 34.293100][ C1] hrtimer_interrupt+0x20d/0x7b0 [ 34.298012][ C1] __sysvec_apic_timer_interrupt+0x52/0x190 [ 34.303884][ C1] sysvec_apic_timer_interrupt+0x68/0x80 [ 34.309494][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 34.315453][ C1] acpi_safe_halt+0x20/0x30 [ 34.319938][ C1] acpi_idle_do_entry+0x19/0x30 [ 34.324781][ C1] acpi_idle_enter+0x96/0xb0 [ 34.329378][ C1] cpuidle_enter_state+0xc6/0x260 [ 34.334380][ C1] cpuidle_enter+0x40/0x60 [ 34.338771][ C1] do_idle+0x194/0x230 [ 34.342819][ C1] cpu_startup_entry+0x24/0x30 [ 34.347559][ C1] start_secondary+0x82/0x90 [ 34.352121][ C1] secondary_startup_64_no_verify+0x167/0x16b [ 34.358163][ C1] [ 34.360460][ C1] value changed: 0xffffffff -> 0x00000000 [ 34.366150][ C1] [ 34.368446][ C1] Reported by Kernel Concurrency Sanitizer on: [ 34.374572][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.6.0-rc4-syzkaller-00176-gb78b18fb8ee1 #0 [ 34.384262][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 34.394294][ C1] ================================================================== [ 34.404000][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 34.404010][ T27] audit: type=1400 audit(1696599128.735:177): avc: denied { remove_name } for pid=2759 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 34.432518][ T27] audit: type=1400 audit(1696599128.735:178): avc: denied { rename } for pid=2759 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 34.454723][ T27] audit: type=1400 audit(1696599128.735:179): avc: denied { create } for pid=2759 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1