Warning: Permanently added '10.128.0.88' (ED25519) to the list of known hosts. 2023/12/04 15:20:39 ignoring optional flag "sandboxArg"="0" 2023/12/04 15:20:39 parsed 1 programs [ 21.088968][ T27] audit: type=1400 audit(1701703239.548:81): avc: denied { getattr } for pid=3073 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.112758][ T3078] cgroup: Unknown subsys name 'net' [ 21.118129][ T27] audit: type=1400 audit(1701703239.558:82): avc: denied { read } for pid=3073 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.139277][ T27] audit: type=1400 audit(1701703239.558:83): avc: denied { open } for pid=3073 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.162689][ T27] audit: type=1400 audit(1701703239.558:84): avc: denied { mounton } for pid=3078 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.185621][ T27] audit: type=1400 audit(1701703239.558:85): avc: denied { mount } for pid=3078 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.208750][ T27] audit: type=1400 audit(1701703239.568:86): avc: denied { unmount } for pid=3078 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.317440][ T3078] cgroup: Unknown subsys name 'rlimit' [ 21.437450][ T27] audit: type=1400 audit(1701703239.898:87): avc: denied { mounton } for pid=3078 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.462589][ T27] audit: type=1400 audit(1701703239.898:88): avc: denied { mount } for pid=3078 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.485953][ T27] audit: type=1400 audit(1701703239.898:89): avc: denied { create } for pid=3078 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.493975][ T3079] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.506422][ T27] audit: type=1400 audit(1701703239.898:90): avc: denied { write } for pid=3078 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2023/12/04 15:20:40 executed programs: 0 [ 21.583134][ T3078] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.727381][ T3084] chnl_net:caif_netlink_parms(): no params data found [ 21.757491][ T3084] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.764630][ T3084] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.771996][ T3084] bridge_slave_0: entered allmulticast mode [ 21.778442][ T3084] bridge_slave_0: entered promiscuous mode [ 21.784923][ T3084] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.792063][ T3084] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.799206][ T3084] bridge_slave_1: entered allmulticast mode [ 21.805650][ T3084] bridge_slave_1: entered promiscuous mode [ 21.820946][ T3084] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 21.831227][ T3084] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 21.848614][ T3084] team0: Port device team_slave_0 added [ 21.854861][ T3084] team0: Port device team_slave_1 added [ 21.868704][ T3084] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 21.875699][ T3084] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 21.901672][ T3084] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 21.912694][ T3084] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 21.919735][ T3084] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 21.945731][ T3084] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 21.969577][ T3084] hsr_slave_0: entered promiscuous mode [ 21.975623][ T3084] hsr_slave_1: entered promiscuous mode [ 22.030255][ T3084] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 22.038722][ T3084] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 22.046877][ T3084] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 22.055271][ T3084] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 22.068751][ T3084] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.075884][ T3084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.083181][ T3084] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.090232][ T3084] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.117631][ T3084] 8021q: adding VLAN 0 to HW filter on device bond0 [ 22.128027][ T3100] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.136408][ T3100] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.148757][ T3084] 8021q: adding VLAN 0 to HW filter on device team0 [ 22.158683][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.165760][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.177070][ T3101] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.184201][ T3101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.205087][ T3084] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 22.246448][ T3084] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 22.300806][ T3084] veth0_vlan: entered promiscuous mode [ 22.308024][ T3084] veth1_vlan: entered promiscuous mode [ 22.320125][ T3084] veth0_macvtap: entered promiscuous mode [ 22.329542][ T3084] veth1_macvtap: entered promiscuous mode [ 22.340215][ T3084] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 22.350338][ T3084] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 22.359417][ T3084] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 22.368435][ T3084] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 22.377286][ T3084] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 22.386189][ T3084] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 2023/12/04 15:20:45 executed programs: 541 2023/12/04 15:20:50 executed programs: 1208 [ 32.346649][ T27] kauditd_printk_skb: 15 callbacks suppressed [ 32.346662][ T27] audit: type=1400 audit(1701703250.808:106): avc: denied { append } for pid=2761 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 32.375854][ T27] audit: type=1400 audit(1701703250.808:107): avc: denied { open } for pid=2761 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 32.398990][ T27] audit: type=1400 audit(1701703250.808:108): avc: denied { getattr } for pid=2761 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 2023/12/04 15:20:55 executed programs: 1861 2023/12/04 15:21:00 executed programs: 2526 [ 41.983832][ T8268] ================================================================== [ 41.992026][ T8268] BUG: KCSAN: data-race in exit_mm / mm_update_next_owner [ 42.000018][ T8268] [ 42.002327][ T8268] write to 0xffff888102a05620 of 8 bytes by task 8269 on cpu 1: [ 42.010026][ T8268] exit_mm+0x9b/0x180 [ 42.014008][ T8268] do_exit+0x585/0x16d0 [ 42.018154][ T8268] do_group_exit+0x101/0x150 [ 42.022735][ T8268] get_signal+0xf4e/0x10a0 [ 42.027228][ T8268] arch_do_signal_or_restart+0x95/0x4b0 [ 42.032858][ T8268] exit_to_user_mode_loop+0x6f/0xe0 [ 42.038043][ T8268] exit_to_user_mode_prepare+0x6c/0xb0 [ 42.043498][ T8268] syscall_exit_to_user_mode+0x26/0x140 [ 42.049045][ T8268] do_syscall_64+0x50/0x110 [ 42.053537][ T8268] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 42.059424][ T8268] [ 42.062338][ T8268] read to 0xffff888102a05620 of 8 bytes by task 8268 on cpu 0: [ 42.069873][ T8268] mm_update_next_owner+0x1a5/0x410 [ 42.075073][ T8268] exit_mm+0xdb/0x180 [ 42.079147][ T8268] do_exit+0x585/0x16d0 [ 42.083296][ T8268] do_group_exit+0x141/0x150 [ 42.087979][ T8268] __x64_sys_exit_group+0x1f/0x20 [ 42.093028][ T8268] do_syscall_64+0x44/0x110 [ 42.097888][ T8268] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 42.103953][ T8268] [ 42.106260][ T8268] value changed: 0xffff888100c38540 -> 0x0000000000000000 [ 42.113365][ T8268] [ 42.115672][ T8268] Reported by Kernel Concurrency Sanitizer on: [ 42.121800][ T8268] CPU: 0 PID: 8268 Comm: syz-executor.0 Not tainted 6.7.0-rc4-syzkaller #0 [ 42.130386][ T8268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 42.140435][ T8268] ==================================================================