Warning: Permanently added '10.128.0.88' (ED25519) to the list of known hosts. 2023/09/06 09:19:56 fuzzer started 2023/09/06 09:19:56 dialing manager at 10.128.0.163:30015 2023/09/06 09:19:56 checking machine... 2023/09/06 09:19:56 checking revisions... 2023/09/06 09:19:56 testing simple program... [ 26.000991][ T27] audit: type=1400 audit(1693991996.803:81): avc: denied { getattr } for pid=3070 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 26.024674][ T27] audit: type=1400 audit(1693991996.803:82): avc: denied { read } for pid=3070 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 26.028009][ T3078] cgroup: Unknown subsys name 'net' [ 26.045748][ T27] audit: type=1400 audit(1693991996.803:83): avc: denied { open } for pid=3070 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 26.074155][ T27] audit: type=1400 audit(1693991996.833:84): avc: denied { mounton } for pid=3078 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.097121][ T27] audit: type=1400 audit(1693991996.833:85): avc: denied { mount } for pid=3078 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.119296][ T27] audit: type=1400 audit(1693991996.863:86): avc: denied { unmount } for pid=3078 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.258371][ T3078] cgroup: Unknown subsys name 'rlimit' [ 26.266777][ T27] audit: type=1400 audit(1693991997.073:87): avc: denied { read } for pid=2760 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 26.378747][ T27] audit: type=1400 audit(1693991997.183:88): avc: denied { mounton } for pid=3078 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.403609][ T27] audit: type=1400 audit(1693991997.183:89): avc: denied { mount } for pid=3078 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.423900][ T3079] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.427011][ T27] audit: type=1400 audit(1693991997.183:90): avc: denied { create } for pid=3078 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.461017][ T3078] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.471870][ T3078] syz-executor (3078) used greatest stack depth: 11608 bytes left [ 26.471924][ T3074] syz-fuzzer[3074]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 26.668002][ T3084] chnl_net:caif_netlink_parms(): no params data found [ 26.702064][ T3084] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.709185][ T3084] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.716299][ T3084] bridge_slave_0: entered allmulticast mode [ 26.722685][ T3084] bridge_slave_0: entered promiscuous mode [ 26.729460][ T3084] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.736634][ T3084] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.743769][ T3084] bridge_slave_1: entered allmulticast mode [ 26.750175][ T3084] bridge_slave_1: entered promiscuous mode [ 26.766079][ T3084] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.776297][ T3084] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.795592][ T3084] team0: Port device team_slave_0 added [ 26.802065][ T3084] team0: Port device team_slave_1 added [ 26.817397][ T3084] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 26.824404][ T3084] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 26.850409][ T3084] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 26.861595][ T3084] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 26.868583][ T3084] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 26.894475][ T3084] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 26.919450][ T3084] hsr_slave_0: entered promiscuous mode [ 26.925492][ T3084] hsr_slave_1: entered promiscuous mode [ 26.988991][ T3084] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 26.997882][ T3084] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 27.006558][ T3084] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 27.015344][ T3084] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 27.029994][ T3084] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.037084][ T3084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.044373][ T3084] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.051450][ T3084] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.083249][ T3084] 8021q: adding VLAN 0 to HW filter on device bond0 [ 27.094520][ T3084] 8021q: adding VLAN 0 to HW filter on device team0 [ 27.103339][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.111356][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.125703][ T836] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.132846][ T836] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.148539][ T3100] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.155693][ T3100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.172423][ T3084] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 27.182883][ T3084] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 27.235932][ T3084] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.298381][ T3084] veth0_vlan: entered promiscuous mode [ 27.306164][ T3084] veth1_vlan: entered promiscuous mode [ 27.322875][ T3084] veth0_macvtap: entered promiscuous mode [ 27.332712][ T3084] veth1_macvtap: entered promiscuous mode [ 27.344843][ T3084] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 27.356053][ T3084] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.365189][ T3084] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.374033][ T3084] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.382804][ T3084] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.391767][ T3084] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 2023/09/06 09:19:58 building call list... executing program [ 30.161903][ T3076] can: request_module (can-proto-0) failed. [ 30.175485][ T3076] can: request_module (can-proto-0) failed. [ 30.189295][ T3076] can: request_module (can-proto-0) failed. [ 30.382605][ T3076] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 30.512852][ T3076] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 31.026868][ T3084] syz-executor.0 (3084) used greatest stack depth: 10392 bytes left [ 31.038243][ T1478] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 33.509321][ T1478] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 33.569587][ T1478] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 33.629611][ T1478] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 33.711421][ T27] kauditd_printk_skb: 72 callbacks suppressed [ 33.711442][ T27] audit: type=1400 audit(1693992004.513:163): avc: denied { search } for pid=2816 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 33.739161][ T27] audit: type=1400 audit(1693992004.513:164): avc: denied { read } for pid=2816 comm="dhcpcd" name="n25" dev="tmpfs" ino=399 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 33.760715][ T27] audit: type=1400 audit(1693992004.513:165): avc: denied { open } for pid=2816 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=399 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 33.783620][ T27] audit: type=1400 audit(1693992004.513:166): avc: denied { getattr } for pid=2816 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=399 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 33.806865][ T27] audit: type=1400 audit(1693992004.543:167): avc: denied { read } for pid=3180 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 33.829806][ T27] audit: type=1400 audit(1693992004.543:168): avc: denied { open } for pid=3180 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 33.854763][ T27] audit: type=1400 audit(1693992004.543:169): avc: denied { getattr } for pid=3180 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 33.880022][ T27] audit: type=1400 audit(1693992004.603:170): avc: denied { write } for pid=3179 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=341 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 33.903008][ T27] audit: type=1400 audit(1693992004.603:171): avc: denied { add_name } for pid=3179 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 33.925772][ T27] audit: type=1400 audit(1693992004.603:172): avc: denied { create } for pid=3179 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 34.378298][ T1478] hsr_slave_0: left promiscuous mode [ 34.384243][ T1478] hsr_slave_1: left promiscuous mode [ 34.390470][ T1478] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 34.397951][ T1478] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 34.405627][ T1478] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 34.413119][ T1478] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 34.420804][ T1478] bridge_slave_1: left allmulticast mode [ 34.426474][ T1478] bridge_slave_1: left promiscuous mode [ 34.432183][ T1478] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.439877][ T1478] bridge_slave_0: left allmulticast mode [ 34.445530][ T1478] bridge_slave_0: left promiscuous mode [ 34.451236][ T1478] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.460718][ T1478] veth1_macvtap: left promiscuous mode [ 34.466222][ T1478] veth0_macvtap: left promiscuous mode [ 34.471820][ T1478] veth1_vlan: left promiscuous mode [ 34.477164][ T1478] veth0_vlan: left promiscuous mode [ 34.553352][ T1478] team0 (unregistering): Port device team_slave_1 removed [ 34.562842][ T1478] team0 (unregistering): Port device team_slave_0 removed [ 34.573474][ T1478] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 34.584759][ T1478] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 34.613385][ T1478] bond0 (unregistering): Released all slaves [ 41.346990][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 41.347001][ T27] audit: type=1400 audit(1693992012.153:177): avc: denied { remove_name } for pid=2760 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 41.375643][ T27] audit: type=1400 audit(1693992012.153:178): avc: denied { rename } for pid=2760 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 41.397889][ T27] audit: type=1400 audit(1693992012.153:179): avc: denied { create } for pid=2760 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 49.146573][ T0] ================================================================== [ 49.154708][ T0] BUG: KCSAN: data-race in tick_nohz_idle_stop_tick / tick_nohz_idle_stop_tick [ 49.163676][ T0] [ 49.165991][ T0] write to 0xffffffff85f16a40 of 4 bytes by task 0 on cpu 1: [ 49.173364][ T0] tick_nohz_idle_stop_tick+0x1d8/0x760 [ 49.178925][ T0] do_idle+0x177/0x230 [ 49.183024][ T0] cpu_startup_entry+0x18/0x20 [ 49.187904][ T0] start_secondary+0x82/0x90 [ 49.192491][ T0] secondary_startup_64_no_verify+0x167/0x16b [ 49.198558][ T0] [ 49.200879][ T0] read to 0xffffffff85f16a40 of 4 bytes by task 0 on cpu 0: [ 49.208166][ T0] tick_nohz_idle_stop_tick+0x1b0/0x760 [ 49.213724][ T0] do_idle+0x177/0x230 [ 49.217806][ T0] cpu_startup_entry+0x18/0x20 [ 49.222584][ T0] rest_init+0xf3/0x100 [ 49.226778][ T0] arch_call_rest_init+0x9/0x10 [ 49.231821][ T0] start_kernel+0x57d/0x5d0 [ 49.236349][ T0] x86_64_start_reservations+0x2a/0x30 [ 49.241823][ T0] x86_64_start_kernel+0x94/0xa0 [ 49.246770][ T0] secondary_startup_64_no_verify+0x167/0x16b [ 49.252855][ T0] [ 49.255196][ T0] value changed: 0x00000001 -> 0xffffffff [ 49.260907][ T0] [ 49.263247][ T0] Reported by Kernel Concurrency Sanitizer on: [ 49.269391][ T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.5.0-syzkaller-11938-g65d6e954e378 #0 [ 49.278680][ T0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 49.288795][ T0] ==================================================================