Warning: Permanently added '10.128.1.103' (ED25519) to the list of known hosts. 2023/07/14 20:40:55 fuzzer started 2023/07/14 20:40:55 dialing manager at 10.128.0.163:30015 2023/07/14 20:40:55 checking machine... 2023/07/14 20:40:55 checking revisions... 2023/07/14 20:40:55 testing simple program... [ 31.076341][ T26] audit: type=1400 audit(1689367255.555:81): avc: denied { getattr } for pid=3060 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 31.099992][ T26] audit: type=1400 audit(1689367255.555:82): avc: denied { read } for pid=3060 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 31.102282][ T3069] cgroup: Unknown subsys name 'net' [ 31.121164][ T26] audit: type=1400 audit(1689367255.555:83): avc: denied { open } for pid=3060 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 31.149708][ T26] audit: type=1400 audit(1689367255.575:84): avc: denied { mounton } for pid=3069 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 31.172521][ T26] audit: type=1400 audit(1689367255.575:85): avc: denied { mount } for pid=3069 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 31.194698][ T26] audit: type=1400 audit(1689367255.605:86): avc: denied { unmount } for pid=3069 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 31.303718][ T3069] cgroup: Unknown subsys name 'rlimit' [ 31.423436][ T26] audit: type=1400 audit(1689367255.905:87): avc: denied { mounton } for pid=3069 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 31.449376][ T26] audit: type=1400 audit(1689367255.905:88): avc: denied { mount } for pid=3069 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 31.472776][ T26] audit: type=1400 audit(1689367255.905:89): avc: denied { create } for pid=3069 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.480439][ T3070] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 31.493324][ T26] audit: type=1400 audit(1689367255.905:90): avc: denied { write } for pid=3069 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.513185][ T3069] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 31.534278][ T3063] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=3063 'syz-fuzzer' [ 31.720556][ T3073] chnl_net:caif_netlink_parms(): no params data found [ 31.754144][ T3073] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.761263][ T3073] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.768663][ T3073] bridge_slave_0: entered allmulticast mode [ 31.775317][ T3073] bridge_slave_0: entered promiscuous mode [ 31.782360][ T3073] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.789427][ T3073] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.796870][ T3073] bridge_slave_1: entered allmulticast mode [ 31.803327][ T3073] bridge_slave_1: entered promiscuous mode [ 31.819912][ T3073] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.830381][ T3073] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.849581][ T3073] team0: Port device team_slave_0 added [ 31.856134][ T3073] team0: Port device team_slave_1 added [ 31.871409][ T3073] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.878379][ T3073] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.904361][ T3073] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.915504][ T3073] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.922565][ T3073] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.948510][ T3073] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.973080][ T3073] hsr_slave_0: entered promiscuous mode [ 31.979075][ T3073] hsr_slave_1: entered promiscuous mode [ 32.041539][ T3073] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 32.050202][ T3073] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 32.058895][ T3073] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 32.067655][ T3073] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 32.082175][ T3073] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.089413][ T3073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.096745][ T3073] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.103869][ T3073] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.135225][ T3073] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.147134][ T2924] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.155227][ T2924] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.167852][ T3073] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.178599][ T899] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.185723][ T899] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.204357][ T899] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.211638][ T899] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.267935][ T3073] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.334063][ T3073] veth0_vlan: entered promiscuous mode [ 32.342707][ T3073] veth1_vlan: entered promiscuous mode [ 32.358098][ T3073] veth0_macvtap: entered promiscuous mode [ 32.365708][ T3073] veth1_macvtap: entered promiscuous mode [ 32.377520][ T3073] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.389431][ T3073] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.398350][ T3073] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.407335][ T3073] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.416248][ T3073] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.425030][ T3073] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 2023/07/14 20:40:56 building call list... executing program [ 35.158388][ T3068] can: request_module (can-proto-0) failed. [ 35.172132][ T3068] can: request_module (can-proto-0) failed. [ 35.185914][ T3068] can: request_module (can-proto-0) failed. [ 35.382738][ T3068] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 35.520231][ T3068] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 36.142012][ T3073] syz-executor.0 (3073) used greatest stack depth: 10696 bytes left [ 36.155442][ T31] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.334262][ T31] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.394682][ T31] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.455273][ T31] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.539249][ T26] kauditd_printk_skb: 72 callbacks suppressed [ 38.539261][ T26] audit: type=1400 audit(1689367263.015:163): avc: denied { search } for pid=2804 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 38.567080][ T26] audit: type=1400 audit(1689367263.025:164): avc: denied { read } for pid=2804 comm="dhcpcd" name="n25" dev="tmpfs" ino=399 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 38.588591][ T26] audit: type=1400 audit(1689367263.025:165): avc: denied { open } for pid=2804 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=399 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 38.611471][ T26] audit: type=1400 audit(1689367263.025:166): avc: denied { getattr } for pid=2804 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=399 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 38.634735][ T26] audit: type=1400 audit(1689367263.045:167): avc: denied { read } for pid=3171 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=341 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 38.657865][ T26] audit: type=1400 audit(1689367263.045:168): avc: denied { open } for pid=3171 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=341 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 38.683547][ T26] audit: type=1400 audit(1689367263.045:169): avc: denied { getattr } for pid=3171 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=341 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 38.708748][ T26] audit: type=1400 audit(1689367263.105:170): avc: denied { write } for pid=3170 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=340 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 38.731705][ T26] audit: type=1400 audit(1689367263.105:171): avc: denied { add_name } for pid=3170 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 38.754050][ T26] audit: type=1400 audit(1689367263.105:172): avc: denied { create } for pid=3170 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 39.173340][ T31] hsr_slave_0: left promiscuous mode [ 39.180168][ T31] hsr_slave_1: left promiscuous mode [ 39.186407][ T31] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 39.194232][ T31] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 39.202629][ T31] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 39.210427][ T31] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 39.218392][ T31] bridge_slave_1: left allmulticast mode [ 39.224125][ T31] bridge_slave_1: left promiscuous mode [ 39.229920][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.237897][ T31] bridge_slave_0: left allmulticast mode [ 39.243630][ T31] bridge_slave_0: left promiscuous mode [ 39.249353][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.259070][ T31] veth1_macvtap: left promiscuous mode [ 39.264928][ T31] veth0_macvtap: left promiscuous mode [ 39.270490][ T31] veth1_vlan: left promiscuous mode [ 39.275841][ T31] veth0_vlan: left promiscuous mode [ 39.355277][ T31] team0 (unregistering): Port device team_slave_1 removed [ 39.365031][ T31] team0 (unregistering): Port device team_slave_0 removed [ 39.374669][ T31] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 39.385604][ T31] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 39.412723][ T31] bond0 (unregistering): Released all slaves [ 50.422515][ T26] kauditd_printk_skb: 4 callbacks suppressed [ 50.422528][ T26] audit: type=1400 audit(1689367274.905:177): avc: denied { remove_name } for pid=2748 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 50.451614][ T26] audit: type=1400 audit(1689367274.905:178): avc: denied { rename } for pid=2748 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 50.474139][ T26] audit: type=1400 audit(1689367274.905:179): avc: denied { create } for pid=2748 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 69.311548][ T0] ================================================================== [ 69.319692][ T0] BUG: KCSAN: data-race in tick_nohz_idle_stop_tick / tick_nohz_idle_stop_tick [ 69.328735][ T0] [ 69.331064][ T0] write to 0xffffffff85f11070 of 4 bytes by task 0 on cpu 1: [ 69.338425][ T0] tick_nohz_idle_stop_tick+0x1d9/0x6c0 [ 69.344002][ T0] do_idle+0x177/0x230 [ 69.348089][ T0] cpu_startup_entry+0x18/0x20 [ 69.352853][ T0] start_secondary+0x82/0x90 [ 69.357440][ T0] secondary_startup_64_no_verify+0x168/0x16b [ 69.363522][ T0] [ 69.365852][ T0] read to 0xffffffff85f11070 of 4 bytes by task 0 on cpu 0: [ 69.373481][ T0] tick_nohz_idle_stop_tick+0x1b1/0x6c0 [ 69.379044][ T0] do_idle+0x177/0x230 [ 69.383116][ T0] cpu_startup_entry+0x18/0x20 [ 69.387880][ T0] rest_init+0xf3/0x100 [ 69.392046][ T0] arch_call_rest_init+0x9/0x10 [ 69.396904][ T0] start_kernel+0x57d/0x5d0 [ 69.401491][ T0] x86_64_start_reservations+0x2a/0x30 [ 69.406958][ T0] x86_64_start_kernel+0x94/0xa0 [ 69.411908][ T0] secondary_startup_64_no_verify+0x168/0x16b [ 69.417982][ T0] [ 69.420299][ T0] value changed: 0x00000001 -> 0xffffffff [ 69.426006][ T0] [ 69.428330][ T0] Reported by Kernel Concurrency Sanitizer on: [ 69.434553][ T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.5.0-rc1-syzkaller-00196-gbde7f150276b #0 [ 69.444391][ T0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 69.454534][ T0] ==================================================================