[ 178.209039][ T28] audit: type=1400 audit(178.130:56): avc: denied { read write } for pid=3077 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 178.212439][ T28] audit: type=1400 audit(178.130:57): avc: denied { open } for pid=3077 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:47300' (ED25519) to the list of known hosts. [ 227.744365][ T28] audit: type=1400 audit(227.650:58): avc: denied { execute } for pid=3089 comm="sh" name="syz-execprog" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 227.748301][ T28] audit: type=1400 audit(227.670:59): avc: denied { execute_no_trans } for pid=3089 comm="sh" path="/syz-execprog" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:04:34 parsed 1 programs [ 274.340086][ T28] audit: type=1400 audit(274.260:60): avc: denied { node_bind } for pid=3089 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 277.127173][ T28] audit: type=1400 audit(277.040:61): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=808 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 277.130759][ T28] audit: type=1400 audit(277.050:62): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 277.141916][ T3097] cgroup: Unknown subsys name 'net' [ 277.147576][ T28] audit: type=1400 audit(277.060:63): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 277.283489][ T3097] cgroup: Unknown subsys name 'cpuset' [ 277.286751][ T3097] cgroup: Unknown subsys name 'hugetlb' [ 277.287545][ T3097] cgroup: Unknown subsys name 'rlimit' [ 277.467226][ T28] audit: type=1400 audit(277.380:64): avc: denied { setattr } for pid=3097 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 277.470125][ T28] audit: type=1400 audit(277.390:65): avc: denied { create } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 277.473323][ T28] audit: type=1400 audit(277.390:66): avc: denied { write } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 277.473673][ T28] audit: type=1400 audit(277.390:67): avc: denied { module_request } for pid=3097 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 277.550511][ T28] audit: type=1400 audit(277.470:68): avc: denied { read } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 277.555786][ T28] audit: type=1400 audit(277.470:69): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 277.751099][ T3100] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 285.983602][ T3097] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 292.787191][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 292.787658][ T28] audit: type=1400 audit(292.700:75): avc: denied { execmem } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 292.813172][ T28] audit: type=1400 audit(292.730:76): avc: denied { read } for pid=3103 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 292.814656][ T28] audit: type=1400 audit(292.730:77): avc: denied { open } for pid=3103 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 292.820203][ T28] audit: type=1400 audit(292.740:78): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 292.927773][ T28] audit: type=1400 audit(292.840:79): avc: denied { ioctl } for pid=3103 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 292.974801][ T28] audit: type=1400 audit(292.890:80): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 292.982001][ T28] audit: type=1400 audit(292.900:81): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.6Udz52/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 292.986640][ T28] audit: type=1400 audit(292.900:82): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 293.002358][ T28] audit: type=1400 audit(292.920:83): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.6Udz52/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 293.005939][ T28] audit: type=1400 audit(292.920:84): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.6Udz52/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 293.105176][ T3103] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 296.181848][ T3155] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 296.188735][ T3155] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 296.926413][ T3155] hsr_slave_0: entered promiscuous mode [ 296.932531][ T3155] hsr_slave_1: entered promiscuous mode [ 297.279618][ T3155] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 297.289405][ T3155] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 297.299501][ T3155] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 297.306162][ T3155] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 298.004047][ T3155] 8021q: adding VLAN 0 to HW filter on device bond0 [ 300.436144][ T3155] veth0_vlan: entered promiscuous mode [ 300.455562][ T3155] veth1_vlan: entered promiscuous mode [ 300.521563][ T3155] veth0_macvtap: entered promiscuous mode [ 300.533389][ T3155] veth1_macvtap: entered promiscuous mode [ 300.599099][ T1120] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.600838][ T1120] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.609957][ T1120] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.610324][ T1120] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.993093][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 300.993416][ T28] audit: type=1400 audit(300.910:95): avc: denied { create } for pid=3459 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 301.004380][ T478] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 301.171261][ T478] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 301.283052][ T478] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 301.370268][ T478] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 301.639117][ T478] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 301.647128][ T478] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 301.664903][ T478] bond0 (unregistering): Released all slaves [ 301.734818][ T478] hsr_slave_0: left promiscuous mode [ 301.736926][ T478] hsr_slave_1: left promiscuous mode [ 301.744060][ T478] veth1_macvtap: left promiscuous mode [ 301.744591][ T478] veth0_macvtap: left promiscuous mode [ 301.745072][ T478] veth1_vlan: left promiscuous mode [ 301.745310][ T478] veth0_vlan: left promiscuous mode [ 302.412383][ T28] audit: type=1401 audit(302.330:96): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 307.942984][ T28] audit: type=1400 audit(307.860:97): avc: denied { create } for pid=3632 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 307.946132][ T28] audit: type=1400 audit(307.860:98): avc: denied { sys_admin } for pid=3632 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 308.135681][ T28] audit: type=1400 audit(308.050:99): avc: denied { sys_chroot } for pid=3633 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 1970/01/01 00:05:12 executed programs: 0 [ 313.909504][ T3702] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 313.914489][ T3702] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 314.561097][ T3702] hsr_slave_0: entered promiscuous mode [ 314.562517][ T3702] hsr_slave_1: entered promiscuous mode [ 314.780145][ T3702] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 314.787541][ T3702] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 314.796691][ T3702] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 314.806065][ T3702] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 315.408782][ T3702] 8021q: adding VLAN 0 to HW filter on device bond0 [ 317.725467][ T3702] veth0_vlan: entered promiscuous mode [ 317.744645][ T3702] veth1_vlan: entered promiscuous mode [ 317.802494][ T3702] veth0_macvtap: entered promiscuous mode [ 317.813547][ T3702] veth1_macvtap: entered promiscuous mode [ 317.871599][ T3983] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 317.871962][ T3983] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 317.872285][ T3983] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 317.872497][ T3983] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:05:17 executed programs: 2 [ 319.314435][ T4010] ------------[ cut here ]------------ [ 319.314890][ T4010] WARNING: mm/highmem.c:714 at kmap_local_fork+0x60/0x64, CPU#1: syz.2.17/4010 [ 319.316464][ T4010] Modules linked in: [ 319.316968][ T4010] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 319.317661][ T4010] CPU: 1 UID: 0 PID: 4010 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 319.318224][ T4010] Hardware name: ARM-Versatile Express [ 319.318552][ T4010] Call trace: [ 319.318949][ T4010] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 319.319354][ T4010] r7:8281f940 r6:00000000 r5:822a7ed4 r4:00000001 [ 319.319579][ T4010] [<80201af0>] (show_stack) from [<8021e444>] (dump_stack_lvl+0x5c/0x70) [ 319.319808][ T4010] [<8021e3e8>] (dump_stack_lvl) from [<8021e470>] (dump_stack+0x18/0x1c) [ 319.320008][ T4010] r7:8281f940 r6:00000000 r5:850eec00 r4:82a80d14 [ 319.320186][ T4010] [<8021e458>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 319.320411][ T4010] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 319.320624][ T4010] r7:804d9cb0 [ 319.320704][ T4010] [<80202818>] (panic) from [<80250a4c>] (get_taint+0x0/0x1c) [ 319.320875][ T4010] r3:8280c544 r2:00000001 r1:8228ec2c r0:822964f4 [ 319.321037][ T4010] [<802509d4>] (check_panic_on_warn) from [<80250bc8>] (__warn+0x98/0x1ac) [ 319.321240][ T4010] [<80250b30>] (__warn) from [<80250e54>] (warn_slowpath_fmt+0x178/0x1f4) [ 319.321439][ T4010] r8:00000009 r7:822c2a54 r6:dfd71d84 r5:850eec00 r4:00000000 [ 319.321607][ T4010] [<80250ce0>] (warn_slowpath_fmt) from [<804d9cb0>] (kmap_local_fork+0x60/0x64) [ 319.321835][ T4010] r10:00010000 r9:dfd38000 r8:00000000 r7:00100000 r6:850eec00 r5:003d0f00 [ 319.322026][ T4010] r4:8511d400 [ 319.322136][ T4010] [<804d9c50>] (kmap_local_fork) from [<8024de04>] (copy_process+0x34c/0x1928) [ 319.322401][ T4010] r5:003d0f00 r4:8511d400 [ 319.322509][ T4010] [<8024dab8>] (copy_process) from [<8024f524>] (kernel_clone+0xac/0x428) [ 319.322802][ T4010] r10:850eec00 r9:850eec00 r8:00000000 r7:00100000 r6:dfd71ea8 r5:00000058 [ 319.323097][ T4010] r4:003d0f00 [ 319.323197][ T4010] [<8024f478>] (kernel_clone) from [<8024f994>] (__do_sys_clone3+0xf4/0x128) [ 319.323454][ T4010] r10:000001b3 r9:850eec00 r8:8020029c r7:000001b3 r6:0000006e r5:00000058 [ 319.323682][ T4010] r4:7ed3c678 [ 319.323805][ T4010] [<8024f8a0>] (__do_sys_clone3) from [<8024fc84>] (sys_clone3+0x10/0x14) [ 319.324050][ T4010] r5:026d8500 r4:003174b8 [ 319.324159][ T4010] [<8024fc74>] (sys_clone3) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 319.324424][ T4010] Exception stack(0xdfd71fa8 to 0xdfd71ff0) [ 319.324724][ T4010] 1fa0: 003174b8 026d8500 7ed3c678 00000058 0010ccfc 76f0b5c0 [ 319.324947][ T4010] 1fc0: 003174b8 026d8500 0000006e 000001b3 76f0b5c0 7ed3c73f 003d0f00 00000000 [ 319.325153][ T4010] 1fe0: 00000000 7ed3c644 00130fbc 0013114c [ 319.326913][ T4010] Rebooting in 86400 seconds..