[ 191.613012][ T28] audit: type=1400 audit(191.510:56): avc: denied { read write } for pid=3080 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 191.615500][ T28] audit: type=1400 audit(191.510:57): avc: denied { open } for pid=3080 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:65089' (ED25519) to the list of known hosts. [ 247.297133][ T28] audit: type=1400 audit(247.190:58): avc: denied { execute } for pid=3092 comm="sh" name="syz-execprog" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 247.302036][ T28] audit: type=1400 audit(247.200:59): avc: denied { execute_no_trans } for pid=3092 comm="sh" path="/syz-execprog" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:04:55 parsed 1 programs [ 295.261058][ T28] audit: type=1400 audit(295.160:60): avc: denied { node_bind } for pid=3092 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 298.920780][ T28] audit: type=1400 audit(298.820:61): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=808 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 298.925910][ T28] audit: type=1400 audit(298.820:62): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 298.946073][ T3101] cgroup: Unknown subsys name 'net' [ 298.956350][ T28] audit: type=1400 audit(298.850:63): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 299.127555][ T3101] cgroup: Unknown subsys name 'cpuset' [ 299.135751][ T3101] cgroup: Unknown subsys name 'hugetlb' [ 299.136837][ T3101] cgroup: Unknown subsys name 'rlimit' [ 299.386030][ T28] audit: type=1400 audit(299.280:64): avc: denied { setattr } for pid=3101 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 299.396052][ T28] audit: type=1400 audit(299.290:65): avc: denied { create } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 299.398323][ T28] audit: type=1400 audit(299.290:66): avc: denied { write } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 299.405648][ T28] audit: type=1400 audit(299.300:67): avc: denied { module_request } for pid=3101 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 299.487892][ T28] audit: type=1400 audit(299.380:68): avc: denied { read } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 299.494687][ T28] audit: type=1400 audit(299.390:69): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 299.722379][ T3104] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 307.997798][ T3101] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 317.453945][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 317.454546][ T28] audit: type=1400 audit(317.350:75): avc: denied { execmem } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 317.492245][ T28] audit: type=1400 audit(317.390:76): avc: denied { read } for pid=3106 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 317.509750][ T28] audit: type=1400 audit(317.390:77): avc: denied { open } for pid=3106 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 317.510395][ T28] audit: type=1400 audit(317.400:78): avc: denied { mounton } for pid=3106 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 317.643895][ T28] audit: type=1400 audit(317.540:79): avc: denied { mount } for pid=3106 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 317.650193][ T28] audit: type=1400 audit(317.540:80): avc: denied { mounton } for pid=3106 comm="syz-executor" path="/syzkaller.E8pcd3/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 317.656512][ T28] audit: type=1400 audit(317.550:81): avc: denied { mount } for pid=3106 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 317.667717][ T28] audit: type=1400 audit(317.560:82): avc: denied { mounton } for pid=3106 comm="syz-executor" path="/syzkaller.E8pcd3/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 317.674545][ T28] audit: type=1400 audit(317.570:83): avc: denied { mounton } for pid=3106 comm="syz-executor" path="/syzkaller.E8pcd3/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 317.695935][ T28] audit: type=1400 audit(317.590:84): avc: denied { unmount } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 317.818500][ T3106] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 323.101400][ T3232] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 323.110369][ T3232] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 323.964104][ T3232] hsr_slave_0: entered promiscuous mode [ 323.970785][ T3232] hsr_slave_1: entered promiscuous mode [ 324.333574][ T3232] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 324.354495][ T3232] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 324.364902][ T3232] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 324.372412][ T3232] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 325.131523][ T3232] 8021q: adding VLAN 0 to HW filter on device bond0 [ 326.998177][ T3232] veth0_vlan: entered promiscuous mode [ 327.021659][ T3232] veth1_vlan: entered promiscuous mode [ 327.090702][ T3232] veth0_macvtap: entered promiscuous mode [ 327.104824][ T3232] veth1_macvtap: entered promiscuous mode [ 327.187537][ T3139] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 327.192741][ T1378] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 327.193267][ T1378] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 327.193642][ T1378] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 327.587051][ T3389] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 327.944838][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 327.945021][ T3389] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 327.950224][ T28] audit: type=1401 audit(327.840:98): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 328.028137][ T3389] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 328.243228][ T3389] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 328.704463][ T28] audit: type=1400 audit(328.600:99): avc: denied { ioctl } for pid=3562 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 329.217118][ T3389] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 329.242468][ T3389] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 329.261514][ T3389] bond0 (unregistering): Released all slaves [ 329.389667][ T3389] hsr_slave_0: left promiscuous mode [ 329.401411][ T3389] hsr_slave_1: left promiscuous mode [ 329.421718][ T3389] veth1_macvtap: left promiscuous mode [ 329.422747][ T3389] veth0_macvtap: left promiscuous mode [ 329.425457][ T3389] veth1_vlan: left promiscuous mode [ 329.426058][ T3389] veth0_vlan: left promiscuous mode 1970/01/01 00:05:37 executed programs: 0 [ 339.908222][ T3706] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 339.917072][ T3706] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 340.773086][ T3706] hsr_slave_0: entered promiscuous mode [ 340.774985][ T3706] hsr_slave_1: entered promiscuous mode [ 341.008360][ T3706] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 341.017275][ T3706] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 341.024825][ T3706] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 341.030523][ T3706] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 341.503550][ T3706] 8021q: adding VLAN 0 to HW filter on device bond0 [ 343.824756][ T3706] veth0_vlan: entered promiscuous mode [ 343.848255][ T3706] veth1_vlan: entered promiscuous mode [ 343.918224][ T3706] veth0_macvtap: entered promiscuous mode [ 343.933671][ T3706] veth1_macvtap: entered promiscuous mode [ 344.038030][ T1378] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 344.038613][ T1378] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 344.039396][ T1378] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 344.039663][ T1378] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:05:44 executed programs: 2 [ 344.347275][ T28] audit: type=1400 audit(344.240:100): avc: denied { prog_load } for pid=4019 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 344.347844][ T28] audit: type=1400 audit(344.240:101): avc: denied { bpf } for pid=4019 comm="syz.2.17" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 344.363106][ T28] audit: type=1400 audit(344.260:102): avc: denied { perfmon } for pid=4019 comm="syz.2.17" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 344.407250][ T4019] ------------[ cut here ]------------ [ 344.408062][ T4019] WARNING: kernel/bpf/verifier.c:2763 at reg_bounds_sanity_check+0x3c0/0x428, CPU#1: syz.2.17/4019 [ 344.416832][ T4019] verifier bug: REG INVARIANTS VIOLATION (true_reg1): range bounds violation u64=[0xffffdfcd, 0xffffffffffffdfcc] s64=[0x80000000ffffdfcd, 0x7fffffffffffdfcc] u32=[0xffffdfcd, 0xffffdfcc] s32=[0xffffdfcd, 0xffffdfcc] var_off=(0xffffdfcc, 0xffffffff00000000) [ 344.417907][ T4019] Modules linked in: [ 344.418892][ T4019] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 344.420125][ T4019] CPU: 1 UID: 0 PID: 4019 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 344.420703][ T4019] Hardware name: ARM-Versatile Express [ 344.421370][ T4019] Call trace: [ 344.421911][ T4019] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 344.422632][ T4019] r7:8281f940 r6:00000000 r5:822a7678 r4:00000001 [ 344.422991][ T4019] [<80201af0>] (show_stack) from [<8021e45c>] (dump_stack_lvl+0x5c/0x70) [ 344.423331][ T4019] [<8021e400>] (dump_stack_lvl) from [<8021e488>] (dump_stack+0x18/0x1c) [ 344.423670][ T4019] r7:8281f940 r6:00000000 r5:83e1b000 r4:82a80d14 [ 344.423913][ T4019] [<8021e470>] (dump_stack) from [<802025f4>] (vpanic+0x114/0x320) [ 344.424225][ T4019] [<802024e0>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0x104) [ 344.424563][ T4019] r7:803e02a4 [ 344.424736][ T4019] [<80202800>] (panic) from [<80250a68>] (get_taint+0x0/0x1c) [ 344.425063][ T4019] r3:8280c544 r2:00000001 r1:8228e41c r0:82295cd4 [ 344.425320][ T4019] [<802509f0>] (check_panic_on_warn) from [<80250be4>] (__warn+0x98/0x1ac) [ 344.425669][ T4019] [<80250b4c>] (__warn) from [<80250ee0>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 344.426022][ T4019] r8:00000009 r7:822adfb0 r6:dfd318c4 r5:83e1b000 r4:00000000 [ 344.426309][ T4019] [<80250cfc>] (warn_slowpath_fmt) from [<803e02a4>] (reg_bounds_sanity_check+0x3c0/0x428) [ 344.426733][ T4019] r10:85318000 r9:ffffdfcd r8:80000000 r7:ffffdfcd r6:ffffdfcc r5:822ae714 [ 344.427067][ T4019] r4:852ac230 [ 344.427238][ T4019] [<803dfee4>] (reg_bounds_sanity_check) from [<803ecfcc>] (reg_set_min_max+0x1c4/0x288) [ 344.427626][ T4019] r10:00000001 r9:00000010 r8:85318000 r7:851fb310 r6:852ac310 r5:852ac230 [ 344.428125][ T4019] r4:851fb230 [ 344.428349][ T4019] [<803ece08>] (reg_set_min_max) from [<803fdc10>] (check_cond_jmp_op+0xc7c/0x1980) [ 344.428911][ T4019] r10:852ac000 r9:00000010 r8:85294180 r7:ffffffff r6:80000000 r5:8387ccc0 [ 344.429346][ T4019] r4:dfd2d0c0 r3:851fb230 [ 344.429627][ T4019] [<803fcf94>] (check_cond_jmp_op) from [<80404280>] (do_check_common+0x259c/0x3228) [ 344.430122][ T4019] r10:8531c000 r9:85318000 r8:dfd2d0c0 r7:8531e000 r6:00000018 r5:dfd2d078 [ 344.430489][ T4019] r4:dfd2d000 [ 344.430677][ T4019] [<80401ce4>] (do_check_common) from [<80407ed4>] (bpf_check+0x22e4/0x2d30) [ 344.431069][ T4019] r10:8531e000 r9:00000001 r8:85318000 r7:00000a7b r6:853188bc r5:00000000 [ 344.431404][ T4019] r4:00000016 [ 344.431588][ T4019] [<80405bf0>] (bpf_check) from [<803d95f4>] (bpf_prog_load+0x5b8/0xdec) [ 344.431990][ T4019] r10:dfd2d000 r9:83e1b000 r8:84e3b330 r7:dfd31d18 r6:00000000 r5:00000000 [ 344.432317][ T4019] r4:dfd31eb0 [ 344.432490][ T4019] [<803d903c>] (bpf_prog_load) from [<803dae1c>] (__sys_bpf+0x2d8/0x2008) [ 344.432891][ T4019] r10:00000005 r9:00000000 r8:dfd31e50 r7:00000048 r6:83e1b000 r5:200054c0 [ 344.433224][ T4019] r4:00000000 [ 344.433398][ T4019] [<803dab44>] (__sys_bpf) from [<803dd0e4>] (sys_bpf+0x2c/0x48) [ 344.433840][ T4019] r10:00000182 r9:83e1b000 r8:8020029c r7:00000182 r6:00346310 r5:00000000 [ 344.434176][ T4019] r4:00000000 [ 344.434385][ T4019] [<803dd0b8>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 344.434836][ T4019] Exception stack(0xdfd31fa8 to 0xdfd31ff0) [ 344.435236][ T4019] 1fa0: 00000000 00000000 00000005 200054c0 00000048 00000000 [ 344.435630][ T4019] 1fc0: 00000000 00000000 00346310 00000182 003462d8 00000000 003462d8 003462e4 [ 344.435998][ T4019] 1fe0: 7efb2790 7efb2780 00018ba0 001300f0 [ 344.438922][ T4019] Rebooting in 86400 seconds..