last executing test programs: kernel console output (not intermixed with test programs): syzkaller syzkaller login: [ 15.371312][ T2797] udevd (2797) used greatest stack depth: 11840 bytes left [ 16.355091][ T29] kauditd_printk_skb: 64 callbacks suppressed [ 16.355107][ T29] audit: type=1400 audit(1717217918.312:76): avc: denied { transition } for pid=2959 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 16.383461][ T29] audit: type=1400 audit(1717217918.312:77): avc: denied { noatsecure } for pid=2959 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 16.402456][ T29] audit: type=1400 audit(1717217918.312:78): avc: denied { write } for pid=2959 comm="sh" path="pipe:[405]" dev="pipefs" ino=405 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 16.424395][ T29] audit: type=1400 audit(1717217918.312:79): avc: denied { rlimitinh } for pid=2959 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 16.443100][ T29] audit: type=1400 audit(1717217918.312:80): avc: denied { siginh } for pid=2959 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.606701][ T2963] sftp-server (2963) used greatest stack depth: 11456 bytes left [ 21.167679][ T29] audit: type=1400 audit(1717217923.122:81): avc: denied { read } for pid=2766 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.1.254' (ED25519) to the list of known hosts. 2024/06/01 04:58:46 fuzzer started 2024/06/01 04:58:46 dialing manager at 10.128.0.163:30030 [ 24.174164][ T29] audit: type=1400 audit(1717217926.122:82): avc: denied { node_bind } for pid=3074 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 24.194839][ T29] audit: type=1400 audit(1717217926.122:83): avc: denied { name_bind } for pid=3074 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 24.253862][ T29] audit: type=1400 audit(1717217926.202:84): avc: denied { mounton } for pid=3082 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.272980][ T3083] cgroup: Unknown subsys name 'net' [ 24.286175][ T3089] ================================================================== [ 24.287682][ T29] audit: type=1400 audit(1717217926.202:85): avc: denied { mounton } for pid=3083 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.294263][ T3089] BUG: KCSAN: data-race in __should_fail_alloc_page / debugfs_write_file_bool [ 24.316924][ T29] audit: type=1400 audit(1717217926.202:86): avc: denied { mount } for pid=3083 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.325702][ T3089] [ 24.325709][ T3089] write to 0xffffffff86183ea8 of 1 bytes by task 3088 on cpu 0: [ 24.325729][ T3089] debugfs_write_file_bool+0xbd/0x160 [ 24.347879][ T29] audit: type=1400 audit(1717217926.202:87): avc: denied { create } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.350144][ T3089] vfs_write+0x28b/0x900 [ 24.357767][ T29] audit: type=1400 audit(1717217926.202:88): avc: denied { write } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.363099][ T3089] ksys_write+0xeb/0x1b0 [ 24.363124][ T3089] __x64_sys_write+0x42/0x50 [ 24.383544][ T29] audit: type=1400 audit(1717217926.232:89): avc: denied { mount } for pid=3082 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 24.387727][ T3089] x64_sys_call+0x27ef/0x2d70 [ 24.387762][ T3089] do_syscall_64+0xc9/0x1c0 [ 24.408068][ T29] audit: type=1400 audit(1717217926.232:90): avc: denied { read } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.412261][ T3089] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 24.412295][ T3089] [ 24.412300][ T3089] read to 0xffffffff86183ea8 of 1 bytes by task 3089 on cpu 1: [ 24.412318][ T3089] __should_fail_alloc_page+0x57/0x110 [ 24.419230][ T29] audit: type=1400 audit(1717217926.372:91): avc: denied { unmount } for pid=3083 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.440025][ T3089] __alloc_pages_noprof+0x109/0x360 [ 24.440054][ T3089] alloc_pages_mpol_noprof+0xb1/0x1e0 [ 24.440084][ T3089] alloc_pages_noprof+0xe1/0x100 [ 24.525993][ T3089] get_free_pages_noprof+0xc/0x30 [ 24.531012][ T3089] pgd_alloc+0x22/0x170 [ 24.535170][ T3089] mm_init+0x372/0x6f0 [ 24.539237][ T3089] mm_alloc+0x81/0xa0 [ 24.543219][ T3089] alloc_bprm+0x1c8/0x5e0 [ 24.547553][ T3089] do_execveat_common+0x138/0x7d0 [ 24.552574][ T3089] __x64_sys_execve+0x5a/0x70 [ 24.557255][ T3089] x64_sys_call+0x1378/0x2d70 [ 24.561930][ T3089] do_syscall_64+0xc9/0x1c0 [ 24.566438][ T3089] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 24.572340][ T3089] [ 24.574656][ T3089] value changed: 0x01 -> 0x00 [ 24.579343][ T3089] [ 24.581654][ T3089] Reported by Kernel Concurrency Sanitizer on: [ 24.587805][ T3089] CPU: 1 PID: 3089 Comm: syz-fuzzer Not tainted 6.10.0-rc1-syzkaller-00104-gd8ec19857b09 #0 [ 24.597861][ T3089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 24.607909][ T3089] ================================================================== [ 24.626552][ T3093] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.663454][ T3090] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.748766][ T3083] cgroup: Unknown subsys name 'rlimit' 2024/06/01 04:58:46 suppressing KCSAN reports in functions: 'exit_mm' '__jbd2_journal_drop_transaction' 'shrink_dentry_list' '__lru_add_drain_all' 'print_cpu' 'pcpu_alloc_noprof' 'ext4_free_inodes_count' '__tmigr_cpu_activate' '__find_get_block' 'mas_replace_node' '__wb_update_bandwidth' 'ext4_fill_raw_inode' 'ext4_mark_iloc_dirty' 'mas_walk' '__perf_event_read_value' '__kernfs_remove' '_prb_read_valid' 'ext4_mb_good_group' '__perf_event_overflow' '__filemap_remove_folio' 'shmem_file_splice_read' 'vmalloc_info_show' 'kick_pool' 'wg_packet_send_staged_packets' '__dentry_kill' '__filemap_add_folio' '__xa_clear_mark' 'xas_clear_mark' 'do_sys_poll' 'do_select' 'batadv_hard_if_event' 'atime_needs_update' 'process_scheduled_works' 'jbd2_journal_dirty_metadata' 'call_rcu' 'ondemand_readahead' 'memchr' 'alloc_pid' 'jbd2_journal_stop' 'rxrpc_input_call_event' 2024/06/01 04:58:46 starting 5 executor processes 2024/06/01 04:58:46 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF