syzkaller syzkaller login: [ 14.265802][ T27] kauditd_printk_skb: 64 callbacks suppressed [ 14.265812][ T27] audit: type=1400 audit(1698837776.803:76): avc: denied { transition } for pid=2946 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.269624][ T27] audit: type=1400 audit(1698837776.803:77): avc: denied { noatsecure } for pid=2946 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.272949][ T27] audit: type=1400 audit(1698837776.813:78): avc: denied { write } for pid=2946 comm="sh" path="pipe:[1839]" dev="pipefs" ino=1839 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 14.276049][ T27] audit: type=1400 audit(1698837776.813:79): avc: denied { rlimitinh } for pid=2946 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.278714][ T27] audit: type=1400 audit(1698837776.813:80): avc: denied { siginh } for pid=2946 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.202' (ED25519) to the list of known hosts. 2023/11/01 11:23:03 ignoring optional flag "sandboxArg"="0" 2023/11/01 11:23:04 parsed 1 programs [ 21.529132][ T27] audit: type=1400 audit(1698837784.073:81): avc: denied { getattr } for pid=3067 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.552891][ T27] audit: type=1400 audit(1698837784.073:82): avc: denied { read } for pid=3067 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.557639][ T3072] cgroup: Unknown subsys name 'net' [ 21.574016][ T27] audit: type=1400 audit(1698837784.073:83): avc: denied { open } for pid=3067 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.602485][ T27] audit: type=1400 audit(1698837784.093:84): avc: denied { mounton } for pid=3072 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.625170][ T27] audit: type=1400 audit(1698837784.093:85): avc: denied { mount } for pid=3072 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.647334][ T27] audit: type=1400 audit(1698837784.123:86): avc: denied { unmount } for pid=3072 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.667144][ T27] audit: type=1400 audit(1698837784.123:87): avc: denied { read } for pid=2757 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 21.809435][ T3072] cgroup: Unknown subsys name 'rlimit' [ 21.899548][ T27] audit: type=1400 audit(1698837784.443:88): avc: denied { mounton } for pid=3072 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.924351][ T27] audit: type=1400 audit(1698837784.443:89): avc: denied { mount } for pid=3072 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.947659][ T27] audit: type=1400 audit(1698837784.443:90): avc: denied { create } for pid=3072 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.969827][ T3075] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). 2023/11/01 11:23:04 executed programs: 0 [ 22.059171][ T3072] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.069520][ T3069] syz-execprog[3069]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 22.228388][ T3081] chnl_net:caif_netlink_parms(): no params data found [ 22.261048][ T3081] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.268192][ T3081] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.275256][ T3081] bridge_slave_0: entered allmulticast mode [ 22.281689][ T3081] bridge_slave_0: entered promiscuous mode [ 22.288185][ T3081] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.295237][ T3081] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.302330][ T3081] bridge_slave_1: entered allmulticast mode [ 22.308587][ T3081] bridge_slave_1: entered promiscuous mode [ 22.324315][ T3081] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 22.334118][ T3081] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 22.352578][ T3081] team0: Port device team_slave_0 added [ 22.358737][ T3081] team0: Port device team_slave_1 added [ 22.373446][ T3081] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 22.380400][ T3081] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 22.406403][ T3081] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 22.417405][ T3081] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 22.424349][ T3081] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 22.450232][ T3081] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 22.474368][ T3081] hsr_slave_0: entered promiscuous mode [ 22.480478][ T3081] hsr_slave_1: entered promiscuous mode [ 22.539227][ T3081] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 22.547518][ T3081] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 22.556305][ T3081] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 22.564717][ T3081] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 22.579562][ T3081] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.586624][ T3081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.593864][ T3081] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.600940][ T3081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.631447][ T3081] 8021q: adding VLAN 0 to HW filter on device bond0 [ 22.642980][ T3081] 8021q: adding VLAN 0 to HW filter on device team0 [ 22.651373][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.659163][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.673235][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.680301][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.700694][ T851] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.707799][ T851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.757778][ T3081] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 22.817540][ T3081] veth0_vlan: entered promiscuous mode [ 22.824982][ T3081] veth1_vlan: entered promiscuous mode [ 22.838994][ T3081] veth0_macvtap: entered promiscuous mode [ 22.846114][ T3081] veth1_macvtap: entered promiscuous mode [ 22.857540][ T3081] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 22.868409][ T3081] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 22.877096][ T3081] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 22.885886][ T3081] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 22.894674][ T3081] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 22.903489][ T3081] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 22.945092][ T3114] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list 2023/11/01 11:23:09 executed programs: 508 2023/11/01 11:23:14 executed programs: 1175 [ 34.245032][ T6055] ================================================================== [ 34.253228][ T6055] BUG: KCSAN: data-race in exit_mm / mm_update_next_owner [ 34.260361][ T6055] [ 34.262683][ T6055] write to 0xffff888103ebb5a0 of 8 bytes by task 6056 on cpu 0: [ 34.270309][ T6055] exit_mm+0x9b/0x180 [ 34.274300][ T6055] do_exit+0x580/0x1660 [ 34.278464][ T6055] do_group_exit+0x101/0x150 [ 34.283074][ T6055] get_signal+0xf4e/0x10a0 [ 34.287503][ T6055] arch_do_signal_or_restart+0x95/0x4b0 [ 34.293053][ T6055] exit_to_user_mode_loop+0x6f/0xe0 [ 34.298271][ T6055] exit_to_user_mode_prepare+0x6c/0xb0 [ 34.303744][ T6055] syscall_exit_to_user_mode+0x26/0x140 [ 34.309319][ T6055] do_syscall_64+0x50/0x110 [ 34.313919][ T6055] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 34.319832][ T6055] [ 34.322151][ T6055] read to 0xffff888103ebb5a0 of 8 bytes by task 6055 on cpu 1: [ 34.329689][ T6055] mm_update_next_owner+0x1a5/0x410 [ 34.334891][ T6055] exit_mm+0xdb/0x180 [ 34.338879][ T6055] do_exit+0x580/0x1660 [ 34.343040][ T6055] do_group_exit+0x141/0x150 [ 34.347641][ T6055] __x64_sys_exit_group+0x1f/0x20 [ 34.352675][ T6055] do_syscall_64+0x44/0x110 [ 34.357181][ T6055] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 34.363084][ T6055] [ 34.365400][ T6055] value changed: 0xffff888103f10fc0 -> 0x0000000000000000 [ 34.372502][ T6055] [ 34.374825][ T6055] Reported by Kernel Concurrency Sanitizer on: [ 34.380960][ T6055] CPU: 1 PID: 6055 Comm: syz-executor.0 Not tainted 6.6.0-syzkaller-05843-g89ed67ef126c #0 [ 34.390933][ T6055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 34.400984][ T6055] ================================================================== 2023/11/01 11:23:19 executed programs: 1840 2023/11/01 11:23:24 executed programs: 2523