Warning: Permanently added '10.128.0.251' (ECDSA) to the list of known hosts. 2021/10/25 00:58:16 parsed 1 programs [ 444.131533][ T23] audit: type=1400 audit(1635123496.679:73): avc: denied { getattr } for pid=365 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 444.134889][ T23] audit: type=1400 audit(1635123496.679:74): avc: denied { read } for pid=365 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 444.137973][ T23] audit: type=1400 audit(1635123496.679:75): avc: denied { open } for pid=365 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 444.141735][ T23] audit: type=1400 audit(1635123496.689:76): avc: denied { read } for pid=365 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 444.145405][ T23] audit: type=1400 audit(1635123496.689:77): avc: denied { open } for pid=365 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 444.146437][ T370] cgroup: Unknown subsys name 'net' [ 444.148761][ T23] audit: type=1400 audit(1635123496.699:78): avc: denied { mounton } for pid=370 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 444.148776][ T23] audit: type=1400 audit(1635123496.699:79): avc: denied { mount } for pid=370 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 444.180617][ T23] audit: type=1400 audit(1635123496.699:80): avc: denied { unmount } for pid=370 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 444.180753][ T370] cgroup: Unknown subsys name 'devices' [ 444.294812][ T370] cgroup: Unknown subsys name 'hugetlb' [ 444.300426][ T370] cgroup: Unknown subsys name 'rlimit' 2021/10/25 00:58:16 executed programs: 0 [ 444.394233][ T23] audit: type=1400 audit(1635123496.949:81): avc: denied { mounton } for pid=370 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 444.419083][ T23] audit: type=1400 audit(1635123496.949:82): avc: denied { mount } for pid=370 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 444.445098][ T374] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.452106][ T374] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.459511][ T374] device bridge_slave_0 entered promiscuous mode [ 444.466254][ T374] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.473255][ T374] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.480628][ T374] device bridge_slave_1 entered promiscuous mode [ 444.505515][ T374] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.512551][ T374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.519807][ T374] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.526820][ T374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.542382][ T375] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.549529][ T375] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.556993][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 444.564628][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 444.573368][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 444.581415][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.588443][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.596360][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 444.604508][ T375] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.611500][ T375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.633823][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 444.642014][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 444.650449][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 444.659592][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 444.667480][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 444.675450][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 444.683225][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 444.696877][ T374] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 444.711610][ T382] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 444.730563][ T382] KVM: debugfs: duplicate directory 382-4 [ 444.750601][ T390] KVM: debugfs: duplicate directory 390-4 [ 444.768014][ T397] KVM: debugfs: duplicate directory 397-4 [ 444.817749][ T410] ------------[ cut here ]------------ [ 444.817946][ T411] KVM: debugfs: duplicate directory 411-4 [ 444.823204][ T410] kernel BUG at arch/x86/kvm/../../../virt/kvm/kvm_main.c:516! [ 444.823226][ T410] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 444.842448][ T410] CPU: 1 PID: 410 Comm: syz-executor.0 Not tainted 5.10.75-syzkaller-01082-g234d53d2bb60 #0 [ 444.852470][ T410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.862511][ T410] RIP: 0010:kvm_mmu_notifier_invalidate_range_end+0xb2/0xc0 [ 444.869762][ T410] Code: 49 8b 1e 48 c7 c7 ff ff ff ff 48 89 de e8 46 96 64 00 48 85 db 78 0e e8 7c 91 64 00 5b 41 5c 41 5e 41 5f 5d c3 e8 6e 91 64 00 <0f> 0b 66 66 2e 0f 1f 84 00 00 00 00 00 90 55 48 89 e5 41 57 41 56 [ 444.889335][ T410] RSP: 0000:ffffc90000ee77d0 EFLAGS: 00010293 [ 444.895370][ T410] RAX: ffffffff81086782 RBX: ffffffffffffffff RCX: ffff888106580000 [ 444.903315][ T410] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: ffffffffffffffff [ 444.911263][ T410] RBP: ffffc90000ee77f0 R08: ffffffff8108676a R09: 0000000000000003 [ 444.919212][ T410] R10: fffff520001dcee9 R11: 0000000000000004 R12: dffffc0000000000 [ 444.927157][ T410] R13: dffffc0000000000 R14: ffffc90000f5a160 R15: ffffc90000f51000 [ 444.935100][ T410] FS: 0000555556bd1400(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 444.943996][ T410] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 444.950590][ T410] CR2: 00007f3ff88bc7d0 CR3: 000000010a643000 CR4: 00000000003526a0 [ 444.958568][ T410] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 444.966508][ T410] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 444.974448][ T410] Call Trace: [ 444.977717][ T410] ? kvm_mmu_notifier_invalidate_range_start+0x300/0x300 [ 444.984707][ T410] __mmu_notifier_invalidate_range_end+0x246/0x300 [ 444.991178][ T410] wp_page_copy+0xe51/0x1750 [ 444.995735][ T410] ? copy_user_highpage+0x1b0/0x1b0 [ 445.000942][ T410] ? __kasan_check_write+0x14/0x20 [ 445.006024][ T410] ? _raw_spin_trylock+0xcb/0x1a0 [ 445.011016][ T410] do_wp_page+0x73b/0xc80 [ 445.015320][ T410] handle_pte_fault+0x575/0xac0 [ 445.020141][ T410] ___handle_speculative_fault+0xd97/0x17d0 [ 445.026002][ T410] ? __handle_speculative_fault+0x2a0/0x2a0 [ 445.031865][ T410] ? __kasan_check_write+0x14/0x20 [ 445.036946][ T410] ? __up_read+0x7b/0x2b0 [ 445.041246][ T410] ? _raw_read_unlock+0x25/0x40 [ 445.046062][ T410] ? get_vma+0x14e/0x160 [ 445.050271][ T410] __handle_speculative_fault+0xc3/0x2a0 [ 445.055874][ T410] do_user_addr_fault+0x8c9/0xd70 [ 445.060867][ T410] ? trace_raw_output_x86_exceptions+0x100/0x100 [ 445.067162][ T410] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 445.073204][ T410] ? exit_to_user_mode_prepare+0x3b/0xe0 [ 445.078812][ T410] exc_page_fault+0x98/0x2d0 [ 445.083371][ T410] ? asm_exc_page_fault+0x8/0x30 [ 445.088279][ T410] asm_exc_page_fault+0x1e/0x30 [ 445.093103][ T410] RIP: 0033:0x7f3ff88eea01 [ 445.097488][ T410] Code: 11 00 4c 29 e8 4b 8d 0c 2f 48 8b 6c 24 18 48 39 d3 48 89 4b 60 0f 95 c2 48 83 c8 01 0f b6 d2 48 c1 e2 02 4c 09 ea 48 83 ca 01 <49> 89 57 08 48 89 41 08 49 83 c7 10 eb b3 48 8d 3d ba dc 09 00 e8 [ 445.117064][ T410] RSP: 002b:00007ffe5d7f56b0 EFLAGS: 00010206 [ 445.123099][ T410] RAX: 00000000000202d1 RBX: 00007f3ff8a045e0 RCX: 0000555556bd2d30 [ 445.131041][ T410] RDX: 0000000000000121 RSI: 0000000000000000 RDI: 0000000000000004 [ 445.139026][ T410] RBP: 0000000000000110 R08: 0000000000000003 R09: 00007f3ff8a04640 [ 445.146973][ T410] R10: 0000000000020022 R11: 0000000000000120 R12: 0000000000000010 [ 445.154914][ T410] R13: 0000000000000120 R14: 0000000000000012 R15: 0000555556bd2c10 [ 445.162854][ T410] Modules linked in: [ 445.167890][ T410] ---[ end trace 2ad04144d9a03e89 ]--- [ 445.173543][ T410] RIP: 0010:kvm_mmu_notifier_invalidate_range_end+0xb2/0xc0 [ 445.180854][ T410] Code: 49 8b 1e 48 c7 c7 ff ff ff ff 48 89 de e8 46 96 64 00 48 85 db 78 0e e8 7c 91 64 00 5b 41 5c 41 5e 41 5f 5d c3 e8 6e 91 64 00 <0f> 0b 66 66 2e 0f 1f 84 00 00 00 00 00 90 55 48 89 e5 41 57 41 56 [ 445.200582][ T410] RSP: 0000:ffffc90000ee77d0 EFLAGS: 00010293 [ 445.206667][ T410] RAX: ffffffff81086782 RBX: ffffffffffffffff RCX: ffff888106580000 [ 445.214749][ T410] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: ffffffffffffffff [ 445.222697][ T410] RBP: ffffc90000ee77f0 R08: ffffffff8108676a R09: 0000000000000003 [ 445.230827][ T410] R10: fffff520001dcee9 R11: 0000000000000004 R12: dffffc0000000000 [ 445.238832][ T410] R13: dffffc0000000000 R14: ffffc90000f5a160 R15: ffffc90000f51000 [ 445.246813][ T410] FS: 0000555556bd1400(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 445.255733][ T410] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 445.262298][ T410] CR2: 00007f3ff88bc7d0 CR3: 000000010a643000 CR4: 00000000003526a0 [ 445.270267][ T410] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 445.278246][ T410] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 445.286358][ T410] Kernel panic - not syncing: Fatal exception [ 445.292705][ T410] Kernel Offset: disabled [ 445.297008][ T410] Rebooting in 86400 seconds..