Warning: Permanently added '10.128.0.210' (ED25519) to the list of known hosts. 2023/12/26 04:18:39 ignoring optional flag "sandboxArg"="0" 2023/12/26 04:18:39 parsed 1 programs [ 21.046368][ T30] audit: type=1400 audit(1703564319.326:66): avc: denied { integrity } for pid=286 comm="syz-execprog" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 21.074088][ T30] audit: type=1400 audit(1703564319.356:67): avc: denied { getattr } for pid=286 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.093830][ T291] cgroup: Unknown subsys name 'net' [ 21.097901][ T30] audit: type=1400 audit(1703564319.356:68): avc: denied { read } for pid=286 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.123514][ T30] audit: type=1400 audit(1703564319.356:69): avc: denied { open } for pid=286 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.123704][ T291] cgroup: Unknown subsys name 'devices' [ 21.146818][ T30] audit: type=1400 audit(1703564319.356:70): avc: denied { read } for pid=286 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.174842][ T30] audit: type=1400 audit(1703564319.356:71): avc: denied { open } for pid=286 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.197922][ T30] audit: type=1400 audit(1703564319.356:72): avc: denied { mounton } for pid=291 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.220442][ T30] audit: type=1400 audit(1703564319.356:73): avc: denied { mount } for pid=291 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.242260][ T30] audit: type=1400 audit(1703564319.386:74): avc: denied { unmount } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.379813][ T291] cgroup: Unknown subsys name 'hugetlb' [ 21.385267][ T291] cgroup: Unknown subsys name 'rlimit' [ 21.569719][ T30] audit: type=1400 audit(1703564319.856:75): avc: denied { mounton } for pid=291 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.599145][ T293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). 2023/12/26 04:18:39 executed programs: 0 [ 21.658247][ T291] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.723116][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.729998][ T298] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.737180][ T298] device bridge_slave_0 entered promiscuous mode [ 21.744142][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.751003][ T298] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.758529][ T298] device bridge_slave_1 entered promiscuous mode [ 21.803993][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.811124][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.818242][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.824992][ T298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.843812][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.851380][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.859119][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.866344][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.875146][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.883262][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.890160][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.908672][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.916794][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.925191][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.932059][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.939464][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.947240][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.959141][ T298] device veth0_vlan entered promiscuous mode [ 21.967988][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.975750][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.983171][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.992546][ T298] device veth1_macvtap entered promiscuous mode [ 21.999345][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.012466][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.020857][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.298732][ T1] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000003 [ 22.307066][ T1] CPU: 1 PID: 1 Comm: init Not tainted 5.15.141-syzkaller-00899-g28e3f5851a99 #0 [ 22.316301][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 22.326646][ T1] Call Trace: [ 22.329766][ T1] [ 22.332547][ T1] dump_stack_lvl+0x151/0x1b7 [ 22.337057][ T1] ? io_uring_drop_tctx_refs+0x190/0x190 [ 22.342550][ T1] dump_stack+0x15/0x17 [ 22.346631][ T1] panic+0x287/0x751 [ 22.350355][ T1] ? do_exit+0x240b/0x2ca0 [ 22.354602][ T1] ? fb_is_primary_device+0xd4/0xd4 [ 22.359641][ T1] ? __kasan_check_write+0x14/0x20 [ 22.364581][ T1] ? sync_mm_rss+0x28a/0x2e0 [ 22.369006][ T1] do_exit+0x2425/0x2ca0 [ 22.373084][ T1] ? __sched_text_start+0x8/0x8 [ 22.377773][ T1] ? put_task_struct+0x80/0x80 [ 22.382371][ T1] ? schedule+0x136/0x1e0 [ 22.386542][ T1] ? __kasan_check_write+0x14/0x20 [ 22.391485][ T1] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 22.396432][ T1] ? _raw_spin_lock_irqsave+0x210/0x210 [ 22.401813][ T1] do_group_exit+0x141/0x310 [ 22.406239][ T1] get_signal+0x7a3/0x1630 [ 22.410494][ T1] ? wait_for_common+0x366/0x420 [ 22.415268][ T1] arch_do_signal_or_restart+0xbd/0x1680 [ 22.420735][ T1] ? __kasan_check_write+0x14/0x20 [ 22.425681][ T1] ? put_pid+0xd7/0x110 [ 22.429671][ T1] ? kernel_clone+0x6cf/0x9e0 [ 22.434197][ T1] ? create_io_thread+0x1e0/0x1e0 [ 22.439050][ T1] ? get_sigframe_size+0x10/0x10 [ 22.443821][ T1] ? timespec64_add_safe+0x220/0x220 [ 22.448942][ T1] exit_to_user_mode_loop+0xa0/0xe0 [ 22.453972][ T1] exit_to_user_mode_prepare+0x5a/0xa0 [ 22.459270][ T1] syscall_exit_to_user_mode+0x26/0x160 [ 22.464737][ T1] do_syscall_64+0x49/0xb0 [ 22.468990][ T1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 22.474719][ T1] RIP: 0033:0x7fcff762ba68 [ 22.478972][ T1] Code: 00 48 8d b8 e0 02 00 00 48 89 b8 d8 02 00 00 48 89 b8 e0 02 00 00 b8 11 01 00 00 0f 05 44 89 c0 c3 90 5f b8 3a 00 00 00 0f 05 <57> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 90 43 0f 00 f7 d8 64 89 01 48 [ 22.498413][ T1] RSP: 002b:00007ffe1d2d06e0 EFLAGS: 00000246 ORIG_RAX: 000000000000003a [ 22.506659][ T1] RAX: 0000000000000134 RBX: 000055e6fed01a50 RCX: 00007fcff762ba68 [ 22.514468][ T1] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 00007fcff77b6bed [ 22.522286][ T1] RBP: 00007fcff77f1528 R08: 0000000000000007 R09: e616aa0fb1fefe57 [ 22.530176][ T1] R10: 00007ffe1d2d0720 R11: 0000000000000246 R12: 0000000000000000 [ 22.538075][ T1] R13: 0000000000000018 R14: 000055e6fd6b6169 R15: 00007fcff7822a80 [ 22.545916][ T1] [ 22.549050][ T1] Kernel Offset: disabled [ 22.553274][ T1] Rebooting in 86400 seconds..