[ 21.124795][ T373] !!!ext4_initxattrs set hndl name selinux [ 21.130881][ T373] In ext4_xattr_set_entry s ffffc90000b677a0, last = ffff88811de444a4, name len 1de444a4 [ 21.643293][ T10] device bridge_slave_1 left promiscuous mode [ 21.649790][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.657418][ T10] device bridge_slave_0 left promiscuous mode [ 21.663946][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.109689][ T387] !!!ext4_initxattrs set hndl name selinux [ 32.115680][ T387] In ext4_xattr_set_entry s ffffc90001cef360, last = ffff88811de442a4, name len 1de442a4 [ 33.537485][ T393] !!!ext4_initxattrs set hndl name selinux [ 33.543425][ T393] In ext4_xattr_set_entry s ffffc90001cef360, last = ffff88811de443a4, name len 1de443a4 Warning: Permanently added '10.128.1.18' (ECDSA) to the list of known hosts. 2022/09/22 23:35:21 ignoring optional flag "sandboxArg"="0" 2022/09/22 23:35:21 parsed 1 programs 2022/09/22 23:35:21 executed programs: 0 [ 39.104456][ T24] kauditd_printk_skb: 65 callbacks suppressed [ 39.104469][ T24] audit: type=1400 audit(1663889721.230:148): avc: denied { mounton } for pid=401 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 39.112498][ T399] !!!ext4_initxattrs set hndl name selinux [ 39.136637][ T24] audit: type=1400 audit(1663889721.240:149): avc: denied { mount } for pid=401 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 39.143896][ T399] In ext4_xattr_set_entry s ffffc900002cf7a0, last = ffff88811de444a4, name len 1de444a4 [ 39.186323][ T404] !!!ext4_initxattrs set hndl name selinux [ 39.193673][ T404] In ext4_xattr_set_entry s ffffc900009df7c0, last = ffff88811de445a4, name len 1de445a4 [ 39.204626][ T24] audit: type=1400 audit(1663889721.330:150): avc: denied { mounton } for pid=405 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 39.229112][ T24] audit: type=1400 audit(1663889721.330:151): avc: denied { module_request } for pid=405 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 39.254733][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.261800][ T405] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.269508][ T405] device bridge_slave_0 entered promiscuous mode [ 39.277043][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.284504][ T405] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.291995][ T405] device bridge_slave_1 entered promiscuous mode [ 39.316172][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.323222][ T405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.331024][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.338036][ T405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.352941][ T53] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.360224][ T53] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.367444][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.375311][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.384718][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.392915][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.399948][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.419630][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.428135][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.436416][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.444566][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.453015][ T53] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.460240][ T53] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.467650][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.475667][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.488491][ T113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.496855][ T113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.508314][ T24] audit: type=1400 audit(1663889721.630:152): avc: denied { mount } for pid=405 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 39.511943][ T405] !!!ext4_initxattrs set hndl name selinux [ 39.537388][ T405] In ext4_xattr_set_entry s ffffc900009ef7a0, last = ffff88811de446a4, name len 1de446a4 [ 39.551284][ T409] !!!ext4_initxattrs set hndl name selinux [ 39.557231][ T409] In ext4_xattr_set_entry s ffffc90000c67780, last = ffff88811de447a4, name len 1de447a4 [ 39.567529][ T409] !!!ext4_initxattrs set hndl name selinux [ 39.573636][ T409] In ext4_xattr_set_entry s ffffc90000c67780, last = ffff88811de448a4, name len 1de448a4 [ 39.584097][ T409] !!!ext4_initxattrs set hndl name selinux [ 39.590027][ T409] In ext4_xattr_set_entry s ffffc90000c67780, last = ffff88811de449a4, name len 1de449a4 [ 39.600179][ T409] !!!ext4_initxattrs set hndl name selinux [ 39.606073][ T409] In ext4_xattr_set_entry s ffffc90000c67780, last = ffff88811de44aa4, name len 1de44aa4 [ 39.616630][ T411] !!!ext4_initxattrs set hndl name selinux [ 39.622604][ T411] In ext4_xattr_set_entry s ffffc90000ee77a0, last = ffff88811de44ba4, name len 1de44ba4 [ 39.633017][ T24] audit: type=1400 audit(1663889721.760:153): avc: denied { mounton } for pid=409 comm="syz-executor.0" path="/root/syzkaller-testdir3443983723/syzkaller.wY8hpM/0/file0" dev="sda1" ino=1148 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 39.640573][ T411] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000007a,,errors=continue [ 39.661105][ T24] audit: type=1400 audit(1663889721.760:154): avc: denied { remount } for pid=409 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 39.673400][ T405] In ext4_xattr_set_entry s ffff88810cebff80, last = ffff88811de446a4, name len 1de446a4 [ 39.701427][ T405] In next ext4_xattr_set_entry s ffff88811de446a4, name len 24 [ 39.701444][ T405] In ext4_xattr_set_entry s ffffc900009ef720, last = ffff88810d840020, name len d840020 [ 39.719842][ T405] In ext4_xattr_set_entry s ffff88810cebf400, last = ffff88811de44aa4, name len 1de44aa4 [ 39.730042][ T405] In next ext4_xattr_set_entry s ffff88811de44aa4, name len 24 [ 39.730058][ T405] In ext4_xattr_set_entry s ffffc900009ef6a0, last = ffff88810d842020, name len d842020 [ 39.749716][ T405] In ext4_xattr_set_entry s ffff88810cebfa80, last = ffff88811de447a4, name len 1de447a4 [ 39.759820][ T405] In next ext4_xattr_set_entry s ffff88811de447a4, name len 24 [ 39.759838][ T405] In ext4_xattr_set_entry s ffffc900009ef6a0, last = ffff88810dac2020, name len dac2020 [ 39.778428][ T405] In ext4_xattr_set_entry s ffff88810cebf280, last = ffff88811de449a4, name len 1de449a4 [ 39.788459][ T405] In next ext4_xattr_set_entry s ffff88811de449a4, name len 24 [ 39.788477][ T405] In ext4_xattr_set_entry s ffffc900009ef6a0, last = ffff88810dac4020, name len dac4020 [ 39.806825][ T24] audit: type=1400 audit(1663889721.940:155): avc: denied { unmount } for pid=405 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 39.806999][ T405] In ext4_xattr_set_entry s ffff88810cebfb00, last = ffff88811de44ba4, name len 1de44ba4 [ 39.837530][ T405] In next ext4_xattr_set_entry s ffff88811de44ba4, name len 24 [ 39.837543][ T405] In ext4_xattr_set_entry s ffffc900009ef720, last = ffff88810dac6020, name len dac6020 [ 39.855188][ T405] In ext4_xattr_set_entry s ffff88810cebf480, last = ffff88811de448a4, name len 1de448a4 [ 39.865026][ T405] In next ext4_xattr_set_entry s ffff88811de448a4, name len 24 [ 39.865050][ T405] In ext4_xattr_set_entry s ffffc900009ef6a0, last = ffff88810d93e020, name len d93e020 [ 39.882884][ T405] In ext4_xattr_set_entry s ffff88810cebf200, last = ffff88811de445a4, name len 1de445a4 [ 39.892942][ T405] In next ext4_xattr_set_entry s ffff88811de445a4, name len 24 [ 39.892966][ T405] In ext4_xattr_set_entry s ffffc900009ef740, last = ffff88810d938020, name len d938020 [ 39.893594][ T24] audit: type=1400 audit(1663889722.020:156): avc: denied { append } for pid=142 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 39.900926][ T405] !!!ext4_initxattrs set hndl name selinux [ 39.910539][ T24] audit: type=1400 audit(1663889722.020:157): avc: denied { open } for pid=142 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 39.932751][ T405] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 39.972601][ T405] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 39.980996][ T405] CPU: 1 PID: 405 Comm: syz-executor.0 Not tainted 5.10.144-syzkaller-987214-g7474313da8d6-dirty #0 [ 39.991901][ T405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/16/2022 [ 40.001949][ T405] RIP: 0010:ext4_xattr_set_entry+0x983/0x2290 [ 40.008091][ T405] Code: 03 48 89 84 24 c0 00 00 00 42 80 3c 28 00 4c 8d b4 24 00 01 00 00 74 08 4c 89 ff e8 47 86 ba ff 49 8b 1f 48 89 d8 48 c1 e8 03 <42> 8a 04 28 84 c0 0f 85 dd 15 00 00 44 0f b6 03 41 83 c0 13 41 83 [ 40.027794][ T405] RSP: 0018:ffffc900009ef4a0 EFLAGS: 00010246 [ 40.033849][ T405] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff88810c432780 [ 40.041818][ T405] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000001c [ 40.049773][ T405] RBP: ffffc900009ef638 R08: ffffffff81ec6ae8 R09: ffffed10241015f3 [ 40.057729][ T405] R10: ffffed10241015f3 R11: 1ffff110241015f2 R12: 0000000000000000 [ 40.065781][ T405] R13: dffffc0000000000 R14: ffffc900009ef5a0 R15: ffffc900009ef7a0 [ 40.073823][ T405] FS: 000055555602d400(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000 [ 40.082734][ T405] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 40.089319][ T405] CR2: 000055555603eb78 CR3: 000000010c556000 CR4: 00000000003506a0 [ 40.097364][ T405] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 40.105502][ T405] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 40.113660][ T405] Call Trace: [ 40.116940][ T405] ? ext4_xattr_ibody_inline_set+0x380/0x380 [ 40.122902][ T405] ? ext4_reserve_inode_write+0x2d2/0x380 [ 40.128725][ T405] ? __kasan_check_write+0x14/0x20 [ 40.133819][ T405] ext4_xattr_ibody_set+0x7c/0x2a0 [ 40.138921][ T405] ext4_xattr_set_handle+0xc5d/0x15a0 [ 40.144281][ T405] ? ext4_xattr_set_entry+0x2290/0x2290 [ 40.149802][ T405] ? vprintk_default+0x26/0x30 [ 40.155156][ T405] ? panic+0x7d7/0x7d7 [ 40.159214][ T405] ? selinux_inode_free_security+0x200/0x200 [ 40.165275][ T405] ext4_initxattrs+0xcd/0x140 [ 40.169928][ T405] security_inode_init_security+0x26c/0x3c0 [ 40.175885][ T405] ? ext4_init_security+0x40/0x40 [ 40.180897][ T405] ? security_dentry_create_files_as+0xd0/0xd0 [ 40.187050][ T405] ? __ext4_set_acl+0x5f0/0x5f0 [ 40.191879][ T405] ? ext4_has_metadata_csum+0x1f0/0x1f0 [ 40.197401][ T405] ext4_init_security+0x34/0x40 [ 40.202409][ T405] __ext4_new_inode+0x3648/0x4530 [ 40.207413][ T405] ? ext4_mark_inode_used+0xc00/0xc00 [ 40.212847][ T405] ? dquot_initialize+0x20/0x20 [ 40.217683][ T405] ? may_create+0x641/0x8b0 [ 40.222164][ T405] ext4_mkdir+0x3b3/0xbb0 [ 40.226469][ T405] ? ext4_symlink+0xf50/0xf50 [ 40.231121][ T405] ? selinux_inode_mkdir+0x22/0x30 [ 40.236205][ T405] ? security_inode_mkdir+0xf1/0x130 [ 40.241605][ T405] vfs_mkdir+0x435/0x610 [ 40.245943][ T405] do_mkdirat+0x1b6/0x2d0 [ 40.250247][ T405] ? __kasan_check_write+0x14/0x20 [ 40.255330][ T405] ? do_mknodat+0x430/0x430 [ 40.259806][ T405] __x64_sys_mkdirat+0x7b/0x90 [ 40.264545][ T405] do_syscall_64+0x34/0x70 [ 40.268940][ T405] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 40.274805][ T405] RIP: 0033:0x7f7237736387 [ 40.279231][ T405] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 40.298814][ T405] RSP: 002b:00007ffd5bebc528 EFLAGS: 00000206 ORIG_RAX: 0000000000000102 [ 40.307210][ T405] RAX: ffffffffffffffda RBX: 00007ffd5bebc5b0 RCX: 00007f7237736387 [ 40.315166][ T405] RDX: 00000000000001ff RSI: 00007ffd5bebc5b0 RDI: 00000000ffffff9c [ 40.323291][ T405] RBP: 00007ffd5bebc58c R08: 0000000000000000 R09: 0000000000000003 [ 40.331250][ T405] R10: 00007ffd5bebc2c7 R11: 0000000000000206 R12: 0000000000000032 [ 40.339214][ T405] R13: 0000000000009ae8 R14: 0000000000000003 R15: 00007ffd5bebc5f0 [ 40.347179][ T405] Modules linked in: [ 40.351778][ T405] ---[ end trace 6102385bb86d719d ]--- [ 40.357258][ T405] RIP: 0010:ext4_xattr_set_entry+0x983/0x2290 [ 40.363392][ T405] Code: 03 48 89 84 24 c0 00 00 00 42 80 3c 28 00 4c 8d b4 24 00 01 00 00 74 08 4c 89 ff e8 47 86 ba ff 49 8b 1f 48 89 d8 48 c1 e8 03 <42> 8a 04 28 84 c0 0f 85 dd 15 00 00 44 0f b6 03 41 83 c0 13 41 83 [ 40.384007][ T405] RSP: 0018:ffffc900009ef4a0 EFLAGS: 00010246 [ 40.390098][ T405] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff88810c432780 [ 40.398230][ T405] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000001c [ 40.406507][ T405] RBP: ffffc900009ef638 R08: ffffffff81ec6ae8 R09: ffffed10241015f3 [ 40.414645][ T405] R10: ffffed10241015f3 R11: 1ffff110241015f2 R12: 0000000000000000 [ 40.423006][ T405] R13: dffffc0000000000 R14: ffffc900009ef5a0 R15: ffffc900009ef7a0 [ 40.431184][ T405] FS: 000055555602d400(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000 [ 40.440170][ T405] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 40.446926][ T405] CR2: 000055555603eb78 CR3: 000000010c556000 CR4: 00000000003506a0 [ 40.455538][ T405] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 40.463631][ T405] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 40.471755][ T405] Kernel panic - not syncing: Fatal exception [ 40.478022][ T405] Kernel Offset: disabled [ 40.482335][ T405] Rebooting in 86400 seconds..