[ 4.059081][ T99] udevd[99]: starting version 3.2.11 [ 4.095342][ T100] udevd[100]: starting eudev-3.2.11 [ 5.489770][ T185] sshd (185) used greatest stack depth: 22288 bytes left [ 7.778006][ T112] udevd (112) used greatest stack depth: 21552 bytes left [ 12.650552][ T30] kauditd_printk_skb: 50 callbacks suppressed [ 12.650564][ T30] audit: type=1400 audit(1684907962.177:61): avc: denied { transition } for pid=224 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.660811][ T30] audit: type=1400 audit(1684907962.197:62): avc: denied { noatsecure } for pid=224 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.665432][ T30] audit: type=1400 audit(1684907962.197:63): avc: denied { write } for pid=224 comm="sh" path="pipe:[13111]" dev="pipefs" ino=13111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 12.673152][ T30] audit: type=1400 audit(1684907962.197:64): avc: denied { rlimitinh } for pid=224 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.679922][ T30] audit: type=1400 audit(1684907962.197:65): avc: denied { siginh } for pid=224 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.121' (ECDSA) to the list of known hosts. [ 58.650616][ T30] audit: type=1400 audit(1684908008.177:66): avc: denied { execmem } for pid=324 comm="syz-executor606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 58.657873][ T30] audit: type=1400 audit(1684908008.177:67): avc: denied { integrity } for pid=324 comm="syz-executor606" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 58.666104][ T30] audit: type=1400 audit(1684908008.177:68): avc: denied { mounton } for pid=324 comm="syz-executor606" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 58.682865][ T30] audit: type=1400 audit(1684908008.187:69): avc: denied { mount } for pid=324 comm="syz-executor606" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 58.706300][ T30] audit: type=1400 audit(1684908008.187:70): avc: denied { setattr } for pid=324 comm="syz-executor606" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 58.729739][ T30] audit: type=1400 audit(1684908008.187:71): avc: denied { mounton } for pid=325 comm="syz-executor606" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 58.753639][ T30] audit: type=1400 audit(1684908008.187:72): avc: denied { mount } for pid=325 comm="syz-executor606" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 58.775963][ T30] audit: type=1400 audit(1684908008.187:73): avc: denied { mounton } for pid=325 comm="syz-executor606" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 58.797411][ T30] audit: type=1400 audit(1684908008.187:74): avc: denied { module_request } for pid=325 comm="syz-executor606" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 58.819565][ T325] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.826508][ T325] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.833770][ T325] device bridge_slave_0 entered promiscuous mode [ 58.840387][ T325] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.847254][ T325] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.854410][ T325] device bridge_slave_1 entered promiscuous mode [ 58.895844][ T30] audit: type=1400 audit(1684908008.427:75): avc: denied { create } for pid=325 comm="syz-executor606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 58.902196][ T325] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.923105][ T325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.930289][ T325] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.937168][ T325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.957448][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.965154][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.972270][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.979739][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.988933][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.996920][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.003767][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.012411][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.020426][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.027301][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.045578][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 59.053721][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.061465][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.072358][ T325] device veth0_vlan entered promiscuous mode [ 59.079123][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.087662][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.095051][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready executing program [ 59.106211][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 59.114957][ T325] device veth1_macvtap entered promiscuous mode [ 59.124133][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 59.137949][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 59.151115][ T333] FAULT_INJECTION: forcing a failure. [ 59.151115][ T333] name failslab, interval 1, probability 0, space 0, times 1 [ 59.163812][ T333] CPU: 1 PID: 333 Comm: syz-executor606 Not tainted 5.15.106-syzkaller-00249-g19c0ed55a470 #0 [ 59.173786][ T333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 59.183680][ T333] Call Trace: [ 59.186800][ T333] [ 59.189577][ T333] dump_stack_lvl+0x151/0x1b7 [ 59.194121][ T333] ? io_uring_drop_tctx_refs+0x190/0x190 [ 59.199560][ T333] dump_stack+0x15/0x17 [ 59.203551][ T333] should_fail+0x3c6/0x510 [ 59.207803][ T333] __should_failslab+0xa4/0xe0 [ 59.212405][ T333] ? anon_vma_fork+0xf7/0x500 [ 59.216917][ T333] should_failslab+0x9/0x20 [ 59.221261][ T333] slab_pre_alloc_hook+0x37/0xd0 [ 59.226040][ T333] ? anon_vma_fork+0xf7/0x500 [ 59.230546][ T333] kmem_cache_alloc+0x44/0x200 [ 59.235146][ T333] anon_vma_fork+0xf7/0x500 [ 59.239485][ T333] ? anon_vma_name+0x43/0x70 [ 59.243911][ T333] ? vm_area_dup+0x17a/0x230 [ 59.248341][ T333] dup_mm+0x8c5/0x12c0 [ 59.252251][ T333] ? copy_init_mm+0x20/0x20 [ 59.256584][ T333] copy_mm+0x107/0x1b0 [ 59.260489][ T333] copy_process+0x12bc/0x3260 [ 59.265003][ T333] ? proc_fail_nth_write+0x20b/0x290 [ 59.270123][ T333] ? fsnotify_perm+0x6a/0x5d0 [ 59.274636][ T333] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 59.279583][ T333] ? vfs_write+0xa0d/0x1160 [ 59.283923][ T333] kernel_clone+0x21e/0x9e0 [ 59.288265][ T333] ? file_end_write+0x1c0/0x1c0 [ 59.293034][ T333] ? __kasan_check_write+0x14/0x20 [ 59.297985][ T333] ? create_io_thread+0x1e0/0x1e0 [ 59.302844][ T333] ? __mutex_lock_slowpath+0x10/0x10 [ 59.307967][ T333] __x64_sys_clone+0x23f/0x290 [ 59.312564][ T333] ? __do_sys_vfork+0x130/0x130 [ 59.317290][ T333] ? ksys_write+0x260/0x2c0 [ 59.321593][ T333] ? debug_smp_processor_id+0x17/0x20 [ 59.326800][ T333] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 59.332788][ T333] ? exit_to_user_mode_prepare+0x39/0xa0 [ 59.338259][ T333] do_syscall_64+0x3d/0xb0 [ 59.342516][ T333] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 59.348238][ T333] RIP: 0033:0x7f0e411a1f29 [ 59.352491][ T333] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 59.371933][ T333] RSP: 002b:00007f0e411481e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 59.380177][ T333] RAX: ffffffffffffffda RBX: 00007f0e41224488 RCX: 00007f0e411a1f29 [ 59.387988][ T333] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000060000200 [ 59.395908][ T333] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000003635 [ 59.403698][ T333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 59.411508][ T333] R13: 00007ffd6cdbe60f R14: 00007f0e41148300 R15: 0000000000022000 [ 59.419325][ T333] [ 59.474189][ T325] syz-executor606 (325) used greatest stack depth: 20320 bytes left [ 59.475043][ T324] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 59.493554][ T324] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 59.501797][ T324] CPU: 0 PID: 324 Comm: syz-executor606 Not tainted 5.15.106-syzkaller-00249-g19c0ed55a470 #0 [ 59.511863][ T324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 59.521762][ T324] RIP: 0010:__rb_erase_color+0x20b/0xa60 [ 59.527225][ T324] Code: 49 89 de 49 c1 ee 03 43 80 3c 26 00 74 08 48 89 df e8 89 28 2b ff 4c 8b 3b 4d 89 fc 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 ff e8 66 28 2b ff 41 f6 07 01 48 89 5d [ 59.546851][ T324] RSP: 0018:ffffc90000a37a00 EFLAGS: 00010246 [ 59.552752][ T324] RAX: dffffc0000000000 RBX: ffff88811e0fd880 RCX: ffff88811bbbe2c0 [ 59.560562][ T324] RDX: ffffffff81a44dc0 RSI: ffff88810be23208 RDI: ffff88811e0fd870 [ 59.568385][ T324] RBP: ffffc90000a37a60 R08: ffffffff81a42e80 R09: ffffed10217c4645 [ 59.576199][ T324] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 59.583998][ T324] R13: ffff88811e0fd870 R14: 1ffff11023c1fb10 R15: 0000000000000000 [ 59.591817][ T324] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 59.600583][ T324] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 59.607000][ T324] CR2: 00007f0e41222188 CR3: 000000011e340000 CR4: 00000000003506b0 [ 59.614820][ T324] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 59.622732][ T324] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 59.630540][ T324] Call Trace: [ 59.633661][ T324] [ 59.636444][ T324] ? anon_vma_interval_tree_iter_next+0x390/0x390 [ 59.642700][ T324] ? rwsem_mark_wake+0x6b0/0x6b0 [ 59.647465][ T324] vma_interval_tree_remove+0xb82/0xba0 [ 59.652851][ T324] unlink_file_vma+0xd9/0xf0 [ 59.657272][ T324] free_pgtables+0x13f/0x280 [ 59.661696][ T324] exit_mmap+0x3e7/0x6f0 [ 59.665777][ T324] ? exit_aio+0x25e/0x3c0 [ 59.669941][ T324] ? vm_brk+0x30/0x30 [ 59.673762][ T324] ? uprobe_clear_state+0x2cd/0x320 [ 59.678793][ T324] __mmput+0x95/0x310 [ 59.682616][ T324] mmput+0x5b/0x170 [ 59.686259][ T324] do_exit+0xbb4/0x2b60 [ 59.690256][ T324] ? put_task_struct+0x80/0x80 [ 59.694853][ T324] ? exc_page_fault+0x47a/0x830 [ 59.699540][ T324] do_group_exit+0x141/0x310 [ 59.703967][ T324] __x64_sys_exit_group+0x3f/0x40 [ 59.708827][ T324] do_syscall_64+0x3d/0xb0 [ 59.713079][ T324] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 59.718806][ T324] RIP: 0033:0x7f0e411a0949 [ 59.723060][ T324] Code: Unable to access opcode bytes at RIP 0x7f0e411a091f. [ 59.730349][ T324] RSP: 002b:00007ffd6cdbe858 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 59.738596][ T324] RAX: ffffffffffffffda RBX: 00007f0e41224430 RCX: 00007f0e411a0949 [ 59.746407][ T324] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 59.754220][ T324] RBP: 0000000000000000 R08: ffffffffffffffb8 R09: 0000555556811400 [ 59.762032][ T324] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0e41224430 [ 59.769841][ T324] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 [ 59.777657][ T324] [ 59.780517][ T324] Modules linked in: [ 59.784886][ T324] ---[ end trace 1f919d8d7cb7419b ]--- [ 59.790202][ T324] RIP: 0010:__rb_erase_color+0x20b/0xa60 [ 59.795703][ T324] Code: 49 89 de 49 c1 ee 03 43 80 3c 26 00 74 08 48 89 df e8 89 28 2b ff 4c 8b 3b 4d 89 fc 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 ff e8 66 28 2b ff 41 f6 07 01 48 89 5d [ 59.815290][ T324] RSP: 0018:ffffc90000a37a00 EFLAGS: 00010246 [ 59.821189][ T324] RAX: dffffc0000000000 RBX: ffff88811e0fd880 RCX: ffff88811bbbe2c0 [ 59.829218][ T324] RDX: ffffffff81a44dc0 RSI: ffff88810be23208 RDI: ffff88811e0fd870 [ 59.836961][ T324] RBP: ffffc90000a37a60 R08: ffffffff81a42e80 R09: ffffed10217c4645 [ 59.844796][ T324] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 59.852876][ T324] R13: ffff88811e0fd870 R14: 1ffff11023c1fb10 R15: 0000000000000000 [ 59.860760][ T324] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 59.869593][ T324] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 59.876023][ T324] CR2: 00007f0e411486b8 CR3: 000000000680f000 CR4: 00000000003506a0 [ 59.883844][ T324] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 59.891617][ T324] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 59.899845][ T324] Kernel panic - not syncing: Fatal exception [ 59.906018][ T324] Kernel Offset: disabled [ 59.910169][ T324] Rebooting in 86400 seconds..