[ 4.059081][ T99] udevd[99]: starting version 3.2.11
[ 4.095342][ T100] udevd[100]: starting eudev-3.2.11
[ 5.489770][ T185] sshd (185) used greatest stack depth: 22288 bytes left
[ 7.778006][ T112] udevd (112) used greatest stack depth: 21552 bytes left
[ 12.650552][ T30] kauditd_printk_skb: 50 callbacks suppressed
[ 12.650564][ T30] audit: type=1400 audit(1684907962.177:61): avc: denied { transition } for pid=224 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 12.660811][ T30] audit: type=1400 audit(1684907962.197:62): avc: denied { noatsecure } for pid=224 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 12.665432][ T30] audit: type=1400 audit(1684907962.197:63): avc: denied { write } for pid=224 comm="sh" path="pipe:[13111]" dev="pipefs" ino=13111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1
[ 12.673152][ T30] audit: type=1400 audit(1684907962.197:64): avc: denied { rlimitinh } for pid=224 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 12.679922][ T30] audit: type=1400 audit(1684907962.197:65): avc: denied { siginh } for pid=224 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
Warning: Permanently added '10.128.1.121' (ECDSA) to the list of known hosts.
[ 58.650616][ T30] audit: type=1400 audit(1684908008.177:66): avc: denied { execmem } for pid=324 comm="syz-executor606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 58.657873][ T30] audit: type=1400 audit(1684908008.177:67): avc: denied { integrity } for pid=324 comm="syz-executor606" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1
[ 58.666104][ T30] audit: type=1400 audit(1684908008.177:68): avc: denied { mounton } for pid=324 comm="syz-executor606" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 58.682865][ T30] audit: type=1400 audit(1684908008.187:69): avc: denied { mount } for pid=324 comm="syz-executor606" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[ 58.706300][ T30] audit: type=1400 audit(1684908008.187:70): avc: denied { setattr } for pid=324 comm="syz-executor606" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 58.729739][ T30] audit: type=1400 audit(1684908008.187:71): avc: denied { mounton } for pid=325 comm="syz-executor606" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1
[ 58.753639][ T30] audit: type=1400 audit(1684908008.187:72): avc: denied { mount } for pid=325 comm="syz-executor606" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1
[ 58.775963][ T30] audit: type=1400 audit(1684908008.187:73): avc: denied { mounton } for pid=325 comm="syz-executor606" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 58.797411][ T30] audit: type=1400 audit(1684908008.187:74): avc: denied { module_request } for pid=325 comm="syz-executor606" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 58.819565][ T325] bridge0: port 1(bridge_slave_0) entered blocking state
[ 58.826508][ T325] bridge0: port 1(bridge_slave_0) entered disabled state
[ 58.833770][ T325] device bridge_slave_0 entered promiscuous mode
[ 58.840387][ T325] bridge0: port 2(bridge_slave_1) entered blocking state
[ 58.847254][ T325] bridge0: port 2(bridge_slave_1) entered disabled state
[ 58.854410][ T325] device bridge_slave_1 entered promiscuous mode
[ 58.895844][ T30] audit: type=1400 audit(1684908008.427:75): avc: denied { create } for pid=325 comm="syz-executor606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 58.902196][ T325] bridge0: port 2(bridge_slave_1) entered blocking state
[ 58.923105][ T325] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 58.930289][ T325] bridge0: port 1(bridge_slave_0) entered blocking state
[ 58.937168][ T325] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 58.957448][ T20] bridge0: port 1(bridge_slave_0) entered disabled state
[ 58.965154][ T20] bridge0: port 2(bridge_slave_1) entered disabled state
[ 58.972270][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 58.979739][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 58.988933][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 58.996920][ T39] bridge0: port 1(bridge_slave_0) entered blocking state
[ 59.003767][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 59.012411][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 59.020426][ T20] bridge0: port 2(bridge_slave_1) entered blocking state
[ 59.027301][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 59.045578][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 59.053721][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 59.061465][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 59.072358][ T325] device veth0_vlan entered promiscuous mode
[ 59.079123][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 59.087662][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 59.095051][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
executing program
[ 59.106211][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 59.114957][ T325] device veth1_macvtap entered promiscuous mode
[ 59.124133][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 59.137949][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 59.151115][ T333] FAULT_INJECTION: forcing a failure.
[ 59.151115][ T333] name failslab, interval 1, probability 0, space 0, times 1
[ 59.163812][ T333] CPU: 1 PID: 333 Comm: syz-executor606 Not tainted 5.15.106-syzkaller-00249-g19c0ed55a470 #0
[ 59.173786][ T333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023
[ 59.183680][ T333] Call Trace:
[ 59.186800][ T333]
[ 59.189577][ T333] dump_stack_lvl+0x151/0x1b7
[ 59.194121][ T333] ? io_uring_drop_tctx_refs+0x190/0x190
[ 59.199560][ T333] dump_stack+0x15/0x17
[ 59.203551][ T333] should_fail+0x3c6/0x510
[ 59.207803][ T333] __should_failslab+0xa4/0xe0
[ 59.212405][ T333] ? anon_vma_fork+0xf7/0x500
[ 59.216917][ T333] should_failslab+0x9/0x20
[ 59.221261][ T333] slab_pre_alloc_hook+0x37/0xd0
[ 59.226040][ T333] ? anon_vma_fork+0xf7/0x500
[ 59.230546][ T333] kmem_cache_alloc+0x44/0x200
[ 59.235146][ T333] anon_vma_fork+0xf7/0x500
[ 59.239485][ T333] ? anon_vma_name+0x43/0x70
[ 59.243911][ T333] ? vm_area_dup+0x17a/0x230
[ 59.248341][ T333] dup_mm+0x8c5/0x12c0
[ 59.252251][ T333] ? copy_init_mm+0x20/0x20
[ 59.256584][ T333] copy_mm+0x107/0x1b0
[ 59.260489][ T333] copy_process+0x12bc/0x3260
[ 59.265003][ T333] ? proc_fail_nth_write+0x20b/0x290
[ 59.270123][ T333] ? fsnotify_perm+0x6a/0x5d0
[ 59.274636][ T333] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 59.279583][ T333] ? vfs_write+0xa0d/0x1160
[ 59.283923][ T333] kernel_clone+0x21e/0x9e0
[ 59.288265][ T333] ? file_end_write+0x1c0/0x1c0
[ 59.293034][ T333] ? __kasan_check_write+0x14/0x20
[ 59.297985][ T333] ? create_io_thread+0x1e0/0x1e0
[ 59.302844][ T333] ? __mutex_lock_slowpath+0x10/0x10
[ 59.307967][ T333] __x64_sys_clone+0x23f/0x290
[ 59.312564][ T333] ? __do_sys_vfork+0x130/0x130
[ 59.317290][ T333] ? ksys_write+0x260/0x2c0
[ 59.321593][ T333] ? debug_smp_processor_id+0x17/0x20
[ 59.326800][ T333] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 59.332788][ T333] ? exit_to_user_mode_prepare+0x39/0xa0
[ 59.338259][ T333] do_syscall_64+0x3d/0xb0
[ 59.342516][ T333] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 59.348238][ T333] RIP: 0033:0x7f0e411a1f29
[ 59.352491][ T333] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 59.371933][ T333] RSP: 002b:00007f0e411481e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 59.380177][ T333] RAX: ffffffffffffffda RBX: 00007f0e41224488 RCX: 00007f0e411a1f29
[ 59.387988][ T333] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000060000200
[ 59.395908][ T333] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000003635
[ 59.403698][ T333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 59.411508][ T333] R13: 00007ffd6cdbe60f R14: 00007f0e41148300 R15: 0000000000022000
[ 59.419325][ T333]
[ 59.474189][ T325] syz-executor606 (325) used greatest stack depth: 20320 bytes left
[ 59.475043][ T324] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN
[ 59.493554][ T324] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
[ 59.501797][ T324] CPU: 0 PID: 324 Comm: syz-executor606 Not tainted 5.15.106-syzkaller-00249-g19c0ed55a470 #0
[ 59.511863][ T324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023
[ 59.521762][ T324] RIP: 0010:__rb_erase_color+0x20b/0xa60
[ 59.527225][ T324] Code: 49 89 de 49 c1 ee 03 43 80 3c 26 00 74 08 48 89 df e8 89 28 2b ff 4c 8b 3b 4d 89 fc 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 ff e8 66 28 2b ff 41 f6 07 01 48 89 5d
[ 59.546851][ T324] RSP: 0018:ffffc90000a37a00 EFLAGS: 00010246
[ 59.552752][ T324] RAX: dffffc0000000000 RBX: ffff88811e0fd880 RCX: ffff88811bbbe2c0
[ 59.560562][ T324] RDX: ffffffff81a44dc0 RSI: ffff88810be23208 RDI: ffff88811e0fd870
[ 59.568385][ T324] RBP: ffffc90000a37a60 R08: ffffffff81a42e80 R09: ffffed10217c4645
[ 59.576199][ T324] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000
[ 59.583998][ T324] R13: ffff88811e0fd870 R14: 1ffff11023c1fb10 R15: 0000000000000000
[ 59.591817][ T324] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
[ 59.600583][ T324] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 59.607000][ T324] CR2: 00007f0e41222188 CR3: 000000011e340000 CR4: 00000000003506b0
[ 59.614820][ T324] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 59.622732][ T324] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 59.630540][ T324] Call Trace:
[ 59.633661][ T324]
[ 59.636444][ T324] ? anon_vma_interval_tree_iter_next+0x390/0x390
[ 59.642700][ T324] ? rwsem_mark_wake+0x6b0/0x6b0
[ 59.647465][ T324] vma_interval_tree_remove+0xb82/0xba0
[ 59.652851][ T324] unlink_file_vma+0xd9/0xf0
[ 59.657272][ T324] free_pgtables+0x13f/0x280
[ 59.661696][ T324] exit_mmap+0x3e7/0x6f0
[ 59.665777][ T324] ? exit_aio+0x25e/0x3c0
[ 59.669941][ T324] ? vm_brk+0x30/0x30
[ 59.673762][ T324] ? uprobe_clear_state+0x2cd/0x320
[ 59.678793][ T324] __mmput+0x95/0x310
[ 59.682616][ T324] mmput+0x5b/0x170
[ 59.686259][ T324] do_exit+0xbb4/0x2b60
[ 59.690256][ T324] ? put_task_struct+0x80/0x80
[ 59.694853][ T324] ? exc_page_fault+0x47a/0x830
[ 59.699540][ T324] do_group_exit+0x141/0x310
[ 59.703967][ T324] __x64_sys_exit_group+0x3f/0x40
[ 59.708827][ T324] do_syscall_64+0x3d/0xb0
[ 59.713079][ T324] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 59.718806][ T324] RIP: 0033:0x7f0e411a0949
[ 59.723060][ T324] Code: Unable to access opcode bytes at RIP 0x7f0e411a091f.
[ 59.730349][ T324] RSP: 002b:00007ffd6cdbe858 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[ 59.738596][ T324] RAX: ffffffffffffffda RBX: 00007f0e41224430 RCX: 00007f0e411a0949
[ 59.746407][ T324] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
[ 59.754220][ T324] RBP: 0000000000000000 R08: ffffffffffffffb8 R09: 0000555556811400
[ 59.762032][ T324] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0e41224430
[ 59.769841][ T324] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
[ 59.777657][ T324]
[ 59.780517][ T324] Modules linked in:
[ 59.784886][ T324] ---[ end trace 1f919d8d7cb7419b ]---
[ 59.790202][ T324] RIP: 0010:__rb_erase_color+0x20b/0xa60
[ 59.795703][ T324] Code: 49 89 de 49 c1 ee 03 43 80 3c 26 00 74 08 48 89 df e8 89 28 2b ff 4c 8b 3b 4d 89 fc 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 ff e8 66 28 2b ff 41 f6 07 01 48 89 5d
[ 59.815290][ T324] RSP: 0018:ffffc90000a37a00 EFLAGS: 00010246
[ 59.821189][ T324] RAX: dffffc0000000000 RBX: ffff88811e0fd880 RCX: ffff88811bbbe2c0
[ 59.829218][ T324] RDX: ffffffff81a44dc0 RSI: ffff88810be23208 RDI: ffff88811e0fd870
[ 59.836961][ T324] RBP: ffffc90000a37a60 R08: ffffffff81a42e80 R09: ffffed10217c4645
[ 59.844796][ T324] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000
[ 59.852876][ T324] R13: ffff88811e0fd870 R14: 1ffff11023c1fb10 R15: 0000000000000000
[ 59.860760][ T324] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[ 59.869593][ T324] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 59.876023][ T324] CR2: 00007f0e411486b8 CR3: 000000000680f000 CR4: 00000000003506a0
[ 59.883844][ T324] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 59.891617][ T324] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 59.899845][ T324] Kernel panic - not syncing: Fatal exception
[ 59.906018][ T324] Kernel Offset: disabled
[ 59.910169][ T324] Rebooting in 86400 seconds..