Warning: Permanently added '10.128.1.57' (ED25519) to the list of known hosts. [ 20.200979][ T30] audit: type=1400 audit(1701556100.461:66): avc: denied { execmem } for pid=286 comm="syz-executor601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.206899][ T30] audit: type=1400 audit(1701556100.461:67): avc: denied { mounton } for pid=287 comm="syz-executor601" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 20.218469][ T30] audit: type=1400 audit(1701556100.461:68): avc: denied { mount } for pid=287 comm="syz-executor601" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 20.236951][ T30] audit: type=1400 audit(1701556100.461:69): avc: denied { mounton } for pid=287 comm="syz-executor601" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 20.260105][ T30] audit: type=1400 audit(1701556100.461:70): avc: denied { module_request } for pid=287 comm="syz-executor601" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 20.287010][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.294159][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.301519][ T287] device bridge_slave_0 entered promiscuous mode [ 20.310215][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.319124][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.329118][ T287] device bridge_slave_1 entered promiscuous mode [ 20.362485][ T30] audit: type=1400 audit(1701556100.621:71): avc: denied { create } for pid=287 comm="syz-executor601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 20.366998][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.385739][ T30] audit: type=1400 audit(1701556100.621:72): avc: denied { write } for pid=287 comm="syz-executor601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 20.393274][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.415429][ T30] audit: type=1400 audit(1701556100.621:73): avc: denied { read } for pid=287 comm="syz-executor601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 20.423738][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.454968][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.474976][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.482282][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.490048][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.497982][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.508700][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.517663][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.524597][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.542338][ T287] device veth0_vlan entered promiscuous mode [ 20.549274][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.558563][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.566485][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.574549][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.582341][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.591813][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.599326][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.607280][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.618367][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.632520][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.643514][ T287] device veth1_macvtap entered promiscuous mode [ 20.653358][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready executing program [ 20.665454][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.678298][ T30] audit: type=1400 audit(1701556100.941:74): avc: denied { mounton } for pid=287 comm="syz-executor601" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 20.703677][ T30] audit: type=1400 audit(1701556100.941:75): avc: denied { mount } for pid=287 comm="syz-executor601" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 executing program executing program executing program [ 20.868781][ T295] syz-executor601 (295) used greatest stack depth: 21360 bytes left executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 23.883914][ T1] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000005 [ 23.894335][ T1] CPU: 1 PID: 1 Comm: init Not tainted 5.15.138-syzkaller-00280-geb99a642b7e6 #0 [ 23.904235][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 23.915373][ T1] Call Trace: [ 23.918675][ T1] [ 23.921527][ T1] dump_stack_lvl+0x151/0x1b7 [ 23.931654][ T1] ? io_uring_drop_tctx_refs+0x190/0x190 [ 23.937357][ T1] dump_stack+0x15/0x17 [ 23.941616][ T1] panic+0x287/0x751 [ 23.945378][ T1] ? do_exit+0x240b/0x2ca0 [ 23.949614][ T1] ? fb_is_primary_device+0xd4/0xd4 [ 23.957583][ T1] ? __kasan_check_write+0x14/0x20 [ 23.964326][ T1] ? sync_mm_rss+0x28a/0x2e0 [ 23.969096][ T1] do_exit+0x2425/0x2ca0 [ 23.973174][ T1] ? __sched_text_start+0x8/0x8 [ 23.979244][ T1] ? put_task_struct+0x80/0x80 [ 23.984192][ T1] ? schedule+0x136/0x1e0 [ 23.988610][ T1] ? __kasan_check_write+0x14/0x20 [ 23.993878][ T1] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 23.999019][ T1] ? _raw_spin_lock_irqsave+0x210/0x210 [ 24.006384][ T1] do_group_exit+0x141/0x310 [ 24.011346][ T1] get_signal+0x7a3/0x1630 [ 24.015761][ T1] ? wait_for_common+0x366/0x420 [ 24.021083][ T1] arch_do_signal_or_restart+0xbd/0x1680 [ 24.026548][ T1] ? __kasan_check_write+0x14/0x20 [ 24.032105][ T1] ? put_pid+0xd7/0x110 [ 24.036992][ T1] ? kernel_clone+0x6cf/0x9e0 [ 24.041851][ T1] ? create_io_thread+0x1e0/0x1e0 [ 24.047186][ T1] ? get_sigframe_size+0x10/0x10 [ 24.052013][ T1] ? timespec64_add_safe+0x220/0x220 [ 24.057156][ T1] exit_to_user_mode_loop+0xa0/0xe0 [ 24.062577][ T1] exit_to_user_mode_prepare+0x5a/0xa0 [ 24.068620][ T1] syscall_exit_to_user_mode+0x26/0x160 [ 24.076529][ T1] do_syscall_64+0x49/0xb0 [ 24.081401][ T1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 24.090754][ T1] RIP: 0033:0x7fde269e3a68 [ 24.097203][ T1] Code: 00 48 8d b8 e0 02 00 00 48 89 b8 d8 02 00 00 48 89 b8 e0 02 00 00 b8 11 01 00 00 0f 05 44 89 c0 c3 90 5f b8 3a 00 00 00 0f 05 <57> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 90 43 0f 00 f7 d8 64 89 01 48 [ 24.119634][ T1] RSP: 002b:00007ffd2c9fdf40 EFLAGS: 00000246 ORIG_RAX: 000000000000003a [ 24.133015][ T1] RAX: 000000000000018e RBX: 000056255f8bda50 RCX: 00007fde269e3a68 [ 24.141259][ T1] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 00007fde26b6ebed [ 24.150164][ T1] RBP: 00007fde26ba9528 R08: 0000000000000007 R09: 8d32fa74ee4cb37b [ 24.158568][ T1] R10: 00007ffd2c9fdf80 R11: 0000000000000246 R12: 0000000000000000 [ 24.166557][ T1] R13: 0000000000000018 R14: 000056255e810169 R15: 00007fde26bdaa80 [ 24.176138][ T1] [ 24.179185][ T1] Kernel Offset: disabled [ 24.184163][ T1] Rebooting in 86400 seconds..