Warning: Permanently added '10.128.1.175' (ED25519) to the list of known hosts. 2024/10/24 09:23:38 ignoring optional flag "sandboxArg"="0" 2024/10/24 09:23:38 ignoring optional flag "type"="gce" 2024/10/24 09:23:38 parsed 1 programs [ 50.124591][ T29] audit: type=1400 audit(1729761818.972:96): avc: denied { mounton } for pid=360 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 50.149771][ T29] audit: type=1400 audit(1729761818.972:97): avc: denied { read write } for pid=360 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 50.175820][ T29] audit: type=1400 audit(1729761818.972:98): avc: denied { open } for pid=360 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/10/24 09:23:39 executed programs: 0 [ 50.202078][ T29] audit: type=1400 audit(1729761819.032:99): avc: denied { unlink } for pid=360 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 50.228271][ T29] audit: type=1400 audit(1729761819.032:100): avc: denied { relabelto } for pid=361 comm="mkswap" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 50.258235][ T360] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 50.277721][ T366] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.284798][ T366] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.291972][ T366] device bridge_slave_0 entered promiscuous mode [ 50.298331][ T366] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.305588][ T366] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.312713][ T366] device bridge_slave_1 entered promiscuous mode [ 50.325656][ T366] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.332652][ T366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.340175][ T366] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.347555][ T366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.357881][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.365644][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.372797][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 50.380610][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.388317][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.396784][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.403656][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.412639][ T366] device veth0_vlan entered promiscuous mode [ 50.418689][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 50.426659][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.434367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.441669][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.449051][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.457524][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.464856][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.472133][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.480699][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.489566][ T366] device veth1_macvtap entered promiscuous mode [ 50.496523][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 50.505059][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 50.513560][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 50.526009][ T29] audit: type=1400 audit(1729761819.382:101): avc: denied { read write } for pid=371 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 50.550806][ T29] audit: type=1400 audit(1729761819.382:102): avc: denied { open } for pid=371 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 50.575220][ T29] audit: type=1400 audit(1729761819.382:103): avc: denied { mounton } for pid=371 comm="syz-executor.0" path="/root/syzkaller-testdir2237578364/syzkaller.wjTJGW/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 50.576535][ T372] BUG: kernel NULL pointer dereference, address: 0000000000000010 [ 50.611662][ T372] #PF: supervisor read access in kernel mode [ 50.618386][ T372] #PF: error_code(0x0000) - not-present page [ 50.624532][ T372] PGD 113e61067 P4D 113e61067 PUD 113e65067 PMD 0 [ 50.631161][ T372] Oops: 0000 [#1] PREEMPT SMP [ 50.635733][ T372] CPU: 0 PID: 372 Comm: syz-executor.0 Not tainted 5.15.167-syzkaller #0 [ 50.644337][ T372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 50.654734][ T372] RIP: 0010:step_into+0x1ba/0x790 [ 50.660283][ T372] Code: 89 54 24 0c e8 f7 d8 ff ff 44 8b 54 24 0c 84 c0 0f 84 c2 01 00 00 48 8b 03 4c 89 64 24 20 45 89 e9 44 8b 43 38 48 89 44 24 18 <41> 8b 34 24 f7 c6 00 00 07 00 0f 85 aa 01 00 00 81 e6 00 00 70 00 [ 50.680996][ T372] RSP: 0018:ffffc900003d3c38 EFLAGS: 00010246 [ 50.687519][ T372] RAX: ffff8881075ef220 RBX: ffffc900003d3d90 RCX: 0000000000000000 [ 50.696136][ T372] RDX: 0000000000000010 RSI: 0000000000000002 RDI: ffffc900003d3d90 [ 50.704202][ T372] RBP: ffffc900003d3c90 R08: 0000000000000011 R09: 00000000ffffffff [ 50.712103][ T372] R10: 0000000000000002 R11: 0000000000000000 R12: 0000000000000010 [ 50.720364][ T372] R13: 0000000000000002 R14: ffffc900003d3ce8 R15: ffff88810a8450d0 [ 50.728345][ T372] FS: 00007f5b5e8356c0(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 50.737484][ T372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 50.744013][ T372] CR2: 0000000000000010 CR3: 0000000113e52000 CR4: 00000000003506b0 [ 50.752397][ T372] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 50.760334][ T372] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 50.768147][ T372] Call Trace: [ 50.771304][ T372] [ 50.774054][ T372] ? show_regs.part.0+0x1e/0x20 [ 50.778817][ T372] ? __die+0x5d/0x9e [ 50.783063][ T372] ? page_fault_oops+0x12d/0x280 [ 50.787965][ T372] ? do_user_addr_fault+0x43d/0x6e0 [ 50.793166][ T372] ? preempt_count_add+0x77/0xa0 [ 50.797935][ T372] ? exc_page_fault+0x67/0x160 [ 50.802708][ T372] ? asm_exc_page_fault+0x27/0x30 [ 50.807949][ T372] ? step_into+0x1ba/0x790 [ 50.812294][ T372] ? __lookup_slow+0x11c/0x150 [ 50.816903][ T372] walk_component+0x6b/0x1b0 [ 50.821751][ T372] link_path_walk.part.0+0x236/0x390 [ 50.826881][ T372] ? futex_wake+0x194/0x300 [ 50.831561][ T372] ? path_init+0x52/0x3e0 [ 50.835816][ T372] path_lookupat+0x39/0x1b0 [ 50.840252][ T372] filename_lookup+0xc6/0x1d0 [ 50.844928][ T372] ? strncpy_from_user+0x63/0x160 [ 50.850056][ T372] ? getname_flags.part.0+0x47/0x1a0 [ 50.855421][ T372] user_path_at_empty+0x3a/0x60 [ 50.860255][ T372] __x64_sys_mount+0xae/0x140 [ 50.864969][ T372] x64_sys_call+0x50d/0x990 [ 50.869282][ T372] do_syscall_64+0x33/0xb0 [ 50.873643][ T372] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 50.879491][ T372] RIP: 0033:0x7f5b5ecb3da9 [ 50.883777][ T372] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 50.904092][ T372] RSP: 002b:00007f5b5e8350c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 50.912509][ T372] RAX: ffffffffffffffda RBX: 00007f5b5ede1f80 RCX: 00007f5b5ecb3da9 [ 50.920350][ T372] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000000 [ 50.928585][ T372] RBP: 00007f5b5ed0047a R08: 0000000000000000 R09: 0000000000000000 [ 50.936673][ T372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 50.945408][ T372] R13: 000000000000000b R14: 00007f5b5ede1f80 R15: 00007fffedb13a18 [ 50.953918][ T372] [ 50.956769][ T372] Modules linked in: [ 50.960503][ T372] CR2: 0000000000000010 [ 50.965199][ T372] ---[ end trace 26d1248f8b12700f ]--- [ 50.970924][ T372] RIP: 0010:step_into+0x1ba/0x790 [ 50.975786][ T372] Code: 89 54 24 0c e8 f7 d8 ff ff 44 8b 54 24 0c 84 c0 0f 84 c2 01 00 00 48 8b 03 4c 89 64 24 20 45 89 e9 44 8b 43 38 48 89 44 24 18 <41> 8b 34 24 f7 c6 00 00 07 00 0f 85 aa 01 00 00 81 e6 00 00 70 00 [ 50.996005][ T372] RSP: 0018:ffffc900003d3c38 EFLAGS: 00010246 [ 51.001919][ T372] RAX: ffff8881075ef220 RBX: ffffc900003d3d90 RCX: 0000000000000000 [ 51.010008][ T372] RDX: 0000000000000010 RSI: 0000000000000002 RDI: ffffc900003d3d90 [ 51.018202][ T372] RBP: ffffc900003d3c90 R08: 0000000000000011 R09: 00000000ffffffff [ 51.026105][ T372] R10: 0000000000000002 R11: 0000000000000000 R12: 0000000000000010 [ 51.034694][ T372] R13: 0000000000000002 R14: ffffc900003d3ce8 R15: ffff88810a8450d0 [ 51.042709][ T372] FS: 00007f5b5e8356c0(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 51.051621][ T372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 51.058042][ T372] CR2: 0000000000000010 CR3: 0000000113e52000 CR4: 00000000003506b0 [ 51.065862][ T372] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 51.073922][ T372] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 51.081916][ T372] Kernel panic - not syncing: Fatal exception [ 51.088122][ T372] Kernel Offset: disabled [ 51.092246][ T372] Rebooting in 86400 seconds..