Warning: Permanently added '10.128.0.121' (ED25519) to the list of known hosts. 2024/08/26 21:44:13 ignoring optional flag "sandboxArg"="0" 2024/08/26 21:44:13 parsed 1 programs [ 47.442415][ T24] kauditd_printk_skb: 18 callbacks suppressed [ 47.442429][ T24] audit: type=1400 audit(1724708653.260:94): avc: denied { mount } for pid=345 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2024/08/26 21:44:13 executed programs: 0 [ 47.472081][ T24] audit: type=1400 audit(1724708653.300:95): avc: denied { unlink } for pid=345 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 47.515542][ T345] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.567314][ T351] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.574189][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.581331][ T351] device bridge_slave_0 entered promiscuous mode [ 47.588128][ T351] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.595160][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.602328][ T351] device bridge_slave_1 entered promiscuous mode [ 47.638615][ T351] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.645483][ T351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.652538][ T351] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.659379][ T351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.676429][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.683721][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.690878][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.698385][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.707077][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.715136][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.722398][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.741892][ T351] device veth0_vlan entered promiscuous mode [ 47.748459][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.757051][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.765105][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.772308][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.779589][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.787568][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.794419][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.801530][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.809571][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.822024][ T351] device veth1_macvtap entered promiscuous mode [ 47.828805][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.844916][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.853313][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.866200][ T24] audit: type=1400 audit(1724708653.690:96): avc: denied { mounton } for pid=351 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 47.896294][ T24] audit: type=1400 audit(1724708653.710:97): avc: denied { prog_load } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 47.915545][ T24] audit: type=1400 audit(1724708653.710:98): avc: denied { bpf } for pid=355 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 47.936656][ T24] audit: type=1400 audit(1724708653.710:99): avc: denied { perfmon } for pid=355 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 47.959274][ T24] audit: type=1400 audit(1724708653.720:100): avc: denied { prog_run } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 47.978616][ T24] audit: type=1400 audit(1724708653.720:101): avc: denied { create } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 47.998446][ T24] audit: type=1400 audit(1724708653.720:102): avc: denied { setopt } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 48.018915][ T24] audit: type=1400 audit(1724708653.720:103): avc: denied { read write } for pid=355 comm="syz-executor.0" name="uinput" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 49.019325][ T1] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000008 [ 49.027791][ T1] CPU: 1 PID: 1 Comm: init Not tainted 5.10.223-syzkaller-1003215-g0890c03b8b7d #0 [ 49.037173][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 49.047126][ T1] Call Trace: [ 49.050226][ T1] dump_stack_lvl+0x1e2/0x24b [ 49.054684][ T1] ? panic+0x22b/0x812 [ 49.058591][ T1] ? bfq_pos_tree_add_move+0x43b/0x43b [ 49.063886][ T1] dump_stack+0x15/0x17 [ 49.067870][ T1] panic+0x2cf/0x812 [ 49.071603][ T1] ? do_exit+0x239a/0x2a50 [ 49.075876][ T1] ? fb_is_primary_device+0xd4/0xd4 [ 49.080892][ T1] ? __kasan_check_write+0x14/0x20 [ 49.085835][ T1] ? sync_mm_rss+0x28a/0x2e0 [ 49.090287][ T1] do_exit+0x23b4/0x2a50 [ 49.094344][ T1] ? sched_group_set_shares+0x490/0x490 [ 49.099731][ T1] ? put_task_struct+0x80/0x80 [ 49.104432][ T1] ? schedule+0x154/0x1d0 [ 49.108584][ T1] ? schedule_timeout+0xa9/0x360 [ 49.113450][ T1] ? __kasan_check_write+0x14/0x20 [ 49.118398][ T1] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 49.123346][ T1] do_group_exit+0x141/0x310 [ 49.127874][ T1] get_signal+0x10a0/0x1410 [ 49.132442][ T1] arch_do_signal_or_restart+0xbd/0x17c0 [ 49.137869][ T1] ? put_pid+0xd7/0x110 [ 49.141944][ T1] ? kernel_clone+0x6ca/0x9e0 [ 49.146376][ T1] ? create_io_thread+0x1e0/0x1e0 [ 49.151325][ T1] ? get_timespec64+0x197/0x270 [ 49.156030][ T1] ? timespec64_add_safe+0x220/0x220 [ 49.161123][ T1] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 49.166424][ T1] ? __do_sys_vfork+0xcd/0x130 [ 49.171118][ T1] exit_to_user_mode_loop+0x9b/0xd0 [ 49.176233][ T1] syscall_exit_to_user_mode+0xa2/0x1a0 [ 49.181606][ T1] do_syscall_64+0x40/0x70 [ 49.185959][ T1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 49.191768][ T1] RIP: 0033:0x7fbc50798a68 [ 49.196240][ T1] Code: 00 48 8d b8 e0 02 00 00 48 89 b8 d8 02 00 00 48 89 b8 e0 02 00 00 b8 11 01 00 00 0f 05 44 89 c0 c3 90 5f b8 3a 00 00 00 0f 05 <57> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 90 43 0f 00 f7 d8 64 89 01 48 [ 49.215858][ T1] RSP: 002b:00007ffde605d660 EFLAGS: 00000246 ORIG_RAX: 000000000000003a [ 49.224091][ T1] RAX: 0000000000000187 RBX: 0000563d4e7eca50 RCX: 00007fbc50798a68 [ 49.232075][ T1] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 00007fbc50923bed [ 49.239886][ T1] RBP: 00007fbc5095e528 R08: 0000000000000007 R09: 205bbe2895fa4e92 [ 49.247698][ T1] R10: 00007ffde605d6a0 R11: 0000000000000246 R12: 0000000000000000 [ 49.255509][ T1] R13: 0000000000000018 R14: 0000563d4e063169 R15: 00007fbc5098fa80 [ 49.263671][ T1] Kernel Offset: disabled [ 49.268022][ T1] Rebooting in 86400 seconds..