Warning: Permanently added '10.128.0.55' (ECDSA) to the list of known hosts. 2023/03/24 08:10:07 ignoring optional flag "sandboxArg"="0" 2023/03/24 08:10:07 parsed 1 programs 2023/03/24 08:10:07 executed programs: 0 [ 36.144375][ T29] kauditd_printk_skb: 65 callbacks suppressed [ 36.144385][ T29] audit: type=1400 audit(1679645407.529:137): avc: denied { mounton } for pid=462 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 36.175234][ T29] audit: type=1400 audit(1679645407.539:138): avc: denied { mount } for pid=462 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 36.216578][ T467] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.223586][ T467] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.231120][ T467] device bridge_slave_0 entered promiscuous mode [ 36.237787][ T467] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.244742][ T467] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.252046][ T467] device bridge_slave_1 entered promiscuous mode [ 36.284556][ T467] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.291417][ T467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.298499][ T467] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.305278][ T467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.321580][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.328802][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.336484][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.343706][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.360849][ T467] device veth0_vlan entered promiscuous mode [ 36.368013][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.376304][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.383952][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.391190][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.398653][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.406607][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.413429][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.420631][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.428549][ T124] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.435367][ T124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.442641][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.450364][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.461396][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.469899][ T467] device veth1_macvtap entered promiscuous mode [ 36.478567][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.488971][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.500090][ T29] audit: type=1400 audit(1679645407.889:139): avc: denied { mount } for pid=467 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 36.528789][ T474] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 36.531623][ T29] audit: type=1400 audit(1679645407.919:140): avc: denied { ioctl } for pid=472 comm="syz-executor.0" path="/dev/kvm" dev="devtmpfs" ino=82 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 36.573320][ T29] audit: type=1400 audit(1679645407.959:141): avc: denied { write } for pid=472 comm="syz-executor.0" name="kvm" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 37.362686][ T474] general protection fault, probably for non-canonical address 0xdffffc000000000c: 0000 [#1] PREEMPT SMP KASAN [ 37.374302][ T474] KASAN: null-ptr-deref in range [0x0000000000000060-0x0000000000000067] [ 37.382636][ T474] CPU: 1 PID: 474 Comm: syz-executor.0 Not tainted 5.15.104-syzkaller-15317-g115472395b0a #0 [ 37.392734][ T474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 37.402631][ T474] RIP: 0010:restart_apic_timer+0x99/0x990 [ 37.408181][ T474] Code: f2 01 66 43 c7 44 3c 0d f3 f3 43 c6 44 3c 0f f3 e8 ac eb 56 00 bf 01 00 00 00 e8 72 6c 35 00 49 8d 5e 60 49 89 dd 49 c1 ed 03 <43> 0f b6 44 3d 00 84 c0 0f 85 e8 05 00 00 48 89 5c 24 20 8b 1b bf [ 37.427712][ T474] RSP: 0018:ffffc90000d17a40 EFLAGS: 00010206 [ 37.433611][ T474] RAX: 1ffff11020cbd73a RBX: 0000000000000060 RCX: ffffffff849e6500 [ 37.441424][ T474] RDX: 0000000000000000 RSI: 0000000000030d40 RDI: ffffffff81168c3e [ 37.449233][ T474] RBP: ffffc90000d17b60 R08: ffffffff8108d6bb R09: ffffed1020cbd601 [ 37.457050][ T474] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff920001a2f50 [ 37.464863][ T474] R13: 000000000000000c R14: 0000000000000000 R15: dffffc0000000000 [ 37.472678][ T474] FS: 00007f3d66085700(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000 [ 37.481520][ T474] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 37.487943][ T474] CR2: 0000000000000000 CR3: 00000001207f4000 CR4: 00000000003526a0 [ 37.495758][ T474] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 37.503572][ T474] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 37.511378][ T474] Call Trace: [ 37.514513][ T474] [ 37.517289][ T474] ? nested_vmx_preemption_timer_pending+0x84/0x110 [ 37.523706][ T474] ? advance_periodic_target_expiration+0x230/0x230 [ 37.530128][ T474] ? kvm_vcpu_check_block+0x200/0x230 [ 37.535508][ T474] ? ktime_get+0x12f/0x160 [ 37.539760][ T474] ? kvm_vcpu_block+0x6d3/0xb30 [ 37.544447][ T474] kvm_lapic_switch_to_hv_timer+0x3b/0x40 [ 37.550009][ T474] vmx_post_block+0x4b/0x60 [ 37.554431][ T474] kvm_arch_vcpu_ioctl_run+0xdff/0x2150 [ 37.560093][ T474] ? ioctl_has_perm+0x1f8/0x560 [ 37.564790][ T474] ? __kvm_request_immediate_exit+0x70/0x70 [ 37.570599][ T474] kvm_vcpu_ioctl+0x7eb/0xcf0 [ 37.575110][ T474] ? kvm_clear_stat_per_vcpu+0x1e0/0x1e0 [ 37.580576][ T474] ? selinux_file_ioctl+0x3cc/0x540 [ 37.585611][ T474] ? numa_migrate_prep+0xe0/0xe0 [ 37.590386][ T474] ? selinux_file_alloc_security+0x120/0x120 [ 37.596204][ T474] ? __fget_files+0x31e/0x380 [ 37.600721][ T474] ? security_file_ioctl+0x84/0xb0 [ 37.605661][ T474] ? kvm_clear_stat_per_vcpu+0x1e0/0x1e0 [ 37.611128][ T474] __se_sys_ioctl+0x114/0x190 [ 37.615647][ T474] __x64_sys_ioctl+0x7b/0x90 [ 37.620068][ T474] do_syscall_64+0x3d/0xb0 [ 37.624321][ T474] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 37.630073][ T474] RIP: 0033:0x7f3d665120f9 [ 37.634306][ T474] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 37.653742][ T474] RSP: 002b:00007f3d66085168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 37.661998][ T474] RAX: ffffffffffffffda RBX: 00007f3d66631f80 RCX: 00007f3d665120f9 [ 37.669808][ T474] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 37.677615][ T474] RBP: 00007f3d6656db39 R08: 0000000000000000 R09: 0000000000000000 [ 37.685597][ T474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 37.693521][ T474] R13: 00007ffe7e85f7ef R14: 00007f3d66085300 R15: 0000000000022000 [ 37.701461][ T474] [ 37.704345][ T474] Modules linked in: [ 37.708218][ T474] ---[ end trace a27280d354fbcf4b ]--- [ 37.713487][ T474] RIP: 0010:restart_apic_timer+0x99/0x990 [ 37.719115][ T474] Code: f2 01 66 43 c7 44 3c 0d f3 f3 43 c6 44 3c 0f f3 e8 ac eb 56 00 bf 01 00 00 00 e8 72 6c 35 00 49 8d 5e 60 49 89 dd 49 c1 ed 03 <43> 0f b6 44 3d 00 84 c0 0f 85 e8 05 00 00 48 89 5c 24 20 8b 1b bf [ 37.738688][ T474] RSP: 0018:ffffc90000d17a40 EFLAGS: 00010206 [ 37.744638][ T474] RAX: 1ffff11020cbd73a RBX: 0000000000000060 RCX: ffffffff849e6500 [ 37.753003][ T474] RDX: 0000000000000000 RSI: 0000000000030d40 RDI: ffffffff81168c3e [ 37.760912][ T474] RBP: ffffc90000d17b60 R08: ffffffff8108d6bb R09: ffffed1020cbd601 [ 37.768901][ T474] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff920001a2f50 [ 37.776650][ T474] R13: 000000000000000c R14: 0000000000000000 R15: dffffc0000000000 [ 37.784444][ T474] FS: 00007f3d66085700(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000 [ 37.793265][ T474] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 37.799905][ T474] CR2: 0000000000000000 CR3: 00000001207f4000 CR4: 00000000003526a0 [ 37.807696][ T474] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 37.815509][ T474] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 37.823309][ T474] Kernel panic - not syncing: Fatal exception [ 37.829369][ T474] Kernel Offset: disabled [ 37.833619][ T474] Rebooting in 86400 seconds..