Warning: Permanently added '10.128.0.40' (ED25519) to the list of known hosts. 2024/12/28 07:59:54 ignoring optional flag "sandboxArg"="0" 2024/12/28 07:59:54 ignoring optional flag "type"="gce" 2024/12/28 07:59:54 parsed 1 programs 2024/12/28 07:59:54 executed programs: 0 [ 44.865635][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 44.865652][ T30] audit: type=1400 audit(1735372794.926:95): avc: denied { unlink } for pid=345 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 44.903624][ T345] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 44.963463][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.970370][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.977660][ T30] audit: type=1400 audit(1735372795.036:96): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 44.977899][ T352] device bridge_slave_0 entered promiscuous mode [ 45.005903][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.012747][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.020310][ T352] device bridge_slave_1 entered promiscuous mode [ 45.067478][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.074345][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.081492][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.088341][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.107248][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.114324][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.121624][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.129059][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.137927][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.146015][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.152850][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.161602][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.169628][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.176486][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.188486][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.197452][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.210998][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 45.221840][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.229739][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.237158][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.245543][ T352] device veth0_vlan entered promiscuous mode [ 45.255115][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.264189][ T352] device veth1_macvtap entered promiscuous mode [ 45.273175][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.282851][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.297362][ T30] audit: type=1400 audit(1735372795.356:97): avc: denied { mounton } for pid=352 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 45.326849][ T30] audit: type=1400 audit(1735372795.386:98): avc: denied { mounton } for pid=356 comm="syz-executor.0" path="/root/syzkaller-testdir406992709/syzkaller.biWR2P/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 45.338559][ T357] general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN [ 45.353815][ T30] audit: type=1400 audit(1735372795.386:99): avc: denied { unlink } for pid=356 comm="syz-executor.0" name="#1" dev="sda1" ino=1944 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=chr_file permissive=1 [ 45.365474][ T357] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037] [ 45.365496][ T357] CPU: 0 PID: 357 Comm: syz-executor.0 Not tainted 5.15.173-syzkaller-1077948-gb4bd207b0380 #0 [ 45.365523][ T357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 45.365535][ T357] RIP: 0010:security_inode_getattr+0x47/0x130 [ 45.388106][ T30] audit: type=1400 audit(1735372795.386:100): avc: denied { mount } for pid=356 comm="syz-executor.0" name="/" dev="overlay" ino=1941 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 45.395677][ T357] Code: 38 ff 49 8d 5f 08 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 c7 62 7a ff 48 8b 1b 48 83 c3 30 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 aa 62 7a ff 48 8b 1b 48 83 c3 0c [ 45.395695][ T357] RSP: 0018:ffffc90000d36eb0 EFLAGS: 00010206 [ 45.406125][ T30] audit: type=1400 audit(1735372795.386:101): avc: denied { write } for pid=356 comm="syz-executor.0" name="/" dev="incremental-fs" ino=1941 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 45.415724][ T357] RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff8881102a0000 [ 45.415740][ T357] RDX: 0000000000000000 RSI: ffffc90000d373e0 RDI: ffffc90000d373d0 [ 45.415754][ T357] RBP: ffffc90000d36ed8 R08: dffffc0000000000 R09: ffffc90000d373d0 [ 45.415768][ T357] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90000d373e0 [ 45.415781][ T357] R13: dffffc0000000000 R14: ffffc90000d373d0 R15: ffffc90000d373d0 [ 45.415796][ T357] FS: 00007fc607d226c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 45.415812][ T357] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 45.422638][ T30] audit: type=1400 audit(1735372795.386:102): avc: denied { add_name } for pid=356 comm="syz-executor.0" name="file1" dev="incremental-fs" ino=1940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 45.443668][ T357] CR2: 00005598aacdee70 CR3: 000000010e67d000 CR4: 00000000003506b0 [ 45.443690][ T357] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 45.443701][ T357] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 45.463861][ T30] audit: type=1400 audit(1735372795.386:103): avc: denied { link } for pid=356 comm="syz-executor.0" name="file1" dev="incremental-fs" ino=1940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 45.469095][ T357] Call Trace: [ 45.469102][ T357] [ 45.469109][ T357] ? __die_body+0x62/0xb0 [ 45.492091][ T30] audit: type=1400 audit(1735372795.396:104): avc: denied { read write } for pid=356 comm="syz-executor.0" name="file3" dev="incremental-fs" ino=1940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 45.499561][ T357] ? die_addr+0x9f/0xd0 [ 45.499587][ T357] ? exc_general_protection+0x311/0x4b0 [ 45.499612][ T357] ? asm_exc_general_protection+0x27/0x30 [ 45.499634][ T357] ? security_inode_getattr+0x47/0x130 [ 45.669592][ T357] vfs_getattr+0x2a/0x320 [ 45.673749][ T357] ovl_copy_up_flags+0x629/0x2d30 [ 45.678612][ T357] ? kasan_set_free_info+0x23/0x40 [ 45.683563][ T357] ? ovl_maybe_copy_up+0x190/0x190 [ 45.688593][ T357] ? stack_trace_save+0x1c0/0x1c0 [ 45.693453][ T357] ? __kernel_text_address+0x9b/0x110 [ 45.698662][ T357] ? unwind_get_return_address+0x4d/0x90 [ 45.704136][ T357] ? arch_stack_walk+0xf3/0x140 [ 45.708903][ T357] ? stack_trace_save+0x113/0x1c0 [ 45.713761][ T357] ? avc_has_perm_noaudit+0x348/0x430 [ 45.718976][ T357] ? memcpy+0x56/0x70 [ 45.722786][ T357] ? avc_has_perm_noaudit+0x2dd/0x430 [ 45.727994][ T357] ? __stack_depot_save+0x34/0x470 [ 45.732944][ T357] ? avc_denied+0x1b0/0x1b0 [ 45.737282][ T357] ? alloc_empty_file+0x95/0x180 [ 45.742062][ T357] ? mnt_want_write+0x1ff/0x2d0 [ 45.746743][ T357] ovl_maybe_copy_up+0x15a/0x190 [ 45.751516][ T357] ovl_open+0xad/0x210 [ 45.755420][ T357] ? ovl_mmap+0x450/0x450 [ 45.759602][ T357] do_dentry_open+0x81c/0xfd0 [ 45.764103][ T357] dentry_open+0xb8/0x100 [ 45.768266][ T357] file_open+0x2a7/0x650 [ 45.772358][ T357] ? incfs_file_mmap+0x120/0x120 [ 45.777136][ T357] ? fsnotify_perm+0x269/0x5b0 [ 45.781721][ T357] ? incfs_file_mmap+0x120/0x120 [ 45.786513][ T357] do_dentry_open+0x81c/0xfd0 [ 45.791007][ T357] vfs_open+0x73/0x80 [ 45.794825][ T357] path_openat+0x26f0/0x2f40 [ 45.799256][ T357] ? __kasan_slab_alloc+0xb1/0xe0 [ 45.804114][ T357] ? kmem_cache_alloc+0xf5/0x250 [ 45.808886][ T357] ? getname_flags+0xba/0x520 [ 45.813403][ T357] ? __x64_sys_openat+0x243/0x290 [ 45.818261][ T357] ? do_filp_open+0x460/0x460 [ 45.822776][ T357] do_filp_open+0x21c/0x460 [ 45.827220][ T357] ? vfs_tmpfile+0x2c0/0x2c0 [ 45.831651][ T357] do_sys_openat2+0x13f/0x820 [ 45.836156][ T357] ? kmem_cache_free+0x115/0x330 [ 45.840929][ T357] ? do_linkat+0x860/0x9f0 [ 45.845187][ T357] ? do_sys_open+0x220/0x220 [ 45.849626][ T357] ? __se_sys_futex+0x37b/0x3e0 [ 45.854301][ T357] __x64_sys_openat+0x243/0x290 [ 45.858984][ T357] ? __ia32_sys_open+0x270/0x270 [ 45.863766][ T357] ? switch_fpu_return+0x15f/0x2e0 [ 45.868710][ T357] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 45.874176][ T357] x64_sys_call+0x6bf/0x9a0 [ 45.878519][ T357] do_syscall_64+0x3b/0xb0 [ 45.882766][ T357] ? clear_bhb_loop+0x35/0x90 [ 45.887279][ T357] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 45.893008][ T357] RIP: 0033:0x7fc6081a0da9 [ 45.897264][ T357] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 45.916709][ T357] RSP: 002b:00007fc607d220c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 45.924949][ T357] RAX: ffffffffffffffda RBX: 00007fc6082cef80 RCX: 00007fc6081a0da9 [ 45.932757][ T357] RDX: 0000000000000002 RSI: 0000000020000080 RDI: 0000000000000004 [ 45.940581][ T357] RBP: 00007fc6081ed47a R08: 0000000000000000 R09: 0000000000000000 [ 45.948380][ T357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 45.956191][ T357] R13: 000000000000000b R14: 00007fc6082cef80 R15: 00007ffdff42b998 [ 45.964005][ T357] [ 45.966863][ T357] Modules linked in: [ 45.972778][ T357] ---[ end trace 9e5f90f91c80bb62 ]--- [ 45.978301][ T357] RIP: 0010:security_inode_getattr+0x47/0x130 [ 45.984183][ T357] Code: 38 ff 49 8d 5f 08 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 c7 62 7a ff 48 8b 1b 48 83 c3 30 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 aa 62 7a ff 48 8b 1b 48 83 c3 0c [ 46.004238][ T357] RSP: 0018:ffffc90000d36eb0 EFLAGS: 00010206 [ 46.010568][ T357] RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff8881102a0000 [ 46.018591][ T357] RDX: 0000000000000000 RSI: ffffc90000d373e0 RDI: ffffc90000d373d0 [ 46.026460][ T357] RBP: ffffc90000d36ed8 R08: dffffc0000000000 R09: ffffc90000d373d0 [ 46.034230][ T357] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90000d373e0 [ 46.042240][ T357] R13: dffffc0000000000 R14: ffffc90000d373d0 R15: ffffc90000d373d0 [ 46.050184][ T357] FS: 00007fc607d226c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 46.059123][ T357] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 46.065622][ T357] CR2: 0000556cc144e088 CR3: 000000010e67d000 CR4: 00000000003506a0 [ 46.073416][ T357] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 46.081271][ T357] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 46.089094][ T357] Kernel panic - not syncing: Fatal exception [ 46.095295][ T357] Kernel Offset: disabled [ 46.099448][ T357] Rebooting in 86400 seconds..