Warning: Permanently added '10.128.1.136' (ECDSA) to the list of known hosts. 2023/01/30 22:02:52 ignoring optional flag "sandboxArg"="0" 2023/01/30 22:02:52 parsed 1 programs 2023/01/30 22:02:52 executed programs: 0 [ 39.648922][ T30] kauditd_printk_skb: 65 callbacks suppressed [ 39.648934][ T30] audit: type=1400 audit(1675116172.619:137): avc: denied { mounton } for pid=372 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 39.680698][ T30] audit: type=1400 audit(1675116172.629:138): avc: denied { mount } for pid=372 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 39.715340][ T375] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.722204][ T375] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.729494][ T375] device bridge_slave_0 entered promiscuous mode [ 39.736175][ T375] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.743093][ T375] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.750163][ T375] device bridge_slave_1 entered promiscuous mode [ 39.781527][ T375] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.788391][ T375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.795438][ T375] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.802399][ T375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.817988][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.825220][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.832605][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.840002][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.856459][ T375] device veth0_vlan entered promiscuous mode [ 39.863475][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.871911][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.879846][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.887325][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.894575][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.903030][ T57] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.909896][ T57] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.917594][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.925639][ T57] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.932518][ T57] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.939649][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.947438][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.958194][ T375] device veth1_macvtap entered promiscuous mode [ 39.967080][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.975135][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.983310][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.996898][ T30] audit: type=1400 audit(1675116172.959:139): avc: denied { mount } for pid=375 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 40.026056][ T380] loop0: detected capacity change from 0 to 512 [ 40.032999][ T30] audit: type=1400 audit(1675116172.999:140): avc: denied { mounton } for pid=379 comm="syz-executor.0" path="/root/syzkaller-testdir1593353059/syzkaller.OhBers/0/file0" dev="sda1" ino=1148 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 40.034891][ T380] EXT4-fs (loop0): Mount option "nouser_xattr" will be removed by 3.5 [ 40.034891][ T380] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 40.034891][ T380] [ 40.079124][ T380] EXT4-fs (loop0): Ignoring removed nobh option [ 40.085226][ T380] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 40.098310][ T380] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 40.110325][ T380] EXT4-fs error (device loop0): ext4_xattr_ibody_find:2201: inode #15: comm syz-executor.0: corrupted in-inode xattr [ 40.122872][ T380] EXT4-fs error (device loop0): ext4_orphan_get:1398: comm syz-executor.0: couldn't read orphan inode 15 (err -117) [ 40.135569][ T380] EXT4-fs (loop0): mounted filesystem without journal. Opts: nouser_xattr,acl,debug_want_extra_isize=0x0000000000000080,lazytime,nobh,quota,,errors=continue. Quota mode: writeback. [ 40.154263][ T30] audit: type=1400 audit(1675116173.119:141): avc: denied { mount } for pid=379 comm="syz-executor.0" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 40.177117][ T30] audit: type=1400 audit(1675116173.119:142): avc: denied { setattr } for pid=379 comm="syz-executor.0" name="file0" dev="loop0" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 40.199991][ T30] audit: type=1400 audit(1675116173.149:143): avc: denied { unmount } for pid=375 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 40.200041][ T375] general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN [ 40.231430][ T375] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037] [ 40.240068][ T375] CPU: 0 PID: 375 Comm: syz-executor.0 Not tainted 5.15.83-syzkaller #0 [ 40.248434][ T375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 40.258686][ T375] RIP: 0010:ext4_xattr_set_entry+0x1ace/0x3600 [ 40.264839][ T375] Code: 48 c1 e8 03 80 3c 10 00 74 12 48 89 df e8 da 0d c3 ff 48 ba 00 00 00 00 00 fc ff df 48 8b 1b 48 83 c3 30 48 89 d8 48 c1 e8 03 <80> 3c 10 00 74 12 48 89 df e8 b4 0d c3 ff 48 ba 00 00 00 00 00 fc [ 40.284661][ T375] RSP: 0018:ffffc900006371a0 EFLAGS: 00010206 [ 40.290550][ T375] RAX: 0000000000000006 RBX: 0000000000000030 RCX: 0000000000000001 [ 40.298363][ T375] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 40.306276][ T375] RBP: ffffc90000637450 R08: dffffc0000000000 R09: ffffffff85ce79d0 [ 40.314521][ T375] R10: ffffed1021cbc003 R11: 1ffff11021cbc002 R12: ffffffff85ce7980 [ 40.323381][ T375] R13: ffffc90000637334 R14: 0000000000000000 R15: ffff88810e300820 [ 40.331187][ T375] FS: 00005555567f1400(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 [ 40.339980][ T375] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 40.346469][ T375] CR2: 00005555567fa728 CR3: 000000011b414000 CR4: 00000000003506b0 [ 40.354635][ T375] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 40.362438][ T375] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 40.370417][ T375] Call Trace: [ 40.373542][ T375] [ 40.376321][ T375] ? ext4_xattr_block_set+0x411/0x35c0 [ 40.381619][ T375] ? dentry_unlink_inode+0x2d2/0x3c0 [ 40.386733][ T375] ? shrink_dentry_list+0x209/0x440 [ 40.391885][ T375] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 40.397770][ T375] ? ext4_xattr_ibody_set+0x300/0x300 [ 40.402976][ T375] ? __kasan_kmalloc+0x9/0x10 [ 40.407486][ T375] ? __kmalloc+0x203/0x350 [ 40.411828][ T375] ? ext4_xattr_block_set+0x504/0x35c0 [ 40.417130][ T375] ext4_xattr_block_set+0xc41/0x35c0 [ 40.422249][ T375] ? ext4_xattr_block_find+0x480/0x480 [ 40.427538][ T375] ? ext4_get_inode_loc+0x120/0x1b0 [ 40.432569][ T375] ? __kasan_check_write+0x14/0x20 [ 40.437526][ T375] ext4_expand_extra_isize_ea+0x11f5/0x1c80 [ 40.443249][ T375] ? ext4_xattr_set+0x380/0x380 [ 40.447973][ T375] ? __kernel_text_address+0x9a/0x110 [ 40.453148][ T375] ? down_write_trylock+0x10/0x10 [ 40.458104][ T375] __ext4_expand_extra_isize+0x1ed/0x340 [ 40.463800][ T375] __ext4_mark_inode_dirty+0x3d8/0x650 [ 40.469055][ T375] ? ext4_blocks_for_truncate+0x250/0x250 [ 40.474599][ T375] ? __stack_depot_save+0x34/0x4b0 [ 40.479644][ T375] ? ext4_journal_check_start+0x52/0x1e0 [ 40.485099][ T375] ? ext4_dirty_inode+0x89/0xe0 [ 40.490389][ T375] ext4_dirty_inode+0xab/0xe0 [ 40.494926][ T375] __mark_inode_dirty+0x14c/0x700 [ 40.499894][ T375] iput+0xff/0x5d0 [ 40.503442][ T375] dentry_unlink_inode+0x2d2/0x3c0 [ 40.508583][ T375] ? __d_drop+0x180/0x270 [ 40.512743][ T375] __dentry_kill+0x329/0x4d0 [ 40.517737][ T375] shrink_dentry_list+0x209/0x440 [ 40.522606][ T375] shrink_dcache_parent+0xb8/0x2f0 [ 40.527553][ T375] ? d_set_mounted+0x1e0/0x1e0 [ 40.532146][ T375] shrink_dcache_for_umount+0x67/0x160 [ 40.537530][ T375] generic_shutdown_super+0x63/0x270 [ 40.542953][ T375] kill_block_super+0x78/0xc0 [ 40.547471][ T375] deactivate_locked_super+0x8b/0xe0 [ 40.553109][ T375] deactivate_super+0x5c/0x80 [ 40.557639][ T375] cleanup_mnt+0x3bd/0x460 [ 40.562021][ T375] __cleanup_mnt+0xd/0x10 [ 40.566179][ T375] task_work_run+0xd6/0x150 [ 40.570966][ T375] exit_to_user_mode_loop+0xfd/0x110 [ 40.576083][ T375] syscall_exit_to_user_mode+0x79/0xc0 [ 40.581496][ T375] do_syscall_64+0x50/0xd0 [ 40.586056][ T375] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 40.591951][ T375] RIP: 0033:0x7f9e39195547 [ 40.596200][ T375] Code: ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 40.616695][ T375] RSP: 002b:00007ffdacc38c98 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 40.626169][ T375] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f9e39195547 [ 40.634606][ T375] RDX: 00007ffdacc38d69 RSI: 000000000000000a RDI: 00007ffdacc38d60 [ 40.642763][ T375] RBP: 00007ffdacc38d60 R08: 00000000ffffffff R09: 00007ffdacc38b30 [ 40.650961][ T375] R10: 00005555567f2793 R11: 0000000000000246 R12: 00007f9e391eeb24 [ 40.658849][ T375] R13: 00007ffdacc39e20 R14: 00005555567f26f0 R15: 00007ffdacc39e60 [ 40.666984][ T375] [ 40.669945][ T375] Modules linked in: [ 40.676129][ T375] ---[ end trace ff4c58ef1f8996c7 ]--- [ 40.682150][ T375] RIP: 0010:ext4_xattr_set_entry+0x1ace/0x3600 [ 40.688435][ T375] Code: 48 c1 e8 03 80 3c 10 00 74 12 48 89 df e8 da 0d c3 ff 48 ba 00 00 00 00 00 fc ff df 48 8b 1b 48 83 c3 30 48 89 d8 48 c1 e8 03 <80> 3c 10 00 74 12 48 89 df e8 b4 0d c3 ff 48 ba 00 00 00 00 00 fc [ 40.708345][ T375] RSP: 0018:ffffc900006371a0 EFLAGS: 00010206 [ 40.714381][ T375] RAX: 0000000000000006 RBX: 0000000000000030 RCX: 0000000000000001 [ 40.722763][ T375] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 40.730644][ T375] RBP: ffffc90000637450 R08: dffffc0000000000 R09: ffffffff85ce79d0 [ 40.738492][ T375] R10: ffffed1021cbc003 R11: 1ffff11021cbc002 R12: ffffffff85ce7980 [ 40.746255][ T375] R13: ffffc90000637334 R14: 0000000000000000 R15: ffff88810e300820 [ 40.754606][ T375] FS: 00005555567f1400(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 [ 40.764647][ T375] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 40.771941][ T375] CR2: 00005555567fa728 CR3: 000000011b414000 CR4: 00000000003506b0 [ 40.779882][ T375] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 40.788575][ T375] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 40.798013][ T375] Kernel panic - not syncing: Fatal exception [ 40.804182][ T375] Kernel Offset: disabled [ 40.808464][ T375] Rebooting in 86400 seconds..