[ 23.100948][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.119569][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.127332][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.145478][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.154075][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.249133][ T358] syz-executor.0 (358) used greatest stack depth: 19352 bytes left [ 23.799047][ T9] device bridge_slave_1 left promiscuous mode [ 23.805011][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.819052][ T9] device bridge_slave_0 left promiscuous mode [ 23.825055][ T9] bridge0: port 1(bridge_slave_0) entered disabled state Warning: Permanently added '10.128.1.132' (ED25519) to the list of known hosts. 2023/11/16 19:00:30 ignoring optional flag "sandboxArg"="0" 2023/11/16 19:00:30 parsed 1 programs 2023/11/16 19:00:30 executed programs: 0 [ 42.153872][ T23] kauditd_printk_skb: 69 callbacks suppressed [ 42.153884][ T23] audit: type=1400 audit(1700161230.200:145): avc: denied { mounton } for pid=403 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 42.185542][ T23] audit: type=1400 audit(1700161230.200:146): avc: denied { mount } for pid=403 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 42.237825][ T407] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.244768][ T407] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.252472][ T407] device bridge_slave_0 entered promiscuous mode [ 42.259361][ T407] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.266645][ T407] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.274076][ T407] device bridge_slave_1 entered promiscuous mode [ 42.320524][ T23] audit: type=1400 audit(1700161230.370:147): avc: denied { create } for pid=407 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.328891][ T407] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.341074][ T23] audit: type=1400 audit(1700161230.370:148): avc: denied { write } for pid=407 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.347848][ T407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.368835][ T23] audit: type=1400 audit(1700161230.370:149): avc: denied { read } for pid=407 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.375519][ T407] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.402486][ T407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.426153][ T364] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.433774][ T364] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.441671][ T364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.449516][ T364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.469337][ T364] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.477307][ T364] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.484343][ T364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.491715][ T364] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 42.499901][ T364] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.507815][ T364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.515089][ T364] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 42.523046][ T364] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 42.537836][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 42.552929][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.569581][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.577802][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.586708][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.603997][ T23] audit: type=1400 audit(1700161230.650:150): avc: denied { mounton } for pid=407 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=10735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 42.638138][ T23] audit: type=1400 audit(1700161230.680:151): avc: denied { ioctl } for pid=412 comm="syz-executor.0" path="socket:[11492]" dev="sockfs" ino=11492 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 42.639475][ T413] FAULT_INJECTION: forcing a failure. [ 42.639475][ T413] name failslab, interval 1, probability 0, space 0, times 1 [ 42.677338][ T413] CPU: 1 PID: 413 Comm: syz-executor.0 Not tainted 5.4.254-syzkaller-04743-g2ac128c04e33 #0 [ 42.687190][ T413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 42.697169][ T413] Call Trace: [ 42.700302][ T413] dump_stack+0x1d8/0x241 [ 42.704462][ T413] ? panic+0x896/0x896 [ 42.708457][ T413] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 42.714294][ T413] should_fail+0x71f/0x880 [ 42.718545][ T413] ? setup_fault_attr+0x3d0/0x3d0 [ 42.723407][ T413] ? rtm_new_nexthop+0x1f15/0x6ae0 [ 42.728349][ T413] should_failslab+0x5/0x20 [ 42.732782][ T413] __kmalloc+0x51/0x2e0 [ 42.736778][ T413] ? rtm_new_nexthop+0x1ebe/0x6ae0 [ 42.741714][ T413] ? rtm_new_nexthop+0x1d47/0x6ae0 [ 42.746670][ T413] rtm_new_nexthop+0x1f15/0x6ae0 [ 42.751438][ T413] ? local_bh_enable+0x20/0x20 [ 42.756147][ T413] ? unwind_next_frame+0x176a/0x1ea0 [ 42.761274][ T413] ? avc_has_perm_noaudit+0x2f1/0x3d0 [ 42.766494][ T413] ? avc_denied+0x1d0/0x1d0 [ 42.770812][ T413] ? selinux_capable+0x1d9/0x430 [ 42.775758][ T413] ? selinux_capable+0x2f1/0x430 [ 42.780533][ T413] ? mutex_trylock+0xa0/0xa0 [ 42.785069][ T413] ? security_capable+0x86/0xb0 [ 42.789740][ T413] ? local_bh_enable+0x20/0x20 [ 42.794329][ T413] rtnetlink_rcv_msg+0x983/0xc70 [ 42.799108][ T413] ? deref_stack_reg+0x1f0/0x1f0 [ 42.803879][ T413] ? rtnetlink_bind+0x80/0x80 [ 42.808397][ T413] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 42.814292][ T413] ? stack_trace_save+0x1c0/0x1c0 [ 42.819160][ T413] ? arch_stack_walk+0x111/0x140 [ 42.824020][ T413] ? avc_has_perm_noaudit+0x2f1/0x3d0 [ 42.829224][ T413] ? avc_denied+0x1d0/0x1d0 [ 42.833574][ T413] ? __reset_page_owner+0x100/0x100 [ 42.838601][ T413] ? avc_has_perm+0xd2/0x260 [ 42.843022][ T413] ? avc_has_perm+0x16f/0x260 [ 42.847551][ T413] ? avc_has_perm_noaudit+0x3d0/0x3d0 [ 42.853066][ T413] ? iov_iter_advance+0x258/0xb20 [ 42.857920][ T413] netlink_rcv_skb+0x1d5/0x420 [ 42.862524][ T413] ? rtnetlink_bind+0x80/0x80 [ 42.867295][ T413] ? nla_put_string+0x30/0x30 [ 42.871943][ T413] ? __netlink_lookup+0x369/0x390 [ 42.876792][ T413] netlink_unicast+0x936/0xb20 [ 42.881401][ T413] ? netlink_detachskb+0x90/0x90 [ 42.886352][ T413] ? __virt_addr_valid+0x20e/0x2a0 [ 42.891288][ T413] netlink_sendmsg+0xa18/0xcf0 [ 42.895892][ T413] ? netlink_getsockopt+0x550/0x550 [ 42.901006][ T413] ? import_iovec+0x1bb/0x380 [ 42.905614][ T413] ? security_socket_sendmsg+0x7d/0xa0 [ 42.910897][ T413] ? netlink_getsockopt+0x550/0x550 [ 42.915954][ T413] ____sys_sendmsg+0x5ac/0x8f0 [ 42.920622][ T413] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 42.925657][ T413] ? proc_fail_nth_read+0x210/0x210 [ 42.930717][ T413] __sys_sendmsg+0x28b/0x380 [ 42.935116][ T413] ? ____sys_sendmsg+0x8f0/0x8f0 [ 42.939889][ T413] ? check_preemption_disabled+0x9f/0x320 [ 42.945448][ T413] ? fput_many+0x15e/0x1b0 [ 42.949692][ T413] ? check_preemption_disabled+0x153/0x320 [ 42.955343][ T413] ? __do_page_fault+0x725/0xbb0 [ 42.960136][ T413] do_syscall_64+0xca/0x1c0 [ 42.964450][ T413] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 42.971153][ T413] kasan: CONFIG_KASAN_INLINE enabled [ 42.976275][ T413] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 42.984365][ T413] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 42.991232][ T413] CPU: 1 PID: 413 Comm: syz-executor.0 Not tainted 5.4.254-syzkaller-04743-g2ac128c04e33 #0 [ 43.001107][ T413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 43.011126][ T413] RIP: 0010:rtm_new_nexthop+0x24d4/0x6ae0 [ 43.016645][ T413] Code: 00 80 3c 01 00 74 0a 48 8b 7c 24 20 e8 f5 64 d3 fd 48 8b 44 24 20 4c 89 30 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 f7 e8 ce 64 d3 fd 48 8b 44 24 20 49 89 06 [ 43.036470][ T413] RSP: 0018:ffff8881eea4f0a0 EFLAGS: 00010246 [ 43.042628][ T413] RAX: 0000000000000000 RBX: 0000000000000000 RCX: dffffc0000000000 [ 43.050436][ T413] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8881f5c02a00 [ 43.058371][ T413] RBP: ffff8881eea4f4b0 R08: ffffffff824687d8 R09: 0000000000000003 [ 43.066149][ T413] R10: ffffffffffffffff R11: dffffc0000000001 R12: 1ffff1103dd49e2c [ 43.073958][ T413] R13: 0000000000010001 R14: 0000000000000000 R15: 1ffff1103b84e704 [ 43.081770][ T413] FS: 00007f49b49656c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 43.090542][ T413] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 43.096956][ T413] CR2: 00007f49b4964ff8 CR3: 00000001ef66f000 CR4: 00000000003406a0 [ 43.104768][ T413] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 43.112590][ T413] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 43.120497][ T413] Call Trace: [ 43.123754][ T413] ? __die+0xb4/0x100 [ 43.128343][ T413] ? die+0x26/0x50 [ 43.131960][ T413] ? do_general_protection+0x266/0x3c0 [ 43.138269][ T413] ? should_fail+0x56c/0x880 [ 43.142895][ T413] ? do_trap+0x340/0x340 [ 43.147030][ T413] ? setup_fault_attr+0x3d0/0x3d0 [ 43.152333][ T413] ? general_protection+0x28/0x30 [ 43.158245][ T413] ? should_fail+0x4f8/0x880 [ 43.163437][ T413] ? rtm_new_nexthop+0x24d4/0x6ae0 [ 43.168953][ T413] ? local_bh_enable+0x20/0x20 [ 43.174108][ T413] ? unwind_next_frame+0x176a/0x1ea0 [ 43.180210][ T413] ? avc_has_perm_noaudit+0x2f1/0x3d0 [ 43.186392][ T413] ? avc_denied+0x1d0/0x1d0 [ 43.191251][ T413] ? selinux_capable+0x1d9/0x430 [ 43.196673][ T413] ? selinux_capable+0x2f1/0x430 [ 43.201915][ T413] ? mutex_trylock+0xa0/0xa0 [ 43.206794][ T413] ? security_capable+0x86/0xb0 [ 43.211741][ T413] ? local_bh_enable+0x20/0x20 [ 43.216727][ T413] rtnetlink_rcv_msg+0x983/0xc70 [ 43.222638][ T413] ? deref_stack_reg+0x1f0/0x1f0 [ 43.227740][ T413] ? rtnetlink_bind+0x80/0x80 [ 43.233114][ T413] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 43.240990][ T413] ? stack_trace_save+0x1c0/0x1c0 [ 43.247130][ T413] ? arch_stack_walk+0x111/0x140 [ 43.252887][ T413] ? avc_has_perm_noaudit+0x2f1/0x3d0 [ 43.261147][ T413] ? avc_denied+0x1d0/0x1d0 [ 43.267298][ T413] ? __reset_page_owner+0x100/0x100 [ 43.274185][ T413] ? avc_has_perm+0xd2/0x260 [ 43.279628][ T413] ? avc_has_perm+0x16f/0x260 [ 43.284393][ T413] ? avc_has_perm_noaudit+0x3d0/0x3d0 [ 43.289589][ T413] ? iov_iter_advance+0x258/0xb20 [ 43.295011][ T413] netlink_rcv_skb+0x1d5/0x420 [ 43.300022][ T413] ? rtnetlink_bind+0x80/0x80 [ 43.304547][ T413] ? nla_put_string+0x30/0x30 [ 43.309935][ T413] ? __netlink_lookup+0x369/0x390 [ 43.315583][ T413] netlink_unicast+0x936/0xb20 [ 43.320363][ T413] ? netlink_detachskb+0x90/0x90 [ 43.326474][ T413] ? __virt_addr_valid+0x20e/0x2a0 [ 43.332042][ T413] netlink_sendmsg+0xa18/0xcf0 [ 43.340747][ T413] ? netlink_getsockopt+0x550/0x550 [ 43.346176][ T413] ? import_iovec+0x1bb/0x380 [ 43.350727][ T413] ? security_socket_sendmsg+0x7d/0xa0 [ 43.356462][ T413] ? netlink_getsockopt+0x550/0x550 [ 43.362814][ T413] ____sys_sendmsg+0x5ac/0x8f0 [ 43.367785][ T413] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 43.373377][ T413] ? proc_fail_nth_read+0x210/0x210 [ 43.378811][ T413] __sys_sendmsg+0x28b/0x380 [ 43.384119][ T413] ? ____sys_sendmsg+0x8f0/0x8f0 [ 43.389428][ T413] ? check_preemption_disabled+0x9f/0x320 [ 43.395686][ T413] ? fput_many+0x15e/0x1b0 [ 43.400306][ T413] ? check_preemption_disabled+0x153/0x320 [ 43.406642][ T413] ? __do_page_fault+0x725/0xbb0 [ 43.411648][ T413] do_syscall_64+0xca/0x1c0 [ 43.416007][ T413] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 43.421940][ T413] Modules linked in: [ 43.427885][ T413] ---[ end trace 3ee93f1b6c256982 ]--- [ 43.433589][ T413] RIP: 0010:rtm_new_nexthop+0x24d4/0x6ae0 [ 43.439469][ T413] Code: 00 80 3c 01 00 74 0a 48 8b 7c 24 20 e8 f5 64 d3 fd 48 8b 44 24 20 4c 89 30 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 f7 e8 ce 64 d3 fd 48 8b 44 24 20 49 89 06 [ 43.460974][ T413] RSP: 0018:ffff8881eea4f0a0 EFLAGS: 00010246 [ 43.468634][ T413] RAX: 0000000000000000 RBX: 0000000000000000 RCX: dffffc0000000000 [ 43.477160][ T413] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8881f5c02a00 [ 43.485436][ T413] RBP: ffff8881eea4f4b0 R08: ffffffff824687d8 R09: 0000000000000003 [ 43.493842][ T413] R10: ffffffffffffffff R11: dffffc0000000001 R12: 1ffff1103dd49e2c [ 43.507040][ T413] R13: 0000000000010001 R14: 0000000000000000 R15: 1ffff1103b84e704 [ 43.516322][ T413] FS: 00007f49b49656c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 43.525405][ T413] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 43.533259][ T413] CR2: 00007f49b4964ff8 CR3: 00000001ef66f000 CR4: 00000000003406a0 [ 43.542707][ T413] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 43.552477][ T413] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 43.561632][ T413] Kernel panic - not syncing: Fatal exception [ 43.567969][ T413] Kernel Offset: disabled [ 43.573657][ T413] Rebooting in 86400 seconds..