Warning: Permanently added '10.128.1.210' (ED25519) to the list of known hosts. 2024/10/19 13:31:57 ignoring optional flag "sandboxArg"="0" 2024/10/19 13:31:57 ignoring optional flag "type"="gce" 2024/10/19 13:31:57 parsed 1 programs [ 50.933537][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 50.933567][ T30] audit: type=1400 audit(1729344717.735:95): avc: denied { unlink } for pid=350 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/10/19 13:31:57 executed programs: 0 [ 50.975887][ T350] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 51.116924][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.125146][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.133131][ T357] device bridge_slave_0 entered promiscuous mode [ 51.140884][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.148033][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.156449][ T357] device bridge_slave_1 entered promiscuous mode [ 51.277780][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.286048][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.293512][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.294329][ T30] audit: type=1400 audit(1729344718.095:96): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 51.300959][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.365147][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.372791][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.381769][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.390361][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.405073][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.414236][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.421410][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.432532][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.441532][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.448962][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.468885][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.483344][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.508194][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.525144][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.534481][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.542300][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.552366][ T357] device veth0_vlan entered promiscuous mode [ 51.569493][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.582049][ T357] device veth1_macvtap entered promiscuous mode [ 51.597897][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.611952][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 51.634266][ T30] audit: type=1400 audit(1729344718.435:97): avc: denied { mounton } for pid=357 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 51.673353][ T30] audit: type=1400 audit(1729344718.475:98): avc: denied { prog_load } for pid=362 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 51.697345][ T30] audit: type=1400 audit(1729344718.475:99): avc: denied { bpf } for pid=362 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 51.721737][ T30] audit: type=1400 audit(1729344718.475:100): avc: denied { perfmon } for pid=362 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 52.245804][ T30] audit: type=1400 audit(1729344719.045:102): avc: denied { map_create } for pid=362 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 52.268823][ T30] audit: type=1400 audit(1729344719.045:101): avc: denied { map_create } for pid=362 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 52.290950][ T30] audit: type=1400 audit(1729344719.045:103): avc: denied { map_read map_write } for pid=362 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 52.431666][ T30] audit: type=1400 audit(1729344719.225:104): avc: denied { prog_run } for pid=362 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 2024/10/19 13:32:02 executed programs: 136 [ 56.675489][ T1] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000007 [ 56.684095][ T1] CPU: 1 PID: 1 Comm: init Not tainted 5.15.167-syzkaller-1075712-g5e4635681cf1 #0 [ 56.693370][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 56.703352][ T1] Call Trace: [ 56.706492][ T1] [ 56.709437][ T1] dump_stack_lvl+0x151/0x1c0 [ 56.714034][ T1] ? io_uring_drop_tctx_refs+0x190/0x190 [ 56.719846][ T1] ? __percpu_down_read+0xc2/0x300 [ 56.725011][ T1] dump_stack+0x15/0x20 [ 56.728987][ T1] panic+0x287/0x760 [ 56.732731][ T1] ? do_exit+0x240b/0x2ca0 [ 56.736978][ T1] ? fb_is_primary_device+0xe0/0xe0 [ 56.742110][ T1] ? __kasan_check_write+0x14/0x20 [ 56.747040][ T1] ? sync_mm_rss+0x28a/0x2e0 [ 56.751729][ T1] do_exit+0x2425/0x2ca0 [ 56.755904][ T1] ? put_task_struct+0x80/0x80 [ 56.760610][ T1] ? schedule_timeout+0xa9/0x370 [ 56.765384][ T1] ? __kasan_check_write+0x14/0x20 [ 56.770532][ T1] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 56.775655][ T1] ? _raw_spin_lock_irqsave+0x210/0x210 [ 56.781135][ T1] do_group_exit+0x141/0x310 [ 56.785595][ T1] get_signal+0x7a3/0x1630 [ 56.789833][ T1] arch_do_signal_or_restart+0xbd/0x1680 [ 56.795479][ T1] ? __kasan_check_write+0x14/0x20 [ 56.800617][ T1] ? put_pid+0xd7/0x110 [ 56.804687][ T1] ? kernel_clone+0x6cf/0x9e0 [ 56.809204][ T1] ? create_io_thread+0x1e0/0x1e0 [ 56.814066][ T1] ? get_timespec64+0x197/0x270 [ 56.818756][ T1] ? get_sigframe_size+0x10/0x10 [ 56.823532][ T1] ? __x64_sys_wait4+0x181/0x1e0 [ 56.828854][ T1] exit_to_user_mode_loop+0xa0/0xe0 [ 56.834669][ T1] exit_to_user_mode_prepare+0x5a/0xa0 [ 56.840924][ T1] syscall_exit_to_user_mode+0x26/0x160 [ 56.846757][ T1] do_syscall_64+0x47/0xb0 [ 56.851006][ T1] ? clear_bhb_loop+0x35/0x90 [ 56.855703][ T1] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 56.861423][ T1] RIP: 0033:0x7f67a745aa68 [ 56.865942][ T1] Code: 00 48 8d b8 e0 02 00 00 48 89 b8 d8 02 00 00 48 89 b8 e0 02 00 00 b8 11 01 00 00 0f 05 44 89 c0 c3 90 5f b8 3a 00 00 00 0f 05 <57> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 90 43 0f 00 f7 d8 64 89 01 48 [ 56.885851][ T1] RSP: 002b:00007ffd34957b20 EFLAGS: 00000246 ORIG_RAX: 000000000000003a [ 56.894154][ T1] RAX: 000000000000038b RBX: 0000561b30a63ab0 RCX: 00007f67a745aa68 [ 56.902070][ T1] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 00007f67a75e5bed [ 56.909882][ T1] RBP: 00007f67a7620528 R08: 0000000000000007 R09: b9468e4917a65f95 [ 56.917880][ T1] R10: 00007ffd34957b60 R11: 0000000000000246 R12: 0000000000000000 [ 56.925876][ T1] R13: 0000000000000018 R14: 0000561b08902169 R15: 00007f67a7651a80 [ 56.933861][ T1] [ 56.937076][ T1] Kernel Offset: disabled [ 56.941356][ T1] Rebooting in 86400 seconds..