Warning: Permanently added '10.128.0.79' (ECDSA) to the list of known hosts. 2022/12/15 21:10:17 ignoring optional flag "sandboxArg"="0" 2022/12/15 21:10:17 parsed 1 programs 2022/12/15 21:10:17 executed programs: 0 [ 36.972311][ T29] kauditd_printk_skb: 65 callbacks suppressed [ 36.972325][ T29] audit: type=1400 audit(1671138617.270:137): avc: denied { mounton } for pid=464 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 37.003598][ T29] audit: type=1400 audit(1671138617.270:138): avc: denied { mount } for pid=464 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 37.033588][ T467] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.040928][ T467] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.048173][ T467] device bridge_slave_0 entered promiscuous mode [ 37.054784][ T467] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.061751][ T467] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.069024][ T467] device bridge_slave_1 entered promiscuous mode [ 37.101978][ T467] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.108922][ T467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.116042][ T467] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.122801][ T467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.139217][ T425] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.146270][ T425] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.153307][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.160924][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.169691][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.177754][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.184763][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.201616][ T467] device veth0_vlan entered promiscuous mode [ 37.208397][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.218713][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.227300][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.234592][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.241819][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.249990][ T425] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.256824][ T425] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.264508][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.272199][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.283604][ T467] device veth1_macvtap entered promiscuous mode [ 37.290576][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.300499][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.311202][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.322272][ T29] audit: type=1400 audit(1671138617.630:139): avc: denied { mount } for pid=467 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 37.352434][ T473] ------------[ cut here ]------------ [ 37.352488][ T29] audit: type=1400 audit(1671138617.650:140): avc: denied { setopt } for pid=472 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 37.357737][ T473] kernel BUG at include/linux/skbuff.h:2440! [ 37.357754][ T473] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 37.357767][ T473] CPU: 0 PID: 473 Comm: syz-executor.0 Not tainted 5.15.83-syzkaller #0 [ 37.357784][ T473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 37.357793][ T473] RIP: 0010:skb_mac_gso_segment+0x498/0x4a0 [ 37.357819][ T473] Code: 4c 24 10 80 e1 07 80 c1 03 38 c1 0f 8c c6 fe ff ff 48 8b 7c 24 10 e8 17 ac dd fd e9 b7 fe ff ff e8 5d 3c d8 00 e8 f8 ba 9d fd <0f> 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 [ 37.357833][ T473] RSP: 0018:ffffc900009cf520 EFLAGS: 00010293 [ 37.357848][ T473] RAX: ffffffff83d2e6a8 RBX: 000000000000fcd3 RCX: ffff88810afe4000 [ 37.378624][ T29] audit: type=1400 audit(1671138617.650:141): avc: denied { ioctl } for pid=472 comm="syz-executor.0" path="socket:[13667]" dev="sockfs" ino=13667 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 37.383322][ T473] RDX: 0000000000000000 RSI: 000000000000fcd3 RDI: 000000000000fccf [ 37.383335][ T473] RBP: ffffc900009cf5e8 R08: ffffffff83d2e358 R09: ffffffff83d2df19 [ 37.383347][ T473] R10: 0000000000000002 R11: ffff88810afe4000 R12: ffff888119983434 [ 37.389624][ T29] audit: type=1400 audit(1671138617.650:142): avc: denied { bind } for pid=472 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 37.397468][ T473] R13: 000000000000b9c6 R14: 0000000000000012 R15: 000000000000fccf [ 37.397481][ T473] FS: 00007f94ab37b700(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 [ 37.397495][ T473] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 37.407801][ T29] audit: type=1400 audit(1671138617.650:143): avc: denied { write } for pid=472 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 37.413093][ T473] CR2: 000000002000f000 CR3: 000000011bb36000 CR4: 00000000003506b0 [ 37.413110][ T473] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 37.572970][ T473] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 37.580786][ T473] Call Trace: [ 37.583902][ T473] [ 37.586774][ T473] ? skb_network_protocol+0x680/0x680 [ 37.591978][ T473] __skb_gso_segment+0x31b/0x4b0 [ 37.596759][ T473] ? netif_skb_features+0x72a/0x9e0 [ 37.601781][ T473] validate_xmit_skb+0x304/0xdc0 [ 37.606556][ T473] ? validate_xmit_skb_list+0x140/0x140 [ 37.611936][ T473] ? netdev_core_pick_tx+0xc9/0x320 [ 37.616971][ T473] __dev_queue_xmit+0xb9e/0x1bd0 [ 37.621924][ T473] ? dev_queue_xmit+0x20/0x20 [ 37.626437][ T473] ? virtio_net_hdr_to_skb+0x9f8/0x1100 [ 37.631815][ T473] ? fanout_demux_bpf+0x1f0/0x1f0 [ 37.636674][ T473] dev_queue_xmit+0x17/0x20 [ 37.641011][ T473] packet_sendmsg+0x4d97/0x69a0 [ 37.645705][ T473] ? avc_has_perm+0x218/0x260 [ 37.650300][ T473] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 37.655596][ T473] ? _raw_spin_lock_bh+0xa3/0x1b0 [ 37.660455][ T473] ? selinux_socket_sendmsg+0x23f/0x340 [ 37.665847][ T473] ? selinux_socket_accept+0x5b0/0x5b0 [ 37.671133][ T473] ? packet_getsockopt+0xea0/0xea0 [ 37.676078][ T473] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 37.681201][ T473] ? security_socket_sendmsg+0xb0/0xd0 [ 37.686492][ T473] ? packet_getsockopt+0xea0/0xea0 [ 37.691440][ T473] __sys_sendto+0x560/0x720 [ 37.695783][ T473] ? __ia32_sys_getpeername+0x90/0x90 [ 37.700986][ T473] ? __kasan_check_write+0x14/0x20 [ 37.705938][ T473] ? switch_fpu_return+0x10/0x10 [ 37.710803][ T473] __x64_sys_sendto+0xe5/0x100 [ 37.715397][ T473] do_syscall_64+0x44/0xd0 [ 37.719651][ T473] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 37.725377][ T473] RIP: 0033:0x7f94ab8080d9 [ 37.729633][ T473] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 37.749073][ T473] RSP: 002b:00007f94ab37b168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 37.757316][ T473] RAX: ffffffffffffffda RBX: 00007f94ab927f80 RCX: 00007f94ab8080d9 [ 37.765139][ T473] RDX: 000000000000fceb RSI: 0000000020000080 RDI: 0000000000000003 [ 37.773298][ T473] RBP: 00007f94ab863ae9 R08: 0000000000000000 R09: 0000000000000000 [ 37.781109][ T473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 37.788924][ T473] R13: 00007fff91a40e9f R14: 00007f94ab37b300 R15: 0000000000022000 [ 37.796732][ T473] [ 37.799598][ T473] Modules linked in: [ 37.803371][ T473] ---[ end trace 5c656a874218530f ]--- [ 37.808637][ T473] RIP: 0010:skb_mac_gso_segment+0x498/0x4a0 [ 37.814378][ T473] Code: 4c 24 10 80 e1 07 80 c1 03 38 c1 0f 8c c6 fe ff ff 48 8b 7c 24 10 e8 17 ac dd fd e9 b7 fe ff ff e8 5d 3c d8 00 e8 f8 ba 9d fd <0f> 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 [ 37.833813][ T473] RSP: 0018:ffffc900009cf520 EFLAGS: 00010293 [ 37.839735][ T473] RAX: ffffffff83d2e6a8 RBX: 000000000000fcd3 RCX: ffff88810afe4000 [ 37.847517][ T473] RDX: 0000000000000000 RSI: 000000000000fcd3 RDI: 000000000000fccf [ 37.855349][ T473] RBP: ffffc900009cf5e8 R08: ffffffff83d2e358 R09: ffffffff83d2df19 [ 37.863132][ T473] R10: 0000000000000002 R11: ffff88810afe4000 R12: ffff888119983434 [ 37.870968][ T473] R13: 000000000000b9c6 R14: 0000000000000012 R15: 000000000000fccf [ 37.878947][ T473] FS: 00007f94ab37b700(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 [ 37.887804][ T473] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 37.894402][ T473] CR2: 000000002000f000 CR3: 000000011bb36000 CR4: 00000000003506b0 [ 37.902280][ T473] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 37.910115][ T473] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 37.917917][ T473] Kernel panic - not syncing: Fatal exception in interrupt [ 37.925130][ T473] Kernel Offset: disabled [ 37.929268][ T473] Rebooting in 86400 seconds..