[ 29.417810][ T114] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.425579][ T114] device bridge_slave_0 left promiscuous mode [ 29.431579][ T114] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.439481][ T114] device veth1_macvtap left promiscuous mode [ 29.445480][ T114] device veth0_vlan left promiscuous mode [ 39.449495][ T30] kauditd_printk_skb: 72 callbacks suppressed [ 39.449504][ T30] audit: type=1400 audit(1684685344.313:148): avc: denied { transition } for pid=321 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 39.477238][ T30] audit: type=1400 audit(1684685344.333:149): avc: denied { noatsecure } for pid=321 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 39.496294][ T30] audit: type=1400 audit(1684685344.353:150): avc: denied { rlimitinh } for pid=321 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 39.515160][ T30] audit: type=1400 audit(1684685344.353:151): avc: denied { siginh } for pid=321 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.95' (ECDSA) to the list of known hosts. 2023/05/21 16:09:11 ignoring optional flag "sandboxArg"="0" 2023/05/21 16:09:11 parsed 1 programs 2023/05/21 16:09:11 executed programs: 0 [ 46.617806][ T30] audit: type=1400 audit(1684685351.483:152): avc: denied { mounton } for pid=342 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 46.642992][ T30] audit: type=1400 audit(1684685351.493:153): avc: denied { mount } for pid=342 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 46.687906][ T346] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.695133][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.702534][ T346] device bridge_slave_0 entered promiscuous mode [ 46.709129][ T346] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.716326][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.724433][ T346] device bridge_slave_1 entered promiscuous mode [ 46.763076][ T30] audit: type=1400 audit(1684685351.633:154): avc: denied { write } for pid=346 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.767458][ T346] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.783622][ T30] audit: type=1400 audit(1684685351.633:155): avc: denied { read } for pid=346 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.790407][ T346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.818283][ T346] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.825171][ T346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.842555][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.849905][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.858021][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.865676][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.874422][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.882474][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.889304][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.904261][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.912276][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.919228][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.927109][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.935354][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.947646][ T346] device veth0_vlan entered promiscuous mode [ 46.954302][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.962947][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.970995][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.978451][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.988896][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.997795][ T346] device veth1_macvtap entered promiscuous mode [ 47.006346][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.017569][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.029509][ T30] audit: type=1400 audit(1684685351.893:156): avc: denied { mounton } for pid=346 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 47.061743][ T30] audit: type=1400 audit(1684685351.933:157): avc: denied { mounton } for pid=353 comm="syz-executor.0" path="/root/syzkaller-testdir2897785456/syzkaller.cQ7fbb/0/file0" dev="sda1" ino=1937 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 47.114642][ T355] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 47.126270][ T355] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 47.134788][ T355] CPU: 0 PID: 355 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller #0 [ 47.144278][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 47.154584][ T355] RIP: 0010:path_openat+0x10cd/0x2560 [ 47.159866][ T355] Code: 4c 89 ff e8 05 78 02 00 43 80 3c 2e 00 48 8b 5c 24 68 74 08 48 89 df e8 61 82 f6 ff 4c 8b 3b 8b 5c 24 48 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 1f 09 00 00 41 f6 47 02 70 75 17 bb fe [ 47.180106][ T355] RSP: 0018:ffffc90000727920 EFLAGS: 00010247 [ 47.186178][ T355] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000300000000 [ 47.194105][ T355] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff88811baa5498 [ 47.204046][ T355] RBP: ffffc90000727b70 R08: dffffc0000000000 R09: ffffed1023754a94 [ 47.211872][ T355] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000001 [ 47.219977][ T355] R13: dffffc0000000000 R14: 1ffff110207f5c33 R15: 0000000000000004 [ 47.228181][ T355] FS: 00007fc69dd23700(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 [ 47.237364][ T355] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 47.243776][ T355] CR2: 000055ca4028dfd8 CR3: 000000010c5af000 CR4: 00000000003506b0 [ 47.251749][ T355] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 47.260127][ T355] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 47.268735][ T355] Call Trace: [ 47.271861][ T355] [ 47.274639][ T355] ? do_syscall_64+0x3d/0xb0 [ 47.279242][ T355] ? do_filp_open+0x400/0x400 [ 47.283842][ T355] do_filp_open+0x208/0x400 [ 47.288176][ T355] ? vfs_tmpfile+0x260/0x260 [ 47.292727][ T355] do_sys_openat2+0x10b/0x420 [ 47.297296][ T355] ? do_sys_open+0x1c0/0x1c0 [ 47.301848][ T355] __x64_sys_openat+0x209/0x250 [ 47.306902][ T355] ? __ia32_sys_open+0x230/0x230 [ 47.311661][ T355] ? __kasan_check_read+0x11/0x20 [ 47.316671][ T355] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 47.322083][ T355] do_syscall_64+0x3d/0xb0 [ 47.326333][ T355] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 47.332057][ T355] RIP: 0033:0x7fc69e1d1169 [ 47.336526][ T355] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 47.356428][ T355] RSP: 002b:00007fc69dd23168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 47.366044][ T355] RAX: ffffffffffffffda RBX: 00007fc69e2f1050 RCX: 00007fc69e1d1169 [ 47.373855][ T355] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 47.381859][ T355] RBP: 00007fc69e22cca1 R08: 0000000000000000 R09: 0000000000000000 [ 47.389754][ T355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 47.397568][ T355] R13: 00007ffc3e7f522f R14: 00007fc69dd23300 R15: 0000000000022000 [ 47.405508][ T355] [ 47.408365][ T355] Modules linked in: [ 47.412287][ T355] ---[ end trace cff2068497ab7418 ]--- [ 47.418662][ T355] RIP: 0010:path_openat+0x10cd/0x2560 [ 47.424173][ T355] Code: 4c 89 ff e8 05 78 02 00 43 80 3c 2e 00 48 8b 5c 24 68 74 08 48 89 df e8 61 82 f6 ff 4c 8b 3b 8b 5c 24 48 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 1f 09 00 00 41 f6 47 02 70 75 17 bb fe [ 47.445230][ T355] RSP: 0018:ffffc90000727920 EFLAGS: 00010247 [ 47.451106][ T355] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000300000000 [ 47.459474][ T355] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff88811baa5498 [ 47.467701][ T355] RBP: ffffc90000727b70 R08: dffffc0000000000 R09: ffffed1023754a94 [ 47.475534][ T355] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000001 [ 47.483482][ T355] R13: dffffc0000000000 R14: 1ffff110207f5c33 R15: 0000000000000004 [ 47.491912][ T355] FS: 00007fc69dd23700(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 [ 47.500775][ T355] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 47.507254][ T355] CR2: 000055ca4028dfd8 CR3: 000000010c5af000 CR4: 00000000003506b0 [ 47.515133][ T355] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 47.523178][ T355] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 47.531059][ T355] Kernel panic - not syncing: Fatal exception [ 47.537361][ T355] Kernel Offset: disabled [ 47.541517][ T355] Rebooting in 86400 seconds..