Warning: Permanently added '10.128.0.2' (ED25519) to the list of known hosts. 2024/11/09 13:55:18 ignoring optional flag "sandboxArg"="0" 2024/11/09 13:55:18 ignoring optional flag "type"="gce" 2024/11/09 13:55:18 parsed 1 programs [ 49.120504][ T24] kauditd_printk_skb: 18 callbacks suppressed [ 49.120517][ T24] audit: type=1400 audit(1731160518.320:94): avc: denied { mount } for pid=346 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 49.149950][ T24] audit: type=1400 audit(1731160518.350:95): avc: denied { unlink } for pid=346 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/11/09 13:55:18 executed programs: 0 [ 49.194932][ T346] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 49.248016][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.254991][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.262450][ T352] device bridge_slave_0 entered promiscuous mode [ 49.269054][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.275879][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.283234][ T352] device bridge_slave_1 entered promiscuous mode [ 49.318640][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.325578][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.332806][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.339658][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.357455][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.364753][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.372020][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.379483][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.388856][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.396847][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.403758][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.412203][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.420484][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.427447][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.439082][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.448155][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.462234][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.473324][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.481455][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.488774][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.496758][ T352] device veth0_vlan entered promiscuous mode [ 49.506415][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.515398][ T352] device veth1_macvtap entered promiscuous mode [ 49.524531][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.534158][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.548425][ T24] audit: type=1400 audit(1731160518.750:96): avc: denied { mounton } for pid=352 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 49.574029][ T24] audit: type=1400 audit(1731160518.770:97): avc: denied { mounton } for pid=357 comm="syz-executor.0" path="/root/syzkaller-testdir1902791011/syzkaller.ArlQMq/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 49.591084][ T358] general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN [ 49.612490][ T358] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037] [ 49.620710][ T358] CPU: 0 PID: 358 Comm: syz-executor.0 Not tainted 5.10.226-syzkaller-1003449-g6a01908517df #0 [ 49.630860][ T358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 49.640779][ T358] RIP: 0010:security_inode_getattr+0x47/0x130 [ 49.646668][ T358] Code: 3f ff 49 8d 5f 08 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 87 a2 7c ff 48 8b 1b 48 83 c3 30 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 6a a2 7c ff 48 8b 1b 48 83 c3 0c [ 49.666646][ T358] RSP: 0018:ffffc90000f06fb0 EFLAGS: 00010206 [ 49.672540][ T358] RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff88810d7f62c0 [ 49.680957][ T358] RDX: 0000000000000000 RSI: ffffc90000f07420 RDI: ffffc90000f07410 [ 49.688771][ T358] RBP: ffffc90000f06fd8 R08: dffffc0000000000 R09: ffffc90000f07410 [ 49.696577][ T358] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90000f07420 [ 49.704394][ T358] R13: dffffc0000000000 R14: 0000000000000000 R15: ffffc90000f07410 [ 49.712203][ T358] FS: 00007f10ab06e6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 49.721055][ T358] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.727597][ T358] CR2: 0000000000000000 CR3: 000000011081f000 CR4: 00000000003506b0 [ 49.735568][ T358] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.743545][ T358] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.751364][ T358] Call Trace: [ 49.754497][ T358] ? __die_body+0x62/0xb0 [ 49.758656][ T358] ? die_addr+0x9f/0xd0 [ 49.762653][ T358] ? exc_general_protection+0x3ff/0x490 [ 49.768092][ T358] ? asm_exc_general_protection+0x1e/0x30 [ 49.773764][ T358] ? security_inode_getattr+0x47/0x130 [ 49.779056][ T358] vfs_getattr+0x26/0x70 [ 49.783133][ T358] ovl_copy_up_flags+0x5af/0x2700 [ 49.788422][ T358] ? ovl_maybe_copy_up+0x190/0x190 [ 49.793336][ T358] ? arch_stack_walk+0xf3/0x140 [ 49.798026][ T358] ? stack_trace_save+0x113/0x1c0 [ 49.803252][ T358] ? stack_trace_snprint+0xf0/0xf0 [ 49.808392][ T358] ? stack_trace_save+0x113/0x1c0 [ 49.813259][ T358] ? stack_trace_snprint+0xf0/0xf0 [ 49.818197][ T358] ? __kasan_slab_alloc+0xc3/0xe0 [ 49.823158][ T358] ? avc_has_perm+0x14d/0x400 [ 49.827737][ T358] ? mnt_want_write+0x1ba/0x290 [ 49.832588][ T358] ovl_maybe_copy_up+0x15a/0x190 [ 49.837628][ T358] ovl_open+0xad/0x210 [ 49.841562][ T358] ? ovl_mmap+0x4f0/0x4f0 [ 49.845709][ T358] do_dentry_open+0x7c1/0x10d0 [ 49.850388][ T358] dentry_open+0xb8/0x100 [ 49.854558][ T358] file_open+0x2a7/0x650 [ 49.858720][ T358] ? incfs_file_mmap+0x120/0x120 [ 49.863672][ T358] ? fsnotify_perm+0x324/0x4e0 [ 49.868366][ T358] ? incfs_file_mmap+0x120/0x120 [ 49.873161][ T358] do_dentry_open+0x7c1/0x10d0 [ 49.877764][ T358] vfs_open+0x73/0x80 [ 49.881659][ T358] path_openat+0x2660/0x3000 [ 49.886295][ T358] ? kmem_cache_alloc+0x168/0x2e0 [ 49.891144][ T358] ? do_syscall_64+0x34/0x70 [ 49.895555][ T358] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 49.901473][ T358] ? do_filp_open+0x460/0x460 [ 49.905972][ T358] do_filp_open+0x21c/0x460 [ 49.910311][ T358] ? vfs_tmpfile+0x2b0/0x2b0 [ 49.914737][ T358] ? get_unused_fd_flags+0x94/0xa0 [ 49.919692][ T358] do_sys_openat2+0x13f/0x710 [ 49.924205][ T358] ? do_sys_open+0x220/0x220 [ 49.928628][ T358] __x64_sys_openat+0x243/0x290 [ 49.933304][ T358] ? __ia32_sys_open+0x270/0x270 [ 49.938256][ T358] ? __kasan_check_read+0x11/0x20 [ 49.943112][ T358] do_syscall_64+0x34/0x70 [ 49.947369][ T358] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 49.953101][ T358] RIP: 0033:0x7f10ab4ecda9 [ 49.957435][ T358] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 49.976943][ T358] RSP: 002b:00007f10ab06e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 49.985657][ T358] RAX: ffffffffffffffda RBX: 00007f10ab61af80 RCX: 00007f10ab4ecda9 [ 49.993473][ T358] RDX: 0000000000000002 RSI: 0000000020000080 RDI: 0000000000000004 [ 50.001296][ T358] RBP: 00007f10ab53947a R08: 0000000000000000 R09: 0000000000000000 [ 50.009077][ T358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 50.016894][ T358] R13: 000000000000000b R14: 00007f10ab61af80 R15: 00007ffd5332e788 [ 50.024704][ T358] Modules linked in: [ 50.031685][ T24] audit: type=1400 audit(1731160518.770:98): avc: denied { unlink } for pid=357 comm="syz-executor.0" name="#1" dev="sda1" ino=1944 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=chr_file permissive=1 [ 50.036359][ T358] ---[ end trace f31ca43d7205230d ]--- [ 50.054698][ T24] audit: type=1400 audit(1731160518.770:99): avc: denied { mount } for pid=357 comm="syz-executor.0" name="/" dev="overlay" ino=1941 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 50.061298][ T358] RIP: 0010:security_inode_getattr+0x47/0x130 [ 50.082400][ T24] audit: type=1400 audit(1731160518.770:100): avc: denied { write } for pid=357 comm="syz-executor.0" name="/" dev="incremental-fs" ino=1941 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 50.111541][ T24] audit: type=1400 audit(1731160518.770:101): avc: denied { add_name } for pid=357 comm="syz-executor.0" name="file1" dev="incremental-fs" ino=1940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 50.111990][ T358] Code: 3f ff 49 8d 5f 08 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 87 a2 7c ff 48 8b 1b 48 83 c3 30 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 6a a2 7c ff 48 8b 1b 48 83 c3 0c [ 50.135771][ T24] audit: type=1400 audit(1731160518.770:102): avc: denied { link } for pid=357 comm="syz-executor.0" name="file1" dev="incremental-fs" ino=1940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 50.155220][ T358] RSP: 0018:ffffc90000f06fb0 EFLAGS: 00010206 [ 50.178134][ T24] audit: type=1400 audit(1731160518.770:103): avc: denied { read write } for pid=357 comm="syz-executor.0" name="file3" dev="incremental-fs" ino=1940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 50.178490][ T358] [ 50.210197][ T358] RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff88810d7f62c0 [ 50.218029][ T358] RDX: 0000000000000000 RSI: ffffc90000f07420 RDI: ffffc90000f07410 [ 50.225788][ T358] RBP: ffffc90000f06fd8 R08: dffffc0000000000 R09: ffffc90000f07410 [ 50.233641][ T358] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90000f07420 [ 50.241563][ T358] R13: dffffc0000000000 R14: 0000000000000000 R15: ffffc90000f07410 [ 50.249435][ T358] FS: 00007f10ab06e6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 50.258193][ T358] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 50.264589][ T358] CR2: 00005611a3c8d0d8 CR3: 000000011081f000 CR4: 00000000003506b0 [ 50.272875][ T358] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 50.280679][ T358] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 50.288749][ T358] Kernel panic - not syncing: Fatal exception [ 50.295179][ T358] Kernel Offset: disabled [ 50.299401][ T358] Rebooting in 86400 seconds..