Warning: Permanently added '10.128.0.143' (ED25519) to the list of known hosts. 2024/03/03 14:45:46 ignoring optional flag "sandboxArg"="0" 2024/03/03 14:45:46 parsed 1 programs [ 43.770621][ T23] kauditd_printk_skb: 72 callbacks suppressed [ 43.770633][ T23] audit: type=1400 audit(1709477146.610:148): avc: denied { mounton } for pid=404 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 2024/03/03 14:45:46 executed programs: 0 [ 43.801157][ T23] audit: type=1400 audit(1709477146.610:149): avc: denied { mount } for pid=404 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 43.824387][ T23] audit: type=1400 audit(1709477146.640:150): avc: denied { unlink } for pid=404 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 43.859555][ T404] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 43.930860][ T410] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.937816][ T410] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.945337][ T410] device bridge_slave_0 entered promiscuous mode [ 43.952246][ T410] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.959064][ T410] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.966586][ T410] device bridge_slave_1 entered promiscuous mode [ 44.012752][ T23] audit: type=1400 audit(1709477146.850:151): avc: denied { create } for pid=410 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.033461][ T23] audit: type=1400 audit(1709477146.870:152): avc: denied { write } for pid=410 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.037881][ T410] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.053903][ T23] audit: type=1400 audit(1709477146.870:153): avc: denied { read } for pid=410 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.060697][ T410] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.088212][ T410] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.095098][ T410] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.119434][ T18] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.126814][ T18] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.135089][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.142701][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.152214][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.160309][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.167398][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.190585][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.198565][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.205425][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.212628][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.220632][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.239531][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.247431][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.255687][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.270288][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.278782][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.296361][ T23] audit: type=1400 audit(1709477147.130:154): avc: denied { mounton } for pid=410 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=835 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 44.331940][ T23] audit: type=1400 audit(1709477147.170:155): avc: denied { ioctl } for pid=416 comm="syz-executor.0" path="socket:[11216]" dev="sockfs" ino=11216 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 44.357247][ T23] audit: type=1400 audit(1709477147.200:156): avc: denied { setopt } for pid=416 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 44.357617][ T417] kasan: CONFIG_KASAN_INLINE enabled [ 44.377707][ T23] audit: type=1400 audit(1709477147.200:157): avc: denied { write } for pid=416 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 44.382317][ T417] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 44.382334][ T417] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 44.416683][ T417] CPU: 0 PID: 417 Comm: syz-executor.0 Not tainted 5.4.265-syzkaller-04844-g50cb39f34248 #0 [ 44.426576][ T417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 44.436563][ T417] RIP: 0010:skb_segment+0x2940/0x3f30 [ 44.441876][ T417] Code: 89 bc 24 90 00 00 00 81 7c 24 3c ff ff 00 00 0f 85 6b e2 ff ff e8 d0 6c ea fd 48 8b 44 24 78 48 8d 58 70 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 47 08 00 00 8b 03 48 89 44 24 40 48 8b [ 44.461519][ T417] RSP: 0018:ffff8881eebaf060 EFLAGS: 00010202 [ 44.467423][ T417] RAX: 000000000000000e RBX: 0000000000000070 RCX: ffff8881ee799f80 [ 44.476100][ T417] RDX: 0000000000000000 RSI: ffff8881ef111bbe RDI: 000000000000ffff [ 44.484097][ T417] RBP: ffff8881eebaf2f0 R08: ffffffff8379bbae R09: ffffffff837df71b [ 44.491914][ T417] R10: ffff8881ee799f80 R11: 0000000000000002 R12: 000000000000003e [ 44.499774][ T417] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881dbf2b800 [ 44.507528][ T417] FS: 00007f375fd8f6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 44.516380][ T417] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 44.522805][ T417] CR2: 0000000020010000 CR3: 00000001ef119000 CR4: 00000000003406b0 [ 44.530639][ T417] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 44.538726][ T417] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 44.546636][ T417] Call Trace: [ 44.549777][ T417] ? __die+0xb4/0x100 [ 44.553572][ T417] ? die+0x26/0x50 [ 44.557141][ T417] ? do_general_protection+0x266/0x3c0 [ 44.562425][ T417] ? do_trap+0x340/0x340 [ 44.566593][ T417] ? skb_network_protocol+0x534/0x7a0 [ 44.571802][ T417] ? general_protection+0x28/0x30 [ 44.576657][ T417] ? skb_network_protocol+0x1ab/0x7a0 [ 44.581864][ T417] ? skb_segment+0xaee/0x3f30 [ 44.586381][ T417] ? skb_segment+0x2940/0x3f30 [ 44.590983][ T417] ? check_preemption_disabled+0x9f/0x320 [ 44.596546][ T417] ? prandom_u32+0x236/0x270 [ 44.601067][ T417] ? skb_gro_receive_list+0x4a0/0x4a0 [ 44.606262][ T417] udp6_ufo_fragment+0x866/0xcd0 [ 44.611034][ T417] ? udpv6_offload_exit+0x20/0x20 [ 44.615893][ T417] ? ipv6_gso_pull_exthdrs+0x423/0x470 [ 44.621183][ T417] ipv6_gso_segment+0x65e/0x1130 [ 44.625968][ T417] ? asan.module_ctor+0x10/0x10 [ 44.630650][ T417] ? asan.module_ctor+0x10/0x10 [ 44.635417][ T417] skb_mac_gso_segment+0x27c/0x490 [ 44.640455][ T417] ? skb_network_protocol+0x7a0/0x7a0 [ 44.646018][ T417] ? netif_skb_features+0x88e/0xba0 [ 44.651132][ T417] __skb_gso_segment+0x305/0x4a0 [ 44.655900][ T417] validate_xmit_skb+0x30a/0xc50 [ 44.660678][ T417] ? validate_xmit_skb_list+0x130/0x130 [ 44.666059][ T417] ? __do_page_fault+0x725/0xbb0 [ 44.670916][ T417] ? netdev_core_pick_tx+0xc7/0x2f0 [ 44.675949][ T417] __dev_queue_xmit+0xf7d/0x27e0 [ 44.680728][ T417] ? dev_queue_xmit+0x20/0x20 [ 44.685412][ T417] ? virtio_net_hdr_to_skb+0xa10/0x1130 [ 44.690886][ T417] packet_sendmsg+0x4747/0x6100 [ 44.695571][ T417] ? avc_has_perm+0x21a/0x260 [ 44.700168][ T417] ? debug_smp_processor_id+0x20/0x20 [ 44.705557][ T417] ? selinux_socket_sendmsg+0x243/0x340 [ 44.710940][ T417] ? selinux_socket_accept+0x5b0/0x5b0 [ 44.716242][ T417] ? __fget+0x407/0x490 [ 44.720239][ T417] ? compat_packet_setsockopt+0x160/0x160 [ 44.725984][ T417] ? selinux_socket_getsockopt+0x340/0x340 [ 44.731777][ T417] ? __fget+0x407/0x490 [ 44.735773][ T417] ? security_socket_sendmsg+0x7d/0xa0 [ 44.741057][ T417] ? compat_packet_setsockopt+0x160/0x160 [ 44.746611][ T417] __sys_sendto+0x4f3/0x6c0 [ 44.750972][ T417] ? __ia32_sys_getpeername+0x80/0x80 [ 44.757047][ T417] ? debug_smp_processor_id+0x20/0x20 [ 44.762226][ T417] ? switch_fpu_return+0x1d4/0x410 [ 44.767165][ T417] ? fpu__clear+0x3c0/0x3c0 [ 44.771501][ T417] __x64_sys_sendto+0xda/0xf0 [ 44.776276][ T417] do_syscall_64+0xca/0x1c0 [ 44.780637][ T417] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 44.786451][ T417] Modules linked in: [ 44.790219][ T417] ---[ end trace db066151f3b8757a ]--- [ 44.795475][ T417] RIP: 0010:skb_segment+0x2940/0x3f30 [ 44.801821][ T417] Code: 89 bc 24 90 00 00 00 81 7c 24 3c ff ff 00 00 0f 85 6b e2 ff ff e8 d0 6c ea fd 48 8b 44 24 78 48 8d 58 70 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 47 08 00 00 8b 03 48 89 44 24 40 48 8b [ 44.821619][ T417] RSP: 0018:ffff8881eebaf060 EFLAGS: 00010202 [ 44.827488][ T417] RAX: 000000000000000e RBX: 0000000000000070 RCX: ffff8881ee799f80 [ 44.835328][ T417] RDX: 0000000000000000 RSI: ffff8881ef111bbe RDI: 000000000000ffff [ 44.843382][ T417] RBP: ffff8881eebaf2f0 R08: ffffffff8379bbae R09: ffffffff837df71b [ 44.851205][ T417] R10: ffff8881ee799f80 R11: 0000000000000002 R12: 000000000000003e [ 44.858991][ T417] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881dbf2b800 [ 44.867097][ T417] FS: 00007f375fd8f6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 44.876042][ T417] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 44.882455][ T417] CR2: 0000000020010000 CR3: 00000001ef119000 CR4: 00000000003406b0 [ 44.890389][ T417] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 44.898177][ T417] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 44.906031][ T417] Kernel panic - not syncing: Fatal exception in interrupt [ 44.913295][ T417] Kernel Offset: disabled [ 44.917521][ T417] Rebooting in 86400 seconds..