Warning: Permanently added '10.128.0.165' (ED25519) to the list of known hosts. 2024/06/07 15:14:54 ignoring optional flag "sandboxArg"="0" 2024/06/07 15:14:54 parsed 1 programs [ 39.654612][ T24] kauditd_printk_skb: 18 callbacks suppressed [ 39.654624][ T24] audit: type=1400 audit(1717773294.390:94): avc: denied { mount } for pid=336 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2024/06/07 15:14:54 executed programs: 0 [ 39.684727][ T24] audit: type=1400 audit(1717773294.420:95): avc: denied { unlink } for pid=336 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 39.728359][ T336] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 39.778282][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.786256][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.793861][ T342] device bridge_slave_0 entered promiscuous mode [ 39.800797][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.808044][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.815981][ T342] device bridge_slave_1 entered promiscuous mode [ 39.853156][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.860650][ T342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.867683][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.874456][ T342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.891851][ T53] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.899732][ T53] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.907238][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.915144][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.935218][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.943723][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.952374][ T53] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.959467][ T53] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.967111][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.975684][ T53] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.983010][ T53] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.990437][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.000040][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.009972][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.018239][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.025899][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.034158][ T342] device veth0_vlan entered promiscuous mode [ 40.044410][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.053315][ T342] device veth1_macvtap entered promiscuous mode [ 40.064171][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.072495][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.087308][ T24] audit: type=1400 audit(1717773294.820:96): avc: denied { mounton } for pid=342 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 40.148794][ T24] audit: type=1400 audit(1717773294.840:97): avc: denied { prog_load } for pid=347 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 40.224851][ T24] audit: type=1400 audit(1717773294.840:98): avc: denied { bpf } for pid=347 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 40.285721][ T24] audit: type=1400 audit(1717773294.840:99): avc: denied { perfmon } for pid=347 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 40.334130][ T24] audit: type=1400 audit(1717773294.850:100): avc: denied { prog_run } for pid=347 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 40.394122][ T24] audit: type=1400 audit(1717773294.860:101): avc: denied { create } for pid=347 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 40.544532][ T1] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000007 [ 40.552889][ T1] CPU: 1 PID: 1 Comm: init Not tainted 5.10.214-syzkaller-1002110-gd3c4d815bf09 #0 [ 40.562632][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 40.572796][ T1] Call Trace: [ 40.575944][ T1] dump_stack_lvl+0x1e2/0x24b [ 40.580432][ T1] ? panic+0x22b/0x80b [ 40.584333][ T1] ? bfq_pos_tree_add_move+0x43b/0x43b [ 40.589897][ T1] dump_stack+0x15/0x17 [ 40.593884][ T1] panic+0x2cf/0x80b [ 40.597681][ T1] ? do_exit+0x239a/0x2a50 [ 40.602330][ T1] ? fb_is_primary_device+0xd4/0xd4 [ 40.607353][ T1] ? __kasan_check_write+0x14/0x20 [ 40.612314][ T1] ? sync_mm_rss+0x28a/0x2e0 [ 40.616900][ T1] do_exit+0x23b4/0x2a50 [ 40.621062][ T1] ? sched_group_set_shares+0x490/0x490 [ 40.626627][ T1] ? put_task_struct+0x80/0x80 [ 40.631302][ T1] ? schedule+0x154/0x1d0 [ 40.635467][ T1] ? schedule_timeout+0xa9/0x360 [ 40.640440][ T1] ? __kasan_check_write+0x14/0x20 [ 40.645640][ T1] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 40.650590][ T1] do_group_exit+0x141/0x310 [ 40.655117][ T1] get_signal+0x10a0/0x1410 [ 40.659624][ T1] arch_do_signal_or_restart+0xbd/0x17c0 [ 40.665179][ T1] ? put_pid+0xd7/0x110 [ 40.669504][ T1] ? kernel_clone+0x6ca/0x9e0 [ 40.674181][ T1] ? create_io_thread+0x1e0/0x1e0 [ 40.679048][ T1] ? get_timespec64+0x197/0x270 [ 40.683749][ T1] ? timespec64_add_safe+0x220/0x220 [ 40.688938][ T1] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 40.694228][ T1] ? __do_sys_vfork+0xcd/0x130 [ 40.698839][ T1] exit_to_user_mode_loop+0x9b/0xd0 [ 40.703957][ T1] syscall_exit_to_user_mode+0xc5/0x1d0 [ 40.709326][ T1] do_syscall_64+0x40/0x70 [ 40.713584][ T1] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 40.719682][ T1] RIP: 0033:0x7f5059202a68 [ 40.724135][ T1] Code: 00 48 8d b8 e0 02 00 00 48 89 b8 d8 02 00 00 48 89 b8 e0 02 00 00 b8 11 01 00 00 0f 05 44 89 c0 c3 90 5f b8 3a 00 00 00 0f 05 <57> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 90 43 0f 00 f7 d8 64 89 01 48 [ 40.744000][ T1] RSP: 002b:00007fff1216c6e0 EFLAGS: 00000246 ORIG_RAX: 000000000000003a [ 40.752479][ T1] RAX: 000000000000015d RBX: 000055d68cef7a50 RCX: 00007f5059202a68 [ 40.760474][ T1] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 00007f505938dbed [ 40.768272][ T1] RBP: 00007f50593c8528 R08: 0000000000000007 R09: 730c702d47cf235f [ 40.776465][ T1] R10: 00007fff1216c720 R11: 0000000000000246 R12: 0000000000000000 [ 40.784800][ T1] R13: 0000000000000018 R14: 000055d68b77f169 R15: 00007f50593f9a80 [ 40.792820][ T1] Kernel Offset: disabled [ 40.797590][ T1] Rebooting in 86400 seconds..