Warning: Permanently added '10.128.0.101' (ECDSA) to the list of known hosts. 2022/09/22 21:37:40 ignoring optional flag "sandboxArg"="0" 2022/09/22 21:37:40 parsed 1 programs 2022/09/22 21:37:40 executed programs: 0 [ 36.424893][ T24] kauditd_printk_skb: 65 callbacks suppressed [ 36.424900][ T24] audit: type=1400 audit(1663882660.550:148): avc: denied { mounton } for pid=402 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 36.432902][ T398] In ext4_xattr_set_entry s ffffc9000098f7a0, last = ffff88811da794a4 [ 36.457117][ T24] audit: type=1400 audit(1663882660.560:149): avc: denied { mount } for pid=402 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 36.478192][ T404] In ext4_xattr_set_entry s ffffc90000b477c0, last = ffff88811da795a4 [ 36.497604][ T24] audit: type=1400 audit(1663882660.620:150): avc: denied { mounton } for pid=405 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 36.522558][ T24] audit: type=1400 audit(1663882660.630:151): avc: denied { module_request } for pid=405 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 36.527057][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.551893][ T405] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.559498][ T405] device bridge_slave_0 entered promiscuous mode [ 36.566170][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.573409][ T405] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.581448][ T405] device bridge_slave_1 entered promiscuous mode [ 36.605545][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.612769][ T405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.620247][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.627260][ T405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.642193][ T73] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.650008][ T73] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.657347][ T73] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.665233][ T73] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.674093][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.682664][ T376] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.689731][ T376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.698933][ T73] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.707137][ T73] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.714177][ T73] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.728921][ T73] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.737364][ T73] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.745480][ T73] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.753648][ T73] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.770132][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.778732][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.787218][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.798073][ T24] audit: type=1400 audit(1663882660.920:152): avc: denied { mount } for pid=405 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 36.800870][ T405] In ext4_xattr_set_entry s ffffc90000b577a0, last = ffff88811da796a4 [ 36.832174][ T409] In ext4_xattr_set_entry s ffffc90000c47780, last = ffff88811da797a4 [ 36.840752][ T409] In ext4_xattr_set_entry s ffffc90000c47780, last = ffff88811da798a4 [ 36.849306][ T409] In ext4_xattr_set_entry s ffffc90000c47780, last = ffff88811da799a4 [ 36.857935][ T409] In ext4_xattr_set_entry s ffffc90000c47780, last = ffff88811da79aa4 [ 36.867016][ T411] In ext4_xattr_set_entry s ffffc90000cb77a0, last = ffff88811da79ba4 [ 36.875900][ T24] audit: type=1400 audit(1663882661.000:153): avc: denied { append } for pid=141 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 36.880474][ T411] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000007a,,errors=continue [ 36.898542][ T24] audit: type=1400 audit(1663882661.000:154): avc: denied { open } for pid=141 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 36.910510][ T405] In ext4_xattr_set_entry s ffff88810cee3b00, last = ffff88811da796a4 [ 36.931718][ T24] audit: type=1400 audit(1663882661.000:155): avc: denied { getattr } for pid=141 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 36.940115][ T405] In ext4_xattr_set_entry s ffffc90000b57720, last = ffff88810d7f6020 [ 36.962659][ T24] audit: type=1400 audit(1663882661.000:156): avc: denied { mounton } for pid=409 comm="syz-executor.0" path="/root/syzkaller-testdir810564309/syzkaller.gzqZjJ/0/file0" dev="sda1" ino=1148 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 36.972630][ T405] In ext4_xattr_set_entry s ffff88810cee3d80, last = ffff88811da79aa4 [ 36.998763][ T24] audit: type=1400 audit(1663882661.000:157): avc: denied { remount } for pid=409 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 37.027351][ T405] In ext4_xattr_set_entry s ffffc90000b576a0, last = ffff88810c5e4020 [ 37.036134][ T405] In ext4_xattr_set_entry s ffff88810b3e7780, last = ffff88811da797a4 [ 37.044491][ T405] In ext4_xattr_set_entry s ffffc90000b576a0, last = ffff88810d7f0020 [ 37.053068][ T405] In ext4_xattr_set_entry s ffff88810cee3080, last = ffff88811da799a4 [ 37.061296][ T405] In ext4_xattr_set_entry s ffffc90000b576a0, last = ffff88810d874020 [ 37.069951][ T405] In ext4_xattr_set_entry s ffff88810cefcd80, last = ffff88811da79ba4 [ 37.078114][ T405] In ext4_xattr_set_entry s ffffc90000b57720, last = ffff88810d872020 [ 37.086695][ T405] In ext4_xattr_set_entry s ffff88810cefc900, last = ffff88811da798a4 [ 37.094968][ T405] In ext4_xattr_set_entry s ffffc90000b576a0, last = ffff88810d876020 [ 37.103594][ T405] In ext4_xattr_set_entry s ffff88810cefc100, last = ffff88811da795a4 [ 37.111761][ T405] In ext4_xattr_set_entry s ffffc90000b57740, last = ffff88810d870020 [ 37.120320][ T405] In ext4_xattr_set_entry s ffffc90000b577a0, last = 0 [ 37.127203][ T405] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 37.138993][ T405] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 37.147385][ T405] CPU: 1 PID: 405 Comm: syz-executor.0 Not tainted 5.10.144-syzkaller-987214-g7474313da8d6-dirty #0 [ 37.158291][ T405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/16/2022 [ 37.168544][ T405] RIP: 0010:ext4_xattr_set_entry+0x858/0x22a0 [ 37.174797][ T405] Code: e6 31 c0 e8 e7 cb a5 02 48 89 9c 24 b8 00 00 00 42 80 3c 2b 00 74 08 4c 89 e7 e8 73 87 ba ff 4d 8b 24 24 4c 89 e0 48 c1 e8 03 <42> 8a 04 28 84 c0 0f 85 35 17 00 00 4c 2b b4 24 a0 00 00 00 4c 89 [ 37.194735][ T405] RSP: 0018:ffffc90000b574a0 EFLAGS: 00010246 [ 37.200955][ T405] RAX: 0000000000000000 RBX: 1ffff9200016aef4 RCX: 3d2ea00db2221f00 [ 37.209253][ T405] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 37.217290][ T405] RBP: ffffc90000b57638 R08: ffffffff8153d3e8 R09: ffffed103ee6a5e8 [ 37.225240][ T405] R10: ffffed103ee6a5e8 R11: 1ffff1103ee6a5e7 R12: 0000000000000000 [ 37.233301][ T405] R13: dffffc0000000000 R14: 0000000000000000 R15: ffffc90000b57768 [ 37.241349][ T405] FS: 0000555556b76400(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000 [ 37.250346][ T405] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 37.256906][ T405] CR2: 0000555556b87b78 CR3: 0000000101fef000 CR4: 00000000003506a0 [ 37.264974][ T405] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 37.273139][ T405] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 37.281175][ T405] Call Trace: [ 37.284537][ T405] ? ext4_xattr_ibody_inline_set+0x380/0x380 [ 37.290499][ T405] ? ext4_reserve_inode_write+0x2d2/0x380 [ 37.296365][ T405] ? __kasan_check_write+0x14/0x20 [ 37.301747][ T405] ext4_xattr_ibody_set+0x7c/0x2a0 [ 37.306833][ T405] ext4_xattr_set_handle+0xc5d/0x15a0 [ 37.312193][ T405] ? ext4_xattr_set_entry+0x22a0/0x22a0 [ 37.317727][ T405] ? selinux_inode_free_security+0x200/0x200 [ 37.323689][ T405] ext4_initxattrs+0xb2/0x120 [ 37.328351][ T405] security_inode_init_security+0x26c/0x3c0 [ 37.334221][ T405] ? ext4_init_security+0x40/0x40 [ 37.339225][ T405] ? security_dentry_create_files_as+0xd0/0xd0 [ 37.345701][ T405] ? __ext4_set_acl+0x5f0/0x5f0 [ 37.350555][ T405] ? ext4_has_metadata_csum+0x1f0/0x1f0 [ 37.356072][ T405] ext4_init_security+0x34/0x40 [ 37.360927][ T405] __ext4_new_inode+0x3648/0x4530 [ 37.365928][ T405] ? ext4_mark_inode_used+0xc00/0xc00 [ 37.371281][ T405] ? dquot_initialize+0x20/0x20 [ 37.376193][ T405] ? may_create+0x641/0x8b0 [ 37.380672][ T405] ext4_mkdir+0x3b3/0xbb0 [ 37.384975][ T405] ? ext4_symlink+0xf50/0xf50 [ 37.389632][ T405] ? selinux_inode_mkdir+0x22/0x30 [ 37.394729][ T405] ? security_inode_mkdir+0xf1/0x130 [ 37.400075][ T405] vfs_mkdir+0x435/0x610 [ 37.404378][ T405] do_mkdirat+0x1b6/0x2d0 [ 37.408681][ T405] ? __kasan_check_write+0x14/0x20 [ 37.413767][ T405] ? do_mknodat+0x430/0x430 [ 37.418267][ T405] __x64_sys_mkdirat+0x7b/0x90 [ 37.423044][ T405] do_syscall_64+0x34/0x70 [ 37.427544][ T405] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 37.433507][ T405] RIP: 0033:0x7f7504a27387 [ 37.437908][ T405] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 37.457675][ T405] RSP: 002b:00007ffc21ad2558 EFLAGS: 00000202 ORIG_RAX: 0000000000000102 [ 37.466086][ T405] RAX: ffffffffffffffda RBX: 00007ffc21ad25e0 RCX: 00007f7504a27387 [ 37.474177][ T405] RDX: 00000000000001ff RSI: 00007ffc21ad25e0 RDI: 00000000ffffff9c [ 37.482232][ T405] RBP: 00007ffc21ad25bc R08: 0000000000000000 R09: 0000000000000003 [ 37.490454][ T405] R10: 00007ffc21ad22f7 R11: 0000000000000202 R12: 0000000000000032 [ 37.498427][ T405] R13: 000000000000901e R14: 0000000000000003 R15: 00007ffc21ad2620 [ 37.506449][ T405] Modules linked in: [ 37.511130][ T405] ---[ end trace 8b9764118d25f940 ]--- [ 37.516626][ T405] RIP: 0010:ext4_xattr_set_entry+0x858/0x22a0 [ 37.522876][ T405] Code: e6 31 c0 e8 e7 cb a5 02 48 89 9c 24 b8 00 00 00 42 80 3c 2b 00 74 08 4c 89 e7 e8 73 87 ba ff 4d 8b 24 24 4c 89 e0 48 c1 e8 03 <42> 8a 04 28 84 c0 0f 85 35 17 00 00 4c 2b b4 24 a0 00 00 00 4c 89 [ 37.542767][ T405] RSP: 0018:ffffc90000b574a0 EFLAGS: 00010246 [ 37.549159][ T405] RAX: 0000000000000000 RBX: 1ffff9200016aef4 RCX: 3d2ea00db2221f00 [ 37.557408][ T405] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 37.565498][ T405] RBP: ffffc90000b57638 R08: ffffffff8153d3e8 R09: ffffed103ee6a5e8 [ 37.574091][ T405] R10: ffffed103ee6a5e8 R11: 1ffff1103ee6a5e7 R12: 0000000000000000 [ 37.582584][ T405] R13: dffffc0000000000 R14: 0000000000000000 R15: ffffc90000b57768 [ 37.590925][ T405] FS: 0000555556b76400(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000 [ 37.600163][ T405] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 37.607006][ T405] CR2: 0000555556b87b78 CR3: 0000000101fef000 CR4: 00000000003506a0 [ 37.615500][ T405] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 37.623615][ T405] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 37.631706][ T405] Kernel panic - not syncing: Fatal exception [ 37.638148][ T405] Kernel Offset: disabled [ 37.642728][ T405] Rebooting in 86400 seconds..