[ 23.260583][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.271658][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.291645][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.300653][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.312251][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.439878][ T360] syz-executor.0 (360) used greatest stack depth: 19320 bytes left [ 23.970393][ T179] device bridge_slave_1 left promiscuous mode [ 23.976375][ T179] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.984050][ T179] device bridge_slave_0 left promiscuous mode [ 23.997475][ T179] bridge0: port 1(bridge_slave_0) entered disabled state Warning: Permanently added '10.128.10.29' (ED25519) to the list of known hosts. 2024/03/07 23:10:59 ignoring optional flag "sandboxArg"="0" 2024/03/07 23:10:59 parsed 1 programs [ 43.080336][ T23] kauditd_printk_skb: 72 callbacks suppressed [ 43.080348][ T23] audit: type=1400 audit(1709853059.350:148): avc: denied { mounton } for pid=405 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 43.111036][ T23] audit: type=1400 audit(1709853059.350:149): avc: denied { mount } for pid=405 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 43.134280][ T23] audit: type=1400 audit(1709853059.380:150): avc: denied { unlink } for pid=405 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/03/07 23:10:59 executed programs: 0 [ 43.191458][ T405] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 43.262652][ T412] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.269499][ T412] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.277111][ T412] device bridge_slave_0 entered promiscuous mode [ 43.284311][ T412] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.291259][ T412] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.298577][ T412] device bridge_slave_1 entered promiscuous mode [ 43.345365][ T23] audit: type=1400 audit(1709853059.610:151): avc: denied { create } for pid=412 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 43.353603][ T412] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.366036][ T23] audit: type=1400 audit(1709853059.610:152): avc: denied { write } for pid=412 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 43.372876][ T412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.373019][ T412] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.394023][ T23] audit: type=1400 audit(1709853059.610:153): avc: denied { read } for pid=412 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 43.400710][ T412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.452072][ T107] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.459495][ T107] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.467392][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 43.475141][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 43.491374][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 43.499550][ T366] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.506589][ T366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.515135][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 43.523324][ T366] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.530250][ T366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.550234][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 43.558832][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 43.566824][ T366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 43.591646][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 43.599868][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 43.608587][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 43.616603][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.631864][ T23] audit: type=1400 audit(1709853059.900:154): avc: denied { mounton } for pid=412 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=781 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 43.665353][ T418] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 43.665891][ T23] audit: type=1400 audit(1709853059.930:155): avc: denied { ioctl } for pid=417 comm="syz-executor.0" path="/dev/kvm" dev="devtmpfs" ino=9222 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 43.722148][ T23] audit: type=1400 audit(1709853059.990:156): avc: denied { write } for pid=417 comm="syz-executor.0" name="kvm" dev="devtmpfs" ino=9222 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 44.093173][ T446] BUG: kernel NULL pointer dereference, address: 0000000000000086 [ 44.100821][ T446] #PF: supervisor instruction fetch in kernel mode [ 44.107118][ T446] #PF: error_code(0x0010) - not-present page [ 44.112937][ T446] PGD 1ee1af067 P4D 1ee1af067 PUD 1ef257067 PMD 0 [ 44.119707][ T446] Oops: 0010 [#1] PREEMPT SMP KASAN [ 44.124744][ T446] CPU: 0 PID: 446 Comm: syz-executor.0 Not tainted 5.4.265-syzkaller-04852-g52021bcc06cb #0 [ 44.134634][ T446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 44.144708][ T446] RIP: 0010:0x86 [ 44.148181][ T446] Code: Bad RIP value. [ 44.152082][ T446] RSP: 0018:ffff8881ec9b7308 EFLAGS: 00010086 [ 44.157984][ T446] RAX: ffff8881ec9b7338 RBX: dffffc0000000000 RCX: ffff8881ed80ee40 [ 44.166221][ T446] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 44.174181][ T446] RBP: 0000000000000ec0 R08: ffffffff823150c1 R09: ffffffff811c9085 [ 44.181989][ T446] R10: ffff8881ed80ee40 R11: 0000000000000002 R12: ffffffff84601550 [ 44.189975][ T446] R13: fffffe0000000ec8 R14: ffff8881ecad8000 R15: fffffe0000000ecb [ 44.197791][ T446] FS: 00007f33d94c46c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 44.206643][ T446] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 44.213142][ T446] CR2: 000000000000005c CR3: 00000001ed15e000 CR4: 00000000003426b0 [ 44.221043][ T446] Call Trace: [ 44.224175][ T446] ? __die+0xb4/0x100 [ 44.228000][ T446] ? no_context+0xbda/0xe50 [ 44.232330][ T446] ? is_prefetch+0x4b0/0x4b0 [ 44.236760][ T446] ? rcu_preempt_deferred_qs+0xa4/0x2b0 [ 44.242138][ T446] ? __do_page_fault+0xa7d/0xbb0 [ 44.246912][ T446] ? vmx_spec_ctrl_restore_host+0x83/0xfd [ 44.252558][ T446] ? __bad_area_nosemaphore+0xc0/0x460 [ 44.258110][ T446] ? page_fault+0x2f/0x40 [ 44.262273][ T446] ? __entry_text_end+0x4/0x4 [ 44.266879][ T446] ? vmx_handle_exit_irqoff+0x45/0x220 [ 44.272177][ T446] ? check_preemption_disabled+0x91/0x320 [ 44.277811][ T446] ? handle_external_interrupt_irqoff+0x148/0x2f0 [ 44.284064][ T446] ? handle_external_interrupt_irqoff+0x12a/0x2f0 [ 44.290403][ T446] ? __entry_text_end+0x4/0x4 [ 44.294906][ T446] ? vcpu_enter_guest+0x2d06/0x9f70 [ 44.299944][ T446] ? unwind_next_frame+0x181e/0x1ea0 [ 44.305540][ T446] ? check_preemption_disabled+0x9f/0x320 [ 44.311266][ T446] ? debug_smp_processor_id+0x20/0x20 [ 44.316484][ T446] ? _raw_spin_lock+0xa4/0x1b0 [ 44.321101][ T446] ? local_bh_enable+0x20/0x20 [ 44.325673][ T446] ? check_preemption_disabled+0x9f/0x320 [ 44.331672][ T446] ? update_load_avg+0x40f/0x1210 [ 44.336534][ T446] ? check_preemption_disabled+0x9f/0x320 [ 44.342514][ T446] ? check_preemption_disabled+0x9f/0x320 [ 44.348424][ T446] ? debug_smp_processor_id+0x20/0x20 [ 44.353632][ T446] ? debug_smp_processor_id+0x20/0x20 [ 44.359012][ T446] ? finish_task_switch+0x1bb/0x590 [ 44.364059][ T446] ? __schedule+0xb0d/0x1320 [ 44.368502][ T446] ? is_mmconf_reserved+0x430/0x430 [ 44.373503][ T446] ? plist_add+0x3f2/0x490 [ 44.377757][ T446] ? plist_check_list+0x1f8/0x220 [ 44.382995][ T446] ? schedule+0x143/0x1d0 [ 44.387400][ T446] ? futex_wait_queue_me+0x378/0x690 [ 44.392696][ T446] ? vmx_vcpu_load_vmcs+0x655/0x8b0 [ 44.397923][ T446] ? futex_wait_setup+0x6c0/0x6c0 [ 44.402859][ T446] ? read_msr+0x40/0x40 [ 44.407213][ T446] ? check_preemption_disabled+0x9f/0x320 [ 44.412831][ T446] ? cpus_share_cache+0x110/0x110 [ 44.417687][ T446] ? check_preemption_disabled+0x9f/0x320 [ 44.423249][ T446] ? debug_smp_processor_id+0x20/0x20 [ 44.428625][ T446] ? kvm_check_async_pf_completion+0x335/0x350 [ 44.434609][ T446] ? kvm_arch_vcpu_ioctl_run+0x748/0x18d0 [ 44.440254][ T446] ? kvm_vcpu_ioctl+0x7f9/0xd10 [ 44.445023][ T446] ? debug_smp_processor_id+0x20/0x20 [ 44.451021][ T446] ? create_vcpu_fd+0x120/0x120 [ 44.455823][ T446] ? do_futex+0x13c1/0x19f0 [ 44.460250][ T446] ? __lru_cache_add+0x206/0x2b0 [ 44.465141][ T446] ? _raw_spin_unlock+0x49/0x60 [ 44.469795][ T446] ? handle_mm_fault+0x1c76/0x4840 [ 44.475209][ T446] ? create_vcpu_fd+0x120/0x120 [ 44.480384][ T446] ? do_vfs_ioctl+0x742/0x1720 [ 44.485042][ T446] ? ioctl_preallocate+0x250/0x250 [ 44.489941][ T446] ? __fget+0x407/0x490 [ 44.494189][ T446] ? fget_many+0x20/0x20 [ 44.498367][ T446] ? switch_fpu_return+0x1d4/0x410 [ 44.503298][ T446] ? security_file_ioctl+0x7d/0xa0 [ 44.508939][ T446] ? __x64_sys_ioctl+0xd4/0x110 [ 44.513888][ T446] ? do_syscall_64+0xca/0x1c0 [ 44.518780][ T446] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 44.525432][ T446] Modules linked in: [ 44.529160][ T446] CR2: 0000000000000086 [ 44.533146][ T446] ---[ end trace b3e0037aa80736ec ]--- [ 44.538616][ T446] RIP: 0010:0x86 [ 44.542000][ T446] Code: Bad RIP value. [ 44.545989][ T446] RSP: 0018:ffff8881ec9b7308 EFLAGS: 00010086 [ 44.551907][ T446] RAX: ffff8881ec9b7338 RBX: dffffc0000000000 RCX: ffff8881ed80ee40 [ 44.559797][ T446] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 44.567606][ T446] RBP: 0000000000000ec0 R08: ffffffff823150c1 R09: ffffffff811c9085 [ 44.575766][ T446] R10: ffff8881ed80ee40 R11: 0000000000000002 R12: ffffffff84601550 [ 44.583601][ T446] R13: fffffe0000000ec8 R14: ffff8881ecad8000 R15: fffffe0000000ecb [ 44.591463][ T446] FS: 00007f33d94c46c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 44.600313][ T446] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 44.606731][ T446] CR2: 000000000000005c CR3: 00000001ed15e000 CR4: 00000000003426b0 [ 44.614547][ T446] Kernel panic - not syncing: Fatal exception [ 44.620757][ T446] Kernel Offset: disabled [ 44.625143][ T446] Rebooting in 86400 seconds..