Warning: Permanently added '10.128.1.73' (ED25519) to the list of known hosts. 2024/11/23 23:16:15 ignoring optional flag "sandboxArg"="0" 2024/11/23 23:16:15 parsed 1 programs [ 50.784204][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 50.784221][ T30] audit: type=1400 audit(1732403776.923:108): avc: denied { unlink } for pid=403 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 50.823357][ T403] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 51.521284][ T437] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.528179][ T437] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.535541][ T437] device bridge_slave_0 entered promiscuous mode [ 51.542280][ T437] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.549168][ T437] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.556499][ T437] device bridge_slave_1 entered promiscuous mode [ 51.602367][ T437] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.609241][ T437] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.616351][ T437] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.623111][ T437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.643929][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.651448][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.658866][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.667973][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.676180][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.683026][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.692205][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.700323][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.707470][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.720766][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.729930][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.743716][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.756331][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.764280][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.771672][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.779902][ T437] device veth0_vlan entered promiscuous mode [ 51.791780][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.800759][ T437] device veth1_macvtap entered promiscuous mode [ 51.810328][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.820414][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.027305][ T30] audit: type=1401 audit(1732403778.163:109): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 2024/11/23 23:16:18 executed programs: 0 [ 52.162713][ T465] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.169750][ T465] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.177032][ T465] device bridge_slave_0 entered promiscuous mode [ 52.183871][ T465] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.190703][ T465] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.198275][ T465] device bridge_slave_1 entered promiscuous mode [ 52.249238][ T465] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.256257][ T465] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.263529][ T465] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.270387][ T465] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.295126][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.304085][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.311167][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.320510][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.328613][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.335484][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.347109][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.355156][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.362008][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.374282][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.386052][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.399795][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 52.414733][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.422682][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.430188][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 52.438853][ T465] device veth0_vlan entered promiscuous mode [ 52.454208][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 52.463476][ T465] device veth1_macvtap entered promiscuous mode [ 52.472826][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.482933][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.511708][ T30] audit: type=1400 audit(1732403778.643:110): avc: denied { read write } for pid=470 comm="syz.2.15" name="fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 52.535302][ T30] audit: type=1400 audit(1732403778.643:111): avc: denied { open } for pid=470 comm="syz.2.15" path="/dev/fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 52.565795][ T472] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 52.577582][ T472] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 52.585825][ T472] CPU: 0 PID: 472 Comm: syz.2.15 Not tainted 5.15.168-syzkaller-1076471-g101e665d55a8 #0 [ 52.595631][ T472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 52.605705][ T472] RIP: 0010:step_into+0x1b6/0xe70 [ 52.610591][ T472] Code: 20 0f 85 99 0a 00 00 44 8b 3b 43 80 3c 2c 00 74 0a 48 8b 7c 24 18 e8 49 b9 f3 ff 48 8b 9c 24 b8 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 86 0a 00 00 8b 1b 89 de 81 e6 00 00 07 [ 52.630187][ T472] RSP: 0018:ffffc90000b07780 EFLAGS: 00010203 [ 52.636085][ T472] RAX: 0000000000000001 RBX: 000000000000000f RCX: ffff88811715e2c0 [ 52.644176][ T472] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 52.651978][ T472] RBP: ffffc90000b078b0 R08: ffffffff81bf03a0 R09: ffffed10257c5a55 [ 52.659869][ T472] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92000160f07 [ 52.667680][ T472] R13: dffffc0000000000 R14: ffffc90000b07b80 R15: 0000000000000010 [ 52.675508][ T472] FS: 00007f7f507b46c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 52.684337][ T472] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 52.691128][ T472] CR2: 00007f7f507b3f98 CR3: 00000001228e9000 CR4: 00000000003506b0 [ 52.699022][ T472] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 52.706835][ T472] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 52.714640][ T472] Call Trace: [ 52.717763][ T472] [ 52.720733][ T472] ? __die_body+0x62/0xb0 [ 52.724883][ T472] ? die_addr+0x9f/0xd0 [ 52.728955][ T472] ? exc_general_protection+0x311/0x4b0 [ 52.734346][ T472] ? dentry_free+0xbf/0x160 [ 52.738682][ T472] ? asm_exc_general_protection+0x27/0x30 [ 52.744405][ T472] ? step_into+0x160/0xe70 [ 52.748583][ T472] ? step_into+0x1b6/0xe70 [ 52.752834][ T472] ? set_root+0x400/0x400 [ 52.756999][ T472] walk_component+0x359/0x610 [ 52.761514][ T472] ? nd_alloc_stack+0xf0/0xf0 [ 52.766115][ T472] ? security_inode_permission+0xb0/0xf0 [ 52.771584][ T472] ? fuse_do_getattr+0x7a0/0x7a0 [ 52.776352][ T472] link_path_walk+0x642/0xd90 [ 52.780863][ T472] ? handle_lookup_down+0x130/0x130 [ 52.785894][ T472] __filename_parentat+0x24c/0x6c0 [ 52.791018][ T472] ? vfs_path_parent_lookup+0x50/0x50 [ 52.796266][ T472] filename_create+0xf2/0x530 [ 52.800913][ T472] ? kern_path_create+0x1a0/0x1a0 [ 52.805772][ T472] do_mkdirat+0xbd/0x450 [ 52.810023][ T472] ? strncpy_from_user+0x18e/0x2d0 [ 52.815061][ T472] ? vfs_mkdir+0x610/0x610 [ 52.819309][ T472] ? getname_flags+0x1fd/0x520 [ 52.823933][ T472] ? switch_fpu_return+0x15f/0x2e0 [ 52.828864][ T472] __x64_sys_mkdirat+0x89/0xa0 [ 52.833468][ T472] x64_sys_call+0x6c6/0x9a0 [ 52.837796][ T472] do_syscall_64+0x3b/0xb0 [ 52.842076][ T472] ? clear_bhb_loop+0x35/0x90 [ 52.846568][ T472] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 52.852417][ T472] RIP: 0033:0x7f7f50d52fb7 [ 52.856669][ T472] Code: 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.876281][ T472] RSP: 002b:00007f7f507b3e68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 52.884534][ T472] RAX: ffffffffffffffda RBX: 00007f7f507b3ef0 RCX: 00007f7f50d52fb7 [ 52.892504][ T472] RDX: 00000000000001ff RSI: 0000000020000200 RDI: 00000000ffffff9c [ 52.900325][ T472] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 52.908457][ T472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000200 [ 52.916270][ T472] R13: 00007f7f507b3eb0 R14: 0000000000000000 R15: 0000000000000000 [ 52.924092][ T472] [ 52.926945][ T472] Modules linked in: [ 52.932061][ T30] audit: type=1400 audit(1732403779.073:112): avc: denied { append } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 52.934725][ T472] ---[ end trace 52c2704318d86f14 ]--- [ 52.956994][ T30] audit: type=1400 audit(1732403779.073:113): avc: denied { open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 52.959442][ T472] RIP: 0010:step_into+0x1b6/0xe70 [ 52.982317][ T30] audit: type=1400 audit(1732403779.073:114): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 52.986971][ T472] Code: 20 0f 85 99 0a 00 00 44 8b 3b 43 80 3c 2c 00 74 0a 48 8b 7c 24 18 e8 49 b9 f3 ff 48 8b 9c 24 b8 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 86 0a 00 00 8b 1b 89 de 81 e6 00 00 07 [ 53.029381][ T472] RSP: 0018:ffffc90000b07780 EFLAGS: 00010203 [ 53.035561][ T472] RAX: 0000000000000001 RBX: 000000000000000f RCX: ffff88811715e2c0 [ 53.043650][ T472] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 53.051573][ T472] RBP: ffffc90000b078b0 R08: ffffffff81bf03a0 R09: ffffed10257c5a55 [ 53.059782][ T472] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92000160f07 [ 53.067684][ T472] R13: dffffc0000000000 R14: ffffc90000b07b80 R15: 0000000000000010 [ 53.075588][ T472] FS: 00007f7f507b46c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 53.084433][ T472] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.090792][ T472] CR2: 00007f7f507b3f98 CR3: 00000001228e9000 CR4: 00000000003506b0 [ 53.098647][ T472] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 53.106620][ T472] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 53.114639][ T472] Kernel panic - not syncing: Fatal exception [ 53.120804][ T472] Kernel Offset: disabled [ 53.124940][ T472] Rebooting in 86400 seconds..