Warning: Permanently added '10.128.1.165' (ED25519) to the list of known hosts. 2023/11/12 14:46:41 ignoring optional flag "sandboxArg"="0" 2023/11/12 14:46:41 parsed 1 programs [ 40.664942][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 40.664944][ T29] audit: type=1400 audit(1699800401.189:154): avc: denied { mounton } for pid=339 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 40.695403][ T29] audit: type=1400 audit(1699800401.199:155): avc: denied { mount } for pid=339 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 40.718384][ T29] audit: type=1400 audit(1699800401.199:156): avc: denied { setattr } for pid=339 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.741293][ T29] audit: type=1400 audit(1699800401.199:157): avc: denied { read write } for pid=339 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 40.767163][ T29] audit: type=1400 audit(1699800401.199:158): avc: denied { open } for pid=339 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 40.855713][ T29] audit: type=1400 audit(1699800401.389:159): avc: denied { unlink } for pid=339 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 40.863647][ T339] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2023/11/12 14:46:41 executed programs: 0 [ 40.881324][ T29] audit: type=1400 audit(1699800401.389:160): avc: denied { relabelto } for pid=340 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 40.922889][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.929731][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.936670][ T345] device bridge_slave_0 entered promiscuous mode [ 40.942807][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.949644][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.956533][ T345] device bridge_slave_1 entered promiscuous mode [ 40.967912][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.974721][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.981783][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.988617][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.997127][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.004024][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.010905][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.017870][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.026440][ T345] device veth0_vlan entered promiscuous mode [ 41.032612][ T345] device veth1_macvtap entered promiscuous mode [ 41.039240][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.047126][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.054664][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.061715][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.069002][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.076818][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.084591][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.091529][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.098608][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.106411][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.113214][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.120295][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.127931][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.137065][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.144956][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.155123][ T29] audit: type=1400 audit(1699800401.679:161): avc: denied { mounton } for pid=351 comm="syz-executor.0" path="/root/syzkaller-testdir2526258459/syzkaller.ZDOA2V/0/file0" dev="sda1" ino=1938 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 41.205770][ T352] BUG: kernel NULL pointer dereference, address: 0000000000000002 [ 41.213364][ T352] #PF: supervisor read access in kernel mode [ 41.219180][ T352] #PF: error_code(0x0000) - not-present page [ 41.224994][ T352] PGD 112a9f067 P4D 112a9f067 PUD 112b61067 PMD 0 [ 41.231336][ T352] Oops: 0000 [#1] PREEMPT SMP [ 41.235845][ T352] CPU: 1 PID: 352 Comm: syz-executor.0 Not tainted 5.15.137-syzkaller #0 [ 41.244096][ T352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 41.253985][ T352] RIP: 0010:do_unlinkat+0x132/0x2a0 [ 41.259020][ T352] Code: 48 81 c7 a0 00 00 00 e8 1c 7e a9 00 48 8b 75 b8 48 8d 7d c0 89 da e8 ed 89 ff ff 48 3d 00 f0 ff ff 49 89 c7 0f 87 44 01 00 00 <8b> 00 8b 4d c4 48 8b 75 c8 89 c2 81 e2 00 00 70 00 80 3c 0e 00 0f [ 41.278464][ T352] RSP: 0018:ffffc9000040beb0 EFLAGS: 00010203 [ 41.284368][ T352] RAX: 0000000000000002 RBX: 0000000000000000 RCX: 0000000400000000 [ 41.292174][ T352] RDX: 0000000000000003 RSI: 0000000300000000 RDI: ffff888101de1280 [ 41.299984][ T352] RBP: ffffc9000040bf18 R08: 0000000000000004 R09: 0000000000000064 [ 41.307796][ T352] R10: ffff888111f27098 R11: 0000000000000001 R12: 0000000000000000 [ 41.315615][ T352] R13: ffff8881002c1000 R14: 0000000000000000 R15: 0000000000000002 [ 41.323516][ T352] FS: 00007f0da5b9f6c0(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 41.332277][ T352] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.338703][ T352] CR2: 0000000000000002 CR3: 0000000112a90000 CR4: 00000000003506a0 [ 41.346515][ T352] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 41.354328][ T352] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 41.362137][ T352] Call Trace: [ 41.365273][ T352] [ 41.368050][ T352] ? show_regs.part.0+0x1e/0x20 [ 41.372724][ T352] ? __die+0x5d/0x9e [ 41.376459][ T352] ? page_fault_oops+0x12d/0x280 [ 41.381231][ T352] ? do_user_addr_fault+0x44b/0x730 [ 41.386265][ T352] ? _raw_spin_unlock_irqrestore+0x28/0x40 [ 41.391912][ T352] ? __mod_timer+0x251/0x3a0 [ 41.396333][ T352] ? add_timer+0x1b/0x20 [ 41.400413][ T352] ? debug_smp_processor_id+0x17/0x20 [ 41.405619][ T352] ? call_rcu+0x194/0x640 [ 41.409795][ T352] ? exc_page_fault+0x67/0x160 [ 41.414386][ T352] ? asm_exc_page_fault+0x27/0x30 [ 41.419246][ T352] ? do_unlinkat+0x132/0x2a0 [ 41.423671][ T352] __x64_sys_unlink+0x3d/0x60 [ 41.428186][ T352] do_syscall_64+0x35/0xb0 [ 41.432438][ T352] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 41.438167][ T352] RIP: 0033:0x7f0da601cb29 [ 41.442428][ T352] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 41.461864][ T352] RSP: 002b:00007f0da5b9f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 41.470110][ T352] RAX: ffffffffffffffda RBX: 00007f0da613bf80 RCX: 00007f0da601cb29 [ 41.477919][ T352] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000100 [ 41.485733][ T352] RBP: 00007f0da606847a R08: 0000000000000000 R09: 0000000000000000 [ 41.493542][ T352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 41.501353][ T352] R13: 000000000000000b R14: 00007f0da613bf80 R15: 00007ffe7f935228 [ 41.509258][ T352] [ 41.512119][ T352] Modules linked in: [ 41.515850][ T352] CR2: 0000000000000002 [ 41.519841][ T352] ---[ end trace 059327bc40a39da5 ]--- [ 41.525135][ T352] RIP: 0010:do_unlinkat+0x132/0x2a0 [ 41.530170][ T352] Code: 48 81 c7 a0 00 00 00 e8 1c 7e a9 00 48 8b 75 b8 48 8d 7d c0 89 da e8 ed 89 ff ff 48 3d 00 f0 ff ff 49 89 c7 0f 87 44 01 00 00 <8b> 00 8b 4d c4 48 8b 75 c8 89 c2 81 e2 00 00 70 00 80 3c 0e 00 0f [ 41.549695][ T352] RSP: 0018:ffffc9000040beb0 EFLAGS: 00010203 [ 41.555598][ T352] RAX: 0000000000000002 RBX: 0000000000000000 RCX: 0000000400000000 [ 41.563410][ T352] RDX: 0000000000000003 RSI: 0000000300000000 RDI: ffff888101de1280 [ 41.571221][ T352] RBP: ffffc9000040bf18 R08: 0000000000000004 R09: 0000000000000064 [ 41.579043][ T352] R10: ffff888111f27098 R11: 0000000000000001 R12: 0000000000000000 [ 41.586851][ T352] R13: ffff8881002c1000 R14: 0000000000000000 R15: 0000000000000002 [ 41.594754][ T352] FS: 00007f0da5b9f6c0(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 41.603508][ T352] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.609937][ T352] CR2: 0000000000000002 CR3: 0000000112a90000 CR4: 00000000003506a0 [ 41.617744][ T352] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 41.625560][ T352] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 41.633367][ T352] Kernel panic - not syncing: Fatal exception [ 41.639495][ T352] Kernel Offset: disabled [ 41.643603][ T352] Rebooting in 86400 seconds..