[ 29.852048][ T3173] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.862608][ T3173] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller syzkaller login: [ 40.074489][ T27] kauditd_printk_skb: 37 callbacks suppressed [ 40.074505][ T27] audit: type=1400 audit(1650428071.196:73): avc: denied { transition } for pid=3381 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 40.102750][ T27] audit: type=1400 audit(1650428071.206:74): avc: denied { write } for pid=3381 comm="sh" path="pipe:[27973]" dev="pipefs" ino=27973 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.0.245' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program [ 49.373502][ T27] audit: type=1400 audit(1650428080.496:75): avc: denied { execmem } for pid=3588 comm="syz-executor935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 49.424732][ T27] audit: type=1400 audit(1650428080.496:76): avc: denied { read write } for pid=3589 comm="syz-executor935" name="loop0" dev="devtmpfs" ino=644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 executing program executing program executing program executing program executing program executing program [ 49.528858][ T27] audit: type=1400 audit(1650428080.496:77): avc: denied { open } for pid=3589 comm="syz-executor935" path="/dev/loop0" dev="devtmpfs" ino=644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 executing program executing program executing program executing program executing program executing program executing program [ 49.640648][ T27] audit: type=1400 audit(1650428080.496:78): avc: denied { ioctl } for pid=3589 comm="syz-executor935" path="/dev/loop0" dev="devtmpfs" ino=644 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 executing program executing program executing program executing program executing program [ 49.781226][ T27] audit: type=1400 audit(1650428080.536:79): avc: denied { mounton } for pid=3598 comm="syz-executor935" path="/root/bus" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program [ 49.904654][ T27] audit: type=1400 audit(1650428080.546:80): avc: denied { mount } for pid=3596 comm="syz-executor935" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 executing program executing program executing program executing program executing program [ 50.022950][ T27] audit: type=1400 audit(1650428080.546:81): avc: denied { mounton } for pid=3600 comm="syz-executor935" path="/root/bus" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 51.283102][ T3867] page:ffffea00014c8dc0 refcount:2 mapcount:0 mapping:ffff88801b2e5cc0 index:0x237 pfn:0x53237 executing program executing program [ 51.332459][ T3867] memcg:ffff888140bb8000 executing program executing program [ 51.353586][ T3867] aops:shmem_aops ino:2 dentry name:"cgroup.controllers" [ 51.383938][ T3867] flags: 0xfff0000008003f(locked|referenced|uptodate|dirty|lru|active|swapbacked|node=0|zone=1|lastcpupid=0x7ff) executing program executing program [ 51.421574][ T3867] raw: 00fff0000008003f ffffea00014c8d88 ffffea00014c8e08 ffff88801b2e5cc0 [ 51.457783][ T3867] raw: 0000000000000237 0000000000000000 00000002ffffffff ffff888140bb8000 executing program executing program executing program [ 51.489532][ T3867] page dumped because: VM_BUG_ON_FOLIO(!folio_contains(folio, index)) [ 51.515225][ T3867] page_owner tracks the page as allocated executing program executing program [ 51.538648][ T3867] page last allocated via order 0, migratetype Movable, gfp_mask 0x3d20ca(GFP_TRANSHUGE_LIGHT|__GFP_NORETRY|__GFP_THISNODE), pid 3867, tgid 3865 (syz-executor935), ts 51256085256, free_ts 12247309195 executing program executing program executing program [ 51.604688][ T3867] get_page_from_freelist+0xba2/0x3e00 [ 51.621390][ T3867] __alloc_pages+0x1b2/0x500 [ 51.639867][ T3867] alloc_pages_vma+0x69b/0x770 executing program executing program [ 51.659786][ T3867] shmem_alloc_hugepage+0x113/0x210 executing program executing program [ 51.686859][ T3867] shmem_alloc_and_acct_page+0x403/0x10b0 [ 51.707509][ T3867] shmem_getpage_gfp+0x5ab/0x2370 [ 51.728353][ T3867] shmem_write_begin+0xff/0x1e0 [ 51.746914][ T3867] generic_perform_write+0x249/0x560 executing program executing program executing program executing program [ 51.767361][ T3867] __generic_file_write_iter+0x2aa/0x4d0 [ 51.789516][ T3867] generic_file_write_iter+0xd7/0x220 [ 51.804127][ T3867] new_sync_write+0x38a/0x560 executing program [ 51.819118][ T3867] vfs_write+0x7c0/0xac0 [ 51.835226][ T3867] ksys_write+0x127/0x250 [ 51.854406][ T3867] do_syscall_64+0x35/0xb0 executing program executing program executing program executing program [ 51.884769][ T3867] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 51.921004][ T3867] page last free stack trace: [ 51.949398][ T3867] free_pcp_prepare+0x549/0xd20 executing program [ 51.972187][ T3867] free_unref_page+0x19/0x6a0 [ 51.991549][ T3867] free_contig_range+0xb1/0x180 executing program executing program executing program executing program [ 52.016866][ T3867] destroy_args+0xa8/0x646 [ 52.034198][ T3867] debug_vm_pgtable+0x2a51/0x2ae3 [ 52.057357][ T3867] do_one_initcall+0x103/0x650 [ 52.079150][ T3867] kernel_init_freeable+0x6b1/0x73a executing program [ 52.105153][ T3867] kernel_init+0x1a/0x1d0 executing program executing program executing program executing program [ 52.127383][ T3867] ret_from_fork+0x1f/0x30 [ 52.145101][ T3867] ------------[ cut here ]------------ [ 52.169825][ T3867] kernel BUG at mm/filemap.c:1971! [ 52.194217][ T3867] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 52.200434][ T3867] CPU: 1 PID: 3867 Comm: syz-executor935 Not tainted 5.18.0-rc3-syzkaller-00007-g559089e0a93d #0 [ 52.210940][ T3867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 52.221108][ T3867] RIP: 0010:__filemap_get_folio+0xc65/0xf00 [ 52.227028][ T3867] Code: db 45 31 f6 e9 fd f5 ff ff 44 8b 6c 24 10 48 89 eb e9 f0 f5 ff ff e8 ba f5 d8 ff 48 c7 c6 80 d9 d5 89 48 89 df e8 6b 8d 0e 00 <0f> 0b e8 a4 f5 d8 ff 48 89 df 31 db e8 4a af 03 00 e9 78 f7 ff ff [ 52.246645][ T3867] RSP: 0018:ffffc900033d78b0 EFLAGS: 00010293 [ 52.252719][ T3867] RAX: 0000000000000000 RBX: ffffea00014c8dc0 RCX: 0000000000000000 [ 52.260697][ T3867] RDX: ffff88807bb560c0 RSI: ffffffff819f5865 RDI: 0000000000000003 [ 52.268682][ T3867] RBP: 0000000000000000 R08: 0000000000000018 R09: 00000000ffffffff [ 52.276668][ T3867] R10: ffffffff891d5eec R11: 00000000ffffffff R12: 0000000000000180 [ 52.284648][ T3867] R13: 0000000000000182 R14: 0000000000000000 R15: dffffc0000000000 executing program executing program [ 52.292634][ T3867] FS: 00007f78863e0700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 52.301583][ T3867] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 52.308179][ T3867] CR2: 000000002013f000 CR3: 0000000075648000 CR4: 00000000003506e0 [ 52.316165][ T3867] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 52.324141][ T3867] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 52.332120][ T3867] Call Trace: [ 52.335416][ T3867] [ 52.338347][ T3867] ? filemap_add_folio+0x1d0/0x1d0 [ 52.343477][ T3867] ? shmem_getpage_gfp+0x2c5/0x2370 [ 52.348686][ T3867] pagecache_get_page+0x2e/0x290 [ 52.353650][ T3867] shmem_getpage_gfp+0x471/0x2370 [ 52.358690][ T3867] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 52.364947][ T3867] ? shmem_is_huge+0x330/0x330 [ 52.369725][ T3867] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 52.375982][ T3867] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 52.382235][ T3867] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 52.387968][ T3867] ? fault_in_readable+0x1bc/0x290 executing program [ 52.393089][ T3867] ? fault_in_writeable+0x200/0x200 [ 52.398298][ T3867] shmem_write_begin+0xff/0x1e0 [ 52.403166][ T3867] generic_perform_write+0x249/0x560 [ 52.408465][ T3867] ? filemap_fdatawrite_wbc+0x1b0/0x1b0 [ 52.414025][ T3867] ? discard_new_inode+0x190/0x190 [ 52.419144][ T3867] ? generic_write_checks+0x25f/0x390 [ 52.424534][ T3867] __generic_file_write_iter+0x2aa/0x4d0 [ 52.430180][ T3867] generic_file_write_iter+0xd7/0x220 [ 52.435565][ T3867] ? iov_iter_init+0x45/0x1b0 [ 52.440252][ T3867] new_sync_write+0x38a/0x560 [ 52.444949][ T3867] ? new_sync_read+0x5f0/0x5f0 [ 52.449719][ T3867] ? lock_release+0x720/0x720 [ 52.454411][ T3867] ? avc_policy_seqno+0x9/0x70 [ 52.459214][ T3867] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 52.464950][ T3867] vfs_write+0x7c0/0xac0 [ 52.469207][ T3867] ksys_write+0x127/0x250 [ 52.473548][ T3867] ? __ia32_sys_read+0xb0/0xb0 [ 52.478325][ T3867] ? syscall_enter_from_user_mode+0x21/0x70 [ 52.484233][ T3867] do_syscall_64+0x35/0xb0 [ 52.488663][ T3867] entry_SYSCALL_64_after_hwframe+0x44/0xae executing program [ 52.494568][ T3867] RIP: 0033:0x7f78864331c9 [ 52.498985][ T3867] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 52.518603][ T3867] RSP: 002b:00007f78863e0308 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 52.527032][ T3867] RAX: ffffffffffffffda RBX: 00007f78864b73e8 RCX: 00007f78864331c9 [ 52.535015][ T3867] RDX: 000000000208e24b RSI: 0000000020000080 RDI: 0000000000000004 executing program executing program executing program executing program [ 52.542994][ T3867] RBP: 00007f78864b73e0 R08: 0000000000000000 R09: 0000000000000000 [ 52.550975][ T3867] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f78864b73ec [ 52.558958][ T3867] R13: 00007f78864840ac R14: 776c613d65677568 R15: 0000000000022000 [ 52.566943][ T3867] [ 52.569965][ T3867] Modules linked in: executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 52.738279][ T3867] ---[ end trace 0000000000000000 ]--- [ 52.746448][ T3867] RIP: 0010:__filemap_get_folio+0xc65/0xf00 [ 52.766721][ T3867] Code: db 45 31 f6 e9 fd f5 ff ff 44 8b 6c 24 10 48 89 eb e9 f0 f5 ff ff e8 ba f5 d8 ff 48 c7 c6 80 d9 d5 89 48 89 df e8 6b 8d 0e 00 <0f> 0b e8 a4 f5 d8 ff 48 89 df 31 db e8 4a af 03 00 e9 78 f7 ff ff executing program executing program executing program executing program [ 52.835258][ T3867] RSP: 0018:ffffc900033d78b0 EFLAGS: 00010293 [ 52.857159][ T3867] RAX: 0000000000000000 RBX: ffffea00014c8dc0 RCX: 0000000000000000 executing program executing program executing program executing program [ 52.889100][ T3867] RDX: ffff88807bb560c0 RSI: ffffffff819f5865 RDI: 0000000000000003 [ 52.905352][ T3867] RBP: 0000000000000000 R08: 0000000000000018 R09: 00000000ffffffff [ 52.926866][ T3867] R10: ffffffff891d5eec R11: 00000000ffffffff R12: 0000000000000180 executing program executing program executing program executing program [ 52.953520][ T3867] R13: 0000000000000182 R14: 0000000000000000 R15: dffffc0000000000 [ 52.988224][ T3867] FS: 00007f78863e0700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 executing program [ 53.008536][ T3867] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.029955][ T3867] CR2: 0000000020800000 CR3: 0000000075648000 CR4: 00000000003506e0 executing program executing program executing program executing program [ 53.057170][ T3867] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 53.088599][ T3867] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 53.120648][ T3867] Kernel panic - not syncing: Fatal exception [ 53.126898][ T3867] Kernel Offset: disabled [ 53.131219][ T3867] Rebooting in 86400 seconds..