Warning: Permanently added '10.128.0.67' (ED25519) to the list of known hosts. 2024/03/05 06:29:34 ignoring optional flag "sandboxArg"="0" 2024/03/05 06:29:34 parsed 1 programs [ 41.921547][ T27] audit: type=1400 audit(1709620174.883:156): avc: denied { mounton } for pid=344 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 41.946323][ T27] audit: type=1400 audit(1709620174.883:157): avc: denied { mount } for pid=344 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2024/03/05 06:29:35 executed programs: 0 [ 41.994391][ T27] audit: type=1400 audit(1709620174.963:158): avc: denied { unlink } for pid=344 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 42.024456][ T344] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 42.046143][ T350] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.053393][ T350] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.060522][ T350] device bridge_slave_0 entered promiscuous mode [ 42.067934][ T350] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.074940][ T350] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.082121][ T350] device bridge_slave_1 entered promiscuous mode [ 42.094630][ T27] audit: type=1400 audit(1709620175.063:159): avc: denied { write } for pid=350 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.096652][ T350] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.116142][ T27] audit: type=1400 audit(1709620175.063:160): avc: denied { read } for pid=350 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.122997][ T350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.150716][ T350] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.157686][ T350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.167509][ T36] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.174461][ T36] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.181714][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.188947][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.196648][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.204501][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.211280][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.221000][ T350] device veth0_vlan entered promiscuous mode [ 42.227265][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 42.235478][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.243098][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 42.250170][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 42.257479][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 42.265452][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.272234][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.280436][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 42.288416][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 42.297319][ T350] device veth1_macvtap entered promiscuous mode [ 42.303984][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.313142][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.321650][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.330379][ T27] audit: type=1400 audit(1709620175.303:161): avc: denied { mounton } for pid=350 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=207 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 42.356470][ T355] BUG: kernel NULL pointer dereference, address: 0000000000000070 [ 42.358577][ T27] audit: type=1400 audit(1709620175.323:162): avc: denied { ioctl } for pid=354 comm="syz-executor.0" path="socket:[11682]" dev="sockfs" ino=11682 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 42.364462][ T355] #PF: supervisor read access in kernel mode [ 42.364467][ T355] #PF: error_code(0x0000) - not-present page [ 42.364470][ T355] PGD 10ffb2067 P4D 10ffb2067 PUD 10ffbb067 PMD 0 [ 42.364478][ T355] Oops: 0000 [#1] PREEMPT SMP [ 42.364482][ T355] CPU: 1 PID: 355 Comm: syz-executor.0 Not tainted 6.1.68-syzkaller #0 [ 42.364487][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 42.364490][ T355] RIP: 0010:skb_segment+0xc00/0xea0 [ 42.364499][ T355] Code: 00 00 00 44 01 e8 66 41 89 44 24 54 8b 75 a4 4c 8b 45 90 4c 8b 8d 60 ff ff ff 44 8b 55 ac 4c 8b 9d 70 ff ff ff e9 04 f7 ff ff <41> 8b 7e 70 44 8b 6b 70 e9 2a f7 ff ff 48 8b 75 b0 4c 89 66 08 8b [ 42.364503][ T355] RSP: 0018:ffffc900007bf9a8 EFLAGS: 00010246 [ 42.364506][ T355] RAX: 0000000000000000 RBX: ffff88810ba92500 RCX: 0000000000000280 [ 42.364509][ T355] RDX: 0000000000000000 RSI: 000000000000ffff RDI: ffff88810ba92500 [ 42.364512][ T355] RBP: ffffc900007bfaa0 R08: 000000000000003e R09: 0000000000000f0f [ 42.390043][ T27] audit: type=1400 audit(1709620175.323:163): avc: denied { setopt } for pid=354 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 42.395574][ T355] R10: 0000000000000011 R11: ffff88810b0ddac8 R12: 0000000000000000 [ 42.395578][ T355] R13: 000000000000003e R14: 0000000000000000 R15: 0000000000000046 [ 42.395580][ T355] FS: 00007f3e8ec726c0(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 42.395584][ T355] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 42.395586][ T355] CR2: 0000000000000070 CR3: 000000010bbb8000 CR4: 00000000003506a0 [ 42.395592][ T355] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 42.395594][ T355] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 42.395596][ T355] Call Trace: [ 42.395598][ T355] [ 42.395601][ T355] ? __die_body+0x62/0xb0 [ 42.401677][ T27] audit: type=1400 audit(1709620175.323:164): avc: denied { write } for pid=354 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 42.407980][ T355] ? __die+0x7e/0x90 [ 42.407987][ T355] ? page_fault_oops+0x369/0x3d0 [ 42.407992][ T355] ? __stack_depot_save+0x21/0x480 [ 42.604163][ T355] ? exc_page_fault+0x4dc/0x670 [ 42.608875][ T355] ? asm_exc_page_fault+0x27/0x30 [ 42.613799][ T355] ? skb_segment+0xc00/0xea0 [ 42.618324][ T355] ? skb_segment+0xd9/0xea0 [ 42.622912][ T355] ? pskb_expand_head+0x12f/0x420 [ 42.627777][ T355] udp6_ufo_fragment+0x23c/0x2b0 [ 42.632553][ T355] ipv6_gso_segment+0x16a/0x490 [ 42.637233][ T355] skb_mac_gso_segment+0x9c/0x130 [ 42.643251][ T355] __skb_gso_segment+0xd8/0x130 [ 42.648168][ T355] validate_xmit_skb+0xc4/0x370 [ 42.655813][ T355] __dev_queue_xmit+0x587/0xd70 [ 42.661163][ T355] ? __dev_queue_xmit+0x76/0xd70 [ 42.666033][ T355] ? virtio_net_hdr_to_skb+0x165/0x410 [ 42.671482][ T355] dev_queue_xmit+0xb/0x10 [ 42.676081][ T355] packet_sendmsg+0x11e0/0x1630 [ 42.680720][ T355] __sys_sendto+0x2e4/0x360 [ 42.685122][ T355] __x64_sys_sendto+0x21/0x30 [ 42.689980][ T355] do_syscall_64+0x3d/0xb0 [ 42.694434][ T355] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 42.700624][ T355] RIP: 0033:0x7f3e8de7cba9 [ 42.705050][ T355] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 42.724589][ T355] RSP: 002b:00007f3e8ec720c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 42.733002][ T355] RAX: ffffffffffffffda RBX: 00007f3e8df9bf80 RCX: 00007f3e8de7cba9 [ 42.741156][ T355] RDX: 0000000000010048 RSI: 00000000200000c0 RDI: 0000000000000003 [ 42.749058][ T355] RBP: 00007f3e8dec847a R08: 0000000020000540 R09: 0000000000000014 [ 42.756860][ T355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 42.764755][ T355] R13: 000000000000000b R14: 00007f3e8df9bf80 R15: 00007ffc8048c148 [ 42.772847][ T355] [ 42.775778][ T355] Modules linked in: [ 42.779519][ T355] CR2: 0000000000000070 [ 42.783505][ T355] ---[ end trace 0000000000000000 ]--- [ 42.788800][ T355] RIP: 0010:skb_segment+0xc00/0xea0 [ 42.794615][ T355] Code: 00 00 00 44 01 e8 66 41 89 44 24 54 8b 75 a4 4c 8b 45 90 4c 8b 8d 60 ff ff ff 44 8b 55 ac 4c 8b 9d 70 ff ff ff e9 04 f7 ff ff <41> 8b 7e 70 44 8b 6b 70 e9 2a f7 ff ff 48 8b 75 b0 4c 89 66 08 8b [ 42.814060][ T355] RSP: 0018:ffffc900007bf9a8 EFLAGS: 00010246 [ 42.819968][ T355] RAX: 0000000000000000 RBX: ffff88810ba92500 RCX: 0000000000000280 [ 42.827854][ T355] RDX: 0000000000000000 RSI: 000000000000ffff RDI: ffff88810ba92500 [ 42.835931][ T355] RBP: ffffc900007bfaa0 R08: 000000000000003e R09: 0000000000000f0f [ 42.844105][ T355] R10: 0000000000000011 R11: ffff88810b0ddac8 R12: 0000000000000000 [ 42.852161][ T355] R13: 000000000000003e R14: 0000000000000000 R15: 0000000000000046 [ 42.860615][ T355] FS: 00007f3e8ec726c0(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 42.869605][ T355] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 42.876023][ T355] CR2: 0000000000000070 CR3: 000000010bbb8000 CR4: 00000000003506a0 [ 42.883837][ T355] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 42.891734][ T355] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 42.899794][ T355] Kernel panic - not syncing: Fatal exception in interrupt [ 42.907251][ T355] Kernel Offset: disabled [ 42.911616][ T355] Rebooting in 86400 seconds..