[ 21.930924][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.938532][ T110] device bridge_slave_0 left promiscuous mode [ 21.944627][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.952667][ T110] device veth1_macvtap left promiscuous mode [ 21.958776][ T110] device veth0_vlan left promiscuous mode [ 32.901545][ T24] kauditd_printk_skb: 70 callbacks suppressed [ 32.901554][ T24] audit: type=1400 audit(1698219121.610:146): avc: denied { transition } for pid=314 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 32.929715][ T24] audit: type=1400 audit(1698219121.620:147): avc: denied { noatsecure } for pid=314 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 32.949259][ T24] audit: type=1400 audit(1698219121.620:148): avc: denied { rlimitinh } for pid=314 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 32.968233][ T24] audit: type=1400 audit(1698219121.620:149): avc: denied { siginh } for pid=314 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.156' (ED25519) to the list of known hosts. 2023/10/25 07:32:09 ignoring optional flag "sandboxArg"="0" 2023/10/25 07:32:09 parsed 1 programs 2023/10/25 07:32:09 executed programs: 0 [ 40.616347][ T24] audit: type=1400 audit(1698219129.330:150): avc: denied { mounton } for pid=336 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 40.641230][ T24] audit: type=1400 audit(1698219129.330:151): avc: denied { mount } for pid=336 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 40.673676][ T340] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.680668][ T340] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.687891][ T340] device bridge_slave_0 entered promiscuous mode [ 40.694894][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.701734][ T340] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.709409][ T340] device bridge_slave_1 entered promiscuous mode [ 40.742720][ T24] audit: type=1400 audit(1698219129.450:152): avc: denied { write } for pid=340 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.747996][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.763351][ T24] audit: type=1400 audit(1698219129.450:153): avc: denied { read } for pid=340 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.770156][ T340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.770259][ T340] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.804291][ T340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.822046][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.829334][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.837116][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.845002][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.864793][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.873239][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.881436][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.888568][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.896503][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.904723][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.911626][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.919329][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.927799][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.936481][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.944360][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.951545][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.960154][ T340] device veth0_vlan entered promiscuous mode [ 40.969665][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.978588][ T340] device veth1_macvtap entered promiscuous mode [ 40.988576][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.000136][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.012936][ T24] audit: type=1400 audit(1698219129.720:154): avc: denied { mounton } for pid=340 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 41.043615][ T24] audit: type=1400 audit(1698219129.750:155): avc: denied { mounton } for pid=344 comm="syz-executor.0" path="/root/syzkaller-testdir1108400251/syzkaller.XwvCNb/0/file0" dev="sda1" ino=1937 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 41.090546][ T348] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 41.102293][ T348] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 41.111090][ T348] CPU: 0 PID: 348 Comm: syz-executor.0 Not tainted 5.10.194-syzkaller-989236-ge7b204458d9c #0 [ 41.121148][ T348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 41.131283][ T348] RIP: 0010:path_openat+0x17ab/0x3000 [ 41.136481][ T348] Code: b6 04 30 84 c0 0f 85 d9 07 00 00 48 8b 44 24 30 80 60 01 f8 e9 69 ee ff ff e8 b1 29 b7 ff 4c 8b 64 24 20 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 0f 85 8f 07 00 00 41 8b 1f be 00 00 70 00 21 [ 41.155936][ T348] RSP: 0018:ffffc90000eb7920 EFLAGS: 00010247 [ 41.161846][ T348] RAX: 0000000000000000 RBX: ffff88810ccbbe18 RCX: ffff88810c96e2c0 [ 41.169648][ T348] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000000 [ 41.177442][ T348] RBP: ffffc90000eb7b50 R08: ffffffff81b62e7b R09: ffffed10238e38d8 [ 41.185341][ T348] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88811c71c690 [ 41.193165][ T348] R13: 0000000000008000 R14: dffffc0000000000 R15: 0000000000000004 [ 41.201146][ T348] FS: 00007f7779c166c0(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 [ 41.209912][ T348] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.216506][ T348] CR2: 00007f7779c36fa8 CR3: 000000010cdeb000 CR4: 00000000003506b0 [ 41.224487][ T348] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 41.232402][ T348] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 41.240211][ T348] Call Trace: [ 41.243439][ T348] ? __die_body+0x62/0xb0 [ 41.247688][ T348] ? die_addr+0x9f/0xd0 [ 41.252328][ T348] ? exc_general_protection+0x3ff/0x490 [ 41.257742][ T348] ? asm_exc_general_protection+0x1e/0x30 [ 41.263512][ T348] ? dput+0x8b/0x310 [ 41.267246][ T348] ? path_openat+0x17ab/0x3000 [ 41.271861][ T348] ? do_filp_open+0x460/0x460 [ 41.276439][ T348] do_filp_open+0x21c/0x460 [ 41.280780][ T348] ? vfs_tmpfile+0x2b0/0x2b0 [ 41.285292][ T348] ? get_unused_fd_flags+0x94/0xa0 [ 41.290422][ T348] do_sys_openat2+0x13f/0x6f0 [ 41.294931][ T348] ? do_sys_open+0x220/0x220 [ 41.299551][ T348] __x64_sys_openat+0x243/0x290 [ 41.304498][ T348] ? __ia32_sys_open+0x270/0x270 [ 41.309396][ T348] ? __kasan_check_read+0x11/0x20 [ 41.314922][ T348] do_syscall_64+0x34/0x70 [ 41.319235][ T348] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 41.325080][ T348] RIP: 0033:0x7f777a0b4959 [ 41.329327][ T348] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 41.348981][ T348] RSP: 002b:00007f7779c160c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 41.357253][ T348] RAX: ffffffffffffffda RBX: 00007f777a1d4050 RCX: 00007f777a0b4959 [ 41.365176][ T348] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 41.373357][ T348] RBP: 00007f777a110c88 R08: 0000000000000000 R09: 0000000000000000 [ 41.381115][ T348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 41.388925][ T348] R13: 000000000000006e R14: 00007f777a1d4050 R15: 00007ffc663cf678 [ 41.396744][ T348] Modules linked in: [ 41.402360][ T348] ---[ end trace 71443e081e889268 ]--- [ 41.407783][ T348] RIP: 0010:path_openat+0x17ab/0x3000 [ 41.413031][ T348] Code: b6 04 30 84 c0 0f 85 d9 07 00 00 48 8b 44 24 30 80 60 01 f8 e9 69 ee ff ff e8 b1 29 b7 ff 4c 8b 64 24 20 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 0f 85 8f 07 00 00 41 8b 1f be 00 00 70 00 21 [ 41.433007][ T348] RSP: 0018:ffffc90000eb7920 EFLAGS: 00010247 [ 41.439423][ T348] RAX: 0000000000000000 RBX: ffff88810ccbbe18 RCX: ffff88810c96e2c0 [ 41.447436][ T348] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000000 [ 41.455457][ T348] RBP: ffffc90000eb7b50 R08: ffffffff81b62e7b R09: ffffed10238e38d8 [ 41.463283][ T348] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88811c71c690 [ 41.471475][ T348] R13: 0000000000008000 R14: dffffc0000000000 R15: 0000000000000004 [ 41.479494][ T348] FS: 00007f7779c166c0(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000 [ 41.488695][ T348] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.495338][ T348] CR2: 000055c0796c82a0 CR3: 000000010cdeb000 CR4: 00000000003506a0 [ 41.503508][ T348] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 41.511569][ T348] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 41.519342][ T348] Kernel panic - not syncing: Fatal exception [ 41.525452][ T348] Kernel Offset: disabled [ 41.529598][ T348] Rebooting in 86400 seconds..