Warning: Permanently added '10.128.0.108' (ED25519) to the list of known hosts. 2023/12/24 14:34:35 ignoring optional flag "sandboxArg"="0" 2023/12/24 14:34:35 parsed 1 programs [ 43.735069][ T23] kauditd_printk_skb: 72 callbacks suppressed [ 43.735082][ T23] audit: type=1400 audit(1703428475.550:148): avc: denied { mounton } for pid=404 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 43.770287][ T23] audit: type=1400 audit(1703428475.550:149): avc: denied { mount } for pid=404 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 43.797114][ T23] audit: type=1400 audit(1703428475.590:150): avc: denied { unlink } for pid=404 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2023/12/24 14:34:35 executed programs: 0 [ 43.860501][ T404] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 43.934992][ T410] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.942236][ T410] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.950073][ T410] device bridge_slave_0 entered promiscuous mode [ 43.957237][ T410] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.964181][ T410] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.971949][ T410] device bridge_slave_1 entered promiscuous mode [ 44.019279][ T23] audit: type=1400 audit(1703428475.840:151): avc: denied { create } for pid=410 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.028114][ T410] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.040577][ T23] audit: type=1400 audit(1703428475.840:152): avc: denied { write } for pid=410 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.047328][ T410] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.047449][ T410] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.068815][ T23] audit: type=1400 audit(1703428475.840:153): avc: denied { read } for pid=410 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.076361][ T410] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.133613][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.142554][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.152607][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.162047][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.173236][ T125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.182782][ T125] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.190311][ T125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.207347][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.218703][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.226596][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.246918][ T125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.257180][ T125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.266220][ T125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.287837][ T125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.296551][ T125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.311344][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.326577][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.340797][ T23] audit: type=1400 audit(1703428476.160:154): avc: denied { mounton } for pid=410 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=891 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 44.381714][ T23] audit: type=1400 audit(1703428476.200:155): avc: denied { ioctl } for pid=416 comm="syz-executor.0" path="socket:[11466]" dev="sockfs" ino=11466 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 44.387272][ T417] kasan: CONFIG_KASAN_INLINE enabled [ 44.408816][ T23] audit: type=1400 audit(1703428476.200:156): avc: denied { setopt } for pid=416 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 44.413327][ T417] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 44.413339][ T417] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 44.413357][ T417] CPU: 1 PID: 417 Comm: syz-executor.0 Not tainted 5.4.259-syzkaller-04800-gc0585bc7c835 #0 [ 44.434330][ T23] audit: type=1400 audit(1703428476.200:157): avc: denied { write } for pid=416 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 44.442556][ T417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 44.442577][ T417] RIP: 0010:skb_segment+0x2940/0x3f30 [ 44.442587][ T417] Code: 89 bc 24 90 00 00 00 81 7c 24 3c ff ff 00 00 0f 85 6b e2 ff ff e8 10 64 ea fd 48 8b 44 24 78 48 8d 58 70 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 47 08 00 00 8b 03 48 89 44 24 40 48 8b [ 44.442593][ T417] RSP: 0018:ffff8881ee1a7060 EFLAGS: 00010202 [ 44.442602][ T417] RAX: 000000000000000e RBX: 0000000000000070 RCX: ffff8881f4bd6e40 [ 44.442616][ T417] RDX: 0000000000000000 RSI: ffff8881dc6166be RDI: 000000000000ffff [ 44.544250][ T417] RBP: ffff8881ee1a72f0 R08: ffffffff8379c24e R09: ffffffff837dfe1b [ 44.552535][ T417] R10: ffff8881f4bd6e40 R11: 0000000000000002 R12: 000000000000003e [ 44.562322][ T417] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881ee3e5800 [ 44.571224][ T417] FS: 00007fee70db16c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 44.581514][ T417] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 44.588673][ T417] CR2: 0000000020010000 CR3: 00000001ee174000 CR4: 00000000003406a0 [ 44.599280][ T417] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 44.609778][ T417] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 44.618558][ T417] Call Trace: [ 44.621700][ T417] ? __die+0xb4/0x100 [ 44.625878][ T417] ? die+0x26/0x50 [ 44.629534][ T417] ? do_general_protection+0x266/0x3c0 [ 44.635015][ T417] ? do_trap+0x340/0x340 [ 44.639300][ T417] ? skb_network_protocol+0x534/0x7a0 [ 44.644749][ T417] ? general_protection+0x28/0x30 [ 44.650116][ T417] ? skb_network_protocol+0x1ab/0x7a0 [ 44.655656][ T417] ? skb_segment+0xaee/0x3f30 [ 44.660872][ T417] ? skb_segment+0x2940/0x3f30 [ 44.666065][ T417] ? check_preemption_disabled+0x9f/0x320 [ 44.674304][ T417] ? prandom_u32+0x236/0x270 [ 44.679600][ T417] ? skb_gro_receive_list+0x4a0/0x4a0 [ 44.685284][ T417] udp6_ufo_fragment+0x866/0xcd0 [ 44.690562][ T417] ? udpv6_offload_exit+0x20/0x20 [ 44.696087][ T417] ? ipv6_gso_pull_exthdrs+0x423/0x470 [ 44.701980][ T417] ipv6_gso_segment+0x65e/0x1130 [ 44.707289][ T417] ? asan.module_ctor+0x10/0x10 [ 44.712957][ T417] ? asan.module_ctor+0x10/0x10 [ 44.719080][ T417] skb_mac_gso_segment+0x27c/0x490 [ 44.725618][ T417] ? skb_network_protocol+0x7a0/0x7a0 [ 44.731217][ T417] ? netif_skb_features+0x88e/0xba0 [ 44.737811][ T417] __skb_gso_segment+0x305/0x4a0 [ 44.744966][ T417] validate_xmit_skb+0x30a/0xc50 [ 44.751273][ T417] ? validate_xmit_skb_list+0x130/0x130 [ 44.759603][ T417] ? __do_page_fault+0x725/0xbb0 [ 44.767319][ T417] ? netdev_core_pick_tx+0xc7/0x2f0 [ 44.775079][ T417] __dev_queue_xmit+0xf7d/0x27e0 [ 44.785469][ T417] ? dev_queue_xmit+0x20/0x20 [ 44.799971][ T417] ? virtio_net_hdr_to_skb+0xa10/0x1130 [ 44.809808][ T417] packet_sendmsg+0x4747/0x6100 [ 44.815046][ T417] ? avc_has_perm+0x21a/0x260 [ 44.820481][ T417] ? debug_smp_processor_id+0x20/0x20 [ 44.825950][ T417] ? selinux_socket_sendmsg+0x243/0x340 [ 44.831894][ T417] ? selinux_socket_accept+0x5b0/0x5b0 [ 44.838438][ T417] ? __fget+0x407/0x490 [ 44.843109][ T417] ? compat_packet_setsockopt+0x160/0x160 [ 44.849199][ T417] ? selinux_socket_getsockopt+0x340/0x340 [ 44.855543][ T417] ? __fget+0x407/0x490 [ 44.860258][ T417] ? security_socket_sendmsg+0x7d/0xa0 [ 44.866576][ T417] ? compat_packet_setsockopt+0x160/0x160 [ 44.872873][ T417] __sys_sendto+0x4f3/0x6c0 [ 44.879424][ T417] ? __ia32_sys_getpeername+0x80/0x80 [ 44.886891][ T417] ? debug_smp_processor_id+0x20/0x20 [ 44.893152][ T417] ? switch_fpu_return+0x1d4/0x410 [ 44.900773][ T417] ? fpu__clear+0x3c0/0x3c0 [ 44.906981][ T417] __x64_sys_sendto+0xda/0xf0 [ 44.912813][ T417] do_syscall_64+0xca/0x1c0 [ 44.918951][ T417] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 44.926571][ T417] Modules linked in: [ 44.932149][ T417] ---[ end trace 0336c935cc30fd9f ]--- [ 44.938731][ T417] RIP: 0010:skb_segment+0x2940/0x3f30 [ 44.944897][ T417] Code: 89 bc 24 90 00 00 00 81 7c 24 3c ff ff 00 00 0f 85 6b e2 ff ff e8 10 64 ea fd 48 8b 44 24 78 48 8d 58 70 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 47 08 00 00 8b 03 48 89 44 24 40 48 8b [ 44.967930][ T417] RSP: 0018:ffff8881ee1a7060 EFLAGS: 00010202 [ 44.974746][ T417] RAX: 000000000000000e RBX: 0000000000000070 RCX: ffff8881f4bd6e40 [ 44.983554][ T417] RDX: 0000000000000000 RSI: ffff8881dc6166be RDI: 000000000000ffff [ 44.991840][ T417] RBP: ffff8881ee1a72f0 R08: ffffffff8379c24e R09: ffffffff837dfe1b [ 45.000493][ T417] R10: ffff8881f4bd6e40 R11: 0000000000000002 R12: 000000000000003e [ 45.008498][ T417] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881ee3e5800 [ 45.017107][ T417] FS: 00007fee70db16c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 45.027282][ T417] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 45.035350][ T417] CR2: 0000000020010000 CR3: 00000001ee174000 CR4: 00000000003406a0 [ 45.043944][ T417] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 45.052286][ T417] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 45.060851][ T417] Kernel panic - not syncing: Fatal exception in interrupt [ 45.069976][ T417] Kernel Offset: disabled [ 45.074799][ T417] Rebooting in 86400 seconds..