Warning: Permanently added '10.128.0.173' (ED25519) to the list of known hosts. 2024/08/26 21:30:08 ignoring optional flag "sandboxArg"="0" 2024/08/26 21:30:09 parsed 1 programs [ 46.228230][ T24] kauditd_printk_skb: 18 callbacks suppressed [ 46.228243][ T24] audit: type=1400 audit(1724707809.050:94): avc: denied { mount } for pid=342 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2024/08/26 21:30:09 executed programs: 0 [ 46.257552][ T24] audit: type=1400 audit(1724707809.080:95): avc: denied { unlink } for pid=342 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 46.290239][ T342] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 46.340471][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.347370][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.354970][ T348] device bridge_slave_0 entered promiscuous mode [ 46.361523][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.368394][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.375546][ T348] device bridge_slave_1 entered promiscuous mode [ 46.411119][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.417998][ T348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.425116][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.431875][ T348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.448882][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.456170][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.463894][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.471438][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.480133][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.488158][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.495224][ T298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.503554][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.512022][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.519485][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.532538][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.540514][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.555416][ T348] device veth0_vlan entered promiscuous mode [ 46.562688][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.571924][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.579693][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.587329][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.598668][ T348] device veth1_macvtap entered promiscuous mode [ 46.605980][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.619932][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.628484][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.640745][ T24] audit: type=1400 audit(1724707809.460:96): avc: denied { mounton } for pid=348 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 46.717046][ T24] audit: type=1400 audit(1724707809.490:97): avc: denied { prog_load } for pid=352 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 46.787874][ T24] audit: type=1400 audit(1724707809.490:98): avc: denied { bpf } for pid=352 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 46.837166][ T24] audit: type=1400 audit(1724707809.490:99): avc: denied { perfmon } for pid=352 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 46.884931][ T24] audit: type=1400 audit(1724707809.490:100): avc: denied { prog_run } for pid=352 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 46.928588][ T24] audit: type=1400 audit(1724707809.490:101): avc: denied { create } for pid=352 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 47.069079][ T1] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000007 [ 47.077850][ T1] CPU: 0 PID: 1 Comm: init Not tainted 5.10.223-syzkaller-1003215-g0890c03b8b7d #0 [ 47.087308][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 47.097226][ T1] Call Trace: [ 47.100338][ T1] dump_stack_lvl+0x1e2/0x24b [ 47.104835][ T1] ? panic+0x22b/0x812 [ 47.108740][ T1] ? bfq_pos_tree_add_move+0x43b/0x43b [ 47.114046][ T1] dump_stack+0x15/0x17 [ 47.118161][ T1] panic+0x2cf/0x812 [ 47.121853][ T1] ? do_exit+0x239a/0x2a50 [ 47.126195][ T1] ? fb_is_primary_device+0xd4/0xd4 [ 47.131224][ T1] ? __kasan_check_write+0x14/0x20 [ 47.136359][ T1] ? sync_mm_rss+0x28a/0x2e0 [ 47.140797][ T1] do_exit+0x23b4/0x2a50 [ 47.144952][ T1] ? sched_group_set_shares+0x490/0x490 [ 47.150618][ T1] ? put_task_struct+0x80/0x80 [ 47.155196][ T1] ? schedule+0x154/0x1d0 [ 47.159358][ T1] ? schedule_timeout+0xa9/0x360 [ 47.164301][ T1] ? __kasan_check_write+0x14/0x20 [ 47.169334][ T1] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 47.174301][ T1] do_group_exit+0x141/0x310 [ 47.178959][ T1] get_signal+0x10a0/0x1410 [ 47.183460][ T1] arch_do_signal_or_restart+0xbd/0x17c0 [ 47.189006][ T1] ? put_pid+0xd7/0x110 [ 47.193160][ T1] ? kernel_clone+0x6ca/0x9e0 [ 47.197684][ T1] ? create_io_thread+0x1e0/0x1e0 [ 47.202631][ T1] ? get_timespec64+0x197/0x270 [ 47.207556][ T1] ? timespec64_add_safe+0x220/0x220 [ 47.212617][ T1] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 47.217893][ T1] ? __do_sys_vfork+0xcd/0x130 [ 47.222500][ T1] exit_to_user_mode_loop+0x9b/0xd0 [ 47.227716][ T1] syscall_exit_to_user_mode+0xa2/0x1a0 [ 47.233083][ T1] do_syscall_64+0x40/0x70 [ 47.237357][ T1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 47.243162][ T1] RIP: 0033:0x7f0d40750a68 [ 47.247523][ T1] Code: 00 48 8d b8 e0 02 00 00 48 89 b8 d8 02 00 00 48 89 b8 e0 02 00 00 b8 11 01 00 00 0f 05 44 89 c0 c3 90 5f b8 3a 00 00 00 0f 05 <57> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 90 43 0f 00 f7 d8 64 89 01 48 [ 47.267028][ T1] RSP: 002b:00007ffef789d740 EFLAGS: 00000246 ORIG_RAX: 000000000000003a [ 47.275455][ T1] RAX: 0000000000000165 RBX: 000055cb0d3a5a50 RCX: 00007f0d40750a68 [ 47.283640][ T1] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 00007f0d408dbbed [ 47.291449][ T1] RBP: 00007f0d40916528 R08: 0000000000000007 R09: 515417f1729dcebd [ 47.299340][ T1] R10: 00007ffef789d780 R11: 0000000000000246 R12: 0000000000000000 [ 47.307148][ T1] R13: 0000000000000018 R14: 000055cb0c2d6169 R15: 00007f0d40947a80 [ 47.316268][ T1] Kernel Offset: disabled [ 47.320531][ T1] Rebooting in 86400 seconds..