Warning: Permanently added '10.128.1.156' (ED25519) to the list of known hosts. 2024/09/06 03:53:22 ignoring optional flag "sandboxArg"="0" 2024/09/06 03:53:22 parsed 1 programs [ 43.557782][ T29] audit: type=1400 audit(1725594802.369:96): avc: denied { mounton } for pid=344 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 43.582654][ T29] audit: type=1400 audit(1725594802.369:97): avc: denied { read write } for pid=344 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 43.608466][ T29] audit: type=1400 audit(1725594802.369:98): avc: denied { open } for pid=344 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/09/06 03:53:22 executed programs: 0 [ 43.634277][ T29] audit: type=1400 audit(1725594802.419:99): avc: denied { unlink } for pid=344 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 43.659803][ T29] audit: type=1400 audit(1725594802.419:100): avc: denied { relabelto } for pid=345 comm="mkswap" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 43.687237][ T344] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 43.706141][ T351] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.713114][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.720309][ T351] device bridge_slave_0 entered promiscuous mode [ 43.726584][ T351] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.733460][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.740616][ T351] device bridge_slave_1 entered promiscuous mode [ 43.754225][ T351] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.761170][ T351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.768381][ T351] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.775750][ T351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.784951][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.792110][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.799117][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 43.806245][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 43.815202][ T351] device veth0_vlan entered promiscuous mode [ 43.821789][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 43.829744][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.837242][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.844353][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.851539][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 43.859321][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.866297][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.873376][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 43.881266][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.888087][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.895188][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 43.902855][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 43.911103][ T351] device veth1_macvtap entered promiscuous mode [ 43.917558][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 43.925815][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 43.934484][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 43.946096][ T29] audit: type=1400 audit(1725594802.759:101): avc: denied { read write } for pid=356 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 43.969524][ T29] audit: type=1400 audit(1725594802.759:102): avc: denied { open } for pid=356 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 43.993307][ T29] audit: type=1400 audit(1725594802.759:103): avc: denied { mounton } for pid=356 comm="syz-executor.0" path="/root/syzkaller-testdir410869280/syzkaller.ByfBVW/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 44.020398][ T357] BUG: kernel NULL pointer dereference, address: 0000000000000010 [ 44.028186][ T357] #PF: supervisor read access in kernel mode [ 44.034130][ T357] #PF: error_code(0x0000) - not-present page [ 44.040123][ T357] PGD 10dbec067 P4D 10dbec067 PUD 10e0a0067 PMD 0 [ 44.046562][ T357] Oops: 0000 [#1] PREEMPT SMP [ 44.051065][ T357] CPU: 1 PID: 357 Comm: syz-executor.0 Not tainted 5.15.157-syzkaller #0 [ 44.059309][ T357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 44.069392][ T357] RIP: 0010:step_into+0x1ba/0x790 [ 44.074237][ T357] Code: 89 54 24 0c e8 f7 d8 ff ff 44 8b 54 24 0c 84 c0 0f 84 c2 01 00 00 48 8b 03 4c 89 64 24 20 45 89 e9 44 8b 43 38 48 89 44 24 18 <41> 8b 34 24 f7 c6 00 00 07 00 0f 85 aa 01 00 00 81 e6 00 00 70 00 [ 44.094482][ T357] RSP: 0018:ffffc900003e3c38 EFLAGS: 00010246 [ 44.100553][ T357] RAX: ffff888101195ca0 RBX: ffffc900003e3d90 RCX: 0000000000000000 [ 44.108675][ T357] RDX: 0000000000000010 RSI: 0000000000000002 RDI: ffffc900003e3d90 [ 44.116566][ T357] RBP: ffffc900003e3c90 R08: 0000000000000011 R09: 00000000ffffffff [ 44.124379][ T357] R10: 0000000000000002 R11: 0000000000000001 R12: 0000000000000010 [ 44.132476][ T357] R13: 0000000000000002 R14: ffffc900003e3ce8 R15: ffff888100424000 [ 44.140300][ T357] FS: 00007f9e3e5916c0(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 44.149484][ T357] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 44.155888][ T357] CR2: 0000000000000010 CR3: 00000001085d9000 CR4: 00000000003506a0 [ 44.163707][ T357] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 44.171684][ T357] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 44.179484][ T357] Call Trace: [ 44.182615][ T357] [ 44.185388][ T357] ? show_regs.part.0+0x1e/0x20 [ 44.190086][ T357] ? __die+0x5d/0x9e [ 44.193867][ T357] ? page_fault_oops+0x12d/0x280 [ 44.198883][ T357] ? do_user_addr_fault+0x44b/0x730 [ 44.203937][ T357] ? preempt_count_add+0x77/0xa0 [ 44.208861][ T357] ? exc_page_fault+0x67/0x160 [ 44.213463][ T357] ? asm_exc_page_fault+0x27/0x30 [ 44.218321][ T357] ? step_into+0x1ba/0x790 [ 44.222573][ T357] ? __lookup_slow+0x11c/0x150 [ 44.227170][ T357] walk_component+0x6b/0x1b0 [ 44.231599][ T357] link_path_walk.part.0+0x236/0x390 [ 44.236718][ T357] ? futex_wake+0x194/0x300 [ 44.241072][ T357] ? path_init+0x52/0x3e0 [ 44.245244][ T357] path_lookupat+0x39/0x1b0 [ 44.249566][ T357] filename_lookup+0xc6/0x1d0 [ 44.254092][ T357] ? strncpy_from_user+0x63/0x160 [ 44.259067][ T357] ? getname_flags.part.0+0x47/0x1a0 [ 44.264181][ T357] user_path_at_empty+0x3a/0x60 [ 44.268874][ T357] __x64_sys_mount+0xae/0x140 [ 44.273376][ T357] x64_sys_call+0x50d/0x990 [ 44.277736][ T357] do_syscall_64+0x33/0xb0 [ 44.281970][ T357] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 44.287801][ T357] RIP: 0033:0x7f9e3ea0fda9 [ 44.292063][ T357] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 44.311577][ T357] RSP: 002b:00007f9e3e5910c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 44.320025][ T357] RAX: ffffffffffffffda RBX: 00007f9e3eb3df80 RCX: 00007f9e3ea0fda9 [ 44.327997][ T357] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000000 [ 44.335906][ T357] RBP: 00007f9e3ea5c47a R08: 0000000000000000 R09: 0000000000000000 [ 44.343824][ T357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 44.351624][ T357] R13: 000000000000000b R14: 00007f9e3eb3df80 R15: 00007ffd2d221a28 [ 44.359526][ T357] [ 44.362475][ T357] Modules linked in: [ 44.366206][ T357] CR2: 0000000000000010 [ 44.370284][ T357] ---[ end trace d6f5db43106527d5 ]--- [ 44.375677][ T357] RIP: 0010:step_into+0x1ba/0x790 [ 44.381025][ T357] Code: 89 54 24 0c e8 f7 d8 ff ff 44 8b 54 24 0c 84 c0 0f 84 c2 01 00 00 48 8b 03 4c 89 64 24 20 45 89 e9 44 8b 43 38 48 89 44 24 18 <41> 8b 34 24 f7 c6 00 00 07 00 0f 85 aa 01 00 00 81 e6 00 00 70 00 [ 44.400563][ T357] RSP: 0018:ffffc900003e3c38 EFLAGS: 00010246 [ 44.406753][ T357] RAX: ffff888101195ca0 RBX: ffffc900003e3d90 RCX: 0000000000000000 [ 44.414552][ T357] RDX: 0000000000000010 RSI: 0000000000000002 RDI: ffffc900003e3d90 [ 44.422555][ T357] RBP: ffffc900003e3c90 R08: 0000000000000011 R09: 00000000ffffffff [ 44.430539][ T357] R10: 0000000000000002 R11: 0000000000000001 R12: 0000000000000010 [ 44.438335][ T357] R13: 0000000000000002 R14: ffffc900003e3ce8 R15: ffff888100424000 [ 44.447179][ T357] FS: 00007f9e3e5916c0(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 44.457042][ T357] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 44.463783][ T357] CR2: 0000000000000010 CR3: 00000001085d9000 CR4: 00000000003506a0 [ 44.471962][ T357] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 44.479908][ T357] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 44.487796][ T357] Kernel panic - not syncing: Fatal exception [ 44.494122][ T357] Kernel Offset: disabled [ 44.498415][ T357] Rebooting in 86400 seconds..