Warning: Permanently added '10.128.10.50' (ED25519) to the list of known hosts. 2023/07/28 16:26:42 ignoring optional flag "sandboxArg"="0" 2023/07/28 16:26:43 parsed 1 programs 2023/07/28 16:26:43 executed programs: 0 [ 41.313235][ T27] audit: type=1400 audit(1690561603.072:152): avc: denied { mounton } for pid=341 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 41.339977][ T27] audit: type=1400 audit(1690561603.072:153): avc: denied { mount } for pid=341 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 41.366389][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.374265][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.381488][ T345] device bridge_slave_0 entered promiscuous mode [ 41.388604][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.396528][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.405294][ T345] device bridge_slave_1 entered promiscuous mode [ 41.418022][ T27] audit: type=1400 audit(1690561603.172:154): avc: denied { write } for pid=345 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.419361][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.441953][ T27] audit: type=1400 audit(1690561603.172:155): avc: denied { read } for pid=345 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.449159][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.481939][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.490554][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.500656][ T56] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.508718][ T56] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.516826][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.525166][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.534771][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.544901][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.551972][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.562512][ T345] device veth0_vlan entered promiscuous mode [ 41.570434][ T345] device veth1_macvtap entered promiscuous mode [ 41.578257][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.586994][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.595323][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.603516][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.610528][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.618615][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.626700][ T56] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.634105][ T56] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.641162][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.649027][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.658532][ T27] audit: type=1400 audit(1690561603.412:156): avc: denied { mounton } for pid=345 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=207 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 41.683527][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.688249][ T353] loop0: detected capacity change from 0 to 128 [ 41.691684][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.697715][ T27] audit: type=1400 audit(1690561603.452:157): avc: denied { mounton } for pid=352 comm="syz-executor.0" path="/root/syzkaller-testdir2304073584/syzkaller.4tWAz5/0/mnt" dev="sda1" ino=1937 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 41.732668][ T353] EXT4-fs: Ignoring removed bh option [ 41.738006][ T353] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 41.749702][ T353] EXT4-fs (loop0): Test dummy encryption mode enabled [ 41.758920][ T353] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 41.768092][ T353] ext4 filesystem being mounted at /root/syzkaller-testdir2304073584/syzkaller.4tWAz5/0/mnt supports timestamps until 2038 (0x7fffffff) [ 41.768128][ T27] audit: type=1400 audit(1690561603.522:158): avc: denied { mount } for pid=352 comm="syz-executor.0" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 41.790679][ T353] fscrypt: AES-256-XTS using implementation "xts-aes-aesni" [ 41.805815][ T27] audit: type=1400 audit(1690561603.542:159): avc: denied { write } for pid=352 comm="syz-executor.0" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 41.814812][ T353] ------------[ cut here ]------------ [ 41.836249][ T27] audit: type=1400 audit(1690561603.542:160): avc: denied { add_name } for pid=352 comm="syz-executor.0" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 41.841745][ T353] kernel BUG at fs/buffer.c:2717! [ 41.841909][ T353] invalid opcode: 0000 [#1] PREEMPT SMP [ 41.862897][ T27] audit: type=1400 audit(1690561603.542:161): avc: denied { create } for pid=352 comm="syz-executor.0" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 41.867678][ T353] CPU: 0 PID: 353 Comm: syz-executor.0 Not tainted 6.1.25-syzkaller #0 [ 41.901952][ T353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 41.912745][ T353] RIP: 0010:submit_bh_wbc+0x13d/0x150 [ 41.918496][ T353] Code: 72 26 00 48 8b 73 10 48 8b 53 20 4c 89 f7 e8 ba d6 fe ff 4c 89 ff e8 82 7c 24 00 5b 41 5e 41 5f 5d c3 0f 0b 0f 0b 0f 0b 0f 0b <0f> 0b 0f 0b 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 55 48 89 [ 41.939466][ T353] RSP: 0018:ffffc9000077f888 EFLAGS: 00010206 [ 41.945592][ T353] RAX: ffffffff81439db0 RBX: ffff88810da94340 RCX: 0000000000000002 [ 41.953618][ T353] RDX: 0000000000000000 RSI: ffff88810da94340 RDI: 0000000000000000 [ 41.962031][ T353] RBP: ffffc9000077f8a0 R08: 00000003fffffffc R09: 0000000000000402 [ 41.970274][ T353] R10: 0000000000000008 R11: 0000000000001097 R12: 0000000000000000 [ 41.978449][ T353] R13: ffffea0004546000 R14: 0000000000000000 R15: 0000000000000001 [ 41.986461][ T353] FS: 00007fd6d1b0c6c0(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 41.995609][ T353] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 42.002130][ T353] CR2: 000000002000a000 CR3: 0000000112bf4000 CR4: 00000000003506b0 [ 42.010099][ T353] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 42.018257][ T353] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 42.026359][ T353] Call Trace: [ 42.029456][ T353] [ 42.032334][ T353] submit_bh+0xb/0x10 [ 42.036221][ T353] ext4_read_bh+0x5b/0x80 [ 42.040743][ T353] ext4_read_bh_lock+0x34/0x90 [ 42.045423][ T353] ext4_block_zero_page_range+0x19c/0x360 [ 42.051150][ T353] ext4_truncate+0x263/0x440 [ 42.055789][ T353] ext4_write_begin+0x479/0x610 [ 42.060659][ T353] ext4_da_write_begin+0x21d/0x2c0 [ 42.065707][ T353] generic_perform_write+0x95/0x1f0 [ 42.070769][ T353] ext4_buffered_write_iter+0xf7/0x190 [ 42.076233][ T353] ext4_file_write_iter+0x2c2/0x7e0 [ 42.081264][ T353] ? selinux_file_permission+0xcc/0x180 [ 42.086829][ T353] do_iter_write+0x1cd/0x2d0 [ 42.091634][ T353] vfs_iter_write+0x14/0x20 [ 42.096942][ T353] iter_file_splice_write+0x279/0x420 [ 42.102134][ T353] direct_splice_actor+0x29/0x40 [ 42.107096][ T353] splice_direct_to_actor+0x143/0x2b0 [ 42.112409][ T353] ? do_splice_direct+0xc0/0xc0 [ 42.117513][ T353] do_splice_direct+0x7f/0xc0 [ 42.122121][ T353] do_sendfile+0x262/0x400 [ 42.126585][ T353] __x64_sys_sendfile64+0x93/0xc0 [ 42.131755][ T353] do_syscall_64+0x3d/0xb0 [ 42.136621][ T353] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 42.142608][ T353] RIP: 0033:0x7fd6d0e7c919 [ 42.147217][ T353] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 42.168324][ T353] RSP: 002b:00007fd6d1b0c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 42.176727][ T353] RAX: ffffffffffffffda RBX: 00007fd6d0f9bf80 RCX: 00007fd6d0e7c919 [ 42.185621][ T353] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 42.194193][ T353] RBP: 00007fd6d0ed8c94 R08: 0000000000000000 R09: 0000000000000000 [ 42.202091][ T353] R10: 0001000000201005 R11: 0000000000000246 R12: 0000000000000000 [ 42.210231][ T353] R13: 000000000000000b R14: 00007fd6d0f9bf80 R15: 00007ffe7a67e068 [ 42.218857][ T353] [ 42.221975][ T353] Modules linked in: [ 42.226167][ T353] ---[ end trace 0000000000000000 ]--- [ 42.231879][ T353] RIP: 0010:submit_bh_wbc+0x13d/0x150 [ 42.238147][ T353] Code: 72 26 00 48 8b 73 10 48 8b 53 20 4c 89 f7 e8 ba d6 fe ff 4c 89 ff e8 82 7c 24 00 5b 41 5e 41 5f 5d c3 0f 0b 0f 0b 0f 0b 0f 0b <0f> 0b 0f 0b 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 55 48 89 [ 42.260703][ T353] RSP: 0018:ffffc9000077f888 EFLAGS: 00010206 [ 42.267723][ T353] RAX: ffffffff81439db0 RBX: ffff88810da94340 RCX: 0000000000000002 [ 42.277414][ T353] RDX: 0000000000000000 RSI: ffff88810da94340 RDI: 0000000000000000 [ 42.286230][ T353] RBP: ffffc9000077f8a0 R08: 00000003fffffffc R09: 0000000000000402 [ 42.294910][ T353] R10: 0000000000000008 R11: 0000000000001097 R12: 0000000000000000 [ 42.303527][ T353] R13: ffffea0004546000 R14: 0000000000000000 R15: 0000000000000001 [ 42.311445][ T353] FS: 00007fd6d1b0c6c0(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 42.321952][ T353] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 42.329568][ T353] CR2: 000000002000a000 CR3: 0000000112bf4000 CR4: 00000000003506b0 [ 42.338872][ T353] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 42.348030][ T353] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 42.357044][ T353] Kernel panic - not syncing: Fatal exception [ 42.363575][ T353] Kernel Offset: disabled [ 42.367689][ T353] Rebooting in 86400 seconds..