Warning: Permanently added '10.128.1.16' (ED25519) to the list of known hosts. 2024/06/09 09:44:46 ignoring optional flag "sandboxArg"="0" 2024/06/09 09:44:47 parsed 1 programs [ 37.301294][ T24] kauditd_printk_skb: 18 callbacks suppressed [ 37.301308][ T24] audit: type=1400 audit(1717926287.100:94): avc: denied { mount } for pid=336 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 37.330747][ T24] audit: type=1400 audit(1717926287.130:95): avc: denied { unlink } for pid=336 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/06/09 09:44:47 executed programs: 0 [ 37.374287][ T336] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 37.427473][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.434600][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.441845][ T342] device bridge_slave_0 entered promiscuous mode [ 37.448802][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.455732][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.462827][ T342] device bridge_slave_1 entered promiscuous mode [ 37.498720][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.505830][ T342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.513232][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.520400][ T342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.537300][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.544659][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.551806][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.560403][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.569045][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.577118][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.584076][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.592180][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.600531][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.607419][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.624861][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.633138][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.641803][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.652389][ T342] device veth0_vlan entered promiscuous mode [ 37.658595][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.666712][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.674231][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.685307][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.694317][ T342] device veth1_macvtap entered promiscuous mode [ 37.704246][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.712440][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.727395][ T24] audit: type=1400 audit(1717926287.530:96): avc: denied { mounton } for pid=342 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 37.754149][ T24] audit: type=1400 audit(1717926287.550:97): avc: denied { read write } for pid=347 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 37.777940][ T24] audit: type=1400 audit(1717926287.550:98): avc: denied { open } for pid=347 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 37.801866][ T24] audit: type=1400 audit(1717926287.550:99): avc: denied { mounton } for pid=347 comm="syz-executor.0" path="/root/syzkaller-testdir3936124145/syzkaller.4npcdW/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 37.854082][ T351] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 37.865749][ T351] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 37.874080][ T351] CPU: 0 PID: 351 Comm: syz-executor.0 Not tainted 5.10.214-syzkaller-1002110-gd3c4d815bf09 #0 [ 37.884309][ T351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 37.894531][ T351] RIP: 0010:filename_create+0x225/0x750 [ 37.900137][ T351] Code: 89 e2 e8 9e 97 ff ff 49 89 c4 48 3d 01 f0 ff ff 72 07 e8 6e c7 b6 ff eb 5f 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 0f 85 70 04 00 00 4c 89 64 24 30 45 8b 24 24 bb [ 37.920408][ T351] RSP: 0018:ffffc90000f37d20 EFLAGS: 00010202 [ 37.926399][ T351] RAX: 0000000000000001 RBX: ffff8881092287a0 RCX: dffffc0000000000 [ 37.934322][ T351] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000000 [ 37.942412][ T351] RBP: ffffc90000f37e10 R08: ffffffff81b67cc8 R09: ffffed10212450fa [ 37.950320][ T351] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000008 [ 37.958121][ T351] R13: 1ffff920001e6fd1 R14: ffffc90000f37e88 R15: 1ffff920001e6fd0 [ 37.966104][ T351] FS: 00007fae533a26c0(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 [ 37.974951][ T351] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 37.981378][ T351] CR2: 0000000020006fe0 CR3: 000000010b8c3000 CR4: 00000000003506b0 [ 37.989277][ T351] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 37.997089][ T351] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 38.004890][ T351] Call Trace: [ 38.008029][ T351] ? __die_body+0x62/0xb0 [ 38.012269][ T351] ? die_addr+0x9f/0xd0 [ 38.016268][ T351] ? exc_general_protection+0x3ff/0x490 [ 38.021780][ T351] ? asm_exc_general_protection+0x1e/0x30 [ 38.027299][ T351] ? fast_dput+0x78/0x2a0 [ 38.031466][ T351] ? filename_create+0x225/0x750 [ 38.036357][ T351] ? __check_object_size+0x2e6/0x3c0 [ 38.041439][ T351] ? kern_path_create+0x40/0x40 [ 38.046218][ T351] do_mkdirat+0xcc/0x2c0 [ 38.050411][ T351] ? switch_fpu_return+0x1e4/0x3c0 [ 38.055361][ T351] ? do_mknodat+0x450/0x450 [ 38.059772][ T351] ? fpu__clear_all+0x20/0x20 [ 38.064459][ T351] ? __kasan_check_read+0x11/0x20 [ 38.069320][ T351] __x64_sys_mkdirat+0x7b/0x90 [ 38.073936][ T351] do_syscall_64+0x34/0x70 [ 38.078359][ T351] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 38.084424][ T351] RIP: 0033:0x7fae53841da9 [ 38.088866][ T351] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 38.108392][ T351] RSP: 002b:00007fae533a20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 38.116952][ T351] RAX: ffffffffffffffda RBX: 00007fae53970050 RCX: 00007fae53841da9 [ 38.124969][ T351] RDX: 0000000000000100 RSI: 0000000020000000 RDI: 0000000000000004 [ 38.132836][ T351] RBP: 00007fae5388e47a R08: 0000000000000000 R09: 0000000000000000 [ 38.140659][ T351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 38.148455][ T351] R13: 000000000000006e R14: 00007fae53970050 R15: 00007ffc8c745d68 [ 38.156433][ T351] Modules linked in: [ 38.160982][ T351] ---[ end trace 3f756d64795e3ccc ]--- [ 38.166613][ T351] RIP: 0010:filename_create+0x225/0x750 [ 38.171918][ T351] Code: 89 e2 e8 9e 97 ff ff 49 89 c4 48 3d 01 f0 ff ff 72 07 e8 6e c7 b6 ff eb 5f 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 0f 85 70 04 00 00 4c 89 64 24 30 45 8b 24 24 bb [ 38.192008][ T351] RSP: 0018:ffffc90000f37d20 EFLAGS: 00010202 [ 38.195130][ T24] audit: type=1400 audit(1717926288.000:100): avc: denied { read } for pid=75 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 38.198408][ T351] RAX: 0000000000000001 RBX: ffff8881092287a0 RCX: dffffc0000000000 [ 38.228150][ T351] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000000 [ 38.236245][ T351] RBP: ffffc90000f37e10 R08: ffffffff81b67cc8 R09: ffffed10212450fa [ 38.244249][ T351] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000008 [ 38.252103][ T351] R13: 1ffff920001e6fd1 R14: ffffc90000f37e88 R15: 1ffff920001e6fd0 [ 38.260174][ T351] FS: 00007fae533a26c0(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000 [ 38.269148][ T351] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 38.275741][ T351] CR2: 000055d1e6831048 CR3: 000000010b8c3000 CR4: 00000000003506a0 [ 38.283621][ T351] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 38.291455][ T351] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 38.299409][ T351] Kernel panic - not syncing: Fatal exception [ 38.305587][ T351] Kernel Offset: disabled [ 38.309721][ T351] Rebooting in 86400 seconds..