Warning: Permanently added '10.128.1.35' (ED25519) to the list of known hosts. 2024/11/30 20:22:35 ignoring optional flag "sandboxArg"="0" 2024/11/30 20:22:35 ignoring optional flag "type"="gce" 2024/11/30 20:22:36 parsed 1 programs [ 47.545154][ T24] kauditd_printk_skb: 18 callbacks suppressed [ 47.545167][ T24] audit: type=1400 audit(1732998156.020:94): avc: denied { mount } for pid=343 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 47.574616][ T24] audit: type=1400 audit(1732998156.050:95): avc: denied { unlink } for pid=343 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/11/30 20:22:36 executed programs: 0 [ 47.630721][ T343] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.683244][ T349] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.690174][ T349] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.697615][ T349] device bridge_slave_0 entered promiscuous mode [ 47.704457][ T349] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.711282][ T349] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.718573][ T349] device bridge_slave_1 entered promiscuous mode [ 47.753362][ T349] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.760290][ T349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.767439][ T349] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.774391][ T349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.791828][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.798997][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.806208][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.814058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.822743][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.830721][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.837696][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.848598][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.856686][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.863624][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.873795][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.883048][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.896625][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.907578][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.915634][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.923030][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.931427][ T349] device veth0_vlan entered promiscuous mode [ 47.941293][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.950210][ T349] device veth1_macvtap entered promiscuous mode [ 47.959353][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.969712][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.983636][ T24] audit: type=1400 audit(1732998156.460:96): avc: denied { mounton } for pid=349 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 48.011385][ T24] audit: type=1400 audit(1732998156.490:97): avc: denied { read write } for pid=354 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 48.035064][ T24] audit: type=1400 audit(1732998156.490:98): avc: denied { open } for pid=354 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 48.058514][ T24] audit: type=1400 audit(1732998156.490:99): avc: denied { mounton } for pid=354 comm="syz-executor.0" path="/root/syzkaller-testdir1153363869/syzkaller.1ralbY/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 48.110472][ T357] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 48.122003][ T357] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 48.130334][ T357] CPU: 0 PID: 357 Comm: syz-executor.0 Not tainted 5.10.226-syzkaller-1003632-g139a6bb26d9d #0 [ 48.140498][ T357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 48.150423][ T357] RIP: 0010:path_openat+0x17ab/0x3000 [ 48.155598][ T357] Code: b6 04 30 84 c0 0f 85 d9 07 00 00 48 8b 44 24 30 80 60 01 f8 e9 69 ee ff ff e8 a1 dc b6 ff 4c 8b 64 24 20 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 0f 85 8f 07 00 00 41 8b 1f be 00 00 70 00 21 [ 48.175110][ T357] RSP: 0018:ffffc90000f17940 EFLAGS: 00010202 [ 48.181360][ T357] RAX: 0000000000000001 RBX: ffff88810fbc0018 RCX: ffff88810e1d13c0 [ 48.189170][ T357] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000000 [ 48.197076][ T357] RBP: ffffc90000f17b70 R08: ffffffff81b69a88 R09: ffffed10219c9f60 [ 48.204885][ T357] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88810ce4fad0 [ 48.212691][ T357] R13: 0000000000028200 R14: dffffc0000000000 R15: 0000000000000008 [ 48.220507][ T357] FS: 00007f111beee6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 48.229358][ T357] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.235780][ T357] CR2: 00007f111beedfa8 CR3: 000000010f71f000 CR4: 00000000003506b0 [ 48.243586][ T357] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 48.251498][ T357] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 48.259313][ T357] Call Trace: [ 48.262445][ T357] ? __die_body+0x62/0xb0 [ 48.266817][ T357] ? die_addr+0x9f/0xd0 [ 48.270802][ T357] ? exc_general_protection+0x3ff/0x490 [ 48.276293][ T357] ? asm_exc_general_protection+0x1e/0x30 [ 48.281950][ T357] ? fast_dput+0x78/0x2a0 [ 48.286189][ T357] ? path_openat+0x17ab/0x3000 [ 48.290791][ T357] ? do_filp_open+0x460/0x460 [ 48.295418][ T357] do_filp_open+0x21c/0x460 [ 48.299747][ T357] ? vfs_tmpfile+0x2b0/0x2b0 [ 48.304277][ T357] ? get_unused_fd_flags+0x94/0xa0 [ 48.309436][ T357] do_sys_openat2+0x13f/0x710 [ 48.314043][ T357] ? do_sys_open+0x220/0x220 [ 48.318574][ T357] __x64_sys_openat+0x243/0x290 [ 48.323252][ T357] ? __ia32_sys_open+0x270/0x270 [ 48.328024][ T357] ? __kasan_check_read+0x11/0x20 [ 48.332889][ T357] do_syscall_64+0x34/0x70 [ 48.337559][ T357] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 48.343310][ T357] RIP: 0033:0x7f111c38dda9 [ 48.347619][ T357] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 48.367580][ T357] RSP: 002b:00007f111beee0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 48.375991][ T357] RAX: ffffffffffffffda RBX: 00007f111c4bc050 RCX: 00007f111c38dda9 [ 48.383800][ T357] RDX: 0000000000020200 RSI: 0000000020000080 RDI: 0000000000000004 [ 48.391722][ T357] RBP: 00007f111c3da47a R08: 0000000000000000 R09: 0000000000000000 [ 48.399753][ T357] R10: 0000000000000010 R11: 0000000000000246 R12: 0000000000000000 [ 48.407556][ T357] R13: 000000000000006e R14: 00007f111c4bc050 R15: 00007ffc82b7db98 [ 48.415492][ T357] Modules linked in: [ 48.420521][ T357] ---[ end trace 277dd1a6f2f9fe53 ]--- [ 48.425860][ T357] RIP: 0010:path_openat+0x17ab/0x3000 [ 48.431094][ T357] Code: b6 04 30 84 c0 0f 85 d9 07 00 00 48 8b 44 24 30 80 60 01 f8 e9 69 ee ff ff e8 a1 dc b6 ff 4c 8b 64 24 20 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 0f 85 8f 07 00 00 41 8b 1f be 00 00 70 00 21 [ 48.451166][ T357] RSP: 0018:ffffc90000f17940 EFLAGS: 00010202 [ 48.457219][ T357] RAX: 0000000000000001 RBX: ffff88810fbc0018 RCX: ffff88810e1d13c0 [ 48.465130][ T357] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000000 [ 48.473055][ T357] RBP: ffffc90000f17b70 R08: ffffffff81b69a88 R09: ffffed10219c9f60 [ 48.480896][ T357] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88810ce4fad0 [ 48.489046][ T357] R13: 0000000000028200 R14: dffffc0000000000 R15: 0000000000000008 [ 48.497055][ T357] FS: 00007f111beee6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 48.505809][ T357] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.512400][ T357] CR2: 00007f111beedfa8 CR3: 000000010f71f000 CR4: 00000000003506b0 [ 48.520462][ T357] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 48.528564][ T357] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 48.529012][ T24] audit: type=1400 audit(1732998157.010:100): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 48.536658][ T357] Kernel panic - not syncing: Fatal exception [ 48.564426][ T357] Kernel Offset: disabled [ 48.568555][ T357] Rebooting in 86400 seconds..