Warning: Permanently added '10.128.0.119' (ED25519) to the list of known hosts. 2024/12/21 08:20:01 ignoring optional flag "sandboxArg"="0" 2024/12/21 08:20:01 ignoring optional flag "type"="gce" 2024/12/21 08:20:01 parsed 1 programs [ 46.947571][ T27] kauditd_printk_skb: 19 callbacks suppressed [ 46.947575][ T27] audit: type=1400 audit(1734769201.829:95): avc: denied { unlink } for pid=349 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/12/21 08:20:01 executed programs: 0 [ 47.003364][ T349] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.022497][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.029372][ T355] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.036512][ T355] device bridge_slave_0 entered promiscuous mode [ 47.042697][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.049570][ T355] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.056440][ T355] device bridge_slave_1 entered promiscuous mode [ 47.069597][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.076417][ T355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.083484][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.090313][ T355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.099663][ T53] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.106625][ T53] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.113628][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.120783][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.128297][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.136112][ T53] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.142938][ T53] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.150317][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.158149][ T53] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.164944][ T53] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.173126][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.181019][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.189639][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.198132][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.205629][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.212708][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.219896][ T355] device veth0_vlan entered promiscuous mode [ 47.226274][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.234384][ T355] device veth1_macvtap entered promiscuous mode [ 47.241028][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.249534][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.259520][ T27] audit: type=1400 audit(1734769202.139:96): avc: denied { mounton } for pid=355 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=207 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 47.285667][ T362] BUG: kernel NULL pointer dereference, address: 0000000000000030 [ 47.293393][ T362] #PF: supervisor read access in kernel mode [ 47.299197][ T362] #PF: error_code(0x0000) - not-present page [ 47.305015][ T362] PGD 11272f067 P4D 11272f067 PUD 11269c067 PMD 0 [ 47.311351][ T362] Oops: 0000 [#1] PREEMPT SMP [ 47.315864][ T362] CPU: 0 PID: 362 Comm: syz-executor.0 Not tainted 6.1.118-syzkaller #0 [ 47.324108][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 47.334023][ T362] RIP: 0010:security_inode_getattr+0xd/0x50 [ 47.339820][ T362] Code: ff 53 18 85 c0 74 eb 41 89 c6 44 89 f0 5b 41 5c 41 5e 41 5f 5d c3 0f 1f 80 00 00 00 00 55 48 89 e5 41 57 41 56 53 48 8b 47 08 <48> 8b 40 30 45 31 f6 f6 40 0d 02 75 1f 49 89 ff 48 c7 c3 28 f9 d5 [ 47.359520][ T362] RSP: 0018:ffffc900007bb7e8 EFLAGS: 00010246 [ 47.365441][ T362] RAX: 0000000000000000 RBX: ffffc900007bb8d0 RCX: 0000000000000000 [ 47.373231][ T362] RDX: 00000000000007ff RSI: ffffc900007bb8e0 RDI: ffffc900007bb8d0 [ 47.381044][ T362] RBP: ffffc900007bb800 R08: 0000000000040006 R09: ffffc900007bb8d0 [ 47.388873][ T362] R10: 0000000000000000 R11: ffff88810ba0fcf0 R12: ffffc900007bb8e0 [ 47.396667][ T362] R13: 00000000ffffffe6 R14: 0000000000000000 R15: 00000000000007ff [ 47.404479][ T362] FS: 00007faa63ff56c0(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 47.413284][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 47.419666][ T362] CR2: 0000000000000030 CR3: 000000010e9b8000 CR4: 00000000003506b0 [ 47.427575][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 47.435375][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 47.443189][ T362] Call Trace: [ 47.446311][ T362] [ 47.449088][ T362] ? __die_body+0x62/0xb0 [ 47.453254][ T362] ? __die+0x7e/0x90 [ 47.456989][ T362] ? page_fault_oops+0x369/0x3d0 [ 47.461854][ T362] ? exc_page_fault+0x4ce/0x630 [ 47.466537][ T362] ? asm_exc_page_fault+0x27/0x30 [ 47.471677][ T362] ? security_inode_getattr+0xd/0x50 [ 47.476777][ T362] vfs_getattr+0x1e/0xc0 [ 47.480855][ T362] ovl_copy_up_flags+0x1be/0x13c0 [ 47.485722][ T362] ? preempt_count_add+0x54/0x90 [ 47.490489][ T362] ? __mnt_want_write+0x6e/0x90 [ 47.495176][ T362] ? mnt_want_write+0x81/0x130 [ 47.499963][ T362] ? ovl_mmap+0x120/0x120 [ 47.504126][ T362] ovl_maybe_copy_up+0x89/0xa0 [ 47.508813][ T362] ovl_open+0x43/0xb0 [ 47.512629][ T362] do_dentry_open+0x253/0x3d0 [ 47.517232][ T362] dentry_open+0x46/0x70 [ 47.521312][ T362] file_open+0xc4/0x220 [ 47.525304][ T362] ? incfs_file_mmap+0x40/0x40 [ 47.530093][ T362] do_dentry_open+0x253/0x3d0 [ 47.534608][ T362] vfs_open+0x28/0x30 [ 47.538436][ T362] path_openat+0x9e0/0xb60 [ 47.542680][ T362] ? schedule+0x54/0xc0 [ 47.546669][ T362] do_filp_open+0xad/0x150 [ 47.550941][ T362] do_sys_openat2+0x83/0x250 [ 47.555351][ T362] ? fpregs_restore_userregs+0x5b/0xc0 [ 47.561162][ T362] __x64_sys_openat+0x79/0xa0 [ 47.565676][ T362] x64_sys_call+0x6bf/0x9a0 [ 47.570029][ T362] do_syscall_64+0x3b/0xb0 [ 47.574268][ T362] ? clear_bhb_loop+0x55/0xb0 [ 47.578787][ T362] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 47.584512][ T362] RIP: 0033:0x7faa6327dda9 [ 47.588854][ T362] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 47.608557][ T362] RSP: 002b:00007faa63ff50c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 47.616797][ T362] RAX: ffffffffffffffda RBX: 00007faa633abf80 RCX: 00007faa6327dda9 [ 47.624696][ T362] RDX: 0000000000000002 RSI: 0000000020000080 RDI: 0000000000000004 [ 47.632550][ T362] RBP: 00007faa632ca47a R08: 0000000000000000 R09: 0000000000000000 [ 47.640345][ T362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 47.648153][ T362] R13: 000000000000000b R14: 00007faa633abf80 R15: 00007ffcb4083808 [ 47.655945][ T362] [ 47.658828][ T362] Modules linked in: [ 47.662565][ T362] CR2: 0000000000000030 [ 47.666530][ T362] ---[ end trace 0000000000000000 ]--- [ 47.671909][ T362] RIP: 0010:security_inode_getattr+0xd/0x50 [ 47.677647][ T362] Code: ff 53 18 85 c0 74 eb 41 89 c6 44 89 f0 5b 41 5c 41 5e 41 5f 5d c3 0f 1f 80 00 00 00 00 55 48 89 e5 41 57 41 56 53 48 8b 47 08 <48> 8b 40 30 45 31 f6 f6 40 0d 02 75 1f 49 89 ff 48 c7 c3 28 f9 d5 [ 47.697080][ T362] RSP: 0018:ffffc900007bb7e8 EFLAGS: 00010246 [ 47.702986][ T362] RAX: 0000000000000000 RBX: ffffc900007bb8d0 RCX: 0000000000000000 [ 47.710795][ T362] RDX: 00000000000007ff RSI: ffffc900007bb8e0 RDI: ffffc900007bb8d0 [ 47.718606][ T362] RBP: ffffc900007bb800 R08: 0000000000040006 R09: ffffc900007bb8d0 [ 47.726429][ T362] R10: 0000000000000000 R11: ffff88810ba0fcf0 R12: ffffc900007bb8e0 [ 47.734231][ T362] R13: 00000000ffffffe6 R14: 0000000000000000 R15: 00000000000007ff [ 47.737417][ T27] audit: type=1400 audit(1734769202.169:97): avc: denied { mounton } for pid=360 comm="syz-executor.0" path="/root/syzkaller-testdir2194472890/syzkaller.GPjvMq/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 47.742388][ T362] FS: 00007faa63ff56c0(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 47.742394][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 47.742397][ T362] CR2: 0000000000000030 CR3: 000000010e9b8000 CR4: 00000000003506b0 [ 47.742402][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 47.742404][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 47.742408][ T362] Kernel panic - not syncing: Fatal exception [ 47.769091][ T362] Kernel Offset: disabled [ 47.817822][ T362] Rebooting in 86400 seconds..