[ 21.379252][ T291] syz-executor.0 (291) used greatest stack depth: 19416 bytes left [ 21.899206][ T7] device bridge_slave_1 left promiscuous mode [ 21.905535][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.913217][ T7] device bridge_slave_0 left promiscuous mode [ 21.919557][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.140559][ T22] kauditd_printk_skb: 67 callbacks suppressed [ 32.140565][ T22] audit: type=1400 audit(1682507355.349:158): avc: denied { append } for pid=138 comm="syslogd" name="messages" dev="tmpfs" ino=10041 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 32.169927][ T22] audit: type=1400 audit(1682507355.349:159): avc: denied { open } for pid=138 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10041 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 32.193456][ T22] audit: type=1400 audit(1682507355.349:160): avc: denied { getattr } for pid=138 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10041 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 33.597868][ T22] audit: type=1400 audit(1682507356.799:161): avc: denied { write } for pid=306 comm="sh" path="pipe:[10676]" dev="pipefs" ino=10676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.0.142' (ECDSA) to the list of known hosts. 2023/04/26 11:09:22 ignoring optional flag "sandboxArg"="0" 2023/04/26 11:09:22 parsed 1 programs 2023/04/26 11:09:22 executed programs: 0 [ 39.431850][ T22] audit: type=1400 audit(1682507362.639:162): avc: denied { getattr } for pid=312 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 39.459277][ T22] audit: type=1400 audit(1682507362.639:163): avc: denied { read } for pid=312 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 39.482237][ T22] audit: type=1400 audit(1682507362.639:164): avc: denied { open } for pid=312 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 39.506317][ T22] audit: type=1400 audit(1682507362.649:165): avc: denied { mounton } for pid=317 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 39.518399][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.532108][ T22] audit: type=1400 audit(1682507362.649:166): avc: denied { mount } for pid=317 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 39.539371][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.570240][ T321] device bridge_slave_0 entered promiscuous mode [ 39.577086][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.584231][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.591650][ T321] device bridge_slave_1 entered promiscuous mode [ 39.625123][ T22] audit: type=1400 audit(1682507362.829:167): avc: denied { write } for pid=321 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.631044][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.646667][ T22] audit: type=1400 audit(1682507362.829:168): avc: denied { read } for pid=321 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.653893][ T321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.653991][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.689566][ T321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.709747][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.717878][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.725830][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.733972][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.750260][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.758946][ T297] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.766140][ T297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.773880][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.782275][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.789494][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.797229][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.805679][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.829425][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.838316][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.847367][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.856265][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.882625][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.885723][ T22] audit: type=1400 audit(1682507363.089:169): avc: denied { mounton } for pid=326 comm="syz-executor.0" path="/root/syzkaller-testdir2176052336/syzkaller.OH0W2j/0/file1" dev="sda1" ino=1937 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 39.919910][ T327] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 39.930611][ T327] EXT4-fs (loop0): 1 truncate cleaned up [ 39.936316][ T327] EXT4-fs (loop0): mounted filesystem without journal. Opts: debug_want_extra_isize=0x0000000000000080,quota,auto_da_alloc=0x0000000000000800,max_batch_time=0x0000000000000008,noload,usrjquota=,,errors=continue [ 39.958934][ T22] audit: type=1400 audit(1682507363.159:170): avc: denied { mount } for pid=326 comm="syz-executor.0" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 39.984582][ T22] audit: type=1400 audit(1682507363.189:171): avc: denied { write } for pid=326 comm="syz-executor.0" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 39.984883][ T327] kasan: CONFIG_KASAN_INLINE enabled [ 40.013541][ T327] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 40.022019][ T327] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 40.029136][ T327] CPU: 1 PID: 327 Comm: syz-executor.0 Not tainted 5.4.233-syzkaller-00018-g8a14194b61da #0 [ 40.039297][ T327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 40.049670][ T327] RIP: 0010:ext4_xattr_set_entry+0x482/0x3820 [ 40.055798][ T327] Code: 24 58 48 89 d8 48 c1 e8 03 48 89 84 24 08 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 b8 06 c2 ff 4c 8b 23 4c 89 e0 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 b9 2d 00 00 4c 89 e8 48 2b 44 24 08 48 [ 40.076504][ T327] RSP: 0018:ffff8881f0faf020 EFLAGS: 00010246 [ 40.082744][ T327] RAX: 0000000000000000 RBX: ffff8881f0faf400 RCX: ffff8881f32e0fc0 [ 40.091198][ T327] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000001c [ 40.099487][ T327] RBP: ffff8881f0faf2a0 R08: ffffffff81ceb9dc R09: ffffed103cd96523 [ 40.107459][ T327] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 40.115615][ T327] R13: 0000000000000000 R14: 000000000000001c R15: dffffc0000000000 [ 40.123656][ T327] FS: 00007f84ce1c6700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 40.133038][ T327] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 40.139877][ T327] CR2: 00007f84ce76f000 CR3: 00000001f2ecb000 CR4: 00000000003406e0 [ 40.148149][ T327] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 40.156652][ T327] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 40.164952][ T327] Call Trace: [ 40.168529][ T327] ? selinux_inode_init_security+0x6df/0xad0 [ 40.174957][ T327] ? ext4_get_group_desc+0x253/0x2a0 [ 40.180243][ T327] ? __ext4_get_inode_loc+0x612/0xe40 [ 40.185745][ T327] ? ext4_xattr_ibody_inline_set+0x330/0x330 [ 40.193238][ T327] ? ext4_get_inode_loc+0x60/0x60 [ 40.199706][ T327] ? __ext4_journal_get_write_access+0x83/0x310 [ 40.206153][ T327] ? __ext4_journal_start_reserved+0x4a0/0x4a0 [ 40.212894][ T327] ? down_write+0xd7/0x150 [ 40.217895][ T327] ? down_read_killable+0x220/0x220 [ 40.223543][ T327] ext4_xattr_ibody_set+0x75/0x2a0 [ 40.229773][ T327] ext4_xattr_set_handle+0xbfd/0x14b0 [ 40.235611][ T327] ? ext4_xattr_set_entry+0x3820/0x3820 [ 40.241447][ T327] ? selinux_inode_free_security+0x1d0/0x1d0 [ 40.248512][ T327] ? __xa_set_mark+0x41b/0x550 [ 40.253705][ T327] ext4_initxattrs+0x9f/0x110 [ 40.258912][ T327] security_inode_init_security+0x252/0x390 [ 40.265302][ T327] ? ext4_init_security+0x40/0x40 [ 40.270416][ T327] ? security_dentry_create_files_as+0xc0/0xc0 [ 40.277695][ T327] ? ext4_init_acl+0x394/0x400 [ 40.282814][ T327] ? prandom_u32+0x21a/0x240 [ 40.287575][ T327] ? ext4_has_metadata_csum+0x12f/0x1c0 [ 40.293384][ T327] __ext4_new_inode+0x2fb9/0x3f10 [ 40.298418][ T327] ? ext4_lock_group+0x440/0x440 [ 40.303876][ T327] ? ext4_lookup+0x549/0xaa0 [ 40.308543][ T327] ? ext4_orphan_del+0x7b0/0x7b0 [ 40.313478][ T327] ext4_create+0x255/0x5b0 [ 40.317897][ T327] ? ext4_lookup+0xaa0/0xaa0 [ 40.322806][ T327] ? security_inode_create+0xb4/0x100 [ 40.328365][ T327] ? ext4_lookup+0xaa0/0xaa0 [ 40.333240][ T327] path_openat+0x181b/0x3480 [ 40.337913][ T327] ? do_filp_open+0x450/0x450 [ 40.342679][ T327] ? do_sys_open+0x357/0x810 [ 40.347248][ T327] ? do_syscall_64+0xca/0x1c0 [ 40.351903][ T327] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 40.358148][ T327] do_filp_open+0x20b/0x450 [ 40.362983][ T327] ? vfs_tmpfile+0x280/0x280 [ 40.368082][ T327] ? _raw_spin_unlock+0x49/0x60 [ 40.373193][ T327] ? __alloc_fd+0x4c1/0x560 [ 40.377809][ T327] do_sys_open+0x39c/0x810 [ 40.382630][ T327] ? file_open_root+0x490/0x490 [ 40.387647][ T327] ? switch_fpu_return+0x1d4/0x410 [ 40.392840][ T327] do_syscall_64+0xca/0x1c0 [ 40.397627][ T327] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 40.403935][ T327] Modules linked in: [ 40.407960][ T327] ---[ end trace fe05bbd8d9c8d00f ]--- [ 40.413480][ T327] RIP: 0010:ext4_xattr_set_entry+0x482/0x3820 [ 40.419562][ T327] Code: 24 58 48 89 d8 48 c1 e8 03 48 89 84 24 08 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 b8 06 c2 ff 4c 8b 23 4c 89 e0 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 b9 2d 00 00 4c 89 e8 48 2b 44 24 08 48 [ 40.439583][ T327] RSP: 0018:ffff8881f0faf020 EFLAGS: 00010246 [ 40.446021][ T327] RAX: 0000000000000000 RBX: ffff8881f0faf400 RCX: ffff8881f32e0fc0 [ 40.455031][ T327] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000001c [ 40.463548][ T327] RBP: ffff8881f0faf2a0 R08: ffffffff81ceb9dc R09: ffffed103cd96523 [ 40.472058][ T327] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 40.480583][ T327] R13: 0000000000000000 R14: 000000000000001c R15: dffffc0000000000 [ 40.489269][ T327] FS: 00007f84ce1c6700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 40.498454][ T327] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 40.505357][ T327] CR2: 00007f84ce76f000 CR3: 00000001f2ecb000 CR4: 00000000003406e0 [ 40.513955][ T327] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 40.521955][ T327] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 40.530142][ T327] Kernel panic - not syncing: Fatal exception [ 40.536879][ T327] Kernel Offset: disabled [ 40.541191][ T327] Rebooting in 86400 seconds..