[ 28.709130][ T306] device veth1_macvtap entered promiscuous mode [ 28.719070][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.729642][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.823391][ T306] syz-executor.0 (306) used greatest stack depth: 20648 bytes left [ 29.282998][ T43] device bridge_slave_1 left promiscuous mode [ 29.288974][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.296487][ T43] device bridge_slave_0 left promiscuous mode [ 29.302557][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.310169][ T43] device veth1_macvtap left promiscuous mode [ 29.316244][ T43] device veth0_vlan left promiscuous mode Warning: Permanently added '10.128.0.133' (ED25519) to the list of known hosts. 2025/01/16 23:48:38 ignoring optional flag "sandboxArg"="0" 2025/01/16 23:48:38 ignoring optional flag "type"="gce" 2025/01/16 23:48:38 parsed 1 programs [ 46.442728][ T28] kauditd_printk_skb: 18 callbacks suppressed [ 46.442744][ T28] audit: type=1400 audit(1737071318.286:94): avc: denied { unlink } for pid=349 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2025/01/16 23:48:38 executed programs: 0 [ 46.494295][ T349] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 46.556821][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.564416][ T356] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.571875][ T356] device bridge_slave_0 entered promiscuous mode [ 46.579028][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.585974][ T356] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.593298][ T356] device bridge_slave_1 entered promiscuous mode [ 46.645258][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.652216][ T356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.659386][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.666575][ T356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.687415][ T315] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.694563][ T315] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.701839][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.709253][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.718250][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.726472][ T315] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.733328][ T315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.741861][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.749974][ T315] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.756947][ T315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.768999][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.778864][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.793198][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.805148][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.813596][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.821064][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.829733][ T356] device veth0_vlan entered promiscuous mode [ 46.840187][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.849340][ T356] device veth1_macvtap entered promiscuous mode [ 46.858722][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.868763][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.891928][ T28] audit: type=1400 audit(1737071318.726:95): avc: denied { read write } for pid=361 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 46.915825][ T28] audit: type=1400 audit(1737071318.726:96): avc: denied { open } for pid=361 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 46.939398][ T28] audit: type=1400 audit(1737071318.726:97): avc: denied { mounton } for pid=361 comm="syz-executor.0" path="/root/syzkaller-testdir2932371684/syzkaller.GoYARL/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 47.017633][ T362] general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN [ 47.029175][ T362] KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] [ 47.037417][ T362] CPU: 0 PID: 362 Comm: syz-executor.0 Not tainted 6.1.118-syzkaller-1166373-gdbdf659cc65c #0 [ 47.047573][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 47.058002][ T362] RIP: 0010:filename_create+0x2d8/0x530 [ 47.063525][ T362] Code: 92 00 00 00 4c 89 7c 24 28 45 84 e4 0f 95 c0 83 7c 24 14 00 0f 94 c3 20 c3 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 0f 85 1f 02 00 00 45 8b 26 41 bd 00 00 70 00 be [ 47.083320][ T362] RSP: 0018:ffffc900014e7cc0 EFLAGS: 00010206 [ 47.089491][ T362] RAX: 0000000000000003 RBX: 1ffff9200029cf00 RCX: dffffc0000000000 [ 47.097545][ T362] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000000 [ 47.105347][ T362] RBP: ffffc900014e7db0 R08: ffffffff81cc2c38 R09: fffff5200029cf71 [ 47.113160][ T362] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 47.120970][ T362] R13: 0000000000000600 R14: 0000000000000018 R15: ffffc900014e7e60 [ 47.129045][ T362] FS: 00007f24c6e3d6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 47.137980][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 47.144401][ T362] CR2: 00007f24c6e3cfa8 CR3: 0000000122335000 CR4: 00000000003506b0 [ 47.152223][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 47.160148][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 47.168040][ T362] Call Trace: [ 47.171247][ T362] [ 47.174034][ T362] ? __die_body+0x62/0xb0 [ 47.178273][ T362] ? die_addr+0x9f/0xd0 [ 47.182264][ T362] ? exc_general_protection+0x317/0x4c0 [ 47.187870][ T362] ? asm_exc_general_protection+0x27/0x30 [ 47.193497][ T362] ? fast_dput+0x78/0x2a0 [ 47.197662][ T362] ? filename_create+0x2d8/0x530 [ 47.202525][ T362] ? kern_path_create+0x1a0/0x1a0 [ 47.207382][ T362] ? __ia32_sys_get_robust_list+0x90/0x90 [ 47.212959][ T362] do_mknodat+0x1a4/0x5c0 [ 47.217103][ T362] ? __check_object_size+0x48e/0x650 [ 47.222230][ T362] ? strncpy_from_user+0x169/0x2b0 [ 47.227380][ T362] ? do_o_path+0x230/0x230 [ 47.231629][ T362] ? getname_flags+0x1fd/0x520 [ 47.236238][ T362] __x64_sys_mknodat+0xa9/0xc0 [ 47.240834][ T362] x64_sys_call+0x6cd/0x9a0 [ 47.245258][ T362] do_syscall_64+0x3b/0xb0 [ 47.249506][ T362] ? clear_bhb_loop+0x55/0xb0 [ 47.254019][ T362] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 47.259920][ T362] RIP: 0033:0x7f24c607cae9 [ 47.264177][ T362] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 47.284049][ T362] RSP: 002b:00007f24c6e3d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000103 [ 47.292422][ T362] RAX: ffffffffffffffda RBX: 00007f24c619bf80 RCX: 00007f24c607cae9 [ 47.300410][ T362] RDX: 0000000000000080 RSI: 00000000200000c0 RDI: 0000000000000004 [ 47.308237][ T362] RBP: 00007f24c60c847a R08: 0000000000000000 R09: 0000000000000000 [ 47.316046][ T362] R10: 0000000000000700 R11: 0000000000000246 R12: 0000000000000000 [ 47.323865][ T362] R13: 000000000000000b R14: 00007f24c619bf80 R15: 00007ffd01ec74a8 [ 47.331863][ T362] [ 47.334696][ T362] Modules linked in: [ 47.339806][ T362] ---[ end trace 0000000000000000 ]--- [ 47.341763][ T28] audit: type=1400 audit(1737071319.176:98): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 47.345127][ T362] RIP: 0010:filename_create+0x2d8/0x530 [ 47.372118][ T362] Code: 92 00 00 00 4c 89 7c 24 28 45 84 e4 0f 95 c0 83 7c 24 14 00 0f 94 c3 20 c3 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 0f 85 1f 02 00 00 45 8b 26 41 bd 00 00 70 00 be [ 47.392039][ T362] RSP: 0018:ffffc900014e7cc0 EFLAGS: 00010206 [ 47.398187][ T362] RAX: 0000000000000003 RBX: 1ffff9200029cf00 RCX: dffffc0000000000 [ 47.406532][ T362] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000000 [ 47.414542][ T362] RBP: ffffc900014e7db0 R08: ffffffff81cc2c38 R09: fffff5200029cf71 [ 47.422384][ T362] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 47.430454][ T362] R13: 0000000000000600 R14: 0000000000000018 R15: ffffc900014e7e60 [ 47.438452][ T362] FS: 00007f24c6e3d6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 47.447136][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 47.453681][ T362] CR2: 00007f24c6e3cfa8 CR3: 0000000122335000 CR4: 00000000003506b0 [ 47.461565][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 47.469575][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 47.477527][ T362] Kernel panic - not syncing: Fatal exception [ 47.483713][ T362] Kernel Offset: disabled [ 47.487962][ T362] Rebooting in 86400 seconds..