Warning: Permanently added '10.128.0.183' (ED25519) to the list of known hosts. 2024/05/01 06:37:44 ignoring optional flag "sandboxArg"="0" 2024/05/01 06:37:44 parsed 1 programs [ 42.984037][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 42.984044][ T29] audit: type=1400 audit(1714545464.898:154): avc: denied { mounton } for pid=342 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 43.016378][ T29] audit: type=1400 audit(1714545464.898:155): avc: denied { mount } for pid=342 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 43.040143][ T29] audit: type=1400 audit(1714545464.898:156): avc: denied { setattr } for pid=342 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 43.063608][ T29] audit: type=1400 audit(1714545464.898:157): avc: denied { read write } for pid=342 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 43.090077][ T29] audit: type=1400 audit(1714545464.898:158): avc: denied { open } for pid=342 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/05/01 06:37:45 executed programs: 0 [ 43.143574][ T29] audit: type=1400 audit(1714545465.058:159): avc: denied { unlink } for pid=342 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 43.155222][ T342] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 43.169859][ T29] audit: type=1400 audit(1714545465.058:160): avc: denied { relabelto } for pid=343 comm="mkswap" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 43.209117][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.216431][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.223999][ T348] device bridge_slave_0 entered promiscuous mode [ 43.230378][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.237289][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.244646][ T348] device bridge_slave_1 entered promiscuous mode [ 43.259203][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.266795][ T348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.275177][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.282228][ T348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.291839][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.299750][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.307126][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 43.314345][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 43.323535][ T348] device veth0_vlan entered promiscuous mode [ 43.330571][ T348] device veth1_macvtap entered promiscuous mode [ 43.338023][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 43.347715][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.356141][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.364407][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.371803][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 43.381126][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 43.389962][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.397734][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.405268][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 43.413969][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.421363][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.428995][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 43.437196][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 43.446002][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 43.455084][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 43.468693][ T29] audit: type=1400 audit(1714545465.378:161): avc: denied { mounton } for pid=352 comm="syz-executor.0" path="/root/syzkaller-testdir1718174439/syzkaller.LIHaaH/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 43.518751][ T356] BUG: kernel NULL pointer dereference, address: 0000000000000038 [ 43.526373][ T356] #PF: supervisor read access in kernel mode [ 43.532449][ T356] #PF: error_code(0x0000) - not-present page [ 43.538369][ T356] PGD 10e35a067 P4D 10e35a067 PUD 10e35e067 PMD 0 [ 43.544827][ T356] Oops: 0000 [#1] PREEMPT SMP [ 43.549321][ T356] CPU: 0 PID: 356 Comm: syz-executor.0 Not tainted 5.15.149-syzkaller #0 [ 43.557738][ T356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 43.567718][ T356] RIP: 0010:fuse_atomic_open+0x49/0x120 [ 43.573097][ T356] Code: 89 e5 41 57 45 89 c7 41 56 49 89 d6 41 55 49 89 fd 41 54 49 89 f4 53 31 db 48 83 ec 10 f7 06 00 00 00 10 75 7a f6 c1 40 74 08 <49> 83 7c 24 30 00 74 1a 48 89 de 4c 89 f7 e8 74 d6 ea ff 48 83 c4 [ 43.592627][ T356] RSP: 0018:ffffc900003bbc80 EFLAGS: 00010202 [ 43.598531][ T356] RAX: 0000000000000008 RBX: 0000000000000008 RCX: 0000000000008041 [ 43.606337][ T356] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff88810a905b88 [ 43.614799][ T356] RBP: ffffc900003bbcb8 R08: ffff88810e2408c8 R09: ffff888100db9c00 [ 43.622802][ T356] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000008 [ 43.630751][ T356] R13: ffff88810a905800 R14: ffff888102197780 R15: 0000000000008000 [ 43.638553][ T356] FS: 00007f42a85756c0(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 43.647458][ T356] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 43.653853][ T356] CR2: 0000000000000038 CR3: 000000010e349000 CR4: 00000000003506b0 [ 43.661757][ T356] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 43.669578][ T356] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 43.677631][ T356] Call Trace: [ 43.680765][ T356] [ 43.683710][ T356] ? show_regs.part.0+0x1e/0x20 [ 43.688393][ T356] ? __die+0x5d/0x9e [ 43.692129][ T356] ? page_fault_oops+0x12d/0x280 [ 43.697138][ T356] ? do_user_addr_fault+0x44b/0x730 [ 43.702507][ T356] ? exc_page_fault+0x67/0x160 [ 43.707398][ T356] ? asm_exc_page_fault+0x27/0x30 [ 43.712622][ T356] ? fuse_atomic_open+0x49/0x120 [ 43.717587][ T356] path_openat+0x7d7/0x1230 [ 43.721996][ T356] do_filp_open+0xb1/0x150 [ 43.726266][ T356] ? _raw_spin_unlock+0x1f/0x40 [ 43.730946][ T356] do_sys_openat2+0x9c/0x250 [ 43.735374][ T356] __x64_sys_openat+0x51/0x90 [ 43.739885][ T356] do_syscall_64+0x35/0xb0 [ 43.744131][ T356] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.750409][ T356] RIP: 0033:0x7f42a8a14da9 [ 43.754773][ T356] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 43.774286][ T356] RSP: 002b:00007f42a85750c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 43.782619][ T356] RAX: ffffffffffffffda RBX: 00007f42a8b43050 RCX: 00007f42a8a14da9 [ 43.790418][ T356] RDX: 0000000000080041 RSI: 00000000200001c0 RDI: ffffffffffffff9c [ 43.798232][ T356] RBP: 00007f42a8a6147a R08: 0000000000000000 R09: 0000000000000000 [ 43.806045][ T356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 43.814944][ T356] R13: 000000000000006e R14: 00007f42a8b43050 R15: 00007ffdd5bb9698 [ 43.824398][ T356] [ 43.827875][ T356] Modules linked in: [ 43.832434][ T356] CR2: 0000000000000038 [ 43.837100][ T356] ---[ end trace 3046ea4b7059fca4 ]--- [ 43.843496][ T356] RIP: 0010:fuse_atomic_open+0x49/0x120 [ 43.849418][ T356] Code: 89 e5 41 57 45 89 c7 41 56 49 89 d6 41 55 49 89 fd 41 54 49 89 f4 53 31 db 48 83 ec 10 f7 06 00 00 00 10 75 7a f6 c1 40 74 08 <49> 83 7c 24 30 00 74 1a 48 89 de 4c 89 f7 e8 74 d6 ea ff 48 83 c4 [ 43.869938][ T356] RSP: 0018:ffffc900003bbc80 EFLAGS: 00010202 [ 43.875847][ T356] RAX: 0000000000000008 RBX: 0000000000000008 RCX: 0000000000008041 [ 43.884413][ T356] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff88810a905b88 [ 43.892395][ T356] RBP: ffffc900003bbcb8 R08: ffff88810e2408c8 R09: ffff888100db9c00 [ 43.900310][ T356] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000008 [ 43.908451][ T356] R13: ffff88810a905800 R14: ffff888102197780 R15: 0000000000008000 [ 43.916392][ T356] FS: 00007f42a85756c0(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 43.925307][ T356] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 43.931833][ T356] CR2: 0000000000000038 CR3: 000000010e349000 CR4: 00000000003506b0 [ 43.939994][ T356] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 43.947810][ T356] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 43.955812][ T356] Kernel panic - not syncing: Fatal exception [ 43.961923][ T356] Kernel Offset: disabled [ 43.966148][ T356] Rebooting in 86400 seconds..