Warning: Permanently added '10.128.0.251' (ECDSA) to the list of known hosts.
2021/10/25 00:58:16 parsed 1 programs
[  444.131533][   T23] audit: type=1400 audit(1635123496.679:73): avc:  denied  { getattr } for  pid=365 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  444.134889][   T23] audit: type=1400 audit(1635123496.679:74): avc:  denied  { read } for  pid=365 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  444.137973][   T23] audit: type=1400 audit(1635123496.679:75): avc:  denied  { open } for  pid=365 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  444.141735][   T23] audit: type=1400 audit(1635123496.689:76): avc:  denied  { read } for  pid=365 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  444.145405][   T23] audit: type=1400 audit(1635123496.689:77): avc:  denied  { open } for  pid=365 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  444.146437][  T370] cgroup: Unknown subsys name 'net'
[  444.148761][   T23] audit: type=1400 audit(1635123496.699:78): avc:  denied  { mounton } for  pid=370 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[  444.148776][   T23] audit: type=1400 audit(1635123496.699:79): avc:  denied  { mount } for  pid=370 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[  444.180617][   T23] audit: type=1400 audit(1635123496.699:80): avc:  denied  { unmount } for  pid=370 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[  444.180753][  T370] cgroup: Unknown subsys name 'devices'
[  444.294812][  T370] cgroup: Unknown subsys name 'hugetlb'
[  444.300426][  T370] cgroup: Unknown subsys name 'rlimit'
2021/10/25 00:58:16 executed programs: 0
[  444.394233][   T23] audit: type=1400 audit(1635123496.949:81): avc:  denied  { mounton } for  pid=370 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[  444.419083][   T23] audit: type=1400 audit(1635123496.949:82): avc:  denied  { mount } for  pid=370 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[  444.445098][  T374] bridge0: port 1(bridge_slave_0) entered blocking state
[  444.452106][  T374] bridge0: port 1(bridge_slave_0) entered disabled state
[  444.459511][  T374] device bridge_slave_0 entered promiscuous mode
[  444.466254][  T374] bridge0: port 2(bridge_slave_1) entered blocking state
[  444.473255][  T374] bridge0: port 2(bridge_slave_1) entered disabled state
[  444.480628][  T374] device bridge_slave_1 entered promiscuous mode
[  444.505515][  T374] bridge0: port 2(bridge_slave_1) entered blocking state
[  444.512551][  T374] bridge0: port 2(bridge_slave_1) entered forwarding state
[  444.519807][  T374] bridge0: port 1(bridge_slave_0) entered blocking state
[  444.526820][  T374] bridge0: port 1(bridge_slave_0) entered forwarding state
[  444.542382][  T375] bridge0: port 1(bridge_slave_0) entered disabled state
[  444.549529][  T375] bridge0: port 2(bridge_slave_1) entered disabled state
[  444.556993][  T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  444.564628][  T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  444.573368][   T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  444.581415][   T24] bridge0: port 1(bridge_slave_0) entered blocking state
[  444.588443][   T24] bridge0: port 1(bridge_slave_0) entered forwarding state
[  444.596360][  T375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  444.604508][  T375] bridge0: port 2(bridge_slave_1) entered blocking state
[  444.611500][  T375] bridge0: port 2(bridge_slave_1) entered forwarding state
[  444.633823][  T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  444.642014][  T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  444.650449][  T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  444.659592][  T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  444.667480][  T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  444.675450][  T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  444.683225][  T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  444.696877][  T374] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation
[  444.711610][  T382] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
[  444.730563][  T382] KVM: debugfs: duplicate directory 382-4
[  444.750601][  T390] KVM: debugfs: duplicate directory 390-4
[  444.768014][  T397] KVM: debugfs: duplicate directory 397-4
[  444.817749][  T410] ------------[ cut here ]------------
[  444.817946][  T411] KVM: debugfs: duplicate directory 411-4
[  444.823204][  T410] kernel BUG at arch/x86/kvm/../../../virt/kvm/kvm_main.c:516!
[  444.823226][  T410] invalid opcode: 0000 [#1] PREEMPT SMP KASAN
[  444.842448][  T410] CPU: 1 PID: 410 Comm: syz-executor.0 Not tainted 5.10.75-syzkaller-01082-g234d53d2bb60 #0
[  444.852470][  T410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  444.862511][  T410] RIP: 0010:kvm_mmu_notifier_invalidate_range_end+0xb2/0xc0
[  444.869762][  T410] Code: 49 8b 1e 48 c7 c7 ff ff ff ff 48 89 de e8 46 96 64 00 48 85 db 78 0e e8 7c 91 64 00 5b 41 5c 41 5e 41 5f 5d c3 e8 6e 91 64 00 <0f> 0b 66 66 2e 0f 1f 84 00 00 00 00 00 90 55 48 89 e5 41 57 41 56
[  444.889335][  T410] RSP: 0000:ffffc90000ee77d0 EFLAGS: 00010293
[  444.895370][  T410] RAX: ffffffff81086782 RBX: ffffffffffffffff RCX: ffff888106580000
[  444.903315][  T410] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: ffffffffffffffff
[  444.911263][  T410] RBP: ffffc90000ee77f0 R08: ffffffff8108676a R09: 0000000000000003
[  444.919212][  T410] R10: fffff520001dcee9 R11: 0000000000000004 R12: dffffc0000000000
[  444.927157][  T410] R13: dffffc0000000000 R14: ffffc90000f5a160 R15: ffffc90000f51000
[  444.935100][  T410] FS:  0000555556bd1400(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[  444.943996][  T410] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  444.950590][  T410] CR2: 00007f3ff88bc7d0 CR3: 000000010a643000 CR4: 00000000003526a0
[  444.958568][  T410] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  444.966508][  T410] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  444.974448][  T410] Call Trace:
[  444.977717][  T410]  ? kvm_mmu_notifier_invalidate_range_start+0x300/0x300
[  444.984707][  T410]  __mmu_notifier_invalidate_range_end+0x246/0x300
[  444.991178][  T410]  wp_page_copy+0xe51/0x1750
[  444.995735][  T410]  ? copy_user_highpage+0x1b0/0x1b0
[  445.000942][  T410]  ? __kasan_check_write+0x14/0x20
[  445.006024][  T410]  ? _raw_spin_trylock+0xcb/0x1a0
[  445.011016][  T410]  do_wp_page+0x73b/0xc80
[  445.015320][  T410]  handle_pte_fault+0x575/0xac0
[  445.020141][  T410]  ___handle_speculative_fault+0xd97/0x17d0
[  445.026002][  T410]  ? __handle_speculative_fault+0x2a0/0x2a0
[  445.031865][  T410]  ? __kasan_check_write+0x14/0x20
[  445.036946][  T410]  ? __up_read+0x7b/0x2b0
[  445.041246][  T410]  ? _raw_read_unlock+0x25/0x40
[  445.046062][  T410]  ? get_vma+0x14e/0x160
[  445.050271][  T410]  __handle_speculative_fault+0xc3/0x2a0
[  445.055874][  T410]  do_user_addr_fault+0x8c9/0xd70
[  445.060867][  T410]  ? trace_raw_output_x86_exceptions+0x100/0x100
[  445.067162][  T410]  ? fpregs_assert_state_consistent+0xb6/0xe0
[  445.073204][  T410]  ? exit_to_user_mode_prepare+0x3b/0xe0
[  445.078812][  T410]  exc_page_fault+0x98/0x2d0
[  445.083371][  T410]  ? asm_exc_page_fault+0x8/0x30
[  445.088279][  T410]  asm_exc_page_fault+0x1e/0x30
[  445.093103][  T410] RIP: 0033:0x7f3ff88eea01
[  445.097488][  T410] Code: 11 00 4c 29 e8 4b 8d 0c 2f 48 8b 6c 24 18 48 39 d3 48 89 4b 60 0f 95 c2 48 83 c8 01 0f b6 d2 48 c1 e2 02 4c 09 ea 48 83 ca 01 <49> 89 57 08 48 89 41 08 49 83 c7 10 eb b3 48 8d 3d ba dc 09 00 e8
[  445.117064][  T410] RSP: 002b:00007ffe5d7f56b0 EFLAGS: 00010206
[  445.123099][  T410] RAX: 00000000000202d1 RBX: 00007f3ff8a045e0 RCX: 0000555556bd2d30
[  445.131041][  T410] RDX: 0000000000000121 RSI: 0000000000000000 RDI: 0000000000000004
[  445.139026][  T410] RBP: 0000000000000110 R08: 0000000000000003 R09: 00007f3ff8a04640
[  445.146973][  T410] R10: 0000000000020022 R11: 0000000000000120 R12: 0000000000000010
[  445.154914][  T410] R13: 0000000000000120 R14: 0000000000000012 R15: 0000555556bd2c10
[  445.162854][  T410] Modules linked in:
[  445.167890][  T410] ---[ end trace 2ad04144d9a03e89 ]---
[  445.173543][  T410] RIP: 0010:kvm_mmu_notifier_invalidate_range_end+0xb2/0xc0
[  445.180854][  T410] Code: 49 8b 1e 48 c7 c7 ff ff ff ff 48 89 de e8 46 96 64 00 48 85 db 78 0e e8 7c 91 64 00 5b 41 5c 41 5e 41 5f 5d c3 e8 6e 91 64 00 <0f> 0b 66 66 2e 0f 1f 84 00 00 00 00 00 90 55 48 89 e5 41 57 41 56
[  445.200582][  T410] RSP: 0000:ffffc90000ee77d0 EFLAGS: 00010293
[  445.206667][  T410] RAX: ffffffff81086782 RBX: ffffffffffffffff RCX: ffff888106580000
[  445.214749][  T410] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: ffffffffffffffff
[  445.222697][  T410] RBP: ffffc90000ee77f0 R08: ffffffff8108676a R09: 0000000000000003
[  445.230827][  T410] R10: fffff520001dcee9 R11: 0000000000000004 R12: dffffc0000000000
[  445.238832][  T410] R13: dffffc0000000000 R14: ffffc90000f5a160 R15: ffffc90000f51000
[  445.246813][  T410] FS:  0000555556bd1400(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[  445.255733][  T410] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  445.262298][  T410] CR2: 00007f3ff88bc7d0 CR3: 000000010a643000 CR4: 00000000003526a0
[  445.270267][  T410] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  445.278246][  T410] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  445.286358][  T410] Kernel panic - not syncing: Fatal exception
[  445.292705][  T410] Kernel Offset: disabled
[  445.297008][  T410] Rebooting in 86400 seconds..