Warning: Permanently added '10.128.10.25' (ED25519) to the list of known hosts. 2026/01/08 06:48:32 ignoring optional flag "type"="gce" 2026/01/08 06:48:32 parsed 1 programs 2026/01/08 06:48:32 executed programs: 0 [ 38.125245][ T24] kauditd_printk_skb: 18 callbacks suppressed [ 38.125254][ T24] audit: type=1400 audit(1767854912.600:92): avc: denied { unlink } for pid=318 comm="syz-executor" name="swap-file" dev="sda1" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 38.160293][ T318] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 38.202780][ T325] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.210871][ T325] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.220599][ T325] device bridge_slave_0 entered promiscuous mode [ 38.228035][ T325] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.236867][ T325] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.244371][ T325] device bridge_slave_1 entered promiscuous mode [ 38.272942][ T325] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.280559][ T325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.288433][ T325] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.295774][ T325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.311662][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.319158][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.326933][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.334792][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.344029][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.352678][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.360425][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.371730][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.381867][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.391785][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.406242][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.416874][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.428947][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.439971][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.448599][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.456473][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.464966][ T325] device veth0_vlan entered promiscuous mode [ 38.474286][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.483657][ T325] device veth1_macvtap entered promiscuous mode [ 38.492262][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.502142][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.520581][ T24] audit: type=1400 audit(1767854912.990:93): avc: denied { read write } for pid=330 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 38.544274][ T24] audit: type=1400 audit(1767854913.010:94): avc: denied { open } for pid=330 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 38.567842][ T24] audit: type=1400 audit(1767854913.010:95): avc: denied { mounton } for pid=330 comm="syz-executor.0" path="/root/syzkaller-testdir2830023656/syzkaller.94Hsop/0/file0" dev="sda1" ino=2036 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 38.586808][ T331] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 38.607038][ T331] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 38.615695][ T331] CPU: 1 PID: 331 Comm: syz-executor.0 Not tainted syzkaller #0 [ 38.623789][ T331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 38.633978][ T331] RIP: 0010:path_openat+0x1738/0x3160 [ 38.639480][ T331] Code: ae 62 02 00 49 63 de 4c 8b 74 24 38 e9 86 fb ff ff e8 bc 79 bb ff 44 8b 6c 24 14 44 8b a4 24 80 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 75 09 00 00 44 8b 33 be 00 00 70 00 44 [ 38.659859][ T331] RSP: 0018:ffffc90000f379e0 EFLAGS: 00010202 [ 38.665903][ T331] RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff88810cd713c0 [ 38.674097][ T331] RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff88810cd713c0 [ 38.682411][ T331] RBP: ffffc90000f37bf0 R08: dffffc0000000000 R09: ffffed102009031c [ 38.690641][ T331] R10: ffffed102009031c R11: 1ffff1102009031b R12: 0000000000000000 [ 38.698699][ T331] R13: 0000000000000000 R14: ffff88810dc84f18 R15: dffffc0000000000 [ 38.707548][ T331] FS: 00007fe7f2df46c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 38.716682][ T331] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 38.723520][ T331] CR2: 00007fe7f32de244 CR3: 000000010d4e8000 CR4: 00000000003506a0 [ 38.731616][ T331] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 38.739691][ T331] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 38.747743][ T331] Call Trace: [ 38.751039][ T331] ? do_filp_open+0x3e0/0x3e0 [ 38.755870][ T331] ? expand_files+0xde/0x8e0 [ 38.760533][ T331] do_filp_open+0x1b3/0x3e0 [ 38.765012][ T331] ? vfs_tmpfile+0x2c0/0x2c0 [ 38.769896][ T331] ? get_unused_fd_flags+0x92/0xa0 [ 38.775118][ T331] do_sys_openat2+0x14c/0x6d0 [ 38.779980][ T331] ? do_sys_open+0xe0/0xe0 [ 38.784468][ T331] ? __kasan_check_write+0x14/0x20 [ 38.789561][ T331] ? switch_fpu_return+0x197/0x340 [ 38.794789][ T331] ? fpu__clear_all+0x20/0x20 [ 38.799480][ T331] __x64_sys_openat+0x136/0x160 [ 38.804508][ T331] do_syscall_64+0x31/0x40 [ 38.809368][ T331] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 38.815977][ T331] RIP: 0033:0x7fe7f3271ae9 [ 38.820554][ T331] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 38.840892][ T331] RSP: 002b:00007fe7f2df40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 38.849594][ T331] RAX: ffffffffffffffda RBX: 00007fe7f3390f80 RCX: 00007fe7f3271ae9 [ 38.857647][ T331] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 38.866083][ T331] RBP: 00007fe7f32bd47a R08: 0000000000000000 R09: 0000000000000000 [ 38.874822][ T331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 38.883977][ T331] R13: 000000000000000b R14: 00007fe7f3390f80 R15: 00007ffc3b706a98 [ 38.892670][ T331] Modules linked in: [ 38.898027][ T331] ---[ end trace 607d6650fe9e6e27 ]--- [ 38.903997][ T331] RIP: 0010:path_openat+0x1738/0x3160 [ 38.910157][ T24] audit: type=1400 audit(1767854913.370:96): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 38.913011][ T331] Code: ae 62 02 00 49 63 de 4c 8b 74 24 38 e9 86 fb ff ff e8 bc 79 bb ff 44 8b 6c 24 14 44 8b a4 24 80 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 75 09 00 00 44 8b 33 be 00 00 70 00 44 [ 38.933968][ T24] audit: type=1400 audit(1767854913.370:97): avc: denied { search } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 38.954688][ T331] RSP: 0018:ffffc90000f379e0 EFLAGS: 00010202 [ 38.975965][ T24] audit: type=1400 audit(1767854913.370:98): avc: denied { write } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 38.982109][ T331] RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff88810cd713c0 [ 39.004014][ T24] audit: type=1400 audit(1767854913.370:99): avc: denied { add_name } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 39.004031][ T24] audit: type=1400 audit(1767854913.370:100): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 39.013069][ T331] RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff88810cd713c0 [ 39.032967][ T24] audit: type=1400 audit(1767854913.370:101): avc: denied { append open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 39.053841][ T331] RBP: ffffc90000f37bf0 R08: dffffc0000000000 R09: ffffed102009031c [ 39.094097][ T331] R10: ffffed102009031c R11: 1ffff1102009031b R12: 0000000000000000 [ 39.102388][ T331] R13: 0000000000000000 R14: ffff88810dc84f18 R15: dffffc0000000000 [ 39.110854][ T331] FS: 00007fe7f2df46c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 39.120286][ T331] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 39.127935][ T331] CR2: 00007fe7f32de244 CR3: 000000010d4e8000 CR4: 00000000003506a0 [ 39.136893][ T331] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 39.145736][ T331] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 39.155438][ T331] Kernel panic - not syncing: Fatal exception [ 39.162925][ T331] Kernel Offset: disabled [ 39.167342][ T331] Rebooting in 86400 seconds..