Warning: Permanently added '10.128.0.173' (ED25519) to the list of known hosts. 2026/01/19 19:33:50 parsed 1 programs Setting up swapspace version 1, size = 127995904 bytes [ 45.472576][ T30] audit: type=1400 audit(1768851230.710:105): avc: denied { unlink } for pid=399 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 45.505148][ T399] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 46.126246][ T30] audit: type=1401 audit(1768851231.360:106): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 46.387375][ T438] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.394465][ T438] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.401740][ T438] device bridge_slave_0 entered promiscuous mode [ 46.408670][ T438] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.415907][ T438] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.423602][ T438] device bridge_slave_1 entered promiscuous mode [ 46.461316][ T438] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.468430][ T438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.475741][ T438] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.482785][ T438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.499419][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.506939][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.514520][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.522168][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.530921][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.539188][ T351] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.546239][ T351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.554677][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.562880][ T351] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.569886][ T351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.581262][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.595369][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.607915][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.618922][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.626981][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.635085][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.646756][ T438] device veth0_vlan entered promiscuous mode [ 46.656363][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.665524][ T438] device veth1_macvtap entered promiscuous mode [ 46.674244][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.687365][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2026/01/19 19:33:52 executed programs: 0 [ 46.943276][ T468] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.950385][ T468] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.957993][ T468] device bridge_slave_0 entered promiscuous mode [ 46.965111][ T468] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.972210][ T468] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.979673][ T468] device bridge_slave_1 entered promiscuous mode [ 47.022967][ T468] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.030103][ T468] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.037555][ T468] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.044579][ T468] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.074130][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.082101][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.089353][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.105009][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.113237][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.120421][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.127935][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.136487][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.143535][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.152607][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.162743][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.174576][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.184981][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.193325][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.201063][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.209298][ T468] device veth0_vlan entered promiscuous mode [ 47.220161][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.229087][ T468] device veth1_macvtap entered promiscuous mode [ 47.238091][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.248290][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.268104][ T480] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 47.269078][ T30] audit: type=1400 audit(1768851232.500:107): avc: denied { read write } for pid=479 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 47.307873][ T30] audit: type=1400 audit(1768851232.500:108): avc: denied { ioctl open } for pid=479 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 47.350197][ T484] general protection fault, probably for non-canonical address 0xe06ff51e0012b200: 0000 [#1] PREEMPT SMP KASAN [ 47.362081][ T484] KASAN: maybe wild-memory-access in range [0x037fc8f000959000-0x037fc8f000959007] [ 47.371524][ T484] CPU: 0 PID: 484 Comm: syz.2.18 Not tainted syzkaller #0 [ 47.378751][ T484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 47.388882][ T484] RIP: 0010:__rmap_write_protect+0x2d/0x3a0 [ 47.394775][ T484] Code: e5 41 57 41 56 41 55 41 54 53 48 83 ec 18 41 89 f4 48 89 fb 49 be 00 00 00 00 00 fc ff df e8 ba 57 50 00 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 df e8 94 7f 8f 00 4c 8b 33 31 ff 4c 89 [ 47.414367][ T484] RSP: 0018:ffffc9000412f898 EFLAGS: 00010206 [ 47.420453][ T484] RAX: 006ff91e0012b200 RBX: 037fc8f000959000 RCX: ffff888118870000 [ 47.428405][ T484] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 037fc8f000959000 [ 47.436363][ T484] RBP: ffffc9000412f8d8 R08: 0000000000000003 R09: 0000000000000004 [ 47.444576][ T484] R10: dffffc0000000000 R11: fffff52000825f28 R12: 0000000000000001 [ 47.452958][ T484] R13: 037fc8f000959000 R14: dffffc0000000000 R15: ffff88810e390348 [ 47.461008][ T484] FS: 00007f45911af6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 47.469930][ T484] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 47.476500][ T484] CR2: 0000200000c42000 CR3: 00000001211f5000 CR4: 00000000003526b0 [ 47.484570][ T484] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 47.492614][ T484] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 47.500737][ T484] Call Trace: [ 47.504010][ T484] [ 47.506938][ T484] kvm_mmu_slot_gfn_write_protect+0x14a/0x270 [ 47.512986][ T484] kvm_arch_mmu_enable_log_dirty_pt_masked+0x10c/0x3d0 [ 47.519860][ T484] kvm_reset_dirty_gfn+0x19d/0x210 [ 47.525049][ T484] kvm_dirty_ring_reset+0x72d/0x8b0 [ 47.530262][ T484] ? do_vfs_ioctl+0x1c19/0x1d80 [ 47.535095][ T484] ? __kasan_check_write+0x14/0x20 [ 47.540322][ T484] ? __mutex_lock_slowpath+0x10/0x10 [ 47.545590][ T484] kvm_vm_ioctl_reset_dirty_pages+0x1a3/0x3b0 [ 47.551656][ T484] kvm_vm_ioctl+0x3bd/0xb30 [ 47.556162][ T484] ? kvm_device_release+0x220/0x220 [ 47.561355][ T484] ? ioctl_has_perm+0x1b8/0x4f0 [ 47.566385][ T484] ? memcpy+0x56/0x70 [ 47.570356][ T484] ? ioctl_has_perm+0x414/0x4f0 [ 47.575373][ T484] ? has_cap_mac_admin+0x370/0x370 [ 47.580474][ T484] ? slab_free_freelist_hook+0xc2/0x190 [ 47.586045][ T484] ? __kasan_check_write+0x14/0x20 [ 47.591139][ T484] ? put_vma+0x44/0x60 [ 47.595455][ T484] ? do_user_addr_fault+0xa35/0x1250 [ 47.600743][ T484] ? selinux_file_ioctl+0x3a0/0x4d0 [ 47.605932][ T484] ? selinux_file_alloc_security+0x120/0x120 [ 47.611909][ T484] ? __fget_files+0x2c4/0x320 [ 47.616600][ T484] ? security_file_ioctl+0x84/0xa0 [ 47.621804][ T484] ? kvm_device_release+0x220/0x220 [ 47.627001][ T484] __se_sys_ioctl+0x121/0x1a0 [ 47.631706][ T484] __x64_sys_ioctl+0x7b/0x90 [ 47.636289][ T484] x64_sys_call+0x2f/0x9a0 [ 47.640708][ T484] do_syscall_64+0x4c/0xa0 [ 47.645117][ T484] ? clear_bhb_loop+0x50/0xa0 [ 47.649784][ T484] ? clear_bhb_loop+0x50/0xa0 [ 47.654446][ T484] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.660323][ T484] RIP: 0033:0x7f459134aef9 [ 47.664761][ T484] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 47.684350][ T484] RSP: 002b:00007f45911af028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 47.692900][ T484] RAX: ffffffffffffffda RBX: 00007f45915b5fa0 RCX: 00007f459134aef9 [ 47.701772][ T484] RDX: 0000000000000000 RSI: 000000000000aec7 RDI: 0000000000000004 [ 47.709943][ T484] RBP: 00007f45913dfee0 R08: 0000000000000000 R09: 0000000000000000 [ 47.718618][ T484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 47.726757][ T484] R13: 00007f45915b6038 R14: 00007f45915b5fa0 R15: 00007fff8b013638 [ 47.734900][ T484] [ 47.737930][ T484] Modules linked in: [ 47.742203][ T484] ---[ end trace 5ce67eed24dbadc9 ]--- [ 47.745709][ T30] audit: type=1400 audit(1768851232.980:109): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 47.747996][ T484] RIP: 0010:__rmap_write_protect+0x2d/0x3a0 [ 47.776130][ T484] Code: e5 41 57 41 56 41 55 41 54 53 48 83 ec 18 41 89 f4 48 89 fb 49 be 00 00 00 00 00 fc ff df e8 ba 57 50 00 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 df e8 94 7f 8f 00 4c 8b 33 31 ff 4c 89 [ 47.795797][ T484] RSP: 0018:ffffc9000412f898 EFLAGS: 00010206 [ 47.801911][ T484] RAX: 006ff91e0012b200 RBX: 037fc8f000959000 RCX: ffff888118870000 [ 47.802109][ T30] audit: type=1400 audit(1768851232.980:110): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 47.809963][ T484] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 037fc8f000959000 [ 47.809975][ T484] RBP: ffffc9000412f8d8 R08: 0000000000000003 R09: 0000000000000004 [ 47.809984][ T484] R10: dffffc0000000000 R11: fffff52000825f28 R12: 0000000000000001 [ 47.809994][ T484] R13: 037fc8f000959000 R14: dffffc0000000000 R15: ffff88810e390348 [ 47.839511][ T30] audit: type=1400 audit(1768851232.980:111): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 47.847458][ T484] FS: 00007f45911af6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 47.847477][ T484] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 47.847485][ T484] CR2: 0000200000c42000 CR3: 00000001211f5000 CR4: 00000000003526b0 [ 47.847499][ T484] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 47.856048][ T30] audit: type=1400 audit(1768851232.980:112): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 47.863437][ T484] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 47.863452][ T484] Kernel panic - not syncing: Fatal exception [ 47.863733][ T484] Kernel Offset: disabled [ 47.955511][ T484] Rebooting in 86400 seconds..