Warning: Permanently added '10.128.1.253' (ED25519) to the list of known hosts. 2025/12/03 23:01:06 ignoring optional flag "type"="gce" 2025/12/03 23:01:06 parsed 1 programs [ 40.520323][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 40.520341][ T30] audit: type=1400 audit(1764802866.707:92): avc: denied { unlink } for pid=329 comm="syz-executor" name="swap-file" dev="sda1" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2025/12/03 23:01:06 executed programs: 0 [ 40.572754][ T329] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 40.625669][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.633241][ T336] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.641060][ T336] device bridge_slave_0 entered promiscuous mode [ 40.648236][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.656336][ T336] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.664061][ T336] device bridge_slave_1 entered promiscuous mode [ 40.704245][ T30] audit: type=1400 audit(1764802866.887:93): avc: denied { create } for pid=336 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.714822][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.726584][ T30] audit: type=1400 audit(1764802866.887:94): avc: denied { write } for pid=336 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.733748][ T336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.755834][ T30] audit: type=1400 audit(1764802866.887:95): avc: denied { read } for pid=336 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.763226][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.791400][ T336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.809688][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.817170][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.825012][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.832804][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.842265][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.850748][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.858426][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.867880][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.876323][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.883426][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.895142][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.904522][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.917843][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.930340][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.938620][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.946843][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.956194][ T336] device veth0_vlan entered promiscuous mode [ 40.966394][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.975852][ T336] device veth1_macvtap entered promiscuous mode [ 40.984932][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.995639][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.016879][ T30] audit: type=1400 audit(1764802867.197:96): avc: denied { read write } for pid=346 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 41.041958][ T30] audit: type=1400 audit(1764802867.217:97): avc: denied { open } for pid=346 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 41.066762][ T30] audit: type=1400 audit(1764802867.227:98): avc: denied { mounton } for pid=346 comm="syz-executor.0" path="/root/syzkaller-testdir4185567574/syzkaller.ersEgJ/0/file0" dev="sda1" ino=2036 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 41.142183][ T349] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 41.154550][ T349] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 41.163488][ T349] CPU: 0 PID: 349 Comm: syz-executor.0 Not tainted syzkaller #0 [ 41.171811][ T349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 41.182211][ T349] RIP: 0010:filename_create+0x241/0x450 [ 41.188277][ T349] Code: ff ff 48 3d 01 f0 ff ff 49 89 c7 4c 8b 64 24 28 72 07 e8 32 f1 b6 ff eb 6d 48 89 c1 48 c1 e9 03 48 ba 00 00 00 00 00 fc ff df <0f> b6 0c 11 84 c9 0f 85 dd 01 00 00 44 8b 20 44 89 e6 81 e6 00 00 [ 41.208908][ T349] RSP: 0018:ffffc90000dd7d80 EFLAGS: 00010202 [ 41.215084][ T349] RAX: 0000000000000008 RBX: 1ffff920001bafd3 RCX: 0000000000000001 [ 41.223144][ T349] RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffff88810d880000 [ 41.231642][ T349] RBP: ffffc90000dd7e60 R08: dffffc0000000000 R09: ffffed1024012fc6 [ 41.240147][ T349] R10: ffffed1024012fc6 R11: 1ffff11024012fc5 R12: ffffc90000dd7e90 [ 41.248410][ T349] R13: ffffc90000dd7e98 R14: 0000000000000600 R15: 0000000000000008 [ 41.256856][ T349] FS: 00007faf21c546c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 41.266317][ T349] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.273417][ T349] CR2: 00005614f5c0ab70 CR3: 000000011b780000 CR4: 00000000003506b0 [ 41.281653][ T349] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 41.290003][ T349] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 41.298232][ T349] Call Trace: [ 41.301518][ T349] [ 41.304704][ T349] ? kern_path_create+0x1b0/0x1b0 [ 41.309921][ T349] do_mkdirat+0x5c/0x4c0 [ 41.314251][ T349] ? getname_flags+0x206/0x500 [ 41.319105][ T349] __x64_sys_mkdirat+0x89/0xa0 [ 41.324038][ T349] x64_sys_call+0x37e/0x9a0 [ 41.328636][ T349] do_syscall_64+0x4c/0xa0 [ 41.333231][ T349] ? clear_bhb_loop+0x50/0xa0 [ 41.338077][ T349] ? clear_bhb_loop+0x50/0xa0 [ 41.343027][ T349] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 41.349090][ T349] RIP: 0033:0x7faf220f3da9 [ 41.353585][ T349] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 41.374016][ T349] RSP: 002b:00007faf21c540c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 41.382428][ T349] RAX: ffffffffffffffda RBX: 00007faf22222050 RCX: 00007faf220f3da9 [ 41.391109][ T349] RDX: 0000000000000100 RSI: 0000000020000000 RDI: 0000000000000004 [ 41.399319][ T349] RBP: 00007faf2214047a R08: 0000000000000000 R09: 0000000000000000 [ 41.407522][ T349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 41.415872][ T349] R13: 000000000000006e R14: 00007faf22222050 R15: 00007ffd0481a6e8 [ 41.424198][ T349] [ 41.427430][ T349] Modules linked in: [ 41.432687][ T349] ---[ end trace 0e8b66d88ef48dcf ]--- [ 41.434217][ T30] audit: type=1400 audit(1764802867.617:99): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 41.438294][ T349] RIP: 0010:filename_create+0x241/0x450 [ 41.460920][ T30] audit: type=1400 audit(1764802867.617:100): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 41.466719][ T349] Code: ff ff 48 3d 01 f0 ff ff 49 89 c7 4c 8b 64 24 28 72 07 e8 32 f1 b6 ff eb 6d 48 89 c1 48 c1 e9 03 48 ba 00 00 00 00 00 fc ff df <0f> b6 0c 11 84 c9 0f 85 dd 01 00 00 44 8b 20 44 89 e6 81 e6 00 00 [ 41.489504][ T30] audit: type=1400 audit(1764802867.617:101): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 41.510463][ T349] RSP: 0018:ffffc90000dd7d80 EFLAGS: 00010202 [ 41.540011][ T349] RAX: 0000000000000008 RBX: 1ffff920001bafd3 RCX: 0000000000000001 [ 41.548973][ T349] RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffff88810d880000 [ 41.557975][ T349] RBP: ffffc90000dd7e60 R08: dffffc0000000000 R09: ffffed1024012fc6 [ 41.566744][ T349] R10: ffffed1024012fc6 R11: 1ffff11024012fc5 R12: ffffc90000dd7e90 [ 41.575467][ T349] R13: ffffc90000dd7e98 R14: 0000000000000600 R15: 0000000000000008 [ 41.584196][ T349] FS: 00007faf21c546c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 41.593375][ T349] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.600407][ T349] CR2: 0000000020006fe0 CR3: 000000011b780000 CR4: 00000000003506a0 [ 41.609182][ T349] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 41.617783][ T349] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 41.626332][ T349] Kernel panic - not syncing: Fatal exception [ 41.632971][ T349] Kernel Offset: disabled [ 41.637308][ T349] Rebooting in 86400 seconds..