Warning: Permanently added '10.128.0.177' (ED25519) to the list of known hosts. 2025/10/29 17:54:14 ignoring optional flag "type"="gce" 2025/10/29 17:54:14 parsed 1 programs [ 38.458139][ T24] kauditd_printk_skb: 18 callbacks suppressed [ 38.458149][ T24] audit: type=1400 audit(1761760454.700:92): avc: denied { unlink } for pid=317 comm="syz-executor" name="swap-file" dev="sda1" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2025/10/29 17:54:14 executed programs: 0 [ 38.499154][ T317] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 38.541678][ T324] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.549143][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.556581][ T324] device bridge_slave_0 entered promiscuous mode [ 38.563424][ T324] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.570752][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.578429][ T324] device bridge_slave_1 entered promiscuous mode [ 38.607048][ T324] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.615362][ T324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.623738][ T324] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.631524][ T324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.647397][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.654940][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.662770][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.670550][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.680235][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.688777][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.696597][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.706240][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.714903][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.722507][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.733526][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.743305][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.755479][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.766177][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.774789][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.782788][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.791657][ T324] device veth0_vlan entered promiscuous mode [ 38.800900][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.810784][ T324] device veth1_macvtap entered promiscuous mode [ 38.820092][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.829538][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.848448][ T24] audit: type=1400 audit(1761760455.090:93): avc: denied { read write } for pid=328 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 38.872775][ T24] audit: type=1400 audit(1761760455.090:94): avc: denied { open } for pid=328 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 38.896735][ T24] audit: type=1400 audit(1761760455.120:95): avc: denied { mounton } for pid=328 comm="syz-executor.0" path="/root/syzkaller-testdir1111922225/syzkaller.R2ZEaM/0/file0" dev="sda1" ino=2036 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 38.924512][ T329] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 38.936835][ T329] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 38.945329][ T329] CPU: 0 PID: 329 Comm: syz-executor.0 Not tainted syzkaller #0 [ 38.953144][ T329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 38.963324][ T329] RIP: 0010:path_openat+0x1738/0x3160 [ 38.969116][ T329] Code: ae 61 02 00 49 63 de 4c 8b 74 24 38 e9 86 fb ff ff e8 bc 78 bb ff 44 8b 6c 24 14 44 8b a4 24 80 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 75 09 00 00 44 8b 33 be 00 00 70 00 44 [ 38.989626][ T329] RSP: 0018:ffffc90000f1f9e0 EFLAGS: 00010202 [ 38.996053][ T329] RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff88810ba72780 [ 39.004449][ T329] RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff88810ba72780 [ 39.012820][ T329] RBP: ffffc90000f1fbf0 R08: dffffc0000000000 R09: ffffed10219cada4 [ 39.021039][ T329] R10: ffffed10219cada4 R11: 1ffff110219cada3 R12: 0000000000000000 [ 39.029340][ T329] R13: 0000000000000000 R14: ffff88810d8b2498 R15: dffffc0000000000 [ 39.037571][ T329] FS: 00007f9dc0a2e6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 39.047294][ T329] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 39.054147][ T329] CR2: 00007f9dc0fc7000 CR3: 000000010d0cb000 CR4: 00000000003506b0 [ 39.062391][ T329] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 39.070517][ T329] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 39.079609][ T329] Call Trace: [ 39.084080][ T329] ? do_filp_open+0x3e0/0x3e0 [ 39.089250][ T329] ? expand_files+0xde/0x8e0 [ 39.094266][ T329] do_filp_open+0x1b3/0x3e0 [ 39.098856][ T329] ? vfs_tmpfile+0x2c0/0x2c0 [ 39.103732][ T329] ? get_unused_fd_flags+0x92/0xa0 [ 39.109016][ T329] do_sys_openat2+0x14c/0x6d0 [ 39.113785][ T329] ? do_sys_open+0xe0/0xe0 [ 39.118655][ T329] ? __kasan_check_write+0x14/0x20 [ 39.124121][ T329] ? switch_fpu_return+0x197/0x340 [ 39.129567][ T329] ? fpu__clear_all+0x20/0x20 [ 39.134514][ T329] __x64_sys_openat+0x136/0x160 [ 39.139710][ T329] do_syscall_64+0x31/0x40 [ 39.144104][ T329] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 39.150225][ T329] RIP: 0033:0x7f9dc0eabae9 [ 39.154821][ T329] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 39.175668][ T329] RSP: 002b:00007f9dc0a2e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 39.184660][ T329] RAX: ffffffffffffffda RBX: 00007f9dc0fcaf80 RCX: 00007f9dc0eabae9 [ 39.192934][ T329] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 39.201156][ T329] RBP: 00007f9dc0ef747a R08: 0000000000000000 R09: 0000000000000000 [ 39.209193][ T329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 39.217578][ T329] R13: 000000000000000b R14: 00007f9dc0fcaf80 R15: 00007ffe877e5ef8 [ 39.226015][ T329] Modules linked in: [ 39.230541][ T329] ---[ end trace 33f23041ca7df4e8 ]--- [ 39.232107][ T24] audit: type=1400 audit(1761760455.480:96): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 39.237078][ T329] RIP: 0010:path_openat+0x1738/0x3160 [ 39.259969][ T24] audit: type=1400 audit(1761760455.480:97): avc: denied { search } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 39.265509][ T329] Code: ae 61 02 00 49 63 de 4c 8b 74 24 38 e9 86 fb ff ff e8 bc 78 bb ff 44 8b 6c 24 14 44 8b a4 24 80 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 75 09 00 00 44 8b 33 be 00 00 70 00 44 [ 39.287848][ T24] audit: type=1400 audit(1761760455.480:98): avc: denied { write } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 39.308599][ T329] RSP: 0018:ffffc90000f1f9e0 EFLAGS: 00010202 [ 39.330741][ T24] audit: type=1400 audit(1761760455.480:99): avc: denied { add_name } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 39.337929][ T329] RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff88810ba72780 [ 39.360773][ T24] audit: type=1400 audit(1761760455.480:100): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 39.369627][ T329] RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff88810ba72780 [ 39.390669][ T24] audit: type=1400 audit(1761760455.480:101): avc: denied { append open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 39.423851][ T329] RBP: ffffc90000f1fbf0 R08: dffffc0000000000 R09: ffffed10219cada4 [ 39.432587][ T329] R10: ffffed10219cada4 R11: 1ffff110219cada3 R12: 0000000000000000 [ 39.440889][ T329] R13: 0000000000000000 R14: ffff88810d8b2498 R15: dffffc0000000000 [ 39.449547][ T329] FS: 00007f9dc0a2e6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 39.458982][ T329] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 39.465911][ T329] CR2: 00007f9dc0fc7000 CR3: 000000010d0cb000 CR4: 00000000003506b0 [ 39.474478][ T329] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 39.483344][ T329] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 39.491776][ T329] Kernel panic - not syncing: Fatal exception [ 39.498146][ T329] Kernel Offset: disabled [ 39.502925][ T329] Rebooting in 86400 seconds..