Warning: Permanently added '10.128.1.151' (ED25519) to the list of known hosts. 2025/10/02 21:43:23 parsed 1 programs [ 47.008494][ T24] kauditd_printk_skb: 30 callbacks suppressed [ 47.008507][ T24] audit: type=1400 audit(1759441404.410:104): avc: denied { unlink } for pid=414 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 47.072784][ T414] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.724701][ T24] audit: type=1400 audit(1759441405.120:105): avc: denied { create } for pid=440 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 47.917655][ T24] audit: type=1401 audit(1759441405.310:106): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 48.122426][ T465] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.129641][ T465] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.136981][ T465] device bridge_slave_0 entered promiscuous mode [ 48.144063][ T465] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.151250][ T465] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.158727][ T465] device bridge_slave_1 entered promiscuous mode [ 48.195144][ T465] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.202319][ T465] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.209606][ T465] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.216660][ T465] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.234660][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.242417][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.249786][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.259815][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.267991][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.275135][ T379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.283814][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.292117][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.299166][ T379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.312033][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.321362][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.335205][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.352421][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.361059][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.369154][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.378875][ T465] device veth0_vlan entered promiscuous mode [ 48.394142][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.403401][ T465] device veth1_macvtap entered promiscuous mode [ 48.413117][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.423183][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2025/10/02 21:43:25 executed programs: 0 [ 48.577244][ T24] audit: type=1400 audit(1759441405.970:107): avc: denied { write } for pid=407 comm="syz-execprog" path="pipe:[15828]" dev="pipefs" ino=15828 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 48.627015][ T475] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.634863][ T475] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.642904][ T475] device bridge_slave_0 entered promiscuous mode [ 48.650298][ T475] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.657338][ T475] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.665018][ T475] device bridge_slave_1 entered promiscuous mode [ 48.706483][ T475] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.713646][ T475] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.721042][ T475] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.728123][ T475] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.751083][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.759192][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.766502][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.781477][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.790041][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.797311][ T379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.806038][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.814340][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.821519][ T379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.849026][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.857348][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.875105][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.886249][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.894607][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.902461][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.910716][ T475] device veth0_vlan entered promiscuous mode [ 48.922212][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.931300][ T475] device veth1_macvtap entered promiscuous mode [ 48.940971][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.952386][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.975749][ T24] audit: type=1400 audit(1759441406.370:108): avc: denied { read write } for pid=499 comm="syz.2.16" name="fuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 48.999797][ T24] audit: type=1400 audit(1759441406.370:109): avc: denied { open } for pid=499 comm="syz.2.16" path="/dev/fuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 49.027860][ T501] general protection fault, probably for non-canonical address 0xdffffc0000000007: 0000 [#1] PREEMPT SMP KASAN [ 49.039857][ T501] KASAN: null-ptr-deref in range [0x0000000000000038-0x000000000000003f] [ 49.048413][ T501] CPU: 1 PID: 501 Comm: syz.2.16 Not tainted syzkaller #0 [ 49.055514][ T501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 49.065820][ T501] RIP: 0010:do_unlinkat+0x26f/0x670 [ 49.071027][ T501] Code: 44 89 ee e8 e3 26 bb ff 45 31 ff 41 81 fd 00 00 20 00 41 0f 95 c7 41 83 c7 eb e9 95 00 00 00 49 8d 7e 30 48 89 f8 48 c1 e8 03 <42> 80 3c 28 00 74 05 e8 a5 12 f5 ff 49 8b 5e 30 4c 89 f0 48 c1 e8 [ 49.090738][ T501] RSP: 0018:ffffc90002ea7e20 EFLAGS: 00010202 [ 49.097378][ T501] RAX: 0000000000000007 RBX: 0000000000000000 RCX: 0000000000000000 [ 49.105439][ T501] RDX: ffff888116d462c0 RSI: 0000000000000000 RDI: 0000000000000038 [ 49.113407][ T501] RBP: ffffc90002ea7f18 R08: dffffc0000000000 R09: ffffed10220d2e72 [ 49.121554][ T501] R10: ffffed10220d2e72 R11: 1ffff110220d2e71 R12: 1ffff110220d2e6c [ 49.129536][ T501] R13: dffffc0000000000 R14: 0000000000000008 R15: ffff888110697360 [ 49.137565][ T501] FS: 00007f53aaf3e6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 49.146491][ T501] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.153075][ T501] CR2: 00007f53aaf3df98 CR3: 000000011782e000 CR4: 00000000003506a0 [ 49.161049][ T501] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.169022][ T501] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.177180][ T501] Call Trace: [ 49.180469][ T501] ? __check_object_size+0x2f4/0x3c0 [ 49.185858][ T501] ? fsnotify_link_count+0x90/0x90 [ 49.191326][ T501] ? getname_flags+0x206/0x500 [ 49.196203][ T501] __x64_sys_unlink+0x49/0x50 [ 49.201024][ T501] do_syscall_64+0x31/0x40 [ 49.205446][ T501] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 49.211378][ T501] RIP: 0033:0x7f53ab4ed169 [ 49.215802][ T501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.235809][ T501] RSP: 002b:00007f53aaf3e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 49.244416][ T501] RAX: ffffffffffffffda RBX: 00007f53ab706080 RCX: 00007f53ab4ed169 [ 49.252481][ T501] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000400000000100 [ 49.260717][ T501] RBP: 00007f53ab56e2a0 R08: 0000000000000000 R09: 0000000000000000 [ 49.268685][ T501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 49.276848][ T501] R13: 0000000000000000 R14: 00007f53ab706080 R15: 00007ffe2058bb98 [ 49.284822][ T501] Modules linked in: [ 49.290117][ T501] ---[ end trace ff93c7694d26527d ]--- [ 49.293653][ T24] audit: type=1400 audit(1759441406.690:110): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 49.295612][ T501] RIP: 0010:do_unlinkat+0x26f/0x670 [ 49.319910][ T24] audit: type=1400 audit(1759441406.690:111): avc: denied { search } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 49.323661][ T501] Code: 44 89 ee e8 e3 26 bb ff 45 31 ff 41 81 fd 00 00 20 00 41 0f 95 c7 41 83 c7 eb e9 95 00 00 00 49 8d 7e 30 48 89 f8 48 c1 e8 03 <42> 80 3c 28 00 74 05 e8 a5 12 f5 ff 49 8b 5e 30 4c 89 f0 48 c1 e8 [ 49.345335][ T24] audit: type=1400 audit(1759441406.690:112): avc: denied { write } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 49.387072][ T501] RSP: 0018:ffffc90002ea7e20 EFLAGS: 00010202 [ 49.387908][ T24] audit: type=1400 audit(1759441406.690:113): avc: denied { add_name } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 49.393712][ T501] RAX: 0000000000000007 RBX: 0000000000000000 RCX: 0000000000000000 [ 49.422620][ T501] RDX: ffff888116d462c0 RSI: 0000000000000000 RDI: 0000000000000038 [ 49.431083][ T501] RBP: ffffc90002ea7f18 R08: dffffc0000000000 R09: ffffed10220d2e72 [ 49.439215][ T501] R10: ffffed10220d2e72 R11: 1ffff110220d2e71 R12: 1ffff110220d2e6c [ 49.447413][ T501] R13: dffffc0000000000 R14: 0000000000000008 R15: ffff888110697360 [ 49.456244][ T501] FS: 00007f53aaf3e6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 49.465516][ T501] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.472197][ T501] CR2: 00007f53aaf3df98 CR3: 000000011782e000 CR4: 00000000003506a0 [ 49.480351][ T501] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.488681][ T501] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.496794][ T501] Kernel panic - not syncing: Fatal exception [ 49.503282][ T501] Kernel Offset: disabled [ 49.507718][ T501] Rebooting in 86400 seconds..