Warning: Permanently added '10.128.0.93' (ED25519) to the list of known hosts. 2025/09/23 06:52:28 parsed 1 programs [ 23.204188][ T30] audit: type=1400 audit(1758610348.145:64): avc: denied { node_bind } for pid=281 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 23.224930][ T30] audit: type=1400 audit(1758610348.145:65): avc: denied { module_request } for pid=281 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 24.085594][ T30] audit: type=1400 audit(1758610349.025:66): avc: denied { mounton } for pid=290 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.086877][ T290] cgroup: Unknown subsys name 'net' [ 24.108280][ T30] audit: type=1400 audit(1758610349.025:67): avc: denied { mount } for pid=290 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.135509][ T30] audit: type=1400 audit(1758610349.055:68): avc: denied { unmount } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.135667][ T290] cgroup: Unknown subsys name 'devices' [ 24.341557][ T290] cgroup: Unknown subsys name 'hugetlb' [ 24.347160][ T290] cgroup: Unknown subsys name 'rlimit' [ 24.492023][ T30] audit: type=1400 audit(1758610349.435:69): avc: denied { setattr } for pid=290 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.515189][ T30] audit: type=1400 audit(1758610349.435:70): avc: denied { create } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.535593][ T30] audit: type=1400 audit(1758610349.435:71): avc: denied { write } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.542932][ T292] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.555865][ T30] audit: type=1400 audit(1758610349.435:72): avc: denied { read } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.584636][ T30] audit: type=1400 audit(1758610349.435:73): avc: denied { mounton } for pid=290 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.634771][ T290] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.017340][ T296] request_module fs-gadgetfs succeeded, but still no fs? [ 25.173246][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.180829][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.188408][ T310] device bridge_slave_0 entered promiscuous mode [ 25.195944][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.203190][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.210581][ T310] device bridge_slave_1 entered promiscuous mode [ 25.217209][ T306] syz-executor (306) used greatest stack depth: 21856 bytes left [ 25.259649][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.266688][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.273981][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.281026][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.298124][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.305726][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.312930][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.322996][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.331156][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.338169][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.346419][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.354575][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.361632][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.372874][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.382629][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.395366][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.406004][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.413999][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.421424][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.430010][ T310] device veth0_vlan entered promiscuous mode [ 25.440534][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.449393][ T310] device veth1_macvtap entered promiscuous mode [ 25.458104][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.468364][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.504307][ T310] syz-executor (310) used greatest stack depth: 21568 bytes left 2025/09/23 06:52:31 executed programs: 0 [ 26.193358][ T362] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.200679][ T362] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.208034][ T362] device bridge_slave_0 entered promiscuous mode [ 26.216225][ T362] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.223362][ T362] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.230654][ T362] device bridge_slave_1 entered promiscuous mode [ 26.286288][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.293956][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.302090][ T45] device bridge_slave_1 left promiscuous mode [ 26.308188][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.316207][ T45] device bridge_slave_0 left promiscuous mode [ 26.322404][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.330335][ T45] device veth1_macvtap left promiscuous mode [ 26.336322][ T45] device veth0_vlan left promiscuous mode [ 26.433478][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.441896][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.450057][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.457070][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.464682][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.473251][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.481589][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.489654][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.496685][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.508143][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.516967][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.530064][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.540940][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.548926][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.556449][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.564634][ T362] device veth0_vlan entered promiscuous mode [ 26.573936][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.582758][ T362] device veth1_macvtap entered promiscuous mode [ 26.591347][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.600972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.621648][ T372] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 26.652478][ T372] general protection fault, probably for non-canonical address 0xe06ff51e0003ea00: 0000 [#1] PREEMPT SMP KASAN [ 26.664181][ T372] KASAN: maybe wild-memory-access in range [0x037fc8f0001f5000-0x037fc8f0001f5007] [ 26.673440][ T372] CPU: 1 PID: 372 Comm: syz.2.17 Not tainted syzkaller #0 [ 26.680535][ T372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 26.690593][ T372] RIP: 0010:__rmap_write_protect+0x2d/0x3a0 [ 26.696481][ T372] Code: e5 41 57 41 56 41 55 41 54 53 48 83 ec 18 41 89 f4 48 89 fb 49 be 00 00 00 00 00 fc ff df e8 ea 91 4f 00 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 df e8 b4 0d 8e 00 4c 8b 33 31 ff 4c 89 [ 26.716070][ T372] RSP: 0018:ffffc90000b57898 EFLAGS: 00010206 [ 26.722128][ T372] RAX: 006ff91e0003ea00 RBX: 037fc8f0001f5000 RCX: ffff8881109162c0 [ 26.730085][ T372] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 037fc8f0001f5000 [ 26.738068][ T372] RBP: ffffc90000b578d8 R08: 0000000000000004 R09: 0000000000000003 [ 26.746029][ T372] R10: fffff5200016af28 R11: 1ffff9200016af28 R12: 0000000000000001 [ 26.753984][ T372] R13: 037fc8f0001f5000 R14: dffffc0000000000 R15: ffff88812a430818 [ 26.761967][ T372] FS: 00005555780ef500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 26.770910][ T372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.777483][ T372] CR2: 0000200000fe9008 CR3: 000000010a923000 CR4: 00000000003526a0 [ 26.785449][ T372] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 26.793406][ T372] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 26.801365][ T372] Call Trace: [ 26.804630][ T372] [ 26.807559][ T372] ? futex_wake+0x600/0x8e0 [ 26.812056][ T372] kvm_mmu_slot_gfn_write_protect+0x14a/0x270 [ 26.818137][ T372] kvm_arch_mmu_enable_log_dirty_pt_masked+0x10c/0x3d0 [ 26.824974][ T372] ? ____kasan_slab_free+0x125/0x160 [ 26.830246][ T372] ? __kasan_slab_free+0x11/0x20 [ 26.835186][ T372] kvm_reset_dirty_gfn+0x19d/0x210 [ 26.840287][ T372] kvm_dirty_ring_reset+0x4a9/0x620 [ 26.845480][ T372] kvm_vm_ioctl_reset_dirty_pages+0x1a3/0x3b0 [ 26.851535][ T372] kvm_vm_ioctl+0x385/0xa80 [ 26.856050][ T372] ? kvm_device_release+0x220/0x220 [ 26.861255][ T372] ? memcpy+0x56/0x70 [ 26.865222][ T372] ? ioctl_has_perm+0x3eb/0x4d0 [ 26.870061][ T372] ? has_cap_mac_admin+0x330/0x330 [ 26.875174][ T372] ? kvm_vcpu_ioctl+0x6ea/0xb80 [ 26.880022][ T372] ? kvm_vcpu_ioctl+0x9b8/0xb80 [ 26.884872][ T372] ? selinux_file_ioctl+0x377/0x480 [ 26.890086][ T372] ? selinux_file_alloc_security+0x120/0x120 [ 26.896067][ T372] ? __se_sys_futex+0x139/0x310 [ 26.900925][ T372] ? __x64_sys_futex+0x100/0x100 [ 26.905865][ T372] ? security_file_ioctl+0x84/0xa0 [ 26.910991][ T372] ? kvm_device_release+0x220/0x220 [ 26.916191][ T372] __se_sys_ioctl+0x121/0x1a0 [ 26.920872][ T372] __x64_sys_ioctl+0x7b/0x90 [ 26.925464][ T372] x64_sys_call+0x2f/0x9a0 [ 26.929877][ T372] do_syscall_64+0x4c/0xa0 [ 26.934288][ T372] ? clear_bhb_loop+0x50/0xa0 [ 26.938969][ T372] ? clear_bhb_loop+0x50/0xa0 [ 26.943652][ T372] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 26.949545][ T372] RIP: 0033:0x7f0c0e587ec9 [ 26.953958][ T372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 26.973560][ T372] RSP: 002b:00007ffca2915eb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 26.981968][ T372] RAX: ffffffffffffffda RBX: 00007f0c0e7defa0 RCX: 00007f0c0e587ec9 [ 26.990047][ T372] RDX: 0000000000000000 RSI: 000000000000aec7 RDI: 0000000000000004 [ 26.998021][ T372] RBP: 00007f0c0e60af91 R08: 0000000000000000 R09: 0000000000000000 [ 27.005992][ T372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 27.013954][ T372] R13: 00007f0c0e7defa0 R14: 00007f0c0e7defa0 R15: 0000000000000002 [ 27.021917][ T372] [ 27.024922][ T372] Modules linked in: [ 27.029139][ T372] ---[ end trace 9a468e75569788de ]--- [ 27.034693][ T372] RIP: 0010:__rmap_write_protect+0x2d/0x3a0 [ 27.040772][ T372] Code: e5 41 57 41 56 41 55 41 54 53 48 83 ec 18 41 89 f4 48 89 fb 49 be 00 00 00 00 00 fc ff df e8 ea 91 4f 00 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 df e8 b4 0d 8e 00 4c 8b 33 31 ff 4c 89 [ 27.060442][ T372] RSP: 0018:ffffc90000b57898 EFLAGS: 00010206 [ 27.066580][ T372] RAX: 006ff91e0003ea00 RBX: 037fc8f0001f5000 RCX: ffff8881109162c0 [ 27.074582][ T372] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 037fc8f0001f5000 [ 27.082572][ T372] RBP: ffffc90000b578d8 R08: 0000000000000004 R09: 0000000000000003 [ 27.090564][ T372] R10: fffff5200016af28 R11: 1ffff9200016af28 R12: 0000000000000001 [ 27.098536][ T372] R13: 037fc8f0001f5000 R14: dffffc0000000000 R15: ffff88812a430818 [ 27.106534][ T372] FS: 00005555780ef500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 27.115486][ T372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 27.122094][ T372] CR2: 0000200000fe9008 CR3: 000000010a923000 CR4: 00000000003526a0 [ 27.130102][ T372] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 27.138088][ T372] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 27.146079][ T372] Kernel panic - not syncing: Fatal exception [ 27.152421][ T372] Kernel Offset: disabled [ 27.156746][ T372] Rebooting in 86400 seconds..