Warning: Permanently added '10.128.1.140' (ED25519) to the list of known hosts. 2025/07/05 18:58:03 ignoring optional flag "sandboxArg"="0" 2025/07/05 18:58:03 ignoring optional flag "type"="gce" 2025/07/05 18:58:04 parsed 1 programs [ 44.231750][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 44.231763][ T30] audit: type=1400 audit(1751741884.140:92): avc: denied { unlink } for pid=328 comm="syz-executor" name="swap-file" dev="sda1" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2025/07/05 18:58:04 executed programs: 0 [ 44.291482][ T328] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 44.337002][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.344219][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.351707][ T334] device bridge_slave_0 entered promiscuous mode [ 44.358381][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.365450][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.372897][ T334] device bridge_slave_1 entered promiscuous mode [ 44.408449][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.415529][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.422818][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.429853][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.445127][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.452475][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.459929][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.467844][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.476763][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.485022][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.492050][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.500451][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.508832][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.515860][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.526958][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.536199][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.548502][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.558900][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.567063][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.574598][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.582782][ T334] device veth0_vlan entered promiscuous mode [ 44.591757][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.600892][ T334] device veth1_macvtap entered promiscuous mode [ 44.609627][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.619218][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.638107][ T30] audit: type=1400 audit(1751741884.540:93): avc: denied { read write } for pid=344 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 44.661916][ T30] audit: type=1400 audit(1751741884.570:94): avc: denied { open } for pid=344 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 44.685467][ T30] audit: type=1400 audit(1751741884.570:95): avc: denied { mounton } for pid=344 comm="syz-executor.0" path="/root/syzkaller-testdir2352245100/syzkaller.es6lao/0/file0" dev="sda1" ino=2036 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 44.713800][ T345] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN [ 44.725505][ T345] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] [ 44.733896][ T345] CPU: 0 PID: 345 Comm: syz-executor.0 Not tainted 5.15.185-syzkaller-1080761-g5cf73bface18 #0 [ 44.744192][ T345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 44.754232][ T345] RIP: 0010:step_into+0x12e/0xd10 [ 44.759261][ T345] Code: 4c 8b 74 24 18 c6 44 24 7f 00 43 0f b6 44 25 00 84 c0 0f 85 6f 0a 00 00 45 8b 36 4c 8b bc 24 a8 00 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 6e 0a 00 00 45 8b 3f 44 89 fe 81 e6 00 [ 44.778938][ T345] RSP: 0018:ffffc90000d7f8a0 EFLAGS: 00010202 [ 44.785015][ T345] RAX: 0000000000000002 RBX: ffffc90000d7fc20 RCX: ffff88810d9d8000 [ 44.792964][ T345] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 44.800909][ T345] RBP: ffffc90000d7f9b0 R08: 0000000000000000 R09: ffffed10246b41c5 [ 44.808857][ T345] R10: ffffed10246b41c5 R11: 1ffff110246b41c4 R12: dffffc0000000000 [ 44.816803][ T345] R13: 1ffff920001aff8b R14: 0000000000000011 R15: 0000000000000010 [ 44.824751][ T345] FS: 00007f5259b676c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 44.833663][ T345] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 44.840224][ T345] CR2: 000055b9a83e1800 CR3: 0000000120a78000 CR4: 00000000003506b0 [ 44.848173][ T345] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 44.856122][ T345] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 44.864072][ T345] Call Trace: [ 44.867328][ T345] [ 44.870239][ T345] ? down_read+0xa5/0xf0 [ 44.874463][ T345] ? __down_common+0x370/0x370 [ 44.879206][ T345] ? set_root+0x400/0x400 [ 44.883516][ T345] walk_component+0x26a/0x460 [ 44.888168][ T345] link_path_walk+0x662/0xd40 [ 44.892823][ T345] ? handle_lookup_down+0x130/0x130 [ 44.898035][ T345] path_lookupat+0x95/0x490 [ 44.902519][ T345] filename_lookup+0x1e2/0x4f0 [ 44.907260][ T345] ? hashlen_string+0x120/0x120 [ 44.912115][ T345] user_path_at_empty+0x47/0x1c0 [ 44.917047][ T345] __se_sys_mount+0x2e3/0x380 [ 44.921879][ T345] ? __x64_sys_mount+0xd0/0xd0 [ 44.926618][ T345] ? __kasan_check_write+0x14/0x20 [ 44.931705][ T345] __x64_sys_mount+0xbf/0xd0 [ 44.936384][ T345] x64_sys_call+0x6bf/0x9a0 [ 44.940887][ T345] do_syscall_64+0x4c/0xa0 [ 44.945366][ T345] ? clear_bhb_loop+0x50/0xa0 [ 44.950020][ T345] ? clear_bhb_loop+0x50/0xa0 [ 44.954672][ T345] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 44.960539][ T345] RIP: 0033:0x7f5259fe5da9 [ 44.964931][ T345] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 44.984607][ T345] RSP: 002b:00007f5259b670c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 44.993010][ T345] RAX: ffffffffffffffda RBX: 00007f525a113f80 RCX: 00007f5259fe5da9 [ 45.001075][ T345] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000000 [ 45.009025][ T345] RBP: 00007f525a03247a R08: 0000000000000000 R09: 0000000000000000 [ 45.016974][ T345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 45.025008][ T345] R13: 000000000000000b R14: 00007f525a113f80 R15: 00007ffe544384f8 [ 45.032965][ T345] [ 45.035964][ T345] Modules linked in: [ 45.040546][ T345] ---[ end trace 80efa52c53d6b2d7 ]--- [ 45.042332][ T30] audit: type=1400 audit(1751741884.940:96): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 45.046078][ T345] RIP: 0010:step_into+0x12e/0xd10 [ 45.069424][ T30] audit: type=1400 audit(1751741884.940:97): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 45.073052][ T345] Code: 4c 8b 74 24 18 c6 44 24 7f 00 43 0f b6 44 25 00 84 c0 0f 85 6f 0a 00 00 45 8b 36 4c 8b bc 24 a8 00 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 6e 0a 00 00 45 8b 3f 44 89 fe 81 e6 00 [ 45.094339][ T30] audit: type=1400 audit(1751741884.940:98): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 45.113813][ T345] RSP: 0018:ffffc90000d7f8a0 EFLAGS: 00010202 [ 45.135647][ T30] audit: type=1400 audit(1751741884.940:99): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 45.141332][ T345] RAX: 0000000000000002 RBX: ffffc90000d7fc20 RCX: ffff88810d9d8000 [ 45.162036][ T30] audit: type=1400 audit(1751741884.940:100): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 45.169821][ T345] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 45.190629][ T30] audit: type=1400 audit(1751741884.940:101): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 45.198428][ T345] RBP: ffffc90000d7f9b0 R08: 0000000000000000 R09: ffffed10246b41c5 [ 45.229294][ T345] R10: ffffed10246b41c5 R11: 1ffff110246b41c4 R12: dffffc0000000000 [ 45.237432][ T345] R13: 1ffff920001aff8b R14: 0000000000000011 R15: 0000000000000010 [ 45.245467][ T345] FS: 00007f5259b676c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 45.254432][ T345] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 45.261019][ T345] CR2: 000055b9a83e1800 CR3: 0000000120a78000 CR4: 00000000003506b0 [ 45.268995][ T345] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 45.276975][ T345] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 45.284982][ T345] Kernel panic - not syncing: Fatal exception [ 45.291431][ T345] Kernel Offset: disabled [ 45.295749][ T345] Rebooting in 86400 seconds..