Warning: Permanently added '10.128.0.207' (ED25519) to the list of known hosts. 2026/04/02 02:12:15 parsed 1 programs [ 45.520733][ T28] audit: type=1400 audit(1775095936.417:106): avc: denied { unlink } for pid=384 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 45.565516][ T384] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 46.407186][ T398] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.414721][ T398] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.422341][ T398] device bridge_slave_0 entered promiscuous mode [ 46.430025][ T398] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.437199][ T398] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.444578][ T398] device bridge_slave_1 entered promiscuous mode [ 46.485888][ T398] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.492950][ T398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.500412][ T398] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.507621][ T398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.526303][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.534158][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.541769][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.550927][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.559214][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.566362][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.575780][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.584229][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.591285][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.603024][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.612595][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.626825][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.638313][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.646847][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.654728][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.663895][ T398] device veth0_vlan entered promiscuous mode [ 46.673933][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.683394][ T398] device veth1_macvtap entered promiscuous mode [ 46.693798][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.704072][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.052801][ T28] audit: type=1400 audit(1775095937.947:107): avc: denied { create } for pid=429 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 47.113360][ T28] audit: type=1401 audit(1775095938.007:108): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 2026/04/02 02:12:18 executed programs: 0 [ 47.504465][ T445] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.512145][ T445] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.519583][ T445] device bridge_slave_0 entered promiscuous mode [ 47.528747][ T445] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.535838][ T445] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.543262][ T445] device bridge_slave_1 entered promiscuous mode [ 47.562746][ T8] device bridge_slave_1 left promiscuous mode [ 47.568865][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.576519][ T8] device bridge_slave_0 left promiscuous mode [ 47.582697][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.590588][ T8] device veth1_macvtap left promiscuous mode [ 47.596626][ T8] device veth0_vlan left promiscuous mode [ 47.697766][ T445] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.704863][ T445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.712150][ T445] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.719183][ T445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.738916][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.746633][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.754007][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.763434][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.771657][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.778776][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.788638][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.796999][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.804055][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.815716][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.825216][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.838503][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.849682][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.858041][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.866048][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.874477][ T445] device veth0_vlan entered promiscuous mode [ 47.887103][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.896972][ T445] device veth1_macvtap entered promiscuous mode [ 47.906254][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.916287][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.946846][ T451] loop2: detected capacity change from 0 to 2048 [ 47.954942][ T451] EXT4-fs: Ignoring removed nobh option [ 47.971710][ T451] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 47.980790][ T28] audit: type=1400 audit(1775095938.877:109): avc: denied { mount } for pid=450 comm="syz.2.16" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 47.980787][ T451] ext4 filesystem being mounted at /0/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 48.018863][ T28] audit: type=1400 audit(1775095938.917:110): avc: denied { write } for pid=450 comm="syz.2.16" name="file0" dev="loop2" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 48.020868][ T451] ------------[ cut here ]------------ [ 48.041088][ T28] audit: type=1400 audit(1775095938.917:111): avc: denied { add_name } for pid=450 comm="syz.2.16" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 48.046311][ T451] kernel BUG at fs/ext4/mballoc.c:1942! [ 48.066830][ T28] audit: type=1400 audit(1775095938.917:112): avc: denied { create } for pid=450 comm="syz.2.16" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 48.072393][ T451] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 48.098325][ T451] CPU: 0 PID: 451 Comm: syz.2.16 Not tainted syzkaller #0 [ 48.105441][ T451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 48.115499][ T451] RIP: 0010:mb_mark_used+0x1545/0x1560 [ 48.120969][ T451] Code: 0f 0b e8 7e 74 81 ff 0f 0b e8 77 74 81 ff 0f 0b e8 70 74 81 ff 0f 0b e8 69 74 81 ff 0f 0b e8 62 74 81 ff 0f 0b e8 5b 74 81 ff <0f> 0b e8 54 74 81 ff 0f 0b e8 4d 74 81 ff 0f 0b 66 2e 0f 1f 84 00 [ 48.140726][ T451] RSP: 0018:ffffc90000a47588 EFLAGS: 00010293 [ 48.146796][ T451] RAX: ffffffff81effaa5 RBX: 0000000080000000 RCX: ffff88811b855100 [ 48.154766][ T451] RDX: 0000000000000000 RSI: ffffffff80000000 RDI: 0000000000008000 [ 48.162819][ T451] RBP: ffffc90000a47668 R08: ffff88811c356003 R09: 1ffff1102386ac00 [ 48.170783][ T451] R10: dffffc0000000000 R11: ffffed102386ac01 R12: ffffffff80000000 [ 48.178749][ T451] R13: 0000000000008000 R14: ffffc90000a47730 R15: ffff88811c585000 [ 48.186909][ T451] FS: 00007f551d2176c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 48.195933][ T451] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.202513][ T451] CR2: 0000400000015000 CR3: 000000012d08c000 CR4: 00000000003506b0 [ 48.210482][ T451] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 48.218447][ T451] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 48.226421][ T451] Call Trace: [ 48.229697][ T451] [ 48.232653][ T451] ? _find_next_bit+0x8a/0x130 [ 48.237423][ T451] ext4_try_to_trim_range+0x5d4/0xfb0 [ 48.242797][ T451] ext4_trim_fs+0xbc8/0x1300 [ 48.247386][ T451] ? __cfi_ext4_trim_fs+0x10/0x10 [ 48.252409][ T451] ? __kasan_check_write+0x14/0x20 [ 48.257524][ T451] ext4_ioctl+0x26f9/0x3ee0 [ 48.262019][ T451] ? memcpy+0x56/0x70 [ 48.266000][ T451] ? __cfi_ext4_ioctl+0x10/0x10 [ 48.270931][ T451] ? preempt_schedule_common+0xbe/0xf0 [ 48.276383][ T451] ? __cfi_avc_has_extended_perms+0x10/0x10 [ 48.282275][ T451] ? __kasan_check_read+0x11/0x20 [ 48.287294][ T451] ? ttwu_do_wakeup+0xfb/0x490 [ 48.292059][ T451] ? __asan_set_shadow_00+0xe/0x10 [ 48.297174][ T451] ? do_vfs_ioctl+0x1b6c/0x1cd0 [ 48.302117][ T451] ? __ia32_compat_sys_ioctl+0x860/0x860 [ 48.307746][ T451] ? wake_up_q+0x105/0x1b0 [ 48.312156][ T451] ? futex_wake+0x5fa/0x8e0 [ 48.316663][ T451] ? ioctl_has_perm+0x1b8/0x4f0 [ 48.321575][ T451] ? ioctl_has_perm+0x3a6/0x4f0 [ 48.326445][ T451] ? has_cap_mac_admin+0x370/0x370 [ 48.331646][ T451] ? __kasan_slab_free+0x11/0x20 [ 48.336633][ T451] ? do_futex+0x2bf/0x430 [ 48.341047][ T451] ? selinux_file_ioctl+0x3a0/0x4d0 [ 48.346250][ T451] ? __cfi_do_futex+0x10/0x10 [ 48.350925][ T451] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 48.356478][ T451] ? __fget_files+0x2d5/0x330 [ 48.361153][ T451] ? security_file_ioctl+0x95/0xc0 [ 48.366438][ T451] ? __cfi_ext4_ioctl+0x10/0x10 [ 48.371461][ T451] __se_sys_ioctl+0x12f/0x1b0 [ 48.376138][ T451] __x64_sys_ioctl+0x7b/0x90 [ 48.380732][ T451] x64_sys_call+0x58b/0x9a0 [ 48.385255][ T451] do_syscall_64+0x4c/0xa0 [ 48.389722][ T451] ? clear_bhb_loop+0x30/0x80 [ 48.394901][ T451] ? clear_bhb_loop+0x30/0x80 [ 48.399610][ T451] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 48.405503][ T451] RIP: 0033:0x7f551c3978f9 [ 48.409925][ T451] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 48.429876][ T451] RSP: 002b:00007f551d217028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 48.438377][ T451] RAX: ffffffffffffffda RBX: 00007f551c5c5fa0 RCX: 00007f551c3978f9 [ 48.446454][ T451] RDX: 0000400000000b40 RSI: 00000000c0185879 RDI: 0000000000000006 [ 48.454424][ T451] RBP: 00007f551c4291bc R08: 0000000000000000 R09: 0000000000000000 [ 48.462581][ T451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 48.470642][ T451] R13: 0000000000000000 R14: 00007f551c5c5fa0 R15: 00007ffc7880e4b8 [ 48.478877][ T451] [ 48.481899][ T451] Modules linked in: [ 48.486291][ T451] ---[ end trace 0000000000000000 ]--- [ 48.491971][ T451] RIP: 0010:mb_mark_used+0x1545/0x1560 [ 48.497559][ T451] Code: 0f 0b e8 7e 74 81 ff 0f 0b e8 77 74 81 ff 0f 0b e8 70 74 81 ff 0f 0b e8 69 74 81 ff 0f 0b e8 62 74 81 ff 0f 0b e8 5b 74 81 ff <0f> 0b e8 54 74 81 ff 0f 0b e8 4d 74 81 ff 0f 0b 66 2e 0f 1f 84 00 [ 48.517363][ T451] RSP: 0018:ffffc90000a47588 EFLAGS: 00010293 [ 48.517438][ T28] audit: type=1400 audit(1775095938.917:113): avc: denied { read write open } for pid=450 comm="syz.2.16" path="/0/file0/file0/bus" dev="loop2" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 48.523490][ T451] RAX: ffffffff81effaa5 RBX: 0000000080000000 RCX: ffff88811b855100 [ 48.523506][ T451] RDX: 0000000000000000 RSI: ffffffff80000000 RDI: 0000000000008000 [ 48.523519][ T451] RBP: ffffc90000a47668 R08: ffff88811c356003 R09: 1ffff1102386ac00 [ 48.547508][ T28] audit: type=1400 audit(1775095938.917:114): avc: denied { mounton } for pid=450 comm="syz.2.16" path="/0/file0/file0/bus" dev="loop2" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 48.555163][ T451] R10: dffffc0000000000 R11: ffffed102386ac01 R12: ffffffff80000000 [ 48.555178][ T451] R13: 0000000000008000 R14: ffffc90000a47730 R15: ffff88811c585000 [ 48.610622][ T451] FS: 00007f551d2176c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 48.619759][ T451] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.626545][ T451] CR2: 0000400000015000 CR3: 000000012d08c000 CR4: 00000000003506b0 [ 48.634551][ T451] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 48.642541][ T451] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 48.650548][ T451] Kernel panic - not syncing: Fatal exception [ 48.657064][ T451] Kernel Offset: disabled [ 48.661381][ T451] Rebooting in 86400 seconds..