Warning: Permanently added '10.128.1.55' (ED25519) to the list of known hosts. 2025/10/20 02:47:00 parsed 1 programs [ 47.500867][ T24] kauditd_printk_skb: 30 callbacks suppressed [ 47.500887][ T24] audit: type=1400 audit(1760928421.860:104): avc: denied { unlink } for pid=413 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 47.540985][ T413] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 48.129773][ T24] audit: type=1401 audit(1760928422.490:105): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 48.178483][ T435] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.185826][ T435] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.193192][ T435] device bridge_slave_0 entered promiscuous mode [ 48.200389][ T435] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.208355][ T435] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.215965][ T435] device bridge_slave_1 entered promiscuous mode [ 48.252946][ T435] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.260567][ T435] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.267878][ T435] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.275025][ T435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.294407][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.301749][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.309182][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.317331][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.326607][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.335351][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.342380][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.351973][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.360438][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.367719][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.379632][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.389404][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.404022][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.415236][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.423855][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.431901][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.441944][ T435] device veth0_vlan entered promiscuous mode [ 48.452343][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.461669][ T435] device veth1_macvtap entered promiscuous mode [ 48.471406][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.491647][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.554448][ T24] audit: type=1400 audit(1760928422.920:106): avc: denied { create } for pid=447 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 2025/10/20 02:47:03 executed programs: 0 [ 49.068263][ T24] audit: type=1400 audit(1760928423.430:107): avc: denied { write } for pid=406 comm="syz-execprog" path="pipe:[15075]" dev="pipefs" ino=15075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 49.115509][ T476] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.122858][ T476] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.130736][ T476] device bridge_slave_0 entered promiscuous mode [ 49.137790][ T476] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.145060][ T476] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.153169][ T476] device bridge_slave_1 entered promiscuous mode [ 49.185956][ T7] device bridge_slave_1 left promiscuous mode [ 49.192304][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.199868][ T7] device bridge_slave_0 left promiscuous mode [ 49.206057][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.214270][ T7] device veth1_macvtap left promiscuous mode [ 49.220300][ T7] device veth0_vlan left promiscuous mode [ 49.314232][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.322025][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.331375][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.340326][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.349125][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.356206][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.364075][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 49.373213][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.382335][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.390960][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.398405][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.409748][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 49.418329][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.427740][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 49.436145][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.449385][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 49.458214][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.468953][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 49.477449][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.486247][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.494278][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.503467][ T476] device veth0_vlan entered promiscuous mode [ 49.513588][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.522775][ T476] device veth1_macvtap entered promiscuous mode [ 49.532440][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.541200][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.559205][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.567809][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.581891][ T24] audit: type=1400 audit(1760928423.940:108): avc: denied { read write } for pid=480 comm="syz.2.16" name="fuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 49.606731][ T24] audit: type=1400 audit(1760928423.940:109): avc: denied { open } for pid=480 comm="syz.2.16" path="/dev/fuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 49.633193][ T482] general protection fault, probably for non-canonical address 0xdffffc0000000008: 0000 [#1] PREEMPT SMP KASAN [ 49.645862][ T482] KASAN: null-ptr-deref in range [0x0000000000000040-0x0000000000000047] [ 49.654549][ T482] CPU: 1 PID: 482 Comm: syz.2.16 Not tainted syzkaller #0 [ 49.661745][ T482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 49.672016][ T482] RIP: 0010:do_rmdir+0x1cf/0x620 [ 49.677044][ T482] Code: ff 72 0d e8 73 31 bb ff 41 89 dc e9 80 00 00 00 48 89 5c 24 10 4c 8d 63 30 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 e7 e8 03 21 f5 ff 49 83 3c 24 00 74 39 e8 [ 49.697218][ T482] RSP: 0018:ffffc90000c47e40 EFLAGS: 00010203 [ 49.703331][ T482] RAX: 0000000000000008 RBX: 0000000000000015 RCX: dffffc0000000000 [ 49.711349][ T482] RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff88811b27a780 [ 49.719364][ T482] RBP: ffffc90000c47f18 R08: dffffc0000000000 R09: ffffed1022041ba4 [ 49.727331][ T482] R10: ffffed1022041ba4 R11: 1ffff11022041ba3 R12: 0000000000000045 [ 49.735313][ T482] R13: 1ffff11022041b9e R14: ffffc90000c47ea0 R15: 00000000ffffff9c [ 49.743293][ T482] FS: 00007f307348b6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 49.752742][ T482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.760337][ T482] CR2: 00007f307348af98 CR3: 00000001292d1000 CR4: 00000000003506a0 [ 49.768769][ T482] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.777412][ T482] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.785601][ T482] Call Trace: [ 49.789242][ T482] ? d_delete_notify+0xd0/0xd0 [ 49.794257][ T482] ? getname_flags+0x206/0x500 [ 49.799363][ T482] __x64_sys_rmdir+0x49/0x50 [ 49.804094][ T482] do_syscall_64+0x31/0x40 [ 49.808933][ T482] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 49.815787][ T482] RIP: 0033:0x7f3073a32d29 [ 49.820239][ T482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.840570][ T482] RSP: 002b:00007f307348b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000054 [ 49.849280][ T482] RAX: ffffffffffffffda RBX: 00007f3073c23080 RCX: 00007f3073a32d29 [ 49.857276][ T482] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200 [ 49.865349][ T482] RBP: 00007f3073aaeb08 R08: 0000000000000000 R09: 0000000000000000 [ 49.873598][ T482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 49.881766][ T482] R13: 0000000000000001 R14: 00007f3073c23080 R15: 00007ffc03720198 [ 49.890044][ T482] Modules linked in: [ 49.895300][ T482] ---[ end trace 51e487eb098ea6ce ]--- [ 49.896387][ T24] audit: type=1400 audit(1760928424.260:110): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 49.900946][ T482] RIP: 0010:do_rmdir+0x1cf/0x620 [ 49.924030][ T24] audit: type=1400 audit(1760928424.260:111): avc: denied { search } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 49.928559][ T482] Code: ff 72 0d e8 73 31 bb ff 41 89 dc e9 80 00 00 00 48 89 5c 24 10 4c 8d 63 30 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 e7 e8 03 21 f5 ff 49 83 3c 24 00 74 39 e8 [ 49.950441][ T24] audit: type=1400 audit(1760928424.260:112): avc: denied { write } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 49.970300][ T482] RSP: 0018:ffffc90000c47e40 EFLAGS: 00010203 [ 49.998809][ T24] audit: type=1400 audit(1760928424.260:113): avc: denied { add_name } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 50.020170][ T482] RAX: 0000000000000008 RBX: 0000000000000015 RCX: dffffc0000000000 [ 50.028977][ T482] RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff88811b27a780 [ 50.037659][ T482] RBP: ffffc90000c47f18 R08: dffffc0000000000 R09: ffffed1022041ba4 [ 50.046141][ T482] R10: ffffed1022041ba4 R11: 1ffff11022041ba3 R12: 0000000000000045 [ 50.054208][ T482] R13: 1ffff11022041b9e R14: ffffc90000c47ea0 R15: 00000000ffffff9c [ 50.062214][ T482] FS: 00007f307348b6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 50.071334][ T482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 50.078161][ T482] CR2: 00007f307348af98 CR3: 00000001292d1000 CR4: 00000000003506a0 [ 50.086615][ T482] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 50.095455][ T482] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 50.103818][ T482] Kernel panic - not syncing: Fatal exception [ 50.110969][ T482] Kernel Offset: disabled [ 50.115612][ T482] Rebooting in 86400 seconds..