Warning: Permanently added '10.128.1.124' (ED25519) to the list of known hosts. 2025/08/31 11:34:01 ignoring optional flag "type"="gce" 2025/08/31 11:34:01 parsed 1 programs [ 44.577769][ T28] kauditd_printk_skb: 18 callbacks suppressed [ 44.577784][ T28] audit: type=1400 audit(1756640041.378:92): avc: denied { unlink } for pid=329 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2025/08/31 11:34:01 executed programs: 0 [ 44.623856][ T329] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 44.677419][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.684740][ T336] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.692393][ T336] device bridge_slave_0 entered promiscuous mode [ 44.699727][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.707542][ T336] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.715179][ T336] device bridge_slave_1 entered promiscuous mode [ 44.758523][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.766358][ T336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.774667][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.782264][ T336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.799908][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.807378][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.815301][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.823538][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.833026][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.842433][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.849972][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.859006][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.867628][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.874842][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.886778][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.897622][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.912121][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.923919][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.932294][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.940379][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.948940][ T336] device veth0_vlan entered promiscuous mode [ 44.959728][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.969560][ T336] device veth1_macvtap entered promiscuous mode [ 44.979011][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.989566][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.011742][ T28] audit: type=1400 audit(1756640041.808:93): avc: denied { read write } for pid=346 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 45.036262][ T28] audit: type=1400 audit(1756640041.808:94): avc: denied { open } for pid=346 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 45.060890][ T28] audit: type=1400 audit(1756640041.808:95): avc: denied { mounton } for pid=346 comm="syz-executor.0" path="/root/syzkaller-testdir3098843011/syzkaller.24qFVJ/0/file0" dev="sda1" ino=2035 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 45.846028][ T28] audit: type=1400 audit(1756640042.638:96): avc: denied { unmount } for pid=336 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 2025/08/31 11:34:06 executed programs: 6 2025/08/31 11:34:11 executed programs: 12 2025/08/31 11:34:17 executed programs: 18 2025/08/31 11:34:22 executed programs: 24 2025/08/31 11:34:27 executed programs: 30 2025/08/31 11:34:32 executed programs: 36 2025/08/31 11:34:37 executed programs: 42 2025/08/31 11:34:42 executed programs: 48 2025/08/31 11:34:47 executed programs: 54 2025/08/31 11:34:52 executed programs: 60 2025/08/31 11:34:57 executed programs: 66 2025/08/31 11:35:02 executed programs: 72 2025/08/31 11:35:07 executed programs: 78 2025/08/31 11:35:12 executed programs: 84 2025/08/31 11:35:17 executed programs: 90 2025/08/31 11:35:22 executed programs: 96 2025/08/31 11:35:27 executed programs: 102 2025/08/31 11:35:33 executed programs: 108 2025/08/31 11:35:38 executed programs: 114 2025/08/31 11:35:43 executed programs: 120 2025/08/31 11:35:48 executed programs: 126 2025/08/31 11:35:53 executed programs: 132 2025/08/31 11:35:58 executed programs: 138 2025/08/31 11:36:03 executed programs: 144 2025/08/31 11:36:08 executed programs: 150 2025/08/31 11:36:13 executed programs: 156 2025/08/31 11:36:18 executed programs: 162 2025/08/31 11:36:23 executed programs: 168 2025/08/31 11:36:28 executed programs: 174 2025/08/31 11:36:33 executed programs: 180 2025/08/31 11:36:39 executed programs: 186 2025/08/31 11:36:44 executed programs: 192 2025/08/31 11:36:49 executed programs: 198 2025/08/31 11:36:54 executed programs: 204 2025/08/31 11:36:59 executed programs: 210 2025/08/31 11:37:04 executed programs: 216 2025/08/31 11:37:09 executed programs: 222 2025/08/31 11:37:14 executed programs: 228 2025/08/31 11:37:19 executed programs: 234 2025/08/31 11:37:24 executed programs: 240 [ 252.191611][ T1331] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 252.203833][ T1331] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 252.212683][ T1331] CPU: 0 PID: 1331 Comm: syz-executor.0 Not tainted syzkaller #0 [ 252.221113][ T1331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 252.232734][ T1331] RIP: 0010:filename_create+0x241/0x450 [ 252.239039][ T1331] Code: ff ff 48 3d 01 f0 ff ff 49 89 c7 4c 8b 64 24 28 72 07 e8 12 d6 af ff eb 6d 48 89 c1 48 c1 e9 03 48 ba 00 00 00 00 00 fc ff df <0f> b6 0c 11 84 c9 0f 85 dd 01 00 00 44 8b 20 44 89 e6 81 e6 00 00 [ 252.261207][ T1331] RSP: 0018:ffffc90003137d80 EFLAGS: 00010202 [ 252.268144][ T1331] RAX: 0000000000000008 RBX: 1ffff92000626fd3 RCX: 0000000000000001 [ 252.276992][ T1331] RDX: dffffc0000000000 RSI: 0000000000000005 RDI: ffff88811529bcc0 [ 252.286337][ T1331] RBP: ffffc90003137e60 R08: dffffc0000000000 R09: fffff52000626f8d [ 252.295281][ T1331] R10: fffff52000626f8d R11: 1ffff92000626f8c R12: ffffc90003137e90 [ 252.306064][ T1331] R13: ffffc90003137e98 R14: 0000000000000600 R15: 0000000000000008 [ 252.316139][ T1331] FS: 00007faa8d5646c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 252.325739][ T1331] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 252.334677][ T1331] CR2: 00007faa8d584fa8 CR3: 00000001039cc000 CR4: 00000000003506b0 [ 252.346200][ T1331] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 252.355229][ T1331] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 252.364794][ T1331] Call Trace: [ 252.368932][ T1331] [ 252.372460][ T1331] ? kasan_save_alloc_info+0x25/0x30 [ 252.380641][ T1331] ? kern_path_create+0x1b0/0x1b0 [ 252.386858][ T1331] do_mkdirat+0x5c/0x4c0 [ 252.394132][ T1331] ? getname_flags+0x206/0x500 [ 252.399722][ T1331] __x64_sys_mkdirat+0x89/0xa0 [ 252.405838][ T1331] x64_sys_call+0x73d/0x9a0 [ 252.411701][ T1331] do_syscall_64+0x4c/0xa0 [ 252.417091][ T1331] ? clear_bhb_loop+0x30/0x80 [ 252.423794][ T1331] ? clear_bhb_loop+0x30/0x80 [ 252.429544][ T1331] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 252.437311][ T1331] RIP: 0033:0x7faa8c87b5e7 [ 252.442476][ T1331] Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 252.464617][ T1331] RSP: 002b:00007faa8d563ee8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 252.476691][ T1331] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007faa8c87b5e7 [ 252.486848][ T1331] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 252.496729][ T1331] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 252.505346][ T1331] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000200001c0 [ 252.514033][ T1331] R13: 00007faa8d563f40 R14: 0000000000000000 R15: 0000000000000000 [ 252.523165][ T1331] [ 252.526506][ T1331] Modules linked in: [ 252.530853][ T1331] ---[ end trace 0000000000000000 ]--- [ 252.537230][ T1331] RIP: 0010:filename_create+0x241/0x450 [ 252.538941][ T28] audit: type=1400 audit(1756640249.338:97): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 252.542906][ T1331] Code: ff ff 48 3d 01 f0 ff ff 49 89 c7 4c 8b 64 24 28 72 07 e8 12 d6 af ff eb 6d 48 89 c1 48 c1 e9 03 48 ba 00 00 00 00 00 fc ff df <0f> b6 0c 11 84 c9 0f 85 dd 01 00 00 44 8b 20 44 89 e6 81 e6 00 00 [ 252.587283][ T1331] RSP: 0018:ffffc90003137d80 EFLAGS: 00010202 [ 252.587345][ T28] audit: type=1400 audit(1756640249.338:98): avc: denied { search } for pid=84 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 252.593898][ T1331] RAX: 0000000000000008 RBX: 1ffff92000626fd3 RCX: 0000000000000001 [ 252.615859][ T28] audit: type=1400 audit(1756640249.338:99): avc: denied { write } for pid=84 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 252.624262][ T1331] RDX: dffffc0000000000 RSI: 0000000000000005 RDI: ffff88811529bcc0 [ 252.646407][ T28] audit: type=1400 audit(1756640249.338:100): avc: denied { add_name } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 252.655205][ T1331] RBP: ffffc90003137e60 R08: dffffc0000000000 R09: fffff52000626f8d [ 252.677038][ T28] audit: type=1400 audit(1756640249.338:101): avc: denied { create } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 252.685261][ T1331] R10: fffff52000626f8d R11: 1ffff92000626f8c R12: ffffc90003137e90 [ 252.708751][ T28] audit: type=1400 audit(1756640249.338:102): avc: denied { append open } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 252.716902][ T1331] R13: ffffc90003137e98 R14: 0000000000000600 R15: 0000000000000008 [ 252.741582][ T28] audit: type=1400 audit(1756640249.338:103): avc: denied { getattr } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 252.750517][ T1331] FS: 00007faa8d5646c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 252.784238][ T1331] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 252.791822][ T1331] CR2: 00007faa8d584fa8 CR3: 00000001039cc000 CR4: 00000000003506b0 [ 252.799973][ T1331] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 252.808542][ T1331] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 252.816816][ T1331] Kernel panic - not syncing: Fatal exception [ 252.828958][ T1331] Kernel Offset: disabled [ 252.838416][ T1331] Rebooting in 86400 seconds..