Warning: Permanently added '10.128.1.220' (ED25519) to the list of known hosts. 2026/02/12 07:17:38 parsed 1 programs [ 52.748093][ T30] audit: type=1400 audit(1770880659.450:105): avc: denied { unlink } for pid=395 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 52.843085][ T395] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 53.310791][ T30] audit: type=1401 audit(1770880660.010:106): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 53.394198][ T404] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.411916][ T404] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.423658][ T404] device bridge_slave_0 entered promiscuous mode [ 53.431019][ T404] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.439184][ T404] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.448023][ T404] device bridge_slave_1 entered promiscuous mode [ 53.495377][ T404] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.503834][ T404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.511956][ T404] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.519626][ T404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.538644][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.546741][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.554660][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.563038][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.573110][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.582053][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.589865][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.600261][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.609123][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.616530][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.629951][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.641322][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.656238][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 53.668400][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.676662][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.685203][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 53.695366][ T404] device veth0_vlan entered promiscuous mode [ 53.708282][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 53.719770][ T404] device veth1_macvtap entered promiscuous mode [ 53.731836][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 53.744832][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 53.787923][ T30] audit: type=1400 audit(1770880660.490:107): avc: denied { create } for pid=418 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 54.412831][ T370] device bridge_slave_1 left promiscuous mode [ 54.420518][ T370] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.429213][ T370] device bridge_slave_0 left promiscuous mode [ 54.436325][ T370] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.445246][ T370] device veth1_macvtap left promiscuous mode [ 54.451880][ T370] device veth0_vlan left promiscuous mode 2026/02/12 07:17:41 executed programs: 0 [ 54.726988][ T467] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.736960][ T467] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.746134][ T467] device bridge_slave_0 entered promiscuous mode [ 54.753966][ T467] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.763311][ T467] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.771870][ T467] device bridge_slave_1 entered promiscuous mode [ 54.829923][ T467] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.838108][ T467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.845961][ T467] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.853923][ T467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.874607][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.884156][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.892741][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.904587][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.914031][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.922993][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.931111][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.940735][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.949354][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.964452][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.975595][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.991333][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 55.005511][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.015433][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.023674][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.034982][ T467] device veth0_vlan entered promiscuous mode [ 55.046060][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 55.056382][ T467] device veth1_macvtap entered promiscuous mode [ 55.068799][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 55.079689][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 55.105805][ T30] audit: type=1400 audit(1770880661.800:108): avc: denied { read write } for pid=477 comm="syz.2.17" name="fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 55.133232][ T30] audit: type=1400 audit(1770880661.800:109): avc: denied { open } for pid=477 comm="syz.2.17" path="/dev/fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 55.160409][ T478] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 55.173148][ T478] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 55.182902][ T478] CPU: 0 PID: 478 Comm: syz.2.17 Not tainted syzkaller #0 [ 55.191086][ T478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 55.201978][ T478] RIP: 0010:filename_create+0x2af/0x470 [ 55.207595][ T478] Code: 89 de e8 64 22 b6 ff 85 db 0f 84 8d 00 00 00 e8 a7 1e b6 ff 48 8b 5c 24 20 4c 8b 74 24 18 e9 a4 00 00 00 48 89 c1 48 c1 e9 03 <42> 0f b6 0c 21 84 c9 0f 85 8e 01 00 00 44 8b 20 44 89 e6 81 e6 00 [ 55.231725][ T478] RSP: 0018:ffffc90002027d60 EFLAGS: 00010203 [ 55.238790][ T478] RAX: 000000000000000d RBX: 1ffff92000404fd3 RCX: 0000000000000001 [ 55.247686][ T478] RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff88812de52780 [ 55.256299][ T478] RBP: ffffc90002027e30 R08: ffff888111c58d1f R09: 1ffff1102238b1a3 [ 55.265471][ T478] R10: dffffc0000000000 R11: ffffed102238b1a4 R12: dffffc0000000000 [ 55.275074][ T478] R13: ffffc90002027e98 R14: 0000000000000600 R15: 000000000000000d [ 55.284117][ T478] FS: 00007fe01f42c6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 55.294613][ T478] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 55.301736][ T478] CR2: 00007fe01f40aff8 CR3: 0000000120c55000 CR4: 00000000003506b0 [ 55.310597][ T478] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 55.319460][ T478] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 55.329692][ T478] Call Trace: [ 55.334490][ T478] [ 55.338431][ T478] ? kern_path_create+0x1b0/0x1b0 [ 55.345677][ T478] do_mknodat+0xd7/0x7a0 [ 55.351371][ T478] ? getname_flags+0x206/0x500 [ 55.356560][ T478] __x64_sys_mknod+0x8e/0xa0 [ 55.361598][ T478] x64_sys_call+0x886/0x9a0 [ 55.366720][ T478] do_syscall_64+0x4c/0xa0 [ 55.372596][ T478] ? clear_bhb_loop+0x50/0xa0 [ 55.377865][ T478] ? clear_bhb_loop+0x50/0xa0 [ 55.383107][ T478] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 55.390282][ T478] RIP: 0033:0x7fe01f5c7cb9 [ 55.395628][ T478] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 55.420885][ T478] RSP: 002b:00007fe01f42c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 55.430337][ T478] RAX: ffffffffffffffda RBX: 00007fe01f842fa0 RCX: 00007fe01f5c7cb9 [ 55.440080][ T478] RDX: 0000000000000704 RSI: 00000000ffff8000 RDI: 00002000000002c0 [ 55.449445][ T478] RBP: 00007fe01f635bf7 R08: 0000000000000000 R09: 0000000000000000 [ 55.459270][ T478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 55.469651][ T478] R13: 00007fe01f843038 R14: 00007fe01f842fa0 R15: 00007ffca671ca98 [ 55.478580][ T478] [ 55.481725][ T478] Modules linked in: [ 55.488598][ T30] audit: type=1400 audit(1770880662.190:110): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 55.513833][ T478] ---[ end trace 53a99dbc8e34becf ]--- [ 55.513927][ T30] audit: type=1400 audit(1770880662.190:111): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 55.520690][ T478] RIP: 0010:filename_create+0x2af/0x470 [ 55.544202][ T30] audit: type=1400 audit(1770880662.190:112): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 55.549711][ T478] Code: 89 de e8 64 22 b6 ff 85 db 0f 84 8d 00 00 00 e8 a7 1e b6 ff 48 8b 5c 24 20 4c 8b 74 24 18 e9 a4 00 00 00 48 89 c1 48 c1 e9 03 <42> 0f b6 0c 21 84 c9 0f 85 8e 01 00 00 44 8b 20 44 89 e6 81 e6 00 [ 55.574229][ T30] audit: type=1400 audit(1770880662.190:113): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 55.616980][ T478] RSP: 0018:ffffc90002027d60 EFLAGS: 00010203 [ 55.616988][ T30] audit: type=1400 audit(1770880662.190:114): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 55.647617][ T478] [ 55.650362][ T478] RAX: 000000000000000d RBX: 1ffff92000404fd3 RCX: 0000000000000001 [ 55.660501][ T478] RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff88812de52780 [ 55.670818][ T478] RBP: ffffc90002027e30 R08: ffff888111c58d1f R09: 1ffff1102238b1a3 [ 55.680370][ T478] R10: dffffc0000000000 R11: ffffed102238b1a4 R12: dffffc0000000000 [ 55.690977][ T478] R13: ffffc90002027e98 R14: 0000000000000600 R15: 000000000000000d [ 55.701210][ T478] FS: 00007fe01f42c6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 55.711446][ T478] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 55.718881][ T478] CR2: 00007fe01f40aff8 CR3: 0000000120c55000 CR4: 00000000003506b0 [ 55.729890][ T478] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 55.739572][ T478] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 55.750058][ T478] Kernel panic - not syncing: Fatal exception [ 55.757889][ T478] Kernel Offset: disabled [ 55.763401][ T478] Rebooting in 86400 seconds..