Warning: Permanently added '10.128.1.107' (ED25519) to the list of known hosts. 2026/01/22 01:53:01 parsed 1 programs [ 46.976546][ T28] audit: type=1400 audit(1769046782.342:106): avc: denied { unlink } for pid=398 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 47.023755][ T398] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.945794][ T28] audit: type=1401 audit(1769046783.302:107): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 47.991498][ T429] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.998653][ T429] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.006615][ T429] device bridge_slave_0 entered promiscuous mode [ 48.013663][ T429] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.020796][ T429] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.028331][ T429] device bridge_slave_1 entered promiscuous mode [ 48.069393][ T429] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.076630][ T429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.084059][ T429] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.091199][ T429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.109040][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.116455][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.124121][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.132107][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.141924][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.150656][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.158108][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.167138][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.176281][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.183691][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.196895][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.206719][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.221383][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.234398][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.244835][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.253439][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.263068][ T429] device veth0_vlan entered promiscuous mode [ 48.276783][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.287659][ T429] device veth1_macvtap entered promiscuous mode [ 48.297833][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.314767][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2026/01/22 01:53:04 executed programs: 0 [ 48.884004][ T470] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.892435][ T470] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.900971][ T470] device bridge_slave_0 entered promiscuous mode [ 48.912255][ T470] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.920514][ T470] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.932480][ T470] device bridge_slave_1 entered promiscuous mode [ 48.984896][ T470] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.992256][ T470] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.999687][ T470] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.006738][ T470] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.016910][ T314] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.024403][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.048622][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.056683][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.066630][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.075287][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.083931][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.091528][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.108144][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.118017][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.126570][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.134763][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.146232][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 49.155465][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.172353][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 49.184120][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.200112][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 49.209757][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.220102][ T43] device bridge_slave_1 left promiscuous mode [ 49.226742][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.234661][ T43] device bridge_slave_0 left promiscuous mode [ 49.241357][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.251543][ T43] device veth1_macvtap left promiscuous mode [ 49.259833][ T43] device veth0_vlan left promiscuous mode [ 49.352942][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 49.361617][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.372241][ T470] device veth0_vlan entered promiscuous mode [ 49.382736][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.391075][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.403443][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 49.412438][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.422531][ T470] device veth1_macvtap entered promiscuous mode [ 49.431877][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 49.440473][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.449698][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.460868][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.470919][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.497601][ T28] audit: type=1400 audit(1769046784.862:108): avc: denied { read write } for pid=480 comm="syz.2.17" name="fuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 49.522037][ T28] audit: type=1400 audit(1769046784.862:109): avc: denied { open } for pid=480 comm="syz.2.17" path="/dev/fuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 49.558215][ T482] general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN [ 49.570742][ T482] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037] [ 49.579561][ T482] CPU: 0 PID: 482 Comm: syz.2.17 Not tainted syzkaller #0 [ 49.587486][ T482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 49.597806][ T482] RIP: 0010:fuse_atomic_open+0x174/0x3c0 [ 49.603663][ T482] Code: 8b 6d c4 44 89 ee 83 e6 40 31 ff e8 96 5a 66 ff 44 89 e8 83 e0 40 75 07 e8 69 56 66 ff eb 26 4d 8d 6e 30 4c 89 e8 48 c1 e8 03 <42> 80 3c 20 00 74 08 4c 89 ef e8 bd 82 ab ff 49 83 7d 00 00 74 21 [ 49.623725][ T482] RSP: 0018:ffffc900009678f8 EFLAGS: 00010207 [ 49.630079][ T482] RAX: 0000000000000006 RBX: ffff8881155d7800 RCX: 0000000000000000 [ 49.638196][ T482] RDX: ffff88811bc2a880 RSI: 0000000000000040 RDI: 0000000000000000 [ 49.646186][ T482] RBP: ffffc90000967950 R08: ffff88811bc2a880 R09: fffff5200012ce94 [ 49.655211][ T482] R10: 00000000fffffffe R11: 0000000000000000 R12: dffffc0000000000 [ 49.663946][ T482] R13: 0000000000000035 R14: 0000000000000005 R15: ffff88812b062640 [ 49.672264][ T482] FS: 00007f2a1c7e26c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 49.682151][ T482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.689448][ T482] CR2: 00007f2a1c7e1ff8 CR3: 00000001162b8000 CR4: 00000000003506b0 [ 49.697952][ T482] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.706027][ T482] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.714272][ T482] Call Trace: [ 49.717558][ T482] [ 49.720928][ T482] ? selinux_inode_create+0x22/0x30 [ 49.726238][ T482] ? __cfi_fuse_atomic_open+0x10/0x10 [ 49.732513][ T482] path_openat+0xe57/0x2f80 [ 49.737922][ T482] ? do_filp_open+0x430/0x430 [ 49.742886][ T482] do_filp_open+0x1f1/0x430 [ 49.747414][ T482] ? __cfi_do_filp_open+0x10/0x10 [ 49.753071][ T482] ? alloc_fd+0x4e6/0x590 [ 49.757503][ T482] do_sys_openat2+0x15e/0x810 [ 49.762529][ T482] ? __se_sys_futex+0x136/0x310 [ 49.767496][ T482] ? do_sys_open+0xe0/0xe0 [ 49.772363][ T482] ? __x64_sys_futex+0x100/0x100 [ 49.777491][ T482] ? ksys_write+0x1f4/0x250 [ 49.782259][ T482] ? __kasan_check_write+0x14/0x20 [ 49.787552][ T482] __x64_sys_creat+0x8e/0xb0 [ 49.792222][ T482] x64_sys_call+0x116/0x9a0 [ 49.796819][ T482] do_syscall_64+0x4c/0xa0 [ 49.801479][ T482] ? clear_bhb_loop+0x30/0x80 [ 49.806252][ T482] ? clear_bhb_loop+0x30/0x80 [ 49.811464][ T482] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 49.817651][ T482] RIP: 0033:0x7f2a1b99a339 [ 49.822496][ T482] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 49.842822][ T482] RSP: 002b:00007f2a1c7e2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 49.851849][ T482] RAX: ffffffffffffffda RBX: 00007f2a1bbd6090 RCX: 00007f2a1b99a339 [ 49.859911][ T482] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000180 [ 49.867886][ T482] RBP: 00007f2a1ba2dd68 R08: 0000000000000000 R09: 0000000000000000 [ 49.876136][ T482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 49.884202][ T482] R13: 00007f2a1bbd6128 R14: 00007f2a1bbd6090 R15: 00007ffd9d91d078 [ 49.892619][ T482] [ 49.895648][ T482] Modules linked in: [ 49.901188][ T28] audit: type=1400 audit(1769046785.262:110): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 49.902635][ T482] ---[ end trace 0000000000000000 ]--- [ 49.924298][ T28] audit: type=1400 audit(1769046785.262:111): avc: denied { search } for pid=85 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 49.930695][ T482] RIP: 0010:fuse_atomic_open+0x174/0x3c0 [ 49.954271][ T28] audit: type=1400 audit(1769046785.262:112): avc: denied { write } for pid=85 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 49.960761][ T482] Code: 8b 6d c4 44 89 ee 83 e6 40 31 ff e8 96 5a 66 ff 44 89 e8 83 e0 40 75 07 e8 69 56 66 ff eb 26 4d 8d 6e 30 4c 89 e8 48 c1 e8 03 <42> 80 3c 20 00 74 08 4c 89 ef e8 bd 82 ab ff 49 83 7d 00 00 74 21 [ 50.006356][ T482] RSP: 0018:ffffc900009678f8 EFLAGS: 00010207 [ 50.012843][ T482] RAX: 0000000000000006 RBX: ffff8881155d7800 RCX: 0000000000000000 [ 50.012965][ T28] audit: type=1400 audit(1769046785.262:113): avc: denied { add_name } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 50.022117][ T482] RDX: ffff88811bc2a880 RSI: 0000000000000040 RDI: 0000000000000000 [ 50.042824][ T28] audit: type=1400 audit(1769046785.262:114): avc: denied { create } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 50.074398][ T482] RBP: ffffc90000967950 R08: ffff88811bc2a880 R09: fffff5200012ce94 [ 50.083087][ T28] audit: type=1400 audit(1769046785.262:115): avc: denied { append open } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 50.107093][ T482] R10: 00000000fffffffe R11: 0000000000000000 R12: dffffc0000000000 [ 50.117470][ T482] R13: 0000000000000035 R14: 0000000000000005 R15: ffff88812b062640 [ 50.127199][ T482] FS: 00007f2a1c7e26c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 50.137540][ T482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 50.144637][ T482] CR2: 00007f2a1b9e7a80 CR3: 00000001162b8000 CR4: 00000000003506a0 [ 50.154222][ T482] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 50.163203][ T482] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 50.172074][ T482] Kernel panic - not syncing: Fatal exception [ 50.178935][ T482] Kernel Offset: disabled [ 50.183448][ T482] Rebooting in 86400 seconds..