Warning: Permanently added '10.128.1.182' (ED25519) to the list of known hosts. 2025/05/21 23:07:55 ignoring optional flag "sandboxArg"="0" 2025/05/21 23:07:55 ignoring optional flag "type"="gce" 2025/05/21 23:07:55 parsed 1 programs [ 43.693579][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 43.693584][ T29] audit: type=1400 audit(1747868875.188:79): avc: denied { unlink } for pid=356 comm="syz-executor" name="swap-file" dev="sda1" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2025/05/21 23:07:55 executed programs: 0 [ 43.745833][ T356] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 43.767721][ T362] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.775018][ T362] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.782019][ T362] device bridge_slave_0 entered promiscuous mode [ 43.788449][ T362] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.795488][ T362] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.802574][ T362] device bridge_slave_1 entered promiscuous mode [ 43.815050][ T362] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.821886][ T362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.829090][ T362] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.835899][ T362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.845108][ T51] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.852065][ T51] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.859011][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 43.866168][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 43.873769][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 43.881579][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.888698][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.896543][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 43.904512][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.911459][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.919954][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 43.928114][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 43.936815][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 43.945626][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.953503][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.960690][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.967964][ T362] device veth0_vlan entered promiscuous mode [ 43.974456][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 43.982404][ T362] device veth1_macvtap entered promiscuous mode [ 43.989361][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 43.997947][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.007510][ T29] audit: type=1400 audit(1747868875.498:80): avc: denied { mounton } for pid=362 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 44.033640][ T29] audit: type=1400 audit(1747868875.528:81): avc: denied { mounton } for pid=368 comm="syz-executor.0" path="/root/syzkaller-testdir2771141541/syzkaller.CKnLGZ/0/file0" dev="sda1" ino=2036 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 44.076962][ T29] audit: type=1400 audit(1747868875.568:82): avc: denied { write } for pid=368 comm="syz-executor.0" name="/" dev="incremental-fs" ino=2036 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 44.076992][ T369] BUG: kernel NULL pointer dereference, address: 0000000000000030 [ 44.100444][ T29] audit: type=1400 audit(1747868875.568:83): avc: denied { add_name } for pid=368 comm="syz-executor.0" name=".pending_reads" dev="incremental-fs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 44.108269][ T369] #PF: supervisor read access in kernel mode [ 44.108272][ T369] #PF: error_code(0x0000) - not-present page [ 44.108274][ T369] PGD 114c05067 P4D 114c05067 PUD 114c01067 PMD 0 [ 44.108293][ T369] Oops: 0000 [#1] PREEMPT SMP [ 44.132826][ T29] audit: type=1400 audit(1747868875.568:84): avc: denied { link } for pid=368 comm="syz-executor.0" name=".pending_reads" dev="incremental-fs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 44.138202][ T369] CPU: 0 PID: 369 Comm: syz-executor.0 Not tainted 5.15.183-syzkaller #0 [ 44.138208][ T369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 44.138209][ T369] RIP: 0010:vfs_link+0x19/0x320 [ 44.138220][ T369] Code: b5 e9 ff eb bc 41 bc ff ff ff ff eb 87 0f 1f 40 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 18 48 8b 42 28 48 89 7d d0 <4c> 8b 77 30 4c 89 45 c0 8b 80 28 04 00 00 4d 85 f6 89 45 cc 0f 84 [ 44.138223][ T369] RSP: 0018:ffffc9000040bd48 EFLAGS: 00010296 [ 44.138227][ T369] RAX: ffff888102595000 RBX: ffff8881061a6c18 RCX: ffff888108e7bc30 [ 44.138229][ T369] RDX: ffff888109dc51f8 RSI: ffffffff82e51d60 RDI: 0000000000000000 [ 44.138232][ T369] RBP: ffffc9000040bd88 R08: 0000000000000000 R09: ffffc9000040bb50 [ 44.138234][ T369] R10: ffff888109dc5298 R11: 0000000000000000 R12: ffff888114e66000 [ 44.138236][ T369] R13: ffff888114e66060 R14: ffffc9000040bdd8 R15: 0000000000000000 [ 44.138238][ T369] FS: 00007f4f6fcbb6c0(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 44.138245][ T369] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 44.138247][ T369] CR2: 0000000000000030 CR3: 0000000114c14000 CR4: 00000000003506b0 [ 44.138249][ T369] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 44.138251][ T369] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 44.138254][ T369] Call Trace: [ 44.138255][ T369] [ 44.138257][ T369] ? preempt_count_add+0x4d/0xa0 [ 44.138265][ T369] dir_link+0x17e/0x250 [ 44.138273][ T369] vfs_link+0x207/0x320 [ 44.138278][ T369] do_linkat+0x1f8/0x2c0 [ 44.138285][ T369] __x64_sys_linkat+0x58/0x70 [ 44.144541][ T29] audit: type=1400 audit(1747868875.568:85): avc: denied { read } for pid=78 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 44.150579][ T369] x64_sys_call+0x2b3/0x990 [ 44.150587][ T369] do_syscall_64+0x33/0xb0 [ 44.155858][ T29] audit: type=1400 audit(1747868875.568:86): avc: denied { search } for pid=78 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 44.179235][ T369] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 44.179246][ T369] RIP: 0033:0x7f4f70139da9 [ 44.179252][ T369] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 44.179255][ T369] RSP: 002b:00007f4f6fcbb0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000109 [ 44.179260][ T369] RAX: ffffffffffffffda RBX: 00007f4f70267f80 RCX: 00007f4f70139da9 [ 44.179262][ T369] RDX: 0000000000000004 RSI: 0000000020000080 RDI: 0000000000000004 [ 44.179264][ T369] RBP: 00007f4f7018647a R08: 0000000000000000 R09: 0000000000000000 [ 44.179266][ T369] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000000 [ 44.187895][ T29] audit: type=1400 audit(1747868875.568:87): avc: denied { write } for pid=78 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 44.197547][ T369] R13: 000000000000000b R14: 00007f4f70267f80 R15: 00007fffe76032f8 [ 44.197556][ T369] [ 44.197557][ T369] Modules linked in: [ 44.197572][ T369] CR2: 0000000000000030 [ 44.197576][ T369] ---[ end trace 924ec37ce4d521ff ]--- [ 44.197579][ T369] RIP: 0010:vfs_link+0x19/0x320 [ 44.202741][ T29] audit: type=1400 audit(1747868875.568:88): avc: denied { add_name } for pid=78 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 44.222139][ T369] Code: b5 e9 ff eb bc 41 bc ff ff ff ff eb 87 0f 1f 40 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 18 48 8b 42 28 48 89 7d d0 <4c> 8b 77 30 4c 89 45 c0 8b 80 28 04 00 00 4d 85 f6 89 45 cc 0f 84 [ 44.222145][ T369] RSP: 0018:ffffc9000040bd48 EFLAGS: 00010296 [ 44.222150][ T369] RAX: ffff888102595000 RBX: ffff8881061a6c18 RCX: ffff888108e7bc30 [ 44.222152][ T369] RDX: ffff888109dc51f8 RSI: ffffffff82e51d60 RDI: 0000000000000000 [ 44.222154][ T369] RBP: ffffc9000040bd88 R08: 0000000000000000 R09: ffffc9000040bb50 [ 44.222156][ T369] R10: ffff888109dc5298 R11: 0000000000000000 R12: ffff888114e66000 [ 44.222158][ T369] R13: ffff888114e66060 R14: ffffc9000040bdd8 R15: 0000000000000000 [ 44.222160][ T369] FS: 00007f4f6fcbb6c0(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 44.222166][ T369] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 44.222169][ T369] CR2: 0000000000000030 CR3: 0000000114c14000 CR4: 00000000003506b0 [ 44.222171][ T369] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 44.222173][ T369] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 44.222176][ T369] Kernel panic - not syncing: Fatal exception [ 44.659308][ T369] Kernel Offset: disabled [ 44.664646][ T369] Rebooting in 86400 seconds..