Warning: Permanently added '10.128.0.219' (ED25519) to the list of known hosts.
2025/12/03 07:37:13 ignoring optional flag "type"="gce"
2025/12/03 07:37:13 parsed 1 programs
2025/12/03 07:37:15 executed programs: 0
[ 67.665835][ T4441] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k FS
[ 67.788201][ T4510] chnl_net:caif_netlink_parms(): no params data found
[ 67.821594][ T4510] bridge0: port 1(bridge_slave_0) entered blocking state
[ 67.829002][ T4510] bridge0: port 1(bridge_slave_0) entered disabled state
[ 67.837002][ T4510] device bridge_slave_0 entered promiscuous mode
[ 67.845918][ T4510] bridge0: port 2(bridge_slave_1) entered blocking state
[ 67.853174][ T4510] bridge0: port 2(bridge_slave_1) entered disabled state
[ 67.861475][ T4510] device bridge_slave_1 entered promiscuous mode
[ 67.880919][ T4510] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 67.892269][ T4510] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 67.912258][ T4510] team0: Port device team_slave_0 added
[ 67.919902][ T4510] team0: Port device team_slave_1 added
[ 67.935174][ T4510] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 67.942160][ T4510] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 67.968954][ T4510] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 67.980728][ T4510] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 67.987814][ T4510] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 68.014090][ T4510] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 68.040232][ T4510] device hsr_slave_0 entered promiscuous mode
[ 68.047780][ T4510] device hsr_slave_1 entered promiscuous mode
[ 68.436711][ T4510] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 68.448162][ T4510] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 68.457882][ T4510] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 68.468729][ T4510] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 68.492706][ T4510] bridge0: port 2(bridge_slave_1) entered blocking state
[ 68.499940][ T4510] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 68.507346][ T4510] bridge0: port 1(bridge_slave_0) entered blocking state
[ 68.514460][ T4510] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 68.567032][ T4510] 8021q: adding VLAN 0 to HW filter on device bond0
[ 68.582373][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 68.591771][ T9] bridge0: port 1(bridge_slave_0) entered disabled state
[ 68.600814][ T9] bridge0: port 2(bridge_slave_1) entered disabled state
[ 68.609044][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 68.624238][ T4510] 8021q: adding VLAN 0 to HW filter on device team0
[ 68.636417][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 68.645921][ T9] bridge0: port 1(bridge_slave_0) entered blocking state
[ 68.652981][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 68.675500][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 68.686190][ T9] bridge0: port 2(bridge_slave_1) entered blocking state
[ 68.693272][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 68.703090][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 68.724404][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 68.732824][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 68.742633][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 68.752147][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 68.763111][ T4510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 68.876738][ T4510] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 68.892881][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 68.902024][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 68.922063][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 68.933262][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 68.956557][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 68.966291][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 68.977987][ T4510] device veth0_vlan entered promiscuous mode
[ 68.986198][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 68.996562][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 69.008848][ T4510] device veth1_vlan entered promiscuous mode
[ 69.033973][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 69.042269][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 69.051784][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 69.060582][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 69.071438][ T4510] device veth0_macvtap entered promiscuous mode
[ 69.081157][ T4510] device veth1_macvtap entered promiscuous mode
[ 69.097868][ T4510] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 69.108392][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 69.116733][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 69.126204][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 69.135262][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 69.148185][ T4510] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 69.157390][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 69.167486][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 69.179545][ T4510] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 69.188873][ T4510] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 69.197891][ T4510] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 69.207036][ T4510] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 69.315206][ T4592] loop0: detected capacity change from 0 to 4096
[ 69.330752][ T4592] ntfs: (device loop0): ntfs_is_extended_system_file(): Corrupt file name attribute. You should run chkdsk.
[ 69.342831][ T4592] ntfs: (device loop0): ntfs_read_locked_inode(): $DATA attribute is missing.
[ 69.353172][ T4592] ntfs: (device loop0): ntfs_read_locked_inode(): Failed with error code -2. Marking corrupt inode 0x1 as bad. Run chkdsk.
[ 69.367704][ T4592] ntfs: (device loop0): load_system_files(): Failed to load $MFTMirr. Mounting read-only. Run ntfsfix and/or chkdsk.
[ 69.397697][ T4592] ntfs: volume version 3.1.
[ 69.414983][ T4592] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Corrupt directory. Aborting lookup.
[ 69.433985][ T4592] ntfs: (device loop0): check_windows_hibernation_status(): Failed to find inode number for hiberfil.sys.
[ 69.449108][ T4592] ntfs: (device loop0): load_system_files(): Failed to determine if Windows is hibernated. Will not be able to remount read-write. Run chkdsk.
[ 69.484833][ T4592] ==================================================================
[ 69.493307][ T4592] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xdda/0x3550
[ 69.500796][ T4592] Read of size 1 at addr ffff8880738a8971 by task syz-executor.0/4592
[ 69.508947][ T4592]
[ 69.511292][ T4592] CPU: 0 PID: 4592 Comm: syz-executor.0 Not tainted syzkaller #0
[ 69.519016][ T4592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
[ 69.529082][ T4592] Call Trace:
[ 69.532365][ T4592]
[ 69.535295][ T4592] dump_stack_lvl+0x168/0x230
[ 69.539992][ T4592] ? show_regs_print_info+0x20/0x20
[ 69.545290][ T4592] ? load_image+0x3b0/0x3b0
[ 69.549799][ T4592] ? _raw_spin_lock_irqsave+0xb0/0xf0
[ 69.555191][ T4592] print_address_description+0x60/0x2d0
[ 69.560746][ T4592] ? ntfs_readdir+0xdda/0x3550
[ 69.565533][ T4592] kasan_report+0xdf/0x130
[ 69.569962][ T4592] ? ntfs_readdir+0xdda/0x3550
[ 69.574736][ T4592] ? unmap_mft_record+0x171/0x2e0
[ 69.579783][ T4592] ntfs_readdir+0xdda/0x3550
[ 69.584400][ T4592] ? lock_acquire+0x1f2/0x3f0
[ 69.589094][ T4592] ? __might_sleep+0xf0/0xf0
[ 69.593701][ T4592] ? preempt_count_add+0x8d/0x190
[ 69.598736][ T4592] ? rwsem_write_trylock+0x12f/0x1b0
[ 69.604037][ T4592] ? clear_nonspinnable+0x60/0x60
[ 69.609071][ T4592] ? ntfs_unmap_page+0x200/0x200
[ 69.614031][ T4592] iterate_dir+0x218/0x560
[ 69.618467][ T4592] __se_sys_getdents64+0xe5/0x260
[ 69.623685][ T4592] ? __x64_sys_getdents64+0x80/0x80
[ 69.628993][ T4592] ? filldir+0x720/0x720
[ 69.633255][ T4592] ? vtime_user_exit+0x2dc/0x400
[ 69.638323][ T4592] ? lockdep_hardirqs_on+0x94/0x140
[ 69.643535][ T4592] do_syscall_64+0x4c/0xa0
[ 69.647961][ T4592] ? clear_bhb_loop+0x30/0x80
[ 69.652647][ T4592] ? clear_bhb_loop+0x30/0x80
[ 69.657378][ T4592] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 69.663297][ T4592] RIP: 0033:0x7f735a61bb29
[ 69.667719][ T4592] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 69.687555][ T4592] RSP: 002b:00007f735999d0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9
[ 69.695988][ T4592] RAX: ffffffffffffffda RBX: 00007f735a73af80 RCX: 00007f735a61bb29
[ 69.704145][ T4592] RDX: 00000000000000ab RSI: 0000000020000080 RDI: 0000000000000004
[ 69.712134][ T4592] RBP: 00007f735a66747a R08: 0000000000000000 R09: 0000000000000000
[ 69.720115][ T4592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 69.728094][ T4592] R13: 000000000000000b R14: 00007f735a73af80 R15: 00007fffa1aa99b8
[ 69.736094][ T4592]
[ 69.739136][ T4592]
[ 69.741476][ T4592] Allocated by task 4592:
[ 69.745801][ T4592] __kasan_kmalloc+0xb5/0xf0
[ 69.750410][ T4592] ntfs_readdir+0x798/0x3550
[ 69.755025][ T4592] iterate_dir+0x218/0x560
[ 69.759445][ T4592] __se_sys_getdents64+0xe5/0x260
[ 69.764487][ T4592] do_syscall_64+0x4c/0xa0
[ 69.768910][ T4592] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 69.774812][ T4592]
[ 69.777235][ T4592] The buggy address belongs to the object at ffff8880738a8900
[ 69.777235][ T4592] which belongs to the cache kmalloc-64 of size 64
[ 69.791111][ T4592] The buggy address is located 49 bytes to the right of
[ 69.791111][ T4592] 64-byte region [ffff8880738a8900, ffff8880738a8940)
[ 69.795019][ T4210] Bluetooth: hci0: command 0x0409 tx timeout
[ 69.804737][ T4592] The buggy address belongs to the page:
[ 69.804774][ T4592] page:ffffea0001ce2a00 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff8880738a8e80 pfn:0x738a8
[ 69.804794][ T4592] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff)
[ 69.804817][ T4592] raw: 00fff00000000200 ffffea0001ce2f80 000000100000000d ffff888016841640
[ 69.844425][ T4592] raw: ffff8880738a8e80 000000008020001f 00000001ffffffff 0000000000000000
[ 69.853094][ T4592] page dumped because: kasan: bad access detected
[ 69.859609][ T4592] page_owner tracks the page as allocated
[ 69.865323][ T4592] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 4195, ts 45960401520, free_ts 37467301060
[ 69.881489][ T4592] get_page_from_freelist+0x1b77/0x1c60
[ 69.887153][ T4592] __alloc_pages+0x1e1/0x470
[ 69.891762][ T4592] new_slab+0xc0/0x4b0
[ 69.895843][ T4592] ___slab_alloc+0x81e/0xdf0
[ 69.900432][ T4592] __kmalloc+0x1cd/0x330
[ 69.904774][ T4592] kobject_get_path+0xae/0x210
[ 69.909554][ T4592] kobject_uevent_env+0x290/0x890
[ 69.914582][ T4592] net_rx_queue_update_kobjects+0x221/0x490
[ 69.920490][ T4592] netdev_register_kobject+0x223/0x310
[ 69.925966][ T4592] register_netdevice+0x1019/0x16b0
[ 69.931175][ T4592] veth_newlink+0x8ed/0xda0
[ 69.935693][ T4592] rtnl_newlink+0x114c/0x17d0
[ 69.940387][ T4592] rtnetlink_rcv_msg+0x7ff/0xe90
[ 69.945350][ T4592] netlink_rcv_skb+0x1e0/0x430
[ 69.950278][ T4592] netlink_unicast+0x774/0x920
[ 69.955057][ T4592] netlink_sendmsg+0x8ab/0xbc0
[ 69.959842][ T4592] page last free stack trace:
[ 69.964522][ T4592] free_unref_page_prepare+0x637/0x6c0
[ 69.969989][ T4592] free_unref_page+0x94/0x280
[ 69.974676][ T4592] pipe_read+0x678/0x1210
[ 69.979270][ T4592] vfs_read+0x725/0xcf0
[ 69.983438][ T4592] ksys_read+0x14d/0x250
[ 69.987688][ T4592] do_syscall_64+0x4c/0xa0
[ 69.992109][ T4592] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 69.998010][ T4592]
[ 70.000334][ T4592] Memory state around the buggy address:
[ 70.005962][ T4592] ffff8880738a8800: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 70.014021][ T4592] ffff8880738a8880: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 70.022083][ T4592] >ffff8880738a8900: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc
[ 70.030231][ T4592] ^
[ 70.037954][ T4592] ffff8880738a8980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 70.046112][ T4592] ffff8880738a8a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 70.054170][ T4592] ==================================================================
[ 70.062229][ T4592] Disabling lock debugging due to kernel taint
[ 70.070366][ T4592] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 70.077574][ T4592] CPU: 0 PID: 4592 Comm: syz-executor.0 Tainted: G B syzkaller #0
[ 70.086677][ T4592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
[ 70.096749][ T4592] Call Trace:
[ 70.100027][ T4592]
[ 70.102963][ T4592] dump_stack_lvl+0x168/0x230
[ 70.108187][ T4592] ? show_regs_print_info+0x20/0x20
[ 70.113391][ T4592] ? load_image+0x3b0/0x3b0
[ 70.117934][ T4592] panic+0x2c9/0x7f0
[ 70.121930][ T4592] ? bpf_jit_dump+0xd0/0xd0
[ 70.126443][ T4592] ? _raw_spin_unlock_irqrestore+0xf6/0x100
[ 70.132383][ T4592] ? _raw_spin_unlock+0x40/0x40
[ 70.137337][ T4592] ? ntfs_readdir+0xdda/0x3550
[ 70.142209][ T4592] check_panic_on_warn+0x80/0xa0
[ 70.147252][ T4592] ? ntfs_readdir+0xdda/0x3550
[ 70.152044][ T4592] end_report+0x6d/0xf0
[ 70.156215][ T4592] kasan_report+0x102/0x130
[ 70.160773][ T4592] ? ntfs_readdir+0xdda/0x3550
[ 70.165893][ T4592] ? unmap_mft_record+0x171/0x2e0
[ 70.170941][ T4592] ntfs_readdir+0xdda/0x3550
[ 70.175547][ T4592] ? lock_acquire+0x1f2/0x3f0
[ 70.180345][ T4592] ? __might_sleep+0xf0/0xf0
[ 70.184944][ T4592] ? preempt_count_add+0x8d/0x190
[ 70.189981][ T4592] ? rwsem_write_trylock+0x12f/0x1b0
[ 70.195480][ T4592] ? clear_nonspinnable+0x60/0x60
[ 70.200515][ T4592] ? ntfs_unmap_page+0x200/0x200
[ 70.205467][ T4592] iterate_dir+0x218/0x560
[ 70.209895][ T4592] __se_sys_getdents64+0xe5/0x260
[ 70.214926][ T4592] ? __x64_sys_getdents64+0x80/0x80
[ 70.220113][ T4592] ? filldir+0x720/0x720
[ 70.224332][ T4592] ? vtime_user_exit+0x2dc/0x400
[ 70.229250][ T4592] ? lockdep_hardirqs_on+0x94/0x140
[ 70.234461][ T4592] do_syscall_64+0x4c/0xa0
[ 70.238856][ T4592] ? clear_bhb_loop+0x30/0x80
[ 70.243690][ T4592] ? clear_bhb_loop+0x30/0x80
[ 70.248621][ T4592] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 70.254495][ T4592] RIP: 0033:0x7f735a61bb29
[ 70.258981][ T4592] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 70.278757][ T4592] RSP: 002b:00007f735999d0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9
[ 70.287152][ T4592] RAX: ffffffffffffffda RBX: 00007f735a73af80 RCX: 00007f735a61bb29
[ 70.295191][ T4592] RDX: 00000000000000ab RSI: 0000000020000080 RDI: 0000000000000004
[ 70.303146][ T4592] RBP: 00007f735a66747a R08: 0000000000000000 R09: 0000000000000000
[ 70.311144][ T4592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 70.319300][ T4592] R13: 000000000000000b R14: 00007f735a73af80 R15: 00007fffa1aa99b8
[ 70.327275][ T4592]
[ 70.330477][ T4592] Kernel Offset: disabled
[ 70.334891][ T4592] Rebooting in 86400 seconds..