Warning: Permanently added '10.128.1.213' (ED25519) to the list of known hosts. 2025/07/20 15:19:37 ignoring optional flag "sandboxArg"="0" 2025/07/20 15:19:37 ignoring optional flag "type"="gce" 2025/07/20 15:19:37 parsed 1 programs 2025/07/20 15:19:37 executed programs: 0 [ 34.181363][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.188483][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.195986][ T332] device bridge_slave_0 entered promiscuous mode [ 34.202684][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.209683][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.217061][ T332] device bridge_slave_1 entered promiscuous mode [ 34.252803][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.259828][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.267098][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.274205][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.289898][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.297165][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.304517][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.311948][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.320487][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.328660][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.335684][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.344066][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.352278][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.359277][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.369979][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.378871][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.391166][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.401895][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.409819][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.417420][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.425759][ T332] device veth0_vlan entered promiscuous mode [ 34.435099][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.444295][ T332] device veth1_macvtap entered promiscuous mode [ 34.452982][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.462567][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.481718][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 34.481731][ T30] audit: type=1400 audit(1753024777.466:88): avc: denied { read write } for pid=342 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 34.511480][ T30] audit: type=1400 audit(1753024777.466:89): avc: denied { open } for pid=342 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 34.535233][ T30] audit: type=1400 audit(1753024777.466:90): avc: denied { mounton } for pid=342 comm="syz-executor.0" path="/root/syzkaller-testdir2391188761/syzkaller.rLsBg4/0/file0" dev="sda1" ino=2034 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 34.539082][ T343] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN [ 34.573651][ T343] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] [ 34.582055][ T343] CPU: 1 PID: 343 Comm: syz-executor.0 Not tainted 5.15.188-syzkaller-1081189-g6b619c45dff5 #0 [ 34.592447][ T343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 34.602482][ T343] RIP: 0010:step_into+0x12e/0xd10 [ 34.607516][ T343] Code: 4c 8b 74 24 18 c6 44 24 7f 00 43 0f b6 44 25 00 84 c0 0f 85 6f 0a 00 00 45 8b 36 4c 8b bc 24 a8 00 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 6e 0a 00 00 45 8b 3f 44 89 fe 81 e6 00 [ 34.627116][ T343] RSP: 0018:ffffc90000dcf8a0 EFLAGS: 00010202 [ 34.633176][ T343] RAX: 0000000000000002 RBX: ffffc90000dcfc20 RCX: ffff88810c3ee2c0 [ 34.641147][ T343] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 34.649243][ T343] RBP: ffffc90000dcf9b0 R08: 0000000000000000 R09: ffffed10240226d5 [ 34.657219][ T343] R10: ffffed10240226d5 R11: 1ffff110240226d4 R12: dffffc0000000000 [ 34.665264][ T343] R13: 1ffff920001b9f8b R14: 0000000000000011 R15: 0000000000000010 [ 34.673489][ T343] FS: 00007ff9bde0e6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 34.682398][ T343] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.688959][ T343] CR2: 00007ff9bddedd58 CR3: 00000001245cf000 CR4: 00000000003506a0 [ 34.696910][ T343] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 34.704870][ T343] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 34.712850][ T343] Call Trace: [ 34.716110][ T343] [ 34.719019][ T343] ? down_read+0xa5/0xf0 [ 34.723251][ T343] ? __down_common+0x370/0x370 [ 34.728000][ T343] ? set_root+0x400/0x400 [ 34.732332][ T343] walk_component+0x26a/0x460 [ 34.736997][ T343] link_path_walk+0x662/0xd40 [ 34.741659][ T343] ? handle_lookup_down+0x130/0x130 [ 34.746854][ T343] path_lookupat+0x95/0x490 [ 34.751375][ T343] filename_lookup+0x1e2/0x4f0 [ 34.756120][ T343] ? hashlen_string+0x120/0x120 [ 34.760952][ T343] user_path_at_empty+0x47/0x1c0 [ 34.765876][ T343] __se_sys_mount+0x2e3/0x380 [ 34.770533][ T343] ? __x64_sys_mount+0xd0/0xd0 [ 34.775387][ T343] ? __kasan_check_write+0x14/0x20 [ 34.780482][ T343] __x64_sys_mount+0xbf/0xd0 [ 34.785322][ T343] x64_sys_call+0x6bf/0x9a0 [ 34.789836][ T343] do_syscall_64+0x4c/0xa0 [ 34.794226][ T343] ? clear_bhb_loop+0x50/0xa0 [ 34.798951][ T343] ? clear_bhb_loop+0x50/0xa0 [ 34.803708][ T343] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 34.809582][ T343] RIP: 0033:0x7ff9be28b959 [ 34.813979][ T343] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 34.833564][ T343] RSP: 002b:00007ff9bde0e0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 34.841959][ T343] RAX: ffffffffffffffda RBX: 00007ff9be3aaf80 RCX: 00007ff9be28b959 [ 34.849919][ T343] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 34.857870][ T343] RBP: 00007ff9be2e7c88 R08: 0000000000000000 R09: 0000000000000000 [ 34.865822][ T343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 34.873776][ T343] R13: 000000000000000b R14: 00007ff9be3aaf80 R15: 00007ffe7d27ac28 [ 34.881742][ T343] [ 34.884745][ T343] Modules linked in: [ 34.889851][ T343] ---[ end trace 5adcfaa44cd2780c ]--- [ 34.891530][ T30] audit: type=1400 audit(1753024777.866:91): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 34.895351][ T343] RIP: 0010:step_into+0x12e/0xd10 [ 34.917171][ T30] audit: type=1400 audit(1753024777.866:92): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 34.922125][ T343] Code: 4c 8b 74 24 18 c6 44 24 7f 00 43 0f b6 44 25 00 84 c0 0f 85 6f 0a 00 00 45 8b 36 4c 8b bc 24 a8 00 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 6e 0a 00 00 45 8b 3f 44 89 fe 81 e6 00 [ 34.943231][ T30] audit: type=1400 audit(1753024777.866:93): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 34.963500][ T343] RSP: 0018:ffffc90000dcf8a0 EFLAGS: 00010202 [ 34.984495][ T30] audit: type=1400 audit(1753024777.866:94): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 34.990448][ T343] RAX: 0000000000000002 RBX: ffffc90000dcfc20 RCX: ffff88810c3ee2c0 [ 35.010957][ T30] audit: type=1400 audit(1753024777.866:95): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 35.019047][ T343] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 35.039286][ T30] audit: type=1400 audit(1753024777.866:96): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 35.047366][ T343] RBP: ffffc90000dcf9b0 R08: 0000000000000000 R09: ffffed10240226d5 [ 35.070064][ T30] audit: type=1400 audit(1753024777.866:97): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 35.078131][ T343] R10: ffffed10240226d5 R11: 1ffff110240226d4 R12: dffffc0000000000 [ 35.108434][ T343] R13: 1ffff920001b9f8b R14: 0000000000000011 R15: 0000000000000010 [ 35.116433][ T343] FS: 00007ff9bde0e6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 35.125462][ T343] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 35.132051][ T343] CR2: 00007ff9bddedd58 CR3: 00000001245cf000 CR4: 00000000003506a0 [ 35.140455][ T343] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 35.148431][ T343] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 35.156418][ T343] Kernel panic - not syncing: Fatal exception [ 35.162648][ T343] Kernel Offset: disabled [ 35.166957][ T343] Rebooting in 86400 seconds..