Warning: Permanently added '10.128.0.218' (ED25519) to the list of known hosts. 2025/11/19 07:16:34 ignoring optional flag "type"="gce" 2025/11/19 07:16:34 parsed 1 programs 2025/11/19 07:16:34 executed programs: 0 [ 39.283218][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.290291][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.297724][ T333] device bridge_slave_0 entered promiscuous mode [ 39.304934][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.311959][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.319347][ T333] device bridge_slave_1 entered promiscuous mode [ 39.355622][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.362676][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.369960][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.376996][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.392444][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.399869][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.407234][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.414624][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.423421][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.431678][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.438725][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.447318][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.455526][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.462572][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.473733][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.482562][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.495111][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.505930][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.513924][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.521306][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.529700][ T333] device veth0_vlan entered promiscuous mode [ 39.539143][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.548232][ T333] device veth1_macvtap entered promiscuous mode [ 39.557258][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.566975][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.587146][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 39.587160][ T30] audit: type=1400 audit(1763536595.218:88): avc: denied { read write } for pid=343 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 39.617270][ T30] audit: type=1400 audit(1763536595.218:89): avc: denied { open } for pid=343 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 39.640963][ T30] audit: type=1400 audit(1763536595.218:90): avc: denied { mounton } for pid=343 comm="syz-executor.0" path="/root/syzkaller-testdir2215682903/syzkaller.eho39h/0/file0" dev="sda1" ino=2034 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 39.641108][ T344] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN [ 39.679333][ T344] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] [ 39.687726][ T344] CPU: 1 PID: 344 Comm: syz-executor.0 Not tainted syzkaller #0 [ 39.695423][ T344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 39.705472][ T344] RIP: 0010:step_into+0x12e/0xd10 [ 39.710620][ T344] Code: 4c 8b 74 24 18 c6 44 24 7f 00 43 0f b6 44 25 00 84 c0 0f 85 6f 0a 00 00 45 8b 36 4c 8b bc 24 a8 00 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 6e 0a 00 00 45 8b 3f 44 89 fe 81 e6 00 [ 39.730307][ T344] RSP: 0018:ffffc90000dc78a0 EFLAGS: 00010202 [ 39.736364][ T344] RAX: 0000000000000002 RBX: ffffc90000dc7c20 RCX: ffff88810c3d13c0 [ 39.744322][ T344] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 39.752680][ T344] RBP: ffffc90000dc79b0 R08: 0000000000000000 R09: ffffed1023f9fa55 [ 39.760849][ T344] R10: ffffed1023f9fa55 R11: 1ffff11023f9fa54 R12: dffffc0000000000 [ 39.768829][ T344] R13: 1ffff920001b8f8b R14: 0000000000000011 R15: 0000000000000010 [ 39.776881][ T344] FS: 00007f370b9786c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 39.786032][ T344] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 39.792605][ T344] CR2: 00007f370b957d58 CR3: 000000010dac4000 CR4: 00000000003506a0 [ 39.801118][ T344] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 39.809651][ T344] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 39.817611][ T344] Call Trace: [ 39.820900][ T344] [ 39.823837][ T344] ? down_read+0xa5/0xf0 [ 39.828081][ T344] ? __down_common+0x370/0x370 [ 39.832828][ T344] ? set_root+0x400/0x400 [ 39.837141][ T344] walk_component+0x26a/0x460 [ 39.841813][ T344] link_path_walk+0x662/0xd40 [ 39.846477][ T344] ? handle_lookup_down+0x130/0x130 [ 39.851668][ T344] path_lookupat+0x95/0x490 [ 39.856237][ T344] filename_lookup+0x1e2/0x4f0 [ 39.860996][ T344] ? hashlen_string+0x120/0x120 [ 39.865845][ T344] user_path_at_empty+0x47/0x1c0 [ 39.870970][ T344] __se_sys_mount+0x2e3/0x380 [ 39.875672][ T344] ? __x64_sys_mount+0xd0/0xd0 [ 39.880427][ T344] ? __kasan_check_write+0x14/0x20 [ 39.885531][ T344] __x64_sys_mount+0xbf/0xd0 [ 39.890115][ T344] x64_sys_call+0x6bf/0x9a0 [ 39.894696][ T344] do_syscall_64+0x4c/0xa0 [ 39.899113][ T344] ? clear_bhb_loop+0x50/0xa0 [ 39.903807][ T344] ? clear_bhb_loop+0x50/0xa0 [ 39.908530][ T344] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 39.914415][ T344] RIP: 0033:0x7f370bdf5959 [ 39.918900][ T344] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 39.938564][ T344] RSP: 002b:00007f370b9780c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 39.946995][ T344] RAX: ffffffffffffffda RBX: 00007f370bf14f80 RCX: 00007f370bdf5959 [ 39.954951][ T344] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 39.962907][ T344] RBP: 00007f370be51c88 R08: 0000000000000000 R09: 0000000000000000 [ 39.970860][ T344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 39.978956][ T344] R13: 000000000000000b R14: 00007f370bf14f80 R15: 00007fff3ad593d8 [ 39.986939][ T344] [ 39.989946][ T344] Modules linked in: [ 39.995063][ T344] ---[ end trace 66ec56e2b8d1702f ]--- [ 39.996599][ T30] audit: type=1400 audit(1763536595.628:91): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 40.000544][ T344] RIP: 0010:step_into+0x12e/0xd10 [ 40.022434][ T30] audit: type=1400 audit(1763536595.628:92): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 40.027613][ T344] Code: 4c 8b 74 24 18 c6 44 24 7f 00 43 0f b6 44 25 00 84 c0 0f 85 6f 0a 00 00 45 8b 36 4c 8b bc 24 a8 00 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 6e 0a 00 00 45 8b 3f 44 89 fe 81 e6 00 [ 40.048759][ T30] audit: type=1400 audit(1763536595.628:93): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 40.068331][ T344] RSP: 0018:ffffc90000dc78a0 EFLAGS: 00010202 [ 40.089562][ T30] audit: type=1400 audit(1763536595.628:94): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 40.095929][ T344] RAX: 0000000000000002 RBX: ffffc90000dc7c20 RCX: ffff88810c3d13c0 [ 40.116553][ T30] audit: type=1400 audit(1763536595.628:95): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 40.124240][ T344] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 40.144932][ T30] audit: type=1400 audit(1763536595.628:96): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 40.152677][ T344] RBP: ffffc90000dc79b0 R08: 0000000000000000 R09: ffffed1023f9fa55 [ 40.175815][ T30] audit: type=1400 audit(1763536595.628:97): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 40.183943][ T344] R10: ffffed1023f9fa55 R11: 1ffff11023f9fa54 R12: dffffc0000000000 [ 40.214000][ T344] R13: 1ffff920001b8f8b R14: 0000000000000011 R15: 0000000000000010 [ 40.222021][ T344] FS: 00007f370b9786c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 40.231011][ T344] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 40.238306][ T344] CR2: 000055e8ca4b7660 CR3: 000000010dac4000 CR4: 00000000003506b0 [ 40.246336][ T344] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 40.254707][ T344] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 40.262675][ T344] Kernel panic - not syncing: Fatal exception [ 40.269022][ T344] Kernel Offset: disabled [ 40.273335][ T344] Rebooting in 86400 seconds..