Warning: Permanently added '10.128.1.14' (ED25519) to the list of known hosts.
2026/01/31 15:16:45 parsed 1 programs
[ 28.476120][ T30] audit: type=1400 audit(1769872605.214:64): avc: denied { node_bind } for pid=281 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 28.497751][ T30] audit: type=1400 audit(1769872605.214:65): avc: denied { module_request } for pid=281 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 29.180860][ T30] audit: type=1400 audit(1769872605.914:66): avc: denied { mounton } for pid=287 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 29.181888][ T287] cgroup: Unknown subsys name 'net'
[ 29.203703][ T30] audit: type=1400 audit(1769872605.914:67): avc: denied { mount } for pid=287 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 29.231445][ T30] audit: type=1400 audit(1769872605.954:68): avc: denied { unmount } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 29.231706][ T287] cgroup: Unknown subsys name 'devices'
[ 29.377435][ T287] cgroup: Unknown subsys name 'hugetlb'
[ 29.383429][ T287] cgroup: Unknown subsys name 'rlimit'
[ 29.554886][ T30] audit: type=1400 audit(1769872606.284:69): avc: denied { setattr } for pid=287 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 29.578370][ T30] audit: type=1400 audit(1769872606.294:70): avc: denied { create } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 29.584135][ T291] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 29.599091][ T30] audit: type=1400 audit(1769872606.294:71): avc: denied { write } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 29.628231][ T30] audit: type=1400 audit(1769872606.294:72): avc: denied { read } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
Setting up swapspace version 1, size = 127995904 bytes
[ 29.648810][ T30] audit: type=1400 audit(1769872606.294:73): avc: denied { mounton } for pid=287 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 29.682721][ T287] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 30.192135][ T293] request_module fs-gadgetfs succeeded, but still no fs?
[ 30.709089][ T342] bridge0: port 1(bridge_slave_0) entered blocking state
[ 30.716343][ T342] bridge0: port 1(bridge_slave_0) entered disabled state
[ 30.723811][ T342] device bridge_slave_0 entered promiscuous mode
[ 30.731294][ T342] bridge0: port 2(bridge_slave_1) entered blocking state
[ 30.738867][ T342] bridge0: port 2(bridge_slave_1) entered disabled state
[ 30.746190][ T342] device bridge_slave_1 entered promiscuous mode
[ 30.783791][ T342] bridge0: port 2(bridge_slave_1) entered blocking state
[ 30.791248][ T342] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 30.798696][ T342] bridge0: port 1(bridge_slave_0) entered blocking state
[ 30.805762][ T342] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 30.824866][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 30.833043][ T45] bridge0: port 1(bridge_slave_0) entered disabled state
[ 30.840956][ T45] bridge0: port 2(bridge_slave_1) entered disabled state
[ 30.850174][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 30.858492][ T45] bridge0: port 1(bridge_slave_0) entered blocking state
[ 30.865535][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 30.874143][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 30.882506][ T45] bridge0: port 2(bridge_slave_1) entered blocking state
[ 30.890014][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 30.901481][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 30.910751][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 30.923765][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 30.934778][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 30.943176][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 30.950855][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 30.959404][ T342] device veth0_vlan entered promiscuous mode
[ 30.969169][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 30.978365][ T342] device veth1_macvtap entered promiscuous mode
[ 30.987732][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 30.997748][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 31.032334][ T342] syz-executor (342) used greatest stack depth: 21088 bytes left
2026/01/31 15:16:47 executed programs: 0
[ 31.258983][ T359] bridge0: port 1(bridge_slave_0) entered blocking state
[ 31.266222][ T359] bridge0: port 1(bridge_slave_0) entered disabled state
[ 31.273507][ T359] device bridge_slave_0 entered promiscuous mode
[ 31.280640][ T359] bridge0: port 2(bridge_slave_1) entered blocking state
[ 31.287836][ T359] bridge0: port 2(bridge_slave_1) entered disabled state
[ 31.296267][ T359] device bridge_slave_1 entered promiscuous mode
[ 31.348658][ T359] bridge0: port 2(bridge_slave_1) entered blocking state
[ 31.355864][ T359] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 31.363310][ T359] bridge0: port 1(bridge_slave_0) entered blocking state
[ 31.370626][ T359] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 31.387746][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 31.395762][ T45] bridge0: port 1(bridge_slave_0) entered disabled state
[ 31.403136][ T45] bridge0: port 2(bridge_slave_1) entered disabled state
[ 31.418746][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 31.427290][ T45] bridge0: port 1(bridge_slave_0) entered blocking state
[ 31.434599][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 31.443444][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 31.451840][ T45] bridge0: port 2(bridge_slave_1) entered blocking state
[ 31.458921][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 31.475107][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 31.484526][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 31.498851][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 31.517343][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 31.525593][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 31.532965][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 31.541700][ T359] device veth0_vlan entered promiscuous mode
[ 31.559696][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 31.568765][ T359] device veth1_macvtap entered promiscuous mode
[ 31.578260][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 31.594557][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 31.845374][ C1] ==================================================================
[ 31.853478][ C1] BUG: KASAN: stack-out-of-bounds in __xfrm_dst_hash+0x399/0x480
[ 31.861196][ C1] Read of size 4 at addr ffffc900001d0ad8 by task swapper/1/0
[ 31.868640][ C1]
[ 31.870953][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted syzkaller #0
[ 31.878042][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
[ 31.888256][ C1] Call Trace:
[ 31.891530][ C1]
[ 31.894361][ C1] __dump_stack+0x21/0x30
[ 31.898682][ C1] dump_stack_lvl+0x110/0x170
[ 31.903461][ C1] ? show_regs_print_info+0x20/0x20
[ 31.908668][ C1] ? load_image+0x3e0/0x3e0
[ 31.913205][ C1] ? tcp_ack_update_rtt+0xbb6/0x1420
[ 31.918481][ C1] print_address_description+0x7f/0x2c0
[ 31.924276][ C1] ? __xfrm_dst_hash+0x399/0x480
[ 31.929217][ C1] kasan_report+0xf1/0x140
[ 31.933723][ C1] ? __xfrm_dst_hash+0x399/0x480
[ 31.938855][ C1] __asan_report_load4_noabort+0x14/0x20
[ 31.944569][ C1] __xfrm_dst_hash+0x399/0x480
[ 31.949321][ C1] xfrm_state_find+0x28a/0x2a10
[ 31.954159][ C1] ? xfrm_sad_getinfo+0x170/0x170
[ 31.959278][ C1] ? secondary_startup_64_no_verify+0xb1/0xbb
[ 31.965346][ C1] ? xfrm_pol_bin_cmp+0x19e/0x310
[ 31.970476][ C1] xfrm_resolve_and_create_bundle+0x697/0x29f0
[ 31.976634][ C1] ? xfrm_sk_policy_lookup+0x480/0x480
[ 31.982565][ C1] ? xfrm_policy_lookup+0xcba/0xd10
[ 31.987942][ C1] ? __xfrm_policy_check+0x2980/0x2980
[ 31.993581][ C1] xfrm_lookup_with_ifid+0x4e9/0x2080
[ 31.998964][ C1] ? rt_set_nexthop+0x5b9/0x780
[ 32.004120][ C1] ? __xfrm_sk_clone_policy+0x680/0x680
[ 32.009670][ C1] ? ip_route_output_key_hash_rcu+0x15af/0x20e0
[ 32.015916][ C1] xfrm_lookup_route+0x3c/0x170
[ 32.020766][ C1] ip_route_output_flow+0x1f8/0x2f0
[ 32.025960][ C1] ? ipv4_sk_update_pmtu+0x14b0/0x14b0
[ 32.031406][ C1] ? make_kuid+0x1db/0x680
[ 32.035986][ C1] ? __put_user_ns+0x60/0x60
[ 32.040659][ C1] ? __kasan_check_write+0x14/0x20
[ 32.045846][ C1] ? __alloc_skb+0x463/0x740
[ 32.050432][ C1] igmpv3_newpack+0x280/0xcd0
[ 32.055100][ C1] ? igmpv3_sendpack+0x190/0x190
[ 32.060165][ C1] add_grhead+0x75/0x2e0
[ 32.064407][ C1] add_grec+0x116c/0x1410
[ 32.068818][ C1] ? __kasan_check_write+0x14/0x20
[ 32.074099][ C1] igmp_ifc_timer_expire+0x89e/0xf80
[ 32.079389][ C1] ? __kasan_check_write+0x14/0x20
[ 32.084537][ C1] ? _raw_spin_lock_irq+0x95/0xf0
[ 32.089559][ C1] ? _raw_spin_lock_irqsave+0x130/0x130
[ 32.095105][ C1] ? igmp_gq_timer_expire+0xe0/0xe0
[ 32.100483][ C1] call_timer_fn+0x38/0x290
[ 32.104996][ C1] ? igmp_gq_timer_expire+0xe0/0xe0
[ 32.110463][ C1] __run_timers+0x650/0x9e0
[ 32.114958][ C1] ? calc_index+0x200/0x200
[ 32.119455][ C1] ? sched_clock_cpu+0x18/0x3c0
[ 32.124290][ C1] run_timer_softirq+0x6a/0xf0
[ 32.129038][ C1] handle_softirqs+0x250/0x560
[ 32.133796][ C1] __irq_exit_rcu+0x52/0xf0
[ 32.138283][ C1] irq_exit_rcu+0x9/0x10
[ 32.142506][ C1] sysvec_apic_timer_interrupt+0xa9/0xc0
[ 32.148476][ C1]
[ 32.151400][ C1]
[ 32.154318][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20
[ 32.160283][ C1] RIP: 0010:default_idle+0xf/0x20
[ 32.165306][ C1] Code: ff 4c 89 f7 e8 d2 27 f5 fc e9 3d ff ff ff 00 00 cc cc 00 00 cc cc 00 00 cc cc 00 55 48 89 e5 66 90 0f 00 2d 93 93 51 00 fb f4 <5d> c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 41
[ 32.185263][ C1] RSP: 0018:ffffc90000157d98 EFLAGS: 00000242
[ 32.191338][ C1] RAX: 0000000000002d8c RBX: ffff88810030a780 RCX: 0000000000002d8c
[ 32.199318][ C1] RDX: 0000000000000001 RSI: ffffffff85639520 RDI: ffffffff856394e0
[ 32.207453][ C1] RBP: ffffc90000157d98 R08: ffff8881f7138c73 R09: 1ffff1103ee2718e
[ 32.215796][ C1] R10: dffffc0000000000 R11: ffffed103ee2718f R12: 1ffff110200614f0
[ 32.223753][ C1] R13: 0000000000000001 R14: 0000000000000000 R15: dffffc0000000000
[ 32.231723][ C1] arch_cpu_idle+0xa/0x10
[ 32.236332][ C1] default_idle_call+0x71/0x1d0
[ 32.241457][ C1] do_idle+0x1dc/0x570
[ 32.245815][ C1] ? idle_inject_timer_fn+0x60/0x60
[ 32.251106][ C1] ? _raw_spin_unlock_irqrestore+0x5b/0x80
[ 32.257006][ C1] cpu_startup_entry+0x18/0x20
[ 32.261767][ C1] start_secondary+0x2e6/0x3a0
[ 32.266524][ C1] secondary_startup_64_no_verify+0xb1/0xbb
[ 32.272795][ C1]
[ 32.275921][ C1]
[ 32.278236][ C1]
[ 32.280579][ C1] Memory state around the buggy address:
[ 32.286285][ C1] ffffc900001d0980: f8 f8 f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00
[ 32.294334][ C1] ffffc900001d0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 32.302583][ C1] >ffffc900001d0a80: f1 f1 f1 f1 00 00 00 00 00 00 00 f3 f3 f3 f3 f3
[ 32.310630][ C1] ^
[ 32.317811][ C1] ffffc900001d0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 32.325865][ C1] ffffc900001d0b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 32.334002][ C1] ==================================================================
[ 32.342130][ C1] Disabling lock debugging due to kernel taint
[ 32.687008][ T45] device bridge_slave_1 left promiscuous mode
[ 32.693227][ T45] bridge0: port 2(bridge_slave_1) entered disabled state
[ 32.705852][ T45] device bridge_slave_0 left promiscuous mode
[ 32.712416][ T45] bridge0: port 1(bridge_slave_0) entered disabled state
[ 32.720824][ T45] device veth1_macvtap left promiscuous mode
[ 32.726968][ T45] device veth0_vlan left promiscuous mode
2026/01/31 15:16:52 executed programs: 249
2026/01/31 15:16:57 executed programs: 550