Warning: Permanently added '10.128.1.117' (ED25519) to the list of known hosts. 2026/02/23 22:03:43 parsed 1 programs [ 27.250228][ T28] audit: type=1400 audit(1771884223.478:64): avc: denied { node_bind } for pid=282 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 27.271315][ T28] audit: type=1400 audit(1771884223.478:65): avc: denied { module_request } for pid=282 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 28.394032][ T28] audit: type=1400 audit(1771884224.618:66): avc: denied { mounton } for pid=288 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.397551][ T288] cgroup: Unknown subsys name 'net' [ 28.416907][ T28] audit: type=1400 audit(1771884224.618:67): avc: denied { mount } for pid=288 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.444112][ T28] audit: type=1400 audit(1771884224.658:68): avc: denied { unmount } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.444600][ T288] cgroup: Unknown subsys name 'devices' [ 28.590024][ T288] cgroup: Unknown subsys name 'hugetlb' [ 28.595675][ T288] cgroup: Unknown subsys name 'rlimit' [ 28.709506][ T28] audit: type=1400 audit(1771884224.938:69): avc: denied { setattr } for pid=288 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.733090][ T28] audit: type=1400 audit(1771884224.938:70): avc: denied { create } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.753775][ T28] audit: type=1400 audit(1771884224.938:71): avc: denied { write } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.774193][ T28] audit: type=1400 audit(1771884224.938:72): avc: denied { read } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 28.794598][ T28] audit: type=1400 audit(1771884224.938:73): avc: denied { mounton } for pid=288 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.803373][ T292] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.854702][ T288] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.563473][ T295] request_module fs-gadgetfs succeeded, but still no fs? [ 29.825640][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.832978][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.840594][ T310] device bridge_slave_0 entered promiscuous mode [ 29.847957][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.855109][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.862803][ T310] device bridge_slave_1 entered promiscuous mode [ 29.914510][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.921726][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.929404][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.936543][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.957549][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.965232][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.972745][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.980506][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.989917][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.998777][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.006700][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.017244][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.025804][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.033175][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.046332][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.056414][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.072260][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.084015][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.092305][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.100279][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.108895][ T310] device veth0_vlan entered promiscuous mode [ 30.121249][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.130445][ T310] device veth1_macvtap entered promiscuous mode [ 30.140486][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.150582][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.760829][ T43] device bridge_slave_1 left promiscuous mode [ 30.767064][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.774735][ T43] device bridge_slave_0 left promiscuous mode [ 30.781073][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.789516][ T43] device veth1_macvtap left promiscuous mode [ 30.795833][ T43] device veth0_vlan left promiscuous mode 2026/02/23 22:03:47 executed programs: 0 [ 31.110772][ T364] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.117915][ T364] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.125407][ T364] device bridge_slave_0 entered promiscuous mode [ 31.132581][ T364] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.139674][ T364] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.147155][ T364] device bridge_slave_1 entered promiscuous mode [ 31.196621][ T364] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.203736][ T364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.211132][ T364] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.218229][ T364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.239735][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.247513][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.254976][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.268395][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.276621][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.283730][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.291322][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.299825][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.306877][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.319768][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.330077][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.344836][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.356836][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.365311][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.373108][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.381614][ T364] device veth0_vlan entered promiscuous mode [ 31.392596][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.401920][ T364] device veth1_macvtap entered promiscuous mode [ 31.412232][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.422936][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.451519][ T374] loop2: detected capacity change from 0 to 512 [ 31.459572][ T374] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 31.474121][ T374] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 31.484911][ T374] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a002c019, mo2=0002] [ 31.493674][ T374] System zones: 1-12 [ 31.499790][ T374] EXT4-fs warning (device loop2): ext4_expand_extra_isize_ea:2800: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 31.513225][ T374] EXT4-fs (loop2): 1 truncate cleaned up [ 31.519055][ T374] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 31.535010][ T374] ================================================================== [ 31.543138][ T374] BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0x979/0x21d0 [ 31.550928][ T374] Read of size 18446744073709551572 at addr ffff88811386c850 by task syz.2.17/374 [ 31.560130][ T374] [ 31.562471][ T374] CPU: 1 PID: 374 Comm: syz.2.17 Not tainted syzkaller #0 [ 31.569606][ T374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 31.579764][ T374] Call Trace: [ 31.583050][ T374] [ 31.585982][ T374] __dump_stack+0x21/0x24 [ 31.590328][ T374] dump_stack_lvl+0x110/0x170 [ 31.595023][ T374] ? __cfi_dump_stack_lvl+0x8/0x8 [ 31.600144][ T374] ? kasan_save_alloc_info+0x25/0x30 [ 31.605460][ T374] ? ext4_xattr_block_set+0x9d5/0x3260 [ 31.610953][ T374] ? __ext4_expand_extra_isize+0x2fe/0x3e0 [ 31.616778][ T374] ? __ext4_mark_inode_dirty+0x3cf/0x600 [ 31.622538][ T374] ? ext4_xattr_set_entry+0x979/0x21d0 [ 31.628041][ T374] print_address_description+0x71/0x200 [ 31.633714][ T374] print_report+0x4a/0x60 [ 31.638146][ T374] kasan_report+0x122/0x150 [ 31.642670][ T374] ? ext4_xattr_set_entry+0x979/0x21d0 [ 31.648230][ T374] ? ext4_xattr_set_entry+0x979/0x21d0 [ 31.653907][ T374] kasan_check_range+0x249/0x2a0 [ 31.659053][ T374] ? ext4_xattr_set_entry+0x979/0x21d0 [ 31.664533][ T374] memmove+0x2d/0x70 [ 31.668434][ T374] ext4_xattr_set_entry+0x979/0x21d0 [ 31.673763][ T374] ext4_xattr_block_set+0xad3/0x3260 [ 31.679064][ T374] ? ext4_get_inode_loc+0xf0/0xf0 [ 31.684104][ T374] ? xattr_find_entry+0x24c/0x300 [ 31.689139][ T374] ? ext4_xattr_block_find+0x310/0x310 [ 31.694610][ T374] ? ext4_xattr_block_find+0x2a1/0x310 [ 31.700083][ T374] ext4_expand_extra_isize_ea+0x124a/0x1ea0 [ 31.706003][ T374] __ext4_expand_extra_isize+0x2fe/0x3e0 [ 31.711658][ T374] __ext4_mark_inode_dirty+0x3cf/0x600 [ 31.717138][ T374] __ext4_unlink+0x6b7/0xb40 [ 31.721744][ T374] ? __cfi___ext4_unlink+0x10/0x10 [ 31.726891][ T374] ? dquot_initialize+0x20/0x20 [ 31.731751][ T374] ? clear_nonspinnable+0x60/0x60 [ 31.736789][ T374] ext4_unlink+0x13a/0x3a0 [ 31.741238][ T374] vfs_unlink+0x39f/0x630 [ 31.745604][ T374] do_unlinkat+0x32a/0x6d0 [ 31.750029][ T374] ? __cfi_do_unlinkat+0x10/0x10 [ 31.755073][ T374] ? getname_flags+0x206/0x500 [ 31.759961][ T374] __x64_sys_unlink+0x49/0x50 [ 31.764672][ T374] x64_sys_call+0x958/0x9a0 [ 31.769193][ T374] do_syscall_64+0x4c/0xa0 [ 31.773636][ T374] ? clear_bhb_loop+0x30/0x80 [ 31.778537][ T374] ? clear_bhb_loop+0x30/0x80 [ 31.783222][ T374] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 31.789129][ T374] RIP: 0033:0x7f9722d9c629 [ 31.793561][ T374] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 31.813181][ T374] RSP: 002b:00007ffc586e4998 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 31.821619][ T374] RAX: ffffffffffffffda RBX: 00007f9723015fa0 RCX: 00007f9722d9c629 [ 31.829613][ T374] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000180 [ 31.837603][ T374] RBP: 00007f9722e32b39 R08: 0000000000000000 R09: 0000000000000000 [ 31.845667][ T374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 31.853655][ T374] R13: 00007f9723015fac R14: 00007f9723015fa0 R15: 00007f9723015fa0 [ 31.861829][ T374] [ 31.864856][ T374] [ 31.867205][ T374] Allocated by task 374: [ 31.871440][ T374] kasan_set_track+0x4b/0x70 [ 31.876063][ T374] kasan_save_alloc_info+0x25/0x30 [ 31.881227][ T374] __kasan_kmalloc+0x95/0xb0 [ 31.885837][ T374] __kmalloc_node_track_caller+0xb1/0x1e0 [ 31.891661][ T374] kmemdup+0x2b/0x60 [ 31.895572][ T374] ext4_xattr_block_set+0x9d5/0x3260 [ 31.900874][ T374] ext4_expand_extra_isize_ea+0x124a/0x1ea0 [ 31.906799][ T374] __ext4_expand_extra_isize+0x2fe/0x3e0 [ 31.912474][ T374] __ext4_mark_inode_dirty+0x3cf/0x600 [ 31.918069][ T374] __ext4_unlink+0x6b7/0xb40 [ 31.922775][ T374] ext4_unlink+0x13a/0x3a0 [ 31.927228][ T374] vfs_unlink+0x39f/0x630 [ 31.931609][ T374] do_unlinkat+0x32a/0x6d0 [ 31.936055][ T374] __x64_sys_unlink+0x49/0x50 [ 31.940756][ T374] x64_sys_call+0x958/0x9a0 [ 31.945309][ T374] do_syscall_64+0x4c/0xa0 [ 31.949747][ T374] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 31.955659][ T374] [ 31.957995][ T374] The buggy address belongs to the object at ffff88811386c800 [ 31.957995][ T374] which belongs to the cache kmalloc-1k of size 1024 [ 31.972051][ T374] The buggy address is located 80 bytes inside of [ 31.972051][ T374] 1024-byte region [ffff88811386c800, ffff88811386cc00) [ 31.985544][ T374] [ 31.987891][ T374] The buggy address belongs to the physical page: [ 31.994319][ T374] page:ffffea00044e1a00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113868 [ 32.004603][ T374] head:ffffea00044e1a00 order:3 compound_mapcount:0 compound_pincount:0 [ 32.013021][ T374] flags: 0x4000000000010200(slab|head|zone=1) [ 32.019112][ T374] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888100043080 [ 32.027705][ T374] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 32.036839][ T374] page dumped because: kasan: bad access detected [ 32.043249][ T374] page_owner tracks the page as allocated [ 32.049125][ T374] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 297, tgid 297 (udevd), ts 31495618034, free_ts 30759349427 [ 32.071120][ T374] post_alloc_hook+0x1f5/0x210 [ 32.075940][ T374] prep_new_page+0x1c/0x110 [ 32.080627][ T374] get_page_from_freelist+0x2d12/0x2d80 [ 32.086213][ T374] __alloc_pages+0x1d9/0x480 [ 32.090807][ T374] alloc_slab_page+0x6e/0xf0 [ 32.095530][ T374] new_slab+0x98/0x3d0 [ 32.099694][ T374] ___slab_alloc+0x6bd/0xb20 [ 32.104377][ T374] __slab_alloc+0x5e/0xa0 [ 32.108714][ T374] __kmem_cache_alloc_node+0x203/0x2c0 [ 32.114375][ T374] __kmalloc_node_track_caller+0xa0/0x1e0 [ 32.120184][ T374] __alloc_skb+0x236/0x4b0 [ 32.124656][ T374] netlink_sendmsg+0x635/0xbd0 [ 32.129486][ T374] ____sys_sendmsg+0x5cc/0x990 [ 32.134263][ T374] ___sys_sendmsg+0x2a2/0x360 [ 32.138955][ T374] __x64_sys_sendmsg+0x205/0x2d0 [ 32.143927][ T374] x64_sys_call+0x171/0x9a0 [ 32.148441][ T374] page last free stack trace: [ 32.153200][ T374] free_unref_page_prepare+0x742/0x750 [ 32.158665][ T374] free_unref_page+0x95/0x540 [ 32.163478][ T374] __free_pages+0x67/0x100 [ 32.167896][ T374] __free_slab+0xca/0x1a0 [ 32.172247][ T374] __unfreeze_partials+0x160/0x190 [ 32.177366][ T374] put_cpu_partial+0xa9/0x100 [ 32.182050][ T374] __slab_free+0x1c4/0x280 [ 32.186471][ T374] ___cache_free+0xbf/0xd0 [ 32.190887][ T374] qlist_free_all+0xc6/0x140 [ 32.195486][ T374] kasan_quarantine_reduce+0x14a/0x170 [ 32.200953][ T374] __kasan_slab_alloc+0x24/0x80 [ 32.205816][ T374] slab_post_alloc_hook+0x4f/0x2d0 [ 32.210946][ T374] __kmem_cache_alloc_node+0x192/0x2c0 [ 32.216424][ T374] __kmalloc+0xa1/0x1e0 [ 32.220595][ T374] __register_sysctl_table+0xf4/0xe30 [ 32.226067][ T374] register_net_sysctl+0x24f/0x260 [ 32.231197][ T374] [ 32.233532][ T374] Memory state around the buggy address: [ 32.239164][ T374] ffff88811386c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.247238][ T374] ffff88811386c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.255312][ T374] >ffff88811386c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.263371][ T374] ^ [ 32.270145][ T374] ffff88811386c880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.278225][ T374] ffff88811386c900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.286292][ T374] ================================================================== [ 32.295419][ T374] Disabling lock debugging due to kernel taint [ 32.306657][ T28] kauditd_printk_skb: 40 callbacks suppressed [ 32.306674][ T28] audit: type=1400 audit(1771884228.538:114): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 32.336093][ T28] audit: type=1400 audit(1771884228.538:115): avc: denied { search } for pid=84 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 32.354799][ T364] EXT4-fs (loop2): unmounting filesystem. [ 32.357880][ T28] audit: type=1400 audit(1771884228.538:116): avc: denied { write } for pid=84 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 32.386674][ T28] audit: type=1400 audit(1771884228.538:117): avc: denied { add_name } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 32.411539][ T28] audit: type=1400 audit(1771884228.538:118): avc: denied { create } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 32.435055][ T28] audit: type=1400 audit(1771884228.538:119): avc: denied { append open } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 32.467830][ T28] audit: type=1400 audit(1771884228.538:120): avc: denied { getattr } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 32.501188][ T364] syz-executor (364) used greatest stack depth: 22144 bytes left