Warning: Permanently added '10.128.0.151' (ED25519) to the list of known hosts. 2026/02/23 09:17:32 parsed 1 programs [ 21.267245][ T28] audit: type=1400 audit(1771838252.453:64): avc: denied { node_bind } for pid=283 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 21.270627][ T28] audit: type=1400 audit(1771838252.453:65): avc: denied { module_request } for pid=283 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 21.974848][ T28] audit: type=1400 audit(1771838253.163:66): avc: denied { mounton } for pid=289 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.975879][ T289] cgroup: Unknown subsys name 'net' [ 21.997631][ T28] audit: type=1400 audit(1771838253.163:67): avc: denied { mount } for pid=289 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.025177][ T28] audit: type=1400 audit(1771838253.193:68): avc: denied { unmount } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.025332][ T289] cgroup: Unknown subsys name 'devices' [ 22.143827][ T289] cgroup: Unknown subsys name 'hugetlb' [ 22.150251][ T289] cgroup: Unknown subsys name 'rlimit' [ 22.257476][ T28] audit: type=1400 audit(1771838253.443:69): avc: denied { setattr } for pid=289 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.281508][ T28] audit: type=1400 audit(1771838253.443:70): avc: denied { create } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.290512][ T293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.302581][ T28] audit: type=1400 audit(1771838253.443:71): avc: denied { write } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.332483][ T28] audit: type=1400 audit(1771838253.443:72): avc: denied { read } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.352905][ T28] audit: type=1400 audit(1771838253.443:73): avc: denied { mounton } for pid=289 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.358171][ T289] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.110846][ T297] request_module fs-gadgetfs succeeded, but still no fs? [ 23.679180][ T346] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.686324][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.693894][ T346] device bridge_slave_0 entered promiscuous mode [ 23.700743][ T346] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.707832][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.715223][ T346] device bridge_slave_1 entered promiscuous mode [ 23.754005][ T346] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.761395][ T346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.768719][ T346] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.775802][ T346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.792471][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.800578][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.808117][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.817325][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.825952][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.833013][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.841587][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.849910][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.856943][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.868157][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.877269][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.890059][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.901524][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.910201][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.918022][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.926595][ T346] device veth0_vlan entered promiscuous mode [ 23.936029][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.945196][ T346] device veth1_macvtap entered promiscuous mode [ 23.954805][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.964868][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.996843][ T346] syz-executor (346) used greatest stack depth: 21632 bytes left 2026/02/23 09:17:35 executed programs: 0 [ 24.250011][ T365] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.257344][ T365] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.264832][ T365] device bridge_slave_0 entered promiscuous mode [ 24.271832][ T365] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.278975][ T365] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.286446][ T365] device bridge_slave_1 entered promiscuous mode [ 24.331042][ T365] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.338130][ T365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.345441][ T365] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.352470][ T365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.375586][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.383386][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.390656][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.404422][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.412656][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.419756][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.428578][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.436941][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.443988][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.459732][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.469172][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.482325][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.500831][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.509207][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.516982][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.525518][ T365] device veth0_vlan entered promiscuous mode [ 24.534951][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.543418][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.560223][ T365] device veth1_macvtap entered promiscuous mode [ 24.568810][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.576599][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.584875][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.603690][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.612309][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.634467][ C0] ================================================================== [ 24.634479][ C0] BUG: KASAN: slab-out-of-bounds in __bpf_get_stackid+0x6fa/0x960 [ 24.634510][ C0] Write of size 104 at addr ffff888114823210 by task syz.2.17/376 [ 24.634524][ C0] [ 24.634535][ C0] CPU: 0 PID: 376 Comm: syz.2.17 Not tainted syzkaller #0 [ 24.634551][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 24.634564][ C0] Call Trace: [ 24.634568][ C0] <#DB> [ 24.634574][ C0] __dump_stack+0x21/0x24 [ 24.634595][ C0] dump_stack_lvl+0x110/0x170 [ 24.634614][ C0] ? __cfi_dump_stack_lvl+0x8/0x8 [ 24.634634][ C0] ? __bpf_get_stackid+0x6fa/0x960 [ 24.634650][ C0] print_address_description+0x71/0x200 [ 24.634670][ C0] print_report+0x4a/0x60 [ 24.634686][ C0] kasan_report+0x122/0x150 [ 24.634714][ C0] ? __bpf_get_stackid+0x6fa/0x960 [ 24.634731][ C0] kasan_check_range+0x249/0x2a0 [ 24.634750][ C0] ? __bpf_get_stackid+0x6fa/0x960 [ 24.634765][ C0] memcpy+0x44/0x70 [ 24.634780][ C0] __bpf_get_stackid+0x6fa/0x960 [ 24.634797][ C0] bpf_get_stackid_pe+0x2ee/0x400 [ 24.634813][ C0] bpf_prog_6611c23d801ea08d+0x21/0x36 [ 24.634833][ C0] bpf_overflow_handler+0x3d0/0x5e0 [ 24.634851][ C0] ? __cfi_bpf_overflow_handler+0x10/0x10 [ 24.634868][ C0] ? __this_cpu_preempt_check+0x13/0x20 [ 24.634886][ C0] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 24.634908][ C0] __perf_event_overflow+0x437/0x620 [ 24.634929][ C0] perf_swevent_event+0x2f7/0x530 [ 24.634949][ C0] perf_bp_event+0x28c/0x330 [ 24.634970][ C0] ? __cfi_perf_bp_event+0x10/0x10 [ 24.634997][ C0] hw_breakpoint_exceptions_notify+0x182/0x550 [ 24.635021][ C0] notify_die+0x12a/0x1e0 [ 24.635035][ C0] ? __cfi_notify_die+0x10/0x10 [ 24.635051][ C0] notify_debug+0x24/0x30 [ 24.635070][ C0] exc_debug+0xde/0x130 [ 24.635091][ C0] asm_exc_debug+0x1a/0x40 [ 24.635105][ C0] RIP: 0010:__get_user_nocheck_8+0x9/0x13 [ 24.635126][ C0] Code: 90 0f 01 cb 0f ae e8 0f b7 10 31 c0 0f 01 ca c3 90 0f 01 cb 0f ae e8 8b 10 31 c0 0f 01 ca c3 90 90 0f 01 cb 0f ae e8 48 8b 10 <31> c0 0f 01 ca c3 90 0f 01 ca 31 d2 48 c7 c0 f2 ff ff ff c3 00 00 [ 24.635139][ C0] RSP: 0000:ffffc90000ab7720 EFLAGS: 00040806 [ 24.635158][ C0] RAX: 0000200000000300 RBX: 0000200000000300 RCX: ffff888113972880 [ 24.635170][ C0] RDX: 00006370692f736e RSI: 0000200000000300 RDI: 00007fffffffeff0 [ 24.635181][ C0] RBP: ffffc90000ab77b0 R08: 000000000000007f R09: 0000000000000000 [ 24.635192][ C0] R10: 0000000000000000 R11: ffffffff810a7780 R12: 0000000000000001 [ 24.635202][ C0] R13: 00000000ffffffff R14: 0000000000000000 R15: dffffc0000000000 [ 24.635213][ C0] ? __cfi_kvm_guest_state+0x10/0x10 [ 24.635238][ C0] [ 24.635242][ C0] [ 24.635247][ C0] ? perf_callchain_user+0x397/0xf50 [ 24.635272][ C0] get_perf_callchain+0x39e/0x490 [ 24.635296][ C0] ? __cfi_get_perf_callchain+0x10/0x10 [ 24.635319][ C0] ? local_clock+0x15/0x20 [ 24.635340][ C0] perf_prepare_sample+0x399/0x1d40 [ 24.635360][ C0] ? __cfi_perf_prepare_sample+0x10/0x10 [ 24.635378][ C0] ? bpf_get_stackid_pe+0x2ee/0x400 [ 24.635394][ C0] perf_event_output_forward+0xd1/0x1a0 [ 24.635412][ C0] ? __cfi_perf_event_output_forward+0x10/0x10 [ 24.635433][ C0] ? __this_cpu_preempt_check+0x13/0x20 [ 24.635450][ C0] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 24.635471][ C0] __perf_event_overflow+0x437/0x620 [ 24.635491][ C0] perf_swevent_event+0x2f7/0x530 [ 24.635512][ C0] perf_bp_event+0x28c/0x330 [ 24.635531][ C0] ? __kasan_check_write+0x14/0x20 [ 24.635545][ C0] ? put_ctx+0xa2/0x1a0 [ 24.635561][ C0] ? __cfi_perf_bp_event+0x10/0x10 [ 24.635580][ C0] ? perf_ioctl+0x140e/0x1e70 [ 24.635598][ C0] ? ioctl_has_perm+0x40f/0x4f0 [ 24.635621][ C0] ? __cfi_do_futex+0x10/0x10 [ 24.635636][ C0] ? __sys_bpf+0x57b/0x850 [ 24.635653][ C0] hw_breakpoint_exceptions_notify+0x278/0x550 [ 24.635674][ C0] notify_die+0x12a/0x1e0 [ 24.635687][ C0] ? __cfi_notify_die+0x10/0x10 [ 24.635707][ C0] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 24.635727][ C0] notify_debug+0x24/0x30 [ 24.635744][ C0] noist_exc_debug+0x77/0x100 [ 24.635766][ C0] asm_exc_debug+0x34/0x40 [ 24.635779][ C0] RIP: 0033:0x7f5c48d7b43d [ 24.635790][ C0] Code: 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 c5 fd 74 0f fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 90 f3 0f bc [ 24.635802][ C0] RSP: 002b:00007ffc1cecedf8 EFLAGS: 00000283 [ 24.635814][ C0] RAX: 0000000000000300 RBX: 00007ffc1cecf330 RCX: 2f666c65732f636f [ 24.635843][ C0] RDX: 0000200000000300 RSI: 00007f5c48e5c9c0 RDI: 0000200000000300 [ 24.635854][ C0] RBP: 0000200000000300 R08: 00007ffc1cecf560 R09: 00000000ffffffff [ 24.635865][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 24.635874][ C0] R13: 0000000000000073 R14: 00007f5c48e31e03 R15: 00007ffc1cecf3f0 [ 24.635887][ C0] [ 24.635892][ C0] [ 24.635895][ C0] Allocated by task 376: [ 24.635901][ C0] kasan_set_track+0x4b/0x70 [ 24.635918][ C0] kasan_save_alloc_info+0x25/0x30 [ 24.635938][ C0] __kasan_kmalloc+0x95/0xb0 [ 24.635955][ C0] __kmalloc_node+0xb2/0x1e0 [ 24.635967][ C0] bpf_map_area_alloc+0x4b/0xe0 [ 24.635985][ C0] prealloc_elems_and_freelist+0x8a/0x1e0 [ 24.635999][ C0] stack_map_alloc+0x3a7/0x530 [ 24.636012][ C0] map_create+0x49c/0xd80 [ 24.636024][ C0] __sys_bpf+0x34e/0x850 [ 24.636036][ C0] __x64_sys_bpf+0x7c/0x90 [ 24.636056][ C0] x64_sys_call+0x488/0x9a0 [ 24.636072][ C0] do_syscall_64+0x4c/0xa0 [ 24.636089][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 24.636112][ C0] [ 24.636114][ C0] The buggy address belongs to the object at ffff888114823200 [ 24.636114][ C0] which belongs to the cache kmalloc-64 of size 64 [ 24.636126][ C0] The buggy address is located 16 bytes inside of [ 24.636126][ C0] 64-byte region [ffff888114823200, ffff888114823240) [ 24.636141][ C0] [ 24.636144][ C0] The buggy address belongs to the physical page: [ 24.636149][ C0] page:ffffea00045208c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114823 [ 24.636170][ C0] flags: 0x4000000000000200(slab|zone=1) [ 24.636193][ C0] raw: 4000000000000200 ffffea0004520500 dead000000000005 ffff888100042780 [ 24.636206][ C0] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 24.636213][ C0] page dumped because: kasan: bad access detected [ 24.636220][ C0] page_owner tracks the page as allocated [ 24.636224][ C0] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 117, tgid 117 (udevadm), ts 4425628532, free_ts 0 [ 24.636255][ C0] post_alloc_hook+0x1f5/0x210 [ 24.636274][ C0] prep_new_page+0x1c/0x110 [ 24.636293][ C0] get_page_from_freelist+0x2d12/0x2d80 [ 24.636312][ C0] __alloc_pages+0x1d9/0x480 [ 24.636330][ C0] alloc_slab_page+0x6e/0xf0 [ 24.636351][ C0] new_slab+0x98/0x3d0 [ 24.636371][ C0] ___slab_alloc+0x6bd/0xb20 [ 24.636389][ C0] __slab_alloc+0x5e/0xa0 [ 24.636407][ C0] __kmem_cache_alloc_node+0x203/0x2c0 [ 24.636426][ C0] __kmalloc+0xa1/0x1e0 [ 24.636437][ C0] kobject_get_path+0xbf/0x200 [ 24.636456][ C0] kobject_uevent_env+0x2a0/0x730 [ 24.636470][ C0] kobject_synth_uevent+0x57e/0xbc0 [ 24.636483][ C0] uevent_store+0x25/0x70 [ 24.636500][ C0] dev_attr_store+0x6c/0x90 [ 24.636516][ C0] sysfs_kf_write+0x137/0x150 [ 24.636533][ C0] page_owner free stack trace missing [ 24.636537][ C0] [ 24.636539][ C0] Memory state around the buggy address: [ 24.636546][ C0] ffff888114823100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.636556][ C0] ffff888114823180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 24.636565][ C0] >ffff888114823200: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 24.636572][ C0] ^ [ 24.636580][ C0] ffff888114823280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.636589][ C0] ffff888114823300: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.636596][ C0] ================================================================== [ 24.636602][ C0] Disabling lock debugging due to kernel taint