Warning: Permanently added '10.128.1.13' (ED25519) to the list of known hosts.
2026/02/25 03:33:47 ignoring optional flag "type"="gce"
2026/02/25 03:33:47 parsed 1 programs
2026/02/25 03:33:47 executed programs: 0
[ 38.313713][ T332] bridge0: port 1(bridge_slave_0) entered blocking state
[ 38.320873][ T332] bridge0: port 1(bridge_slave_0) entered disabled state
[ 38.328184][ T332] device bridge_slave_0 entered promiscuous mode
[ 38.335106][ T332] bridge0: port 2(bridge_slave_1) entered blocking state
[ 38.342157][ T332] bridge0: port 2(bridge_slave_1) entered disabled state
[ 38.349429][ T332] device bridge_slave_1 entered promiscuous mode
[ 38.388577][ T332] bridge0: port 2(bridge_slave_1) entered blocking state
[ 38.395641][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 38.402914][ T332] bridge0: port 1(bridge_slave_0) entered blocking state
[ 38.409955][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 38.426425][ T45] bridge0: port 1(bridge_slave_0) entered disabled state
[ 38.433610][ T45] bridge0: port 2(bridge_slave_1) entered disabled state
[ 38.440954][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 38.448405][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 38.457114][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 38.465273][ T45] bridge0: port 1(bridge_slave_0) entered blocking state
[ 38.472409][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 38.481085][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 38.489221][ T45] bridge0: port 2(bridge_slave_1) entered blocking state
[ 38.496346][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 38.507813][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 38.517297][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 38.530663][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 38.541779][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 38.549965][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 38.557443][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 38.565873][ T332] device veth0_vlan entered promiscuous mode
[ 38.575367][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 38.584248][ T332] device veth1_macvtap entered promiscuous mode
[ 38.593137][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 38.603191][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 38.623813][ T30] kauditd_printk_skb: 14 callbacks suppressed
[ 38.623827][ T30] audit: type=1400 audit(1771990427.574:88): avc: denied { create } for pid=342 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 38.650717][ T30] audit: type=1400 audit(1771990427.584:89): avc: denied { write } for pid=342 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 38.671246][ T30] audit: type=1400 audit(1771990427.584:90): avc: denied { nlmsg_write } for pid=342 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 38.693428][ T30] audit: type=1400 audit(1771990427.584:91): avc: denied { prog_load } for pid=342 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[ 39.499764][ C1] ==================================================================
[ 39.507889][ C1] BUG: KASAN: stack-out-of-bounds in __xfrm_dst_hash+0x399/0x480
[ 39.515750][ C1] Read of size 4 at addr ffffc900001d0ad8 by task syz-executor.0/607
[ 39.523809][ C1]
[ 39.526154][ C1] CPU: 1 PID: 607 Comm: syz-executor.0 Not tainted syzkaller #0
[ 39.533770][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
[ 39.543915][ C1] Call Trace:
[ 39.547190][ C1]
[ 39.550047][ C1] __dump_stack+0x21/0x30
[ 39.554372][ C1] dump_stack_lvl+0x110/0x170
[ 39.559042][ C1] ? show_regs_print_info+0x20/0x20
[ 39.564232][ C1] ? load_image+0x3e0/0x3e0
[ 39.568907][ C1] print_address_description+0x7f/0x2c0
[ 39.574474][ C1] ? __xfrm_dst_hash+0x399/0x480
[ 39.579420][ C1] kasan_report+0xf1/0x140
[ 39.583839][ C1] ? __xfrm_dst_hash+0x399/0x480
[ 39.588771][ C1] __asan_report_load4_noabort+0x14/0x20
[ 39.594484][ C1] __xfrm_dst_hash+0x399/0x480
[ 39.599247][ C1] xfrm_state_find+0x28a/0x2a10
[ 39.604092][ C1] ? percpu_counter_add_batch+0x13c/0x160
[ 39.609819][ C1] ? xfrm_sad_getinfo+0x170/0x170
[ 39.614844][ C1] ? xfrm_pol_bin_cmp+0x19e/0x310
[ 39.619862][ C1] xfrm_resolve_and_create_bundle+0x697/0x29f0
[ 39.626052][ C1] ? xfrm_sk_policy_lookup+0x480/0x480
[ 39.631506][ C1] ? xfrm_policy_lookup+0xcba/0xd10
[ 39.636700][ C1] ? __xfrm_policy_check+0x2980/0x2980
[ 39.642162][ C1] xfrm_lookup_with_ifid+0x4e9/0x2080
[ 39.647532][ C1] ? rt_set_nexthop+0x5b9/0x780
[ 39.652388][ C1] ? __xfrm_sk_clone_policy+0x680/0x680
[ 39.657928][ C1] ? ip_route_output_key_hash_rcu+0x15af/0x20e0
[ 39.664170][ C1] xfrm_lookup_route+0x3c/0x170
[ 39.669102][ C1] ip_route_output_flow+0x1f8/0x2f0
[ 39.674311][ C1] ? ipv4_sk_update_pmtu+0x14b0/0x14b0
[ 39.679767][ C1] ? make_kuid+0x1db/0x680
[ 39.684186][ C1] ? __put_user_ns+0x60/0x60
[ 39.688941][ C1] ? __kasan_check_write+0x14/0x20
[ 39.694046][ C1] ? __alloc_skb+0x463/0x740
[ 39.698630][ C1] igmpv3_newpack+0x280/0xcd0
[ 39.703308][ C1] ? unlink_anon_vmas+0x8e/0x590
[ 39.708305][ C1] ? free_pgtables+0x131/0x280
[ 39.713061][ C1] ? __mmput+0x93/0x320
[ 39.717211][ C1] ? mmput+0x50/0x150
[ 39.721189][ C1] ? do_exit+0x9f2/0x27e0
[ 39.725519][ C1] ? get_signal+0x66a/0x1480
[ 39.730101][ C1] ? igmpv3_sendpack+0x190/0x190
[ 39.735037][ C1] ? _raw_spin_lock_irqsave+0xc2/0x130
[ 39.740490][ C1] ? _raw_spin_lock+0xf0/0xf0
[ 39.745165][ C1] add_grhead+0x75/0x2e0
[ 39.749487][ C1] add_grec+0x116c/0x1410
[ 39.753894][ C1] ? __kasan_check_write+0x14/0x20
[ 39.759002][ C1] igmp_ifc_timer_expire+0x89e/0xf80
[ 39.764279][ C1] ? __kasan_check_write+0x14/0x20
[ 39.769391][ C1] ? _raw_spin_lock+0x94/0xf0
[ 39.774059][ C1] ? _raw_spin_trylock_bh+0x150/0x150
[ 39.779534][ C1] ? igmp_gq_timer_expire+0xe0/0xe0
[ 39.784734][ C1] call_timer_fn+0x38/0x290
[ 39.789318][ C1] ? igmp_gq_timer_expire+0xe0/0xe0
[ 39.794597][ C1] __run_timers+0x650/0x9e0
[ 39.799096][ C1] ? calc_index+0x200/0x200
[ 39.803605][ C1] ? sched_clock_cpu+0x18/0x3c0
[ 39.808449][ C1] run_timer_softirq+0x6a/0xf0
[ 39.813250][ C1] handle_softirqs+0x250/0x560
[ 39.818062][ C1] __irq_exit_rcu+0x52/0xf0
[ 39.822582][ C1] irq_exit_rcu+0x9/0x10
[ 39.826827][ C1] sysvec_apic_timer_interrupt+0xa9/0xc0
[ 39.832458][ C1]
[ 39.835384][ C1]
[ 39.838312][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20
[ 39.844306][ C1] RIP: 0010:unlink_anon_vmas+0x8e/0x590
[ 39.849945][ C1] Code: 45 a0 4c 89 75 c0 4d 89 e7 49 c1 ef 03 48 b8 00 00 00 00 00 fc ff df 41 80 3c 07 00 74 08 4c 89 e7 e8 56 21 07 00 49 8b 04 24 <48> 89 45 c8 49 8d 5c 24 f8 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00
[ 39.869543][ C1] RSP: 0018:ffffc90000df7770 EFLAGS: 00000246
[ 39.875691][ C1] RAX: ffff888113803e50 RBX: ffff88810de470b8 RCX: ffff8881164993c0
[ 39.883664][ C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
[ 39.891824][ C1] RBP: ffffc90000df77d0 R08: ffff88810de470cf R09: 1ffff11021bc8e19
[ 39.899797][ C1] R10: dffffc0000000000 R11: ffffed1021bc8e1a R12: ffff8881138031f0
[ 39.907899][ C1] R13: ffff88810de470b8 R14: ffff888113868818 R15: 1ffff1102270063e
[ 39.916162][ C1] ? up_write+0x7b/0x290
[ 39.920417][ C1] free_pgtables+0x131/0x280
[ 39.925037][ C1] exit_mmap+0x433/0x8b0
[ 39.929320][ C1] ? vm_brk+0x30/0x30
[ 39.933298][ C1] ? mutex_unlock+0x8f/0x230
[ 39.937885][ C1] ? uprobe_clear_state+0x2c1/0x320
[ 39.943171][ C1] __mmput+0x93/0x320
[ 39.947234][ C1] ? mmput+0x48/0x150
[ 39.951211][ C1] mmput+0x50/0x150
[ 39.955101][ C1] do_exit+0x9f2/0x27e0
[ 39.959252][ C1] ? put_task_struct+0x90/0x90
[ 39.964013][ C1] ? asm_exc_page_fault+0x27/0x30
[ 39.969033][ C1] ? futex_exit_release+0x1d0/0x1d0
[ 39.974233][ C1] ? __kasan_check_write+0x14/0x20
[ 39.979428][ C1] ? _raw_spin_lock_irq+0x95/0xf0
[ 39.984449][ C1] do_group_exit+0x141/0x310
[ 39.989132][ C1] ? __kasan_check_write+0x14/0x20
[ 39.994244][ C1] get_signal+0x66a/0x1480
[ 39.998667][ C1] arch_do_signal_or_restart+0xdf/0x11c0
[ 40.004318][ C1] ? selinux_bpf+0xc7/0xf0
[ 40.008868][ C1] ? security_bpf+0x82/0xa0
[ 40.013565][ C1] ? get_sigframe_size+0x10/0x10
[ 40.018510][ C1] ? __se_sys_futex+0x135/0x330
[ 40.023368][ C1] exit_to_user_mode_loop+0xa7/0xe0
[ 40.028569][ C1] exit_to_user_mode_prepare+0x87/0xd0
[ 40.034195][ C1] syscall_exit_to_user_mode+0x1a/0x30
[ 40.039734][ C1] do_syscall_64+0x58/0xa0
[ 40.044264][ C1] ? clear_bhb_loop+0x50/0xa0
[ 40.049023][ C1] ? clear_bhb_loop+0x50/0xa0
[ 40.053693][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 40.059583][ C1] RIP: 0033:0x7f2a13cbaeb9
[ 40.064001][ C1] Code: Unable to access opcode bytes at RIP 0x7f2a13cbae8f.
[ 40.071359][ C1] RSP: 002b:00007f2a1384d178 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[ 40.079783][ C1] RAX: 0000000000000001 RBX: 00007f2a13df9f88 RCX: 00007f2a13cbaeb9
[ 40.087844][ C1] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f2a13df9f8c
[ 40.096170][ C1] RBP: 00007f2a13df9f80 R08: 001bbf34851c7942 R09: 00007f2a1384dcdc
[ 40.104227][ C1] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f2a13df9f8c
[ 40.112192][ C1] R13: 000000000000000b R14: 00007ffeff13de20 R15: 00007ffeff13df08
[ 40.120261][ C1]
[ 40.123273][ C1]
[ 40.125593][ C1]
[ 40.127908][ C1] Memory state around the buggy address:
[ 40.133527][ C1] ffffc900001d0980: f8 f8 f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00
[ 40.141766][ C1] ffffc900001d0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 40.149905][ C1] >ffffc900001d0a80: f1 f1 f1 f1 00 00 00 00 00 00 00 f3 f3 f3 f3 f3
[ 40.157954][ C1] ^
[ 40.164878][ C1] ffffc900001d0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 40.172937][ C1] ffffc900001d0b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 40.180986][ C1] ==================================================================
[ 40.189058][ C1] Disabling lock debugging due to kernel taint
2026/02/25 03:33:52 executed programs: 632
2026/02/25 03:33:57 executed programs: 1450