Warning: Permanently added '10.128.10.7' (ED25519) to the list of known hosts. 2025/11/03 04:57:29 parsed 1 programs [ 21.526851][ T24] audit: type=1400 audit(1762145849.780:64): avc: denied { node_bind } for pid=275 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 21.535600][ T24] audit: type=1400 audit(1762145849.780:65): avc: denied { create } for pid=275 comm="syz-execprog" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 21.542948][ T24] audit: type=1400 audit(1762145849.780:66): avc: denied { module_request } for pid=275 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 22.366733][ T24] audit: type=1400 audit(1762145850.620:67): avc: denied { mounton } for pid=283 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.368061][ T283] cgroup: Unknown subsys name 'net' [ 22.389385][ T24] audit: type=1400 audit(1762145850.620:68): avc: denied { mount } for pid=283 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.416686][ T24] audit: type=1400 audit(1762145850.650:69): avc: denied { unmount } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.416881][ T283] cgroup: Unknown subsys name 'devices' [ 22.585766][ T283] cgroup: Unknown subsys name 'hugetlb' [ 22.591367][ T283] cgroup: Unknown subsys name 'rlimit' [ 22.797840][ T24] audit: type=1400 audit(1762145851.050:70): avc: denied { setattr } for pid=283 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.814055][ T286] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.821128][ T24] audit: type=1400 audit(1762145851.050:71): avc: denied { create } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.850103][ T24] audit: type=1400 audit(1762145851.050:72): avc: denied { write } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.870375][ T24] audit: type=1400 audit(1762145851.050:73): avc: denied { read } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.870608][ T283] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.284768][ T288] request_module fs-gadgetfs succeeded, but still no fs? [ 23.295316][ T288] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.521663][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.528729][ T314] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.536419][ T314] device bridge_slave_0 entered promiscuous mode [ 23.544060][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.551301][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.558856][ T314] device bridge_slave_1 entered promiscuous mode [ 23.592498][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.599547][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.606822][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.613849][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.632021][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.639793][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.647039][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.657189][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.665337][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.672342][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.680818][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.689026][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.696063][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.708934][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.717934][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.731193][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.742541][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.750929][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.758792][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.766878][ T314] device veth0_vlan entered promiscuous mode [ 23.777342][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.786852][ T314] device veth1_macvtap entered promiscuous mode [ 23.796429][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.806825][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2025/11/03 04:57:32 executed programs: 0 [ 24.482222][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.489302][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.496665][ T354] device bridge_slave_0 entered promiscuous mode [ 24.503385][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.510428][ T354] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.517995][ T354] device bridge_slave_1 entered promiscuous mode [ 24.565785][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.573139][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.581906][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.590634][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.598904][ T318] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.605955][ T318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.613449][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.621948][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.630244][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.638414][ T318] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.645458][ T318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.656798][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.665511][ T112] device bridge_slave_1 left promiscuous mode [ 24.671605][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.679331][ T112] device bridge_slave_0 left promiscuous mode [ 24.685744][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.693415][ T112] device veth1_macvtap left promiscuous mode [ 24.699695][ T112] device veth0_vlan left promiscuous mode [ 24.770172][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.783344][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.794621][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.802603][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.810248][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.818554][ T354] device veth0_vlan entered promiscuous mode [ 24.828553][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.837384][ T354] device veth1_macvtap entered promiscuous mode [ 24.846413][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.856236][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.878420][ T359] ================================================================== [ 24.886612][ T359] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 24.895809][ T359] Read of size 1 at addr ffff888110335bd8 by task syz.2.17/359 [ 24.903418][ T359] [ 24.905752][ T359] CPU: 0 PID: 359 Comm: syz.2.17 Not tainted syzkaller #0 [ 24.912847][ T359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 24.922912][ T359] Call Trace: [ 24.926208][ T359] __dump_stack+0x21/0x24 [ 24.930530][ T359] dump_stack_lvl+0x169/0x1d8 [ 24.935205][ T359] ? show_regs_print_info+0x18/0x18 [ 24.940397][ T359] ? thaw_kernel_threads+0x220/0x220 [ 24.945674][ T359] ? unwind_get_return_address+0x4d/0x90 [ 24.951294][ T359] print_address_description+0x7f/0x2c0 [ 24.956845][ T359] ? xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 24.963334][ T359] kasan_report+0xe2/0x130 [ 24.967743][ T359] ? xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 24.974231][ T359] __asan_report_load1_noabort+0x14/0x20 [ 24.979850][ T359] xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 24.986203][ T359] xfrm_policy_inexact_insert_node+0x938/0xb50 [ 24.992351][ T359] ? xfrm_netlink_rcv+0x72/0x90 [ 24.997199][ T359] ? netlink_unicast+0x876/0xa40 [ 25.002139][ T359] ? netlink_sendmsg+0x88d/0xb30 [ 25.007087][ T359] ? ____sys_sendmsg+0x5a2/0x8c0 [ 25.012022][ T359] ? ___sys_sendmsg+0x1f0/0x260 [ 25.016887][ T359] ? do_syscall_64+0x31/0x40 [ 25.021467][ T359] xfrm_policy_inexact_alloc_chain+0x53a/0xb30 [ 25.027614][ T359] xfrm_policy_inexact_insert+0x70/0x1130 [ 25.033327][ T359] ? __get_hash_thresh+0x10c/0x420 [ 25.038437][ T359] ? policy_hash_bysel+0x110/0x4f0 [ 25.043556][ T359] xfrm_policy_insert+0x126/0x9a0 [ 25.048608][ T359] ? xfrm_policy_construct+0x54f/0x1f00 [ 25.054176][ T359] xfrm_add_policy+0x4d1/0x830 [ 25.058946][ T359] ? xfrm_dump_sa_done+0xc0/0xc0 [ 25.063921][ T359] xfrm_user_rcv_msg+0x450/0x6d0 [ 25.068968][ T359] ? xfrm_netlink_rcv+0x90/0x90 [ 25.073803][ T359] ? do_syscall_64+0x31/0x40 [ 25.078403][ T359] ? selinux_nlmsg_lookup+0x219/0x4a0 [ 25.083773][ T359] netlink_rcv_skb+0x1e0/0x430 [ 25.088543][ T359] ? xfrm_netlink_rcv+0x90/0x90 [ 25.093399][ T359] ? netlink_ack+0xb80/0xb80 [ 25.097985][ T359] ? mutex_trylock+0xa0/0xa0 [ 25.102571][ T359] ? __netlink_lookup+0x387/0x3b0 [ 25.107589][ T359] xfrm_netlink_rcv+0x72/0x90 [ 25.112261][ T359] netlink_unicast+0x876/0xa40 [ 25.117024][ T359] netlink_sendmsg+0x88d/0xb30 [ 25.121782][ T359] ? netlink_getsockopt+0x530/0x530 [ 25.126970][ T359] ? security_socket_sendmsg+0x82/0xa0 [ 25.132430][ T359] ? netlink_getsockopt+0x530/0x530 [ 25.137624][ T359] ____sys_sendmsg+0x5a2/0x8c0 [ 25.142382][ T359] ? __sys_sendmsg_sock+0x40/0x40 [ 25.147399][ T359] ? import_iovec+0x7c/0xb0 [ 25.151893][ T359] ___sys_sendmsg+0x1f0/0x260 [ 25.156561][ T359] ? __sys_sendmsg+0x250/0x250 [ 25.161332][ T359] ? alloc_file_pseudo+0x1a4/0x1f0 [ 25.166448][ T359] ? __kasan_check_read+0x11/0x20 [ 25.171456][ T359] ? __fdget+0x15b/0x230 [ 25.175684][ T359] __x64_sys_sendmsg+0x1e2/0x2a0 [ 25.180607][ T359] ? ___sys_sendmsg+0x260/0x260 [ 25.185446][ T359] ? __fd_install+0x13b/0x270 [ 25.190134][ T359] ? debug_smp_processor_id+0x17/0x20 [ 25.195496][ T359] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 25.201550][ T359] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 25.207174][ T359] do_syscall_64+0x31/0x40 [ 25.211582][ T359] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 25.217473][ T359] RIP: 0033:0x7f609262efc9 [ 25.221881][ T359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 25.241474][ T359] RSP: 002b:00007ffdcfd7fef8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 25.249876][ T359] RAX: ffffffffffffffda RBX: 00007f6092885fa0 RCX: 00007f609262efc9 [ 25.257840][ T359] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 0000000000000006 [ 25.265806][ T359] RBP: 00007f60926b1f91 R08: 0000000000000000 R09: 0000000000000000 [ 25.273766][ T359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 25.281734][ T359] R13: 00007f6092885fa0 R14: 00007f6092885fa0 R15: 0000000000000003 [ 25.289696][ T359] [ 25.292013][ T359] Allocated by task 359: [ 25.296264][ T359] __kasan_kmalloc+0xda/0x110 [ 25.300932][ T359] __kmalloc+0x1a7/0x330 [ 25.305163][ T359] sk_prot_alloc+0xb2/0x340 [ 25.309654][ T359] sk_alloc+0x38/0x4e0 [ 25.313708][ T359] pfkey_create+0x12a/0x660 [ 25.318201][ T359] __sock_create+0x38d/0x770 [ 25.322783][ T359] __sys_socket+0xec/0x190 [ 25.327192][ T359] __x64_sys_socket+0x7a/0x90 [ 25.331888][ T359] do_syscall_64+0x31/0x40 [ 25.336293][ T359] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 25.342163][ T359] [ 25.344480][ T359] The buggy address belongs to the object at ffff888110335800 [ 25.344480][ T359] which belongs to the cache kmalloc-1k of size 1024 [ 25.358520][ T359] The buggy address is located 984 bytes inside of [ 25.358520][ T359] 1024-byte region [ffff888110335800, ffff888110335c00) [ 25.371860][ T359] The buggy address belongs to the page: [ 25.377494][ T359] page:ffffea000440cc00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x110330 [ 25.387718][ T359] head:ffffea000440cc00 order:3 compound_mapcount:0 compound_pincount:0 [ 25.396027][ T359] flags: 0x4000000000010200(slab|head) [ 25.401476][ T359] raw: 4000000000010200 dead000000000100 dead000000000122 ffff888100042f00 [ 25.410069][ T359] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 25.418652][ T359] page dumped because: kasan: bad access detected [ 25.425049][ T359] page_owner tracks the page as allocated [ 25.430761][ T359] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d2a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 358, ts 24867760669, free_ts 24781058879 [ 25.450534][ T359] prep_new_page+0x179/0x180 [ 25.455127][ T359] get_page_from_freelist+0x2235/0x23d0 [ 25.460657][ T359] __alloc_pages_nodemask+0x268/0x5f0 [ 25.466016][ T359] new_slab+0x84/0x3f0 [ 25.470101][ T359] ___slab_alloc+0x2a6/0x450 [ 25.474676][ T359] __slab_alloc+0x63/0xa0 [ 25.478994][ T359] __kmalloc_track_caller+0x1ef/0x320 [ 25.484359][ T359] __alloc_skb+0xdc/0x520 [ 25.488769][ T359] wg_socket_send_buffer_to_peer+0x37/0x170 [ 25.494658][ T359] wg_packet_send_handshake_response+0x18f/0x1f0 [ 25.500981][ T359] wg_packet_handshake_receive_worker+0x512/0x900 [ 25.507391][ T359] process_one_work+0x6e1/0xba0 [ 25.512231][ T359] worker_thread+0xa6a/0x13b0 [ 25.516894][ T359] kthread+0x346/0x3d0 [ 25.520969][ T359] ret_from_fork+0x1f/0x30 [ 25.525366][ T359] page last free stack trace: [ 25.530028][ T359] __free_pages_ok+0x7fc/0x820 [ 25.534780][ T359] __free_pages+0xdd/0x380 [ 25.539185][ T359] __free_slab+0xcf/0x190 [ 25.543504][ T359] discard_slab+0x29/0x40 [ 25.547824][ T359] __slab_free+0x313/0x3a0 [ 25.552230][ T359] ___cache_free+0x111/0x130 [ 25.556821][ T359] qlink_free+0x50/0x90 [ 25.560966][ T359] qlist_free_all+0x5f/0xb0 [ 25.565457][ T359] kasan_quarantine_reduce+0x14a/0x160 [ 25.570901][ T359] __kasan_slab_alloc+0x2f/0xf0 [ 25.575741][ T359] slab_post_alloc_hook+0x5d/0x2f0 [ 25.580839][ T359] kmem_cache_alloc+0x165/0x2e0 [ 25.585877][ T359] sock_alloc_inode+0x1b/0xb0 [ 25.590546][ T359] new_inode_pseudo+0x62/0x210 [ 25.595296][ T359] __sock_create+0x12c/0x770 [ 25.599884][ T359] __sys_socket+0xec/0x190 [ 25.604289][ T359] [ 25.606610][ T359] Memory state around the buggy address: [ 25.612235][ T359] ffff888110335a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.620297][ T359] ffff888110335b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.628355][ T359] >ffff888110335b80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.636402][ T359] ^ [ 25.643329][ T359] ffff888110335c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.651374][ T359] ffff888110335c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.659431][ T359] ================================================================== [ 25.667480][ T359] Disabling lock debugging due to kernel taint