Warning: Permanently added '10.128.0.71' (ED25519) to the list of known hosts. 2025/12/18 04:56:13 parsed 1 programs [ 22.066024][ T30] audit: type=1400 audit(1766033773.730:64): avc: denied { node_bind } for pid=281 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 22.086713][ T30] audit: type=1400 audit(1766033773.730:65): avc: denied { module_request } for pid=281 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 22.700356][ T30] audit: type=1400 audit(1766033774.370:66): avc: denied { mounton } for pid=290 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.701370][ T290] cgroup: Unknown subsys name 'net' [ 22.723012][ T30] audit: type=1400 audit(1766033774.370:67): avc: denied { mount } for pid=290 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.750225][ T30] audit: type=1400 audit(1766033774.390:68): avc: denied { unmount } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.751177][ T290] cgroup: Unknown subsys name 'devices' [ 22.921422][ T290] cgroup: Unknown subsys name 'hugetlb' [ 22.926998][ T290] cgroup: Unknown subsys name 'rlimit' [ 23.067176][ T30] audit: type=1400 audit(1766033774.730:69): avc: denied { setattr } for pid=290 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.090347][ T30] audit: type=1400 audit(1766033774.730:70): avc: denied { create } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.110269][ T292] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.110731][ T30] audit: type=1400 audit(1766033774.730:71): avc: denied { write } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.139469][ T30] audit: type=1400 audit(1766033774.730:72): avc: denied { read } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 23.159840][ T30] audit: type=1400 audit(1766033774.730:73): avc: denied { mounton } for pid=290 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.165834][ T290] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.583315][ T294] request_module fs-gadgetfs succeeded, but still no fs? [ 23.728363][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.735522][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.742978][ T308] device bridge_slave_0 entered promiscuous mode [ 23.749809][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.749948][ T304] syz-executor (304) used greatest stack depth: 21056 bytes left [ 23.756827][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.757226][ T308] device bridge_slave_1 entered promiscuous mode [ 23.809179][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.816334][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.823622][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.830649][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.846662][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.854346][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.862065][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.871725][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.879944][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.887043][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.896255][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.904485][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.911517][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.923549][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.932309][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.944865][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.955294][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.963350][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.970839][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.978657][ T308] device veth0_vlan entered promiscuous mode [ 23.987728][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.997238][ T308] device veth1_macvtap entered promiscuous mode [ 24.005581][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.015891][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2025/12/18 04:56:16 executed programs: 0 [ 24.687884][ T8] device bridge_slave_1 left promiscuous mode [ 24.694068][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.701485][ T8] device bridge_slave_0 left promiscuous mode [ 24.707585][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.715396][ T8] device veth1_macvtap left promiscuous mode [ 24.721409][ T8] device veth0_vlan left promiscuous mode [ 24.754566][ T363] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.761643][ T363] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.768882][ T363] device bridge_slave_0 entered promiscuous mode [ 24.776159][ T363] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.783211][ T363] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.790696][ T363] device bridge_slave_1 entered promiscuous mode [ 24.838142][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.845708][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.854777][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.863218][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.871466][ T319] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.878471][ T319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.885895][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.894242][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.902795][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.911068][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.918070][ T319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.928878][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.937677][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.950222][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.962114][ T363] device veth0_vlan entered promiscuous mode [ 24.970303][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.978257][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.985957][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.996688][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.006104][ T363] device veth1_macvtap entered promiscuous mode [ 25.015441][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.025626][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.048849][ T374] ================================================================== [ 25.056907][ T374] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 25.066099][ T374] Read of size 1 at addr ffff88811099ebf8 by task syz.2.17/374 [ 25.073611][ T374] [ 25.075915][ T374] CPU: 1 PID: 374 Comm: syz.2.17 Not tainted syzkaller #0 [ 25.082991][ T374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 25.093036][ T374] Call Trace: [ 25.096301][ T374] [ 25.099233][ T374] __dump_stack+0x21/0x30 [ 25.103552][ T374] dump_stack_lvl+0xee/0x150 [ 25.108116][ T374] ? show_regs_print_info+0x20/0x20 [ 25.113283][ T374] ? load_image+0x3a0/0x3a0 [ 25.117766][ T374] ? unwind_get_return_address+0x4d/0x90 [ 25.123369][ T374] print_address_description+0x7f/0x2c0 [ 25.128884][ T374] ? xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 25.135355][ T374] kasan_report+0xf1/0x140 [ 25.139745][ T374] ? xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 25.146232][ T374] __asan_report_load1_noabort+0x14/0x20 [ 25.151838][ T374] xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 25.158136][ T374] xfrm_policy_inexact_insert_node+0x938/0xb50 [ 25.164260][ T374] ? xfrm_netlink_rcv+0x72/0x90 [ 25.169082][ T374] ? netlink_unicast+0x876/0xa40 [ 25.173988][ T374] ? ____sys_sendmsg+0x5a2/0x8c0 [ 25.178908][ T374] ? x64_sys_call+0x4b/0x9a0 [ 25.183477][ T374] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 25.189520][ T374] xfrm_policy_inexact_alloc_chain+0x53a/0xb30 [ 25.195646][ T374] xfrm_policy_inexact_insert+0x70/0x1130 [ 25.201345][ T374] ? __get_hash_thresh+0x10c/0x420 [ 25.206433][ T374] ? policy_hash_bysel+0x110/0x4f0 [ 25.211518][ T374] xfrm_policy_insert+0x126/0x9a0 [ 25.216516][ T374] ? xfrm_policy_construct+0x54f/0x1f00 [ 25.222040][ T374] xfrm_add_policy+0x4d1/0x830 [ 25.226780][ T374] ? xfrm_dump_sa_done+0xc0/0xc0 [ 25.231691][ T374] xfrm_user_rcv_msg+0x45c/0x6e0 [ 25.236599][ T374] ? xfrm_netlink_rcv+0x90/0x90 [ 25.241423][ T374] ? avc_has_perm_noaudit+0x460/0x460 [ 25.246854][ T374] ? x64_sys_call+0x4b/0x9a0 [ 25.251417][ T374] ? selinux_nlmsg_lookup+0x237/0x4c0 [ 25.256762][ T374] netlink_rcv_skb+0x1e0/0x430 [ 25.261496][ T374] ? xfrm_netlink_rcv+0x90/0x90 [ 25.266318][ T374] ? netlink_ack+0xb60/0xb60 [ 25.270879][ T374] ? wait_for_completion_killable_timeout+0x10/0x10 [ 25.277442][ T374] ? __netlink_lookup+0x387/0x3b0 [ 25.282438][ T374] xfrm_netlink_rcv+0x72/0x90 [ 25.287085][ T374] netlink_unicast+0x876/0xa40 [ 25.291820][ T374] netlink_sendmsg+0x86a/0xb70 [ 25.296557][ T374] ? netlink_getsockopt+0x530/0x530 [ 25.301728][ T374] ? sock_alloc_file+0xba/0x260 [ 25.306559][ T374] ? security_socket_sendmsg+0x82/0xa0 [ 25.311991][ T374] ? netlink_getsockopt+0x530/0x530 [ 25.317158][ T374] ____sys_sendmsg+0x5a2/0x8c0 [ 25.321899][ T374] ? __sys_sendmsg_sock+0x40/0x40 [ 25.326894][ T374] ? import_iovec+0x7c/0xb0 [ 25.331367][ T374] ___sys_sendmsg+0x1f0/0x260 [ 25.336017][ T374] ? __sys_sendmsg+0x250/0x250 [ 25.340754][ T374] ? __kasan_check_read+0x11/0x20 [ 25.345751][ T374] ? __fdget+0x15b/0x230 [ 25.349970][ T374] __x64_sys_sendmsg+0x1e2/0x2a0 [ 25.354881][ T374] ? ___sys_sendmsg+0x260/0x260 [ 25.359703][ T374] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 25.365752][ T374] x64_sys_call+0x4b/0x9a0 [ 25.370141][ T374] do_syscall_64+0x4c/0xa0 [ 25.374532][ T374] ? clear_bhb_loop+0x50/0xa0 [ 25.379178][ T374] ? clear_bhb_loop+0x50/0xa0 [ 25.383827][ T374] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 25.389737][ T374] RIP: 0033:0x7ffb4d6da749 [ 25.394132][ T374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 25.413716][ T374] RSP: 002b:00007fffdf4016d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 25.422106][ T374] RAX: ffffffffffffffda RBX: 00007ffb4d930fa0 RCX: 00007ffb4d6da749 [ 25.430056][ T374] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 0000000000000005 [ 25.438006][ T374] RBP: 00007ffb4d75ef91 R08: 0000000000000000 R09: 0000000000000000 [ 25.445954][ T374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 25.453903][ T374] R13: 00007ffb4d930fa0 R14: 00007ffb4d930fa0 R15: 0000000000000003 [ 25.461880][ T374] [ 25.464878][ T374] [ 25.467179][ T374] Allocated by task 374: [ 25.471394][ T374] __kasan_kmalloc+0xda/0x110 [ 25.476054][ T374] __kmalloc+0x13d/0x2c0 [ 25.480273][ T374] sk_prot_alloc+0xed/0x320 [ 25.484754][ T374] sk_alloc+0x38/0x430 [ 25.488801][ T374] pfkey_create+0x12a/0x660 [ 25.493281][ T374] __sock_create+0x38d/0x7a0 [ 25.497850][ T374] __sys_socket+0xec/0x190 [ 25.502244][ T374] __x64_sys_socket+0x7a/0x90 [ 25.506897][ T374] x64_sys_call+0x8c5/0x9a0 [ 25.511376][ T374] do_syscall_64+0x4c/0xa0 [ 25.515773][ T374] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 25.521653][ T374] [ 25.523956][ T374] The buggy address belongs to the object at ffff88811099e800 [ 25.523956][ T374] which belongs to the cache kmalloc-1k of size 1024 [ 25.537983][ T374] The buggy address is located 1016 bytes inside of [ 25.537983][ T374] 1024-byte region [ffff88811099e800, ffff88811099ec00) [ 25.551415][ T374] The buggy address belongs to the page: [ 25.557032][ T374] page:ffffea0004426600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x110998 [ 25.567288][ T374] head:ffffea0004426600 order:3 compound_mapcount:0 compound_pincount:0 [ 25.575606][ T374] flags: 0x4000000000010200(slab|head|zone=1) [ 25.581683][ T374] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888100043080 [ 25.590247][ T374] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 25.598806][ T374] page dumped because: kasan: bad access detected [ 25.605196][ T374] page_owner tracks the page as allocated [ 25.610897][ T374] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 363, ts 25043101526, free_ts 24928681884 [ 25.631288][ T374] post_alloc_hook+0x192/0x1b0 [ 25.636131][ T374] prep_new_page+0x1c/0x110 [ 25.640614][ T374] get_page_from_freelist+0x2cc5/0x2d50 [ 25.646141][ T374] __alloc_pages+0x18f/0x440 [ 25.650710][ T374] new_slab+0xa1/0x4d0 [ 25.654760][ T374] ___slab_alloc+0x381/0x810 [ 25.659329][ T374] __slab_alloc+0x49/0x90 [ 25.663637][ T374] __kmalloc+0x16a/0x2c0 [ 25.667856][ T374] ip6t_alloc_initial_table+0x6d/0x660 [ 25.673292][ T374] ip6table_raw_table_init+0x32/0x80 [ 25.678590][ T374] xt_find_table_lock+0x2a5/0x400 [ 25.683596][ T374] xt_request_find_table_lock+0x27/0x100 [ 25.689207][ T374] do_ip6t_get_ctl+0x5e7/0x1070 [ 25.694039][ T374] nf_getsockopt+0x26d/0x290 [ 25.698609][ T374] ipv6_getsockopt+0x173d/0x1da0 [ 25.703522][ T374] tcp_getsockopt+0x1de/0x20a0 [ 25.708260][ T374] page last free stack trace: [ 25.712905][ T374] free_unref_page_prepare+0x542/0x550 [ 25.718343][ T374] free_unref_page+0xa2/0x550 [ 25.722997][ T374] __free_pages+0x6c/0x100 [ 25.727389][ T374] __free_slab+0xe8/0x1e0 [ 25.731698][ T374] __unfreeze_partials+0x160/0x190 [ 25.736793][ T374] put_cpu_partial+0xc6/0x120 [ 25.741458][ T374] __slab_free+0x1d4/0x290 [ 25.745854][ T374] ___cache_free+0x104/0x120 [ 25.750427][ T374] qlink_free+0x4d/0x90 [ 25.754562][ T374] qlist_free_all+0x5f/0xb0 [ 25.759046][ T374] kasan_quarantine_reduce+0x14a/0x170 [ 25.764484][ T374] __kasan_slab_alloc+0x2f/0xf0 [ 25.769313][ T374] slab_post_alloc_hook+0x4f/0x2b0 [ 25.774407][ T374] kmem_cache_alloc+0xf7/0x260 [ 25.779152][ T374] __alloc_skb+0xe0/0x740 [ 25.783465][ T374] netlink_ack+0x3a6/0xb60 [ 25.787864][ T374] [ 25.790166][ T374] Memory state around the buggy address: [ 25.795769][ T374] ffff88811099ea80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.803814][ T374] ffff88811099eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.811856][ T374] >ffff88811099eb80: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 25.819894][ T374] ^ [ 25.827849][ T374] ffff88811099ec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.835895][ T374] ffff88811099ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.843935][ T374] ================================================================== [ 25.851970][ T374] Disabling lock debugging due to kernel taint