Warning: Permanently added '10.128.0.251' (ED25519) to the list of known hosts. 2025/10/23 03:09:06 parsed 1 programs [ 23.106894][ T24] audit: type=1400 audit(1761188946.830:64): avc: denied { node_bind } for pid=275 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 23.127702][ T24] audit: type=1400 audit(1761188946.830:65): avc: denied { create } for pid=275 comm="syz-execprog" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 23.147642][ T24] audit: type=1400 audit(1761188946.830:66): avc: denied { module_request } for pid=275 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 24.028256][ T24] audit: type=1400 audit(1761188947.750:67): avc: denied { mounton } for pid=282 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.029608][ T282] cgroup: Unknown subsys name 'net' [ 24.051056][ T24] audit: type=1400 audit(1761188947.750:68): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.078713][ T24] audit: type=1400 audit(1761188947.780:69): avc: denied { unmount } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.078986][ T282] cgroup: Unknown subsys name 'devices' [ 24.254775][ T282] cgroup: Unknown subsys name 'hugetlb' [ 24.260489][ T282] cgroup: Unknown subsys name 'rlimit' [ 24.409848][ T24] audit: type=1400 audit(1761188948.130:70): avc: denied { setattr } for pid=282 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.433227][ T24] audit: type=1400 audit(1761188948.130:71): avc: denied { create } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.453592][ T24] audit: type=1400 audit(1761188948.130:72): avc: denied { write } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.465037][ T285] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.474249][ T24] audit: type=1400 audit(1761188948.130:73): avc: denied { read } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.528262][ T282] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.955346][ T288] request_module fs-gadgetfs succeeded, but still no fs? [ 24.966419][ T288] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 25.049109][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.056268][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.063868][ T293] device bridge_slave_0 entered promiscuous mode [ 25.070686][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.078050][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.085560][ T293] device bridge_slave_1 entered promiscuous mode [ 25.120780][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.127853][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.135164][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.142366][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.161279][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.168487][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.176173][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.183735][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.193485][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.201811][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.208923][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.218622][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.226827][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.233978][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.245694][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.255629][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.268834][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.280565][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.288822][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.296866][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.305186][ T293] device veth0_vlan entered promiscuous mode [ 25.315017][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.325235][ T293] device veth1_macvtap entered promiscuous mode [ 25.334804][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.345450][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2025/10/23 03:09:09 executed programs: 0 [ 26.185690][ T49] device bridge_slave_1 left promiscuous mode [ 26.192006][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.199933][ T49] device bridge_slave_0 left promiscuous mode [ 26.206191][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.216650][ T49] device veth1_macvtap left promiscuous mode [ 26.222746][ T49] device veth0_vlan left promiscuous mode [ 26.310179][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.317902][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.325554][ T353] device bridge_slave_0 entered promiscuous mode [ 26.332459][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.339748][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.347311][ T353] device bridge_slave_1 entered promiscuous mode [ 26.384174][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.391222][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.398766][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.405842][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.423381][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.431208][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.438461][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.447596][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.455820][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.462844][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.472178][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.480371][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.487595][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.499700][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.515790][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.524479][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.537674][ T353] device veth0_vlan entered promiscuous mode [ 26.549466][ T353] device veth1_macvtap entered promiscuous mode [ 26.556543][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.564764][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.572201][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.579918][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.592156][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.601774][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.625719][ T365] ================================================================== [ 26.633851][ T365] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 26.643136][ T365] Read of size 1 at addr ffff8881101b93d8 by task syz.2.17/365 [ 26.650844][ T365] [ 26.653188][ T365] CPU: 0 PID: 365 Comm: syz.2.17 Not tainted syzkaller #0 [ 26.660284][ T365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 26.670330][ T365] Call Trace: [ 26.673617][ T365] __dump_stack+0x21/0x24 [ 26.677939][ T365] dump_stack_lvl+0x169/0x1d8 [ 26.682603][ T365] ? show_regs_print_info+0x18/0x18 [ 26.687790][ T365] ? thaw_kernel_threads+0x220/0x220 [ 26.693073][ T365] ? unwind_get_return_address+0x4d/0x90 [ 26.698939][ T365] print_address_description+0x7f/0x2c0 [ 26.704808][ T365] ? xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 26.711308][ T365] kasan_report+0xe2/0x130 [ 26.715726][ T365] ? xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 26.722560][ T365] __asan_report_load1_noabort+0x14/0x20 [ 26.728203][ T365] xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 26.734524][ T365] xfrm_policy_inexact_insert_node+0x938/0xb50 [ 26.741190][ T365] ? xfrm_netlink_rcv+0x72/0x90 [ 26.746028][ T365] ? netlink_unicast+0x876/0xa40 [ 26.750954][ T365] ? netlink_sendmsg+0x88d/0xb30 [ 26.755878][ T365] ? ____sys_sendmsg+0x5a2/0x8c0 [ 26.760801][ T365] ? ___sys_sendmsg+0x1f0/0x260 [ 26.765658][ T365] ? do_syscall_64+0x31/0x40 [ 26.770240][ T365] xfrm_policy_inexact_alloc_chain+0x53a/0xb30 [ 26.776393][ T365] xfrm_policy_inexact_insert+0x70/0x1130 [ 26.782188][ T365] ? __get_hash_thresh+0x10c/0x420 [ 26.787413][ T365] ? policy_hash_bysel+0x110/0x4f0 [ 26.792557][ T365] xfrm_policy_insert+0x126/0x9a0 [ 26.797612][ T365] ? xfrm_policy_construct+0x54f/0x1f00 [ 26.803295][ T365] xfrm_add_policy+0x4d1/0x830 [ 26.808060][ T365] ? xfrm_dump_sa_done+0xc0/0xc0 [ 26.813005][ T365] xfrm_user_rcv_msg+0x450/0x6d0 [ 26.817946][ T365] ? xfrm_netlink_rcv+0x90/0x90 [ 26.822982][ T365] ? do_syscall_64+0x31/0x40 [ 26.827958][ T365] ? selinux_nlmsg_lookup+0x219/0x4a0 [ 26.833455][ T365] netlink_rcv_skb+0x1e0/0x430 [ 26.838228][ T365] ? xfrm_netlink_rcv+0x90/0x90 [ 26.843234][ T365] ? netlink_ack+0xb80/0xb80 [ 26.847822][ T365] ? mutex_trylock+0xa0/0xa0 [ 26.852504][ T365] ? __netlink_lookup+0x387/0x3b0 [ 26.857541][ T365] xfrm_netlink_rcv+0x72/0x90 [ 26.862209][ T365] netlink_unicast+0x876/0xa40 [ 26.866972][ T365] netlink_sendmsg+0x88d/0xb30 [ 26.871726][ T365] ? netlink_getsockopt+0x530/0x530 [ 26.876930][ T365] ? security_socket_sendmsg+0x82/0xa0 [ 26.882380][ T365] ? netlink_getsockopt+0x530/0x530 [ 26.887705][ T365] ____sys_sendmsg+0x5a2/0x8c0 [ 26.892493][ T365] ? __sys_sendmsg_sock+0x40/0x40 [ 26.897545][ T365] ? import_iovec+0x7c/0xb0 [ 26.902050][ T365] ___sys_sendmsg+0x1f0/0x260 [ 26.906727][ T365] ? __sys_sendmsg+0x250/0x250 [ 26.911637][ T365] ? alloc_file_pseudo+0x1a4/0x1f0 [ 26.916759][ T365] ? __kasan_check_read+0x11/0x20 [ 26.922073][ T365] ? __fdget+0x15b/0x230 [ 26.926417][ T365] __x64_sys_sendmsg+0x1e2/0x2a0 [ 26.931351][ T365] ? ___sys_sendmsg+0x260/0x260 [ 26.936278][ T365] ? __fd_install+0x13b/0x270 [ 26.940954][ T365] ? debug_smp_processor_id+0x17/0x20 [ 26.946319][ T365] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 26.952377][ T365] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 26.958010][ T365] do_syscall_64+0x31/0x40 [ 26.962424][ T365] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 26.968320][ T365] RIP: 0033:0x7fcdcd7bafc9 [ 26.973007][ T365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 26.992867][ T365] RSP: 002b:00007ffd2b940478 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 27.001375][ T365] RAX: ffffffffffffffda RBX: 00007fcdcda11fa0 RCX: 00007fcdcd7bafc9 [ 27.009344][ T365] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 0000000000000006 [ 27.017315][ T365] RBP: 00007fcdcd83df91 R08: 0000000000000000 R09: 0000000000000000 [ 27.025488][ T365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 27.033485][ T365] R13: 00007fcdcda11fa0 R14: 00007fcdcda11fa0 R15: 0000000000000003 [ 27.041448][ T365] [ 27.043854][ T365] Allocated by task 365: [ 27.048091][ T365] __kasan_kmalloc+0xda/0x110 [ 27.052760][ T365] __kmalloc+0x1a7/0x330 [ 27.057014][ T365] sk_prot_alloc+0xb2/0x340 [ 27.061525][ T365] sk_alloc+0x38/0x4e0 [ 27.065582][ T365] pfkey_create+0x12a/0x660 [ 27.070095][ T365] __sock_create+0x38d/0x770 [ 27.074692][ T365] __sys_socket+0xec/0x190 [ 27.079121][ T365] __x64_sys_socket+0x7a/0x90 [ 27.083908][ T365] do_syscall_64+0x31/0x40 [ 27.088337][ T365] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 27.094328][ T365] [ 27.096729][ T365] The buggy address belongs to the object at ffff8881101b9000 [ 27.096729][ T365] which belongs to the cache kmalloc-1k of size 1024 [ 27.110907][ T365] The buggy address is located 984 bytes inside of [ 27.110907][ T365] 1024-byte region [ffff8881101b9000, ffff8881101b9400) [ 27.124366][ T365] The buggy address belongs to the page: [ 27.130029][ T365] page:ffffea0004406e00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1101b8 [ 27.140262][ T365] head:ffffea0004406e00 order:3 compound_mapcount:0 compound_pincount:0 [ 27.148602][ T365] flags: 0x4000000000010200(slab|head) [ 27.154056][ T365] raw: 4000000000010200 ffffea0004404800 0000000300000003 ffff888100042f00 [ 27.162632][ T365] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 27.171323][ T365] page dumped because: kasan: bad access detected [ 27.177759][ T365] page_owner tracks the page as allocated [ 27.183472][ T365] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 95, ts 5688504086, free_ts 0 [ 27.201424][ T365] prep_new_page+0x179/0x180 [ 27.206124][ T365] get_page_from_freelist+0x2235/0x23d0 [ 27.211712][ T365] __alloc_pages_nodemask+0x268/0x5f0 [ 27.217105][ T365] new_slab+0x84/0x3f0 [ 27.221170][ T365] ___slab_alloc+0x2a6/0x450 [ 27.225752][ T365] __slab_alloc+0x63/0xa0 [ 27.230087][ T365] __kmalloc_track_caller+0x1ef/0x320 [ 27.235473][ T365] __alloc_skb+0xdc/0x520 [ 27.239791][ T365] netlink_sendmsg+0x5f6/0xb30 [ 27.244542][ T365] ____sys_sendmsg+0x5a2/0x8c0 [ 27.249293][ T365] ___sys_sendmsg+0x1f0/0x260 [ 27.253978][ T365] __x64_sys_sendmsg+0x1e2/0x2a0 [ 27.258913][ T365] do_syscall_64+0x31/0x40 [ 27.263317][ T365] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 27.269195][ T365] page_owner free stack trace missing [ 27.274557][ T365] [ 27.276950][ T365] Memory state around the buggy address: [ 27.282590][ T365] ffff8881101b9280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.290746][ T365] ffff8881101b9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.298888][ T365] >ffff8881101b9380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 27.306939][ T365] ^ [ 27.313884][ T365] ffff8881101b9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.322027][ T365] ffff8881101b9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.330078][ T365] ================================================================== [ 27.338129][ T365] Disabling lock debugging due to kernel taint