[ 32.925717][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 32.941222][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.952415][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.964850][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.976928][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.986915][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.497878][ T9] device bridge_slave_1 left promiscuous mode [ 34.503822][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.511058][ T9] device bridge_slave_0 left promiscuous mode [ 34.516960][ T9] bridge0: port 1(bridge_slave_0) entered disabled state Warning: Permanently added '10.128.1.104' (ED25519) to the list of known hosts. 2025/02/20 07:29:10 ignoring optional flag "sandboxArg"="0" 2025/02/20 07:29:11 parsed 1 programs [ 53.089770][ T23] kauditd_printk_skb: 29 callbacks suppressed [ 53.089779][ T23] audit: type=1400 audit(1740036552.419:105): avc: denied { unlink } for pid=498 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 53.231162][ T498] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 53.639686][ T23] audit: type=1400 audit(1740036552.969:106): avc: denied { mounton } for pid=504 comm="syz-executor" path="/root/syzkaller.9GLcHx/syz-tmp/newroot/dev" dev="tmpfs" ino=13423 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 54.177610][ T545] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.184431][ T545] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.191778][ T545] device bridge_slave_0 entered promiscuous mode [ 54.198357][ T545] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.205163][ T545] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.212474][ T545] device bridge_slave_1 entered promiscuous mode [ 54.250967][ T545] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.257892][ T545] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.264972][ T545] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.271795][ T545] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.292646][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.300269][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.307162][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.316435][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.325432][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.332270][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.341114][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.349231][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.356062][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.368967][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.378553][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.393650][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 54.404607][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.416842][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 54.429559][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 54.439289][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 54.493430][ T23] audit: type=1401 audit(1740036553.819:107): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 2025/02/20 07:29:14 executed programs: 0 [ 54.743772][ T559] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.750968][ T559] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.758681][ T559] device bridge_slave_0 entered promiscuous mode [ 54.768542][ T559] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.775356][ T559] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.782882][ T559] device bridge_slave_1 entered promiscuous mode [ 54.826524][ T559] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.833365][ T559] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.840514][ T559] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.847260][ T559] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.867704][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.875108][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.882167][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.893999][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.901990][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.908841][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.918016][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.926017][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.932845][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.948406][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.957642][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.973386][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 54.986770][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.999776][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 55.016171][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 55.024856][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 55.074012][ T23] audit: type=1400 audit(1740036554.399:108): avc: denied { create } for pid=566 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 55.094708][ T567] ================================================================== [ 55.102594][ T567] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 55.111599][ T567] Read of size 1 at addr ffff8881e66a23d8 by task syz.2.16/567 [ 55.118969][ T567] [ 55.121154][ T567] CPU: 0 PID: 567 Comm: syz.2.16 Not tainted 5.4.289-syzkaller-05043-g39762b7a60e9 #0 [ 55.130518][ T567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 55.130705][ T23] audit: type=1400 audit(1740036554.419:109): avc: denied { setopt } for pid=566 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 55.140405][ T567] Call Trace: [ 55.140419][ T567] dump_stack+0x1d8/0x241 [ 55.140430][ T567] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 55.140437][ T567] ? printk+0xd1/0x111 [ 55.140446][ T567] ? xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 55.140453][ T567] ? wake_up_klogd+0xb2/0xf0 [ 55.140460][ T567] ? xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 55.140468][ T567] print_address_description+0x8c/0x600 [ 55.140474][ T567] ? panic+0x89d/0x89d [ 55.140484][ T567] ? xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 55.140490][ T567] __kasan_report+0xf3/0x120 [ 55.140499][ T567] ? xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 55.140507][ T567] kasan_report+0x30/0x60 [ 55.140515][ T567] xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 55.140522][ T567] ? xfrm_policy_addr_delta+0x234/0x340 [ 55.140529][ T567] xfrm_policy_inexact_insert_node+0x8f3/0xb00 [ 55.140539][ T567] ? xfrm_policy_inexact_alloc_bin+0x5b2/0x1440 [ 55.140546][ T567] xfrm_policy_inexact_alloc_chain+0x4f9/0xb10 [ 55.140561][ T567] xfrm_policy_inexact_insert+0x69/0x10e0 [ 55.160032][ T23] audit: type=1400 audit(1740036554.419:110): avc: denied { write } for pid=566 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 55.162474][ T567] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 55.166638][ T23] audit: type=1400 audit(1740036554.419:111): avc: denied { create } for pid=566 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 55.172272][ T567] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 55.172281][ T567] ? policy_hash_bysel+0x12c/0x6f0 [ 55.172288][ T567] ? memcpy+0x38/0x50 [ 55.172295][ T567] xfrm_policy_insert+0xe1/0x8a0 [ 55.172306][ T567] xfrm_add_policy+0x4f2/0x980 [ 55.172318][ T567] ? __nla_validate+0x50/0x50 [ 55.176213][ T23] audit: type=1400 audit(1740036554.419:112): avc: denied { write } for pid=566 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 55.182517][ T567] ? xfrm_dump_sa_done+0xc0/0xc0 [ 55.182526][ T567] ? __nla_parse+0x3a/0x50 [ 55.182534][ T567] xfrm_user_rcv_msg+0x689/0x9b0 [ 55.182543][ T567] ? xfrm_netlink_rcv+0x80/0x80 [ 55.182558][ T567] ? avc_has_perm+0xd2/0x260 [ 55.182565][ T567] ? avc_has_perm+0x16f/0x260 [ 55.182574][ T567] ? avc_has_perm_noaudit+0x3d0/0x3d0 [ 55.182584][ T567] netlink_rcv_skb+0x1d5/0x420 [ 55.182592][ T567] ? xfrm_netlink_rcv+0x80/0x80 [ 55.182598][ T567] ? nla_put_string+0x30/0x30 [ 55.182606][ T567] ? mutex_trylock+0xa0/0xa0 [ 55.182614][ T567] ? __netlink_lookup+0x369/0x390 [ 55.182627][ T567] xfrm_netlink_rcv+0x6e/0x80 [ 55.187599][ T23] audit: type=1400 audit(1740036554.419:113): avc: denied { nlmsg_write } for pid=566 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 55.193287][ T567] netlink_unicast+0x936/0xb20 [ 55.434483][ T567] ? netlink_detachskb+0x90/0x90 [ 55.439248][ T567] ? __virt_addr_valid+0x20e/0x2a0 [ 55.444219][ T567] netlink_sendmsg+0xa18/0xcf0 [ 55.448797][ T567] ? netlink_getsockopt+0x550/0x550 [ 55.453827][ T567] ? import_iovec+0x1bb/0x380 [ 55.458363][ T567] ? security_socket_sendmsg+0x7d/0xa0 [ 55.463641][ T567] ? netlink_getsockopt+0x550/0x550 [ 55.468675][ T567] ____sys_sendmsg+0x5ac/0x8f0 [ 55.473278][ T567] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 55.478310][ T567] ? percpu_counter_add_batch+0x14d/0x170 [ 55.483863][ T567] __sys_sendmsg+0x28b/0x380 [ 55.488287][ T567] ? ____sys_sendmsg+0x8f0/0x8f0 [ 55.493065][ T567] ? security_socket_post_create+0x96/0xc0 [ 55.498710][ T567] ? __do_page_fault+0x725/0xbb0 [ 55.503478][ T567] do_syscall_64+0xca/0x1c0 [ 55.507818][ T567] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 55.513558][ T567] RIP: 0033:0x7f42f9a89de9 [ 55.517979][ T567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 55.537410][ T567] RSP: 002b:00007f42f94fc038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 55.545654][ T567] RAX: ffffffffffffffda RBX: 00007f42f9ca2fa0 RCX: 00007f42f9a89de9 [ 55.553468][ T567] RDX: 0000000000004000 RSI: 0000200000000580 RDI: 0000000000000005 [ 55.561279][ T567] RBP: 00007f42f9b0b2a0 R08: 0000000000000000 R09: 0000000000000000 [ 55.569089][ T567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 55.576900][ T567] R13: 0000000000000000 R14: 00007f42f9ca2fa0 R15: 00007fff037a2d38 [ 55.584720][ T567] [ 55.586882][ T567] Allocated by task 567: [ 55.590964][ T567] __kasan_kmalloc+0x171/0x210 [ 55.595570][ T567] sk_prot_alloc+0xbd/0x3e0 [ 55.599901][ T567] sk_alloc+0x35/0x2f0 [ 55.603811][ T567] pfkey_create+0x122/0x670 [ 55.608154][ T567] __sock_create+0x3cb/0x7a0 [ 55.612574][ T567] __sys_socket+0x132/0x370 [ 55.616924][ T567] __x64_sys_socket+0x76/0x80 [ 55.621428][ T567] do_syscall_64+0xca/0x1c0 [ 55.625766][ T567] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 55.631496][ T567] [ 55.633665][ T567] Freed by task 0: [ 55.637226][ T567] (stack is not available) [ 55.641478][ T567] [ 55.643648][ T567] The buggy address belongs to the object at ffff8881e66a2000 [ 55.643648][ T567] which belongs to the cache kmalloc-1k of size 1024 [ 55.657544][ T567] The buggy address is located 984 bytes inside of [ 55.657544][ T567] 1024-byte region [ffff8881e66a2000, ffff8881e66a2400) [ 55.670814][ T567] The buggy address belongs to the page: [ 55.676295][ T567] page:ffffea000799a800 refcount:1 mapcount:0 mapping:ffff8881f5c02280 index:0x0 compound_mapcount: 0 [ 55.687048][ T567] flags: 0x8000000000010200(slab|head) [ 55.692350][ T567] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881f5c02280 [ 55.700850][ T567] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 55.709262][ T567] page dumped because: kasan: bad access detected [ 55.715524][ T567] page_owner tracks the page as allocated [ 55.721100][ T567] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d2a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL) [ 55.736698][ T567] prep_new_page+0x18f/0x370 [ 55.741134][ T567] get_page_from_freelist+0x2d13/0x2d90 [ 55.746595][ T567] __alloc_pages_nodemask+0x393/0x840 [ 55.751819][ T567] alloc_slab_page+0x39/0x3c0 [ 55.756314][ T567] new_slab+0x97/0x440 [ 55.760275][ T567] ___slab_alloc+0x2fe/0x490 [ 55.764669][ T567] __slab_alloc+0x62/0xa0 [ 55.768917][ T567] __kmalloc_track_caller+0x16d/0x2b0 [ 55.774118][ T567] __alloc_skb+0xb4/0x4d0 [ 55.778290][ T567] inet6_rt_notify+0x2db/0x550 [ 55.782885][ T567] fib6_add+0x2444/0x3df0 [ 55.787048][ T567] ip6_route_add+0x84/0x120 [ 55.791391][ T567] addrconf_add_dev+0x41f/0x610 [ 55.796077][ T567] addrconf_dev_config+0x1a7/0x320 [ 55.801030][ T567] addrconf_notify+0x9d2/0xe50 [ 55.805622][ T567] raw_notifier_call_chain+0x95/0x110 [ 55.810826][ T567] page last free stack trace: [ 55.815355][ T567] __free_pages_ok+0x847/0x950 [ 55.819947][ T567] __free_pages+0x91/0x140 [ 55.824208][ T567] can_pernet_exit+0x6c/0xc0 [ 55.828682][ T567] cleanup_net+0x665/0xc90 [ 55.832875][ T567] process_one_work+0x765/0xd20 [ 55.837563][ T567] worker_thread+0xaef/0x1470 [ 55.842073][ T567] kthread+0x2da/0x360 [ 55.845978][ T567] ret_from_fork+0x1f/0x30 [ 55.850232][ T567] [ 55.852397][ T567] Memory state around the buggy address: [ 55.857898][ T567] ffff8881e66a2280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.865764][ T567] ffff8881e66a2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.873666][ T567] >ffff8881e66a2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.881561][ T567] ^ [ 55.888334][ T567] ffff8881e66a2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.896231][ T567] ffff8881e66a2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.904129][ T567] ================================================================== [ 55.912112][ T567] Disabling lock debugging due to kernel taint [ 56.537861][ T393] device bridge_slave_1 left promiscuous mode [ 56.543816][ T393] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.551415][ T393] device bridge_slave_0 left promiscuous mode [ 56.557430][ T393] bridge0: port 1(bridge_slave_0) entered disabled state 2025/02/20 07:29:19 executed programs: 311 [ 63.161268][ T1778] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.168195][ T1778] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.175488][ T1778] device bridge_slave_0 entered promiscuous mode [ 63.183335][ T1778] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.190266][ T1778] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.197545][ T1778] device bridge_slave_1 entered promiscuous mode [ 63.238727][ T1778] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.245547][ T1778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.252700][ T1778] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.259450][ T1778] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.279300][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.286644][ T393] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.294057][ T393] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.304920][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.312916][ T393] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.319756][ T393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.328575][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.336559][ T393] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.343390][ T393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.355920][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 63.366665][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 63.383298][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 63.394429][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 63.406833][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 63.420057][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 63.431064][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 63.657727][ T9] device bridge_slave_1 left promiscuous mode [ 63.663660][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.672094][ T9] device bridge_slave_0 left promiscuous mode [ 63.680889][ T9] bridge0: port 1(bridge_slave_0) entered disabled state 2025/02/20 07:29:24 executed programs: 705