Warning: Permanently added '10.128.0.148' (ED25519) to the list of known hosts. 2025/02/20 07:13:26 ignoring optional flag "sandboxArg"="0" 2025/02/20 07:13:27 parsed 1 programs [ 54.623167][ T23] kauditd_printk_skb: 29 callbacks suppressed [ 54.623178][ T23] audit: type=1400 audit(1740035608.680:105): avc: denied { unlink } for pid=499 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 54.770521][ T499] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 55.237817][ T23] audit: type=1400 audit(1740035609.290:106): avc: denied { mounton } for pid=507 comm="syz-executor" path="/root/syzkaller.jfB2YD/syz-tmp/newroot/dev" dev="tmpfs" ino=13093 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 55.493526][ T524] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.500390][ T524] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.507639][ T524] device bridge_slave_0 entered promiscuous mode [ 55.514512][ T524] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.521355][ T524] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.528639][ T524] device bridge_slave_1 entered promiscuous mode [ 55.580430][ T524] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.587265][ T524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.594428][ T524] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.601167][ T524] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.624739][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.632049][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.639200][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.646619][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.658131][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.666216][ T380] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.673086][ T380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.682278][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.690329][ T380] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.697150][ T380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.711859][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.721399][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.739169][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 55.751439][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.766473][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 55.780468][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 55.791105][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 56.171268][ T23] audit: type=1401 audit(1740035610.230:107): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 2025/02/20 07:13:30 executed programs: 0 [ 56.550827][ T9] device bridge_slave_1 left promiscuous mode [ 56.556914][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.565723][ T9] device bridge_slave_0 left promiscuous mode [ 56.571813][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.728777][ T562] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.735847][ T562] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.743282][ T562] device bridge_slave_0 entered promiscuous mode [ 56.750186][ T562] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.757018][ T562] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.764462][ T562] device bridge_slave_1 entered promiscuous mode [ 56.816537][ T562] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.823475][ T562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.830620][ T562] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.837346][ T562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.862419][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.870300][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.877279][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.887251][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.895706][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.902548][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.911713][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.919800][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.926649][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.944129][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.962129][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.983811][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 56.997148][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.014022][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.030563][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 57.042026][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 57.071401][ T23] audit: type=1400 audit(1740035611.130:108): avc: denied { create } for pid=566 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 57.090890][ T23] audit: type=1400 audit(1740035611.150:109): avc: denied { setopt } for pid=566 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 57.092614][ T567] ================================================================== [ 57.110236][ T23] audit: type=1400 audit(1740035611.150:110): avc: denied { write } for pid=566 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 57.117620][ T567] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 57.136619][ T23] audit: type=1400 audit(1740035611.150:111): avc: denied { create } for pid=566 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 57.145464][ T567] Read of size 1 at addr ffff8881e3a85bd8 by task syz.2.16/567 [ 57.145467][ T567] [ 57.145479][ T567] CPU: 1 PID: 567 Comm: syz.2.16 Not tainted 5.4.289-syzkaller-05043-g39762b7a60e9 #0 [ 57.145491][ T567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 57.165633][ T23] audit: type=1400 audit(1740035611.150:112): avc: denied { write } for pid=566 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 57.172663][ T567] Call Trace: [ 57.172678][ T567] dump_stack+0x1d8/0x241 [ 57.172689][ T567] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 57.172702][ T567] ? printk+0xd1/0x111 [ 57.174976][ T23] audit: type=1400 audit(1740035611.150:113): avc: denied { nlmsg_write } for pid=566 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 57.184212][ T567] ? xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 57.184223][ T567] ? wake_up_klogd+0xb2/0xf0 [ 57.184240][ T567] ? xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 57.267628][ T567] print_address_description+0x8c/0x600 [ 57.273000][ T567] ? panic+0x89d/0x89d [ 57.276905][ T567] ? xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 57.283258][ T567] __kasan_report+0xf3/0x120 [ 57.287665][ T567] ? xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 57.294006][ T567] kasan_report+0x30/0x60 [ 57.298167][ T567] xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 57.304333][ T567] ? xfrm_policy_addr_delta+0x234/0x340 [ 57.309710][ T567] xfrm_policy_inexact_insert_node+0x8f3/0xb00 [ 57.315702][ T567] ? xfrm_policy_inexact_alloc_bin+0x5b2/0x1440 [ 57.321776][ T567] xfrm_policy_inexact_alloc_chain+0x4f9/0xb10 [ 57.327767][ T567] xfrm_policy_inexact_insert+0x69/0x10e0 [ 57.333320][ T567] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 57.338177][ T567] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 57.343213][ T567] ? policy_hash_bysel+0x12c/0x6f0 [ 57.348156][ T567] ? memcpy+0x38/0x50 [ 57.351979][ T567] xfrm_policy_insert+0xe1/0x8a0 [ 57.356756][ T567] xfrm_add_policy+0x4f2/0x980 [ 57.361438][ T567] ? __nla_validate+0x50/0x50 [ 57.365951][ T567] ? xfrm_dump_sa_done+0xc0/0xc0 [ 57.370723][ T567] ? __nla_parse+0x3a/0x50 [ 57.374976][ T567] xfrm_user_rcv_msg+0x689/0x9b0 [ 57.379754][ T567] ? xfrm_netlink_rcv+0x80/0x80 [ 57.384448][ T567] ? avc_has_perm+0xd2/0x260 [ 57.388871][ T567] ? avc_has_perm+0x16f/0x260 [ 57.393380][ T567] ? avc_has_perm_noaudit+0x3d0/0x3d0 [ 57.398589][ T567] netlink_rcv_skb+0x1d5/0x420 [ 57.403189][ T567] ? xfrm_netlink_rcv+0x80/0x80 [ 57.407869][ T567] ? nla_put_string+0x30/0x30 [ 57.412384][ T567] ? mutex_trylock+0xa0/0xa0 [ 57.416809][ T567] ? __netlink_lookup+0x369/0x390 [ 57.421672][ T567] xfrm_netlink_rcv+0x6e/0x80 [ 57.426183][ T567] netlink_unicast+0x936/0xb20 [ 57.430787][ T567] ? netlink_detachskb+0x90/0x90 [ 57.435558][ T567] ? __virt_addr_valid+0x20e/0x2a0 [ 57.440510][ T567] netlink_sendmsg+0xa18/0xcf0 [ 57.445111][ T567] ? netlink_getsockopt+0x550/0x550 [ 57.450137][ T567] ? import_iovec+0x1bb/0x380 [ 57.454847][ T567] ? security_socket_sendmsg+0x7d/0xa0 [ 57.460126][ T567] ? netlink_getsockopt+0x550/0x550 [ 57.465190][ T567] ____sys_sendmsg+0x5ac/0x8f0 [ 57.469774][ T567] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 57.474818][ T567] ? percpu_counter_add_batch+0x14d/0x170 [ 57.480351][ T567] __sys_sendmsg+0x28b/0x380 [ 57.484780][ T567] ? ____sys_sendmsg+0x8f0/0x8f0 [ 57.489556][ T567] ? security_socket_post_create+0x96/0xc0 [ 57.495198][ T567] ? __do_page_fault+0x725/0xbb0 [ 57.499971][ T567] do_syscall_64+0xca/0x1c0 [ 57.504309][ T567] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 57.510067][ T567] RIP: 0033:0x7f9f97e9fde9 [ 57.514286][ T567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.533730][ T567] RSP: 002b:00007f9f97912038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 57.541974][ T567] RAX: ffffffffffffffda RBX: 00007f9f980b8fa0 RCX: 00007f9f97e9fde9 [ 57.549794][ T567] RDX: 0000000000004000 RSI: 0000200000000580 RDI: 0000000000000005 [ 57.557601][ T567] RBP: 00007f9f97f212a0 R08: 0000000000000000 R09: 0000000000000000 [ 57.565404][ T567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 57.573303][ T567] R13: 0000000000000000 R14: 00007f9f980b8fa0 R15: 00007ffcc376bf08 [ 57.581115][ T567] [ 57.583282][ T567] Allocated by task 567: [ 57.587368][ T567] __kasan_kmalloc+0x171/0x210 [ 57.591964][ T567] sk_prot_alloc+0xbd/0x3e0 [ 57.596302][ T567] sk_alloc+0x35/0x2f0 [ 57.600214][ T567] pfkey_create+0x122/0x670 [ 57.604561][ T567] __sock_create+0x3cb/0x7a0 [ 57.608976][ T567] __sys_socket+0x132/0x370 [ 57.613316][ T567] __x64_sys_socket+0x76/0x80 [ 57.617840][ T567] do_syscall_64+0xca/0x1c0 [ 57.622168][ T567] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 57.627901][ T567] [ 57.630066][ T567] Freed by task 167: [ 57.633798][ T567] __kasan_slab_free+0x1b5/0x270 [ 57.638572][ T567] kfree+0x123/0x370 [ 57.642314][ T567] consume_skb+0xa5/0x2a0 [ 57.646475][ T567] netlink_unicast+0x93e/0xb20 [ 57.651071][ T567] netlink_sendmsg+0xa18/0xcf0 [ 57.655671][ T567] ____sys_sendmsg+0x5ac/0x8f0 [ 57.660272][ T567] __sys_sendmsg+0x28b/0x380 [ 57.664700][ T567] do_syscall_64+0xca/0x1c0 [ 57.669035][ T567] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 57.674761][ T567] [ 57.676939][ T567] The buggy address belongs to the object at ffff8881e3a85800 [ 57.676939][ T567] which belongs to the cache kmalloc-1k of size 1024 [ 57.690823][ T567] The buggy address is located 984 bytes inside of [ 57.690823][ T567] 1024-byte region [ffff8881e3a85800, ffff8881e3a85c00) [ 57.704012][ T567] The buggy address belongs to the page: [ 57.709489][ T567] page:ffffea00078ea000 refcount:1 mapcount:0 mapping:ffff8881f5c02280 index:0x0 compound_mapcount: 0 [ 57.720242][ T567] flags: 0x8000000000010200(slab|head) [ 57.725546][ T567] raw: 8000000000010200 ffffea00078fdc00 0000000200000002 ffff8881f5c02280 [ 57.734222][ T567] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 57.742640][ T567] page dumped because: kasan: bad access detected [ 57.748887][ T567] page_owner tracks the page as allocated [ 57.754445][ T567] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC) [ 57.769290][ T567] prep_new_page+0x18f/0x370 [ 57.773719][ T567] get_page_from_freelist+0x2d13/0x2d90 [ 57.779090][ T567] __alloc_pages_nodemask+0x393/0x840 [ 57.784300][ T567] alloc_slab_page+0x39/0x3c0 [ 57.788810][ T567] new_slab+0x97/0x440 [ 57.792724][ T567] ___slab_alloc+0x2fe/0x490 [ 57.797143][ T567] __slab_alloc+0x62/0xa0 [ 57.801308][ T567] __kmalloc_track_caller+0x16d/0x2b0 [ 57.806519][ T567] __alloc_skb+0xb4/0x4d0 [ 57.810685][ T567] netlink_sendmsg+0x797/0xcf0 [ 57.815287][ T567] ____sys_sendmsg+0x5ac/0x8f0 [ 57.819884][ T567] __sys_sendmsg+0x28b/0x380 [ 57.824309][ T567] do_syscall_64+0xca/0x1c0 [ 57.828652][ T567] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 57.834373][ T567] page_owner free stack trace missing [ 57.839587][ T567] [ 57.841750][ T567] Memory state around the buggy address: [ 57.847225][ T567] ffff8881e3a85a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 57.855125][ T567] ffff8881e3a85b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 57.863029][ T567] >ffff8881e3a85b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.870915][ T567] ^ [ 57.877691][ T567] ffff8881e3a85c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.885589][ T567] ffff8881e3a85c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.893579][ T567] ================================================================== [ 57.901551][ T567] Disabling lock debugging due to kernel taint 2025/02/20 07:13:35 executed programs: 272 [ 66.102589][ T1777] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.109428][ T1777] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.116886][ T1777] device bridge_slave_0 entered promiscuous mode [ 66.124061][ T1777] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.130933][ T1777] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.138468][ T1777] device bridge_slave_1 entered promiscuous mode [ 66.194700][ T1777] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.201553][ T1777] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.208665][ T1777] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.215546][ T1777] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.240073][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.248551][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.256185][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.267070][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.275335][ T380] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.282219][ T380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.292696][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.300766][ T380] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.307604][ T380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.324111][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.333577][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.352726][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 66.364783][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 66.378846][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 66.394447][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 66.402632][ T13] cfg80211: failed to load regulatory.db [ 66.411539][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 66.571919][ T9] device bridge_slave_1 left promiscuous mode [ 66.577865][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.587503][ T9] device bridge_slave_0 left promiscuous mode [ 66.593617][ T9] bridge0: port 1(bridge_slave_0) entered disabled state 2025/02/20 07:13:40 executed programs: 614