Warning: Permanently added '10.128.1.122' (ED25519) to the list of known hosts. 2025/11/18 12:36:28 parsed 1 programs [ 44.033820][ T30] audit: type=1400 audit(1763469388.991:105): avc: denied { unlink } for pid=400 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 44.079599][ T400] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 44.540273][ T30] audit: type=1401 audit(1763469389.491:106): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 44.584769][ T414] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.591923][ T414] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.599512][ T414] device bridge_slave_0 entered promiscuous mode [ 44.606540][ T414] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.613819][ T414] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.621302][ T414] device bridge_slave_1 entered promiscuous mode [ 44.658592][ T414] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.665729][ T414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.673301][ T414] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.680459][ T414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.701879][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.713656][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.721647][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.733709][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.754113][ T424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.763287][ T424] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.770354][ T424] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.779375][ T424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.787735][ T424] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.795011][ T424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.802621][ T424] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.810670][ T424] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.823406][ T424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.834171][ T424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.842240][ T424] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.850413][ T424] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.859347][ T414] device veth0_vlan entered promiscuous mode [ 44.868619][ T424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.877819][ T414] device veth1_macvtap entered promiscuous mode [ 44.888070][ T424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.898052][ T424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2025/11/18 12:36:30 executed programs: 0 [ 45.600990][ T8] device bridge_slave_1 left promiscuous mode [ 45.607269][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.615041][ T8] device bridge_slave_0 left promiscuous mode [ 45.621497][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.629882][ T8] device veth1_macvtap left promiscuous mode [ 45.636027][ T8] device veth0_vlan left promiscuous mode [ 45.713627][ T471] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.720944][ T471] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.728623][ T471] device bridge_slave_0 entered promiscuous mode [ 45.735700][ T471] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.742990][ T471] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.750808][ T471] device bridge_slave_1 entered promiscuous mode [ 45.792472][ T471] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.799730][ T471] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.807027][ T471] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.814415][ T471] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.831162][ T323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.839071][ T323] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.846726][ T323] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.855438][ T323] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.863838][ T323] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.870889][ T323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.879982][ T323] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.888271][ T323] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.895619][ T323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.918118][ T323] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.933711][ T323] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.945584][ T323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.953728][ T323] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.961786][ T323] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.969860][ T323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 45.979381][ T471] device veth0_vlan entered promiscuous mode [ 45.988609][ T323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.997679][ T471] device veth1_macvtap entered promiscuous mode [ 46.006542][ T323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.018005][ T323] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.039764][ T482] ================================================================== [ 46.043180][ T30] audit: type=1400 audit(1763469390.991:107): avc: denied { create } for pid=481 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 46.048062][ T482] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 46.048109][ T482] Read of size 1 at addr ffff8881185da3f8 by task syz.2.17/482 [ 46.048123][ T482] [ 46.048132][ T482] CPU: 1 PID: 482 Comm: syz.2.17 Not tainted syzkaller #0 [ 46.048148][ T482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 46.048165][ T482] Call Trace: [ 46.048170][ T482] [ 46.048177][ T482] __dump_stack+0x21/0x30 [ 46.048196][ T482] dump_stack_lvl+0xee/0x150 [ 46.048213][ T482] ? show_regs_print_info+0x20/0x20 [ 46.048231][ T482] ? load_image+0x3a0/0x3a0 [ 46.048247][ T482] ? unwind_get_return_address+0x4d/0x90 [ 46.048268][ T482] print_address_description+0x7f/0x2c0 [ 46.048286][ T482] ? xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 46.048302][ T482] kasan_report+0xf1/0x140 [ 46.048318][ T482] ? xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 46.073251][ T30] audit: type=1400 audit(1763469390.991:108): avc: denied { setopt } for pid=481 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 46.076858][ T482] __asan_report_load1_noabort+0x14/0x20 [ 46.084530][ T30] audit: type=1400 audit(1763469390.991:109): avc: denied { write } for pid=481 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 46.086707][ T482] xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 46.093845][ T30] audit: type=1400 audit(1763469390.991:110): avc: denied { create } for pid=481 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 46.104028][ T482] xfrm_policy_inexact_insert_node+0x938/0xb50 [ 46.104048][ T482] ? xfrm_netlink_rcv+0x72/0x90 [ 46.104065][ T482] ? netlink_unicast+0x876/0xa40 [ 46.107384][ T30] audit: type=1400 audit(1763469390.991:111): avc: denied { write } for pid=481 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 46.110277][ T482] ? netlink_sendmsg+0x86a/0xb70 [ 46.114697][ T30] audit: type=1400 audit(1763469390.991:112): avc: denied { nlmsg_write } for pid=481 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 46.119229][ T482] ? ____sys_sendmsg+0x5a2/0x8c0 [ 46.119249][ T482] ? ___sys_sendmsg+0x1f0/0x260 [ 46.303174][ T482] ? x64_sys_call+0x4b/0x9a0 [ 46.307749][ T482] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 46.313922][ T482] xfrm_policy_inexact_alloc_chain+0x53a/0xb30 [ 46.320065][ T482] xfrm_policy_inexact_insert+0x70/0x1130 [ 46.325861][ T482] ? __get_hash_thresh+0x10c/0x420 [ 46.330988][ T482] ? policy_hash_bysel+0x110/0x4f0 [ 46.336177][ T482] xfrm_policy_insert+0x126/0x9a0 [ 46.341272][ T482] ? xfrm_policy_construct+0x54f/0x1f00 [ 46.346809][ T482] xfrm_add_policy+0x4d1/0x830 [ 46.351586][ T482] ? xfrm_dump_sa_done+0xc0/0xc0 [ 46.356514][ T482] xfrm_user_rcv_msg+0x45c/0x6e0 [ 46.361516][ T482] ? xfrm_netlink_rcv+0x90/0x90 [ 46.366437][ T482] ? avc_has_perm_noaudit+0x460/0x460 [ 46.371796][ T482] ? x64_sys_call+0x4b/0x9a0 [ 46.376484][ T482] ? selinux_nlmsg_lookup+0x237/0x4c0 [ 46.381848][ T482] netlink_rcv_skb+0x1e0/0x430 [ 46.386717][ T482] ? xfrm_netlink_rcv+0x90/0x90 [ 46.391642][ T482] ? netlink_ack+0xb60/0xb60 [ 46.396348][ T482] ? wait_for_completion_killable_timeout+0x10/0x10 [ 46.402917][ T482] ? __netlink_lookup+0x387/0x3b0 [ 46.408044][ T482] xfrm_netlink_rcv+0x72/0x90 [ 46.412718][ T482] netlink_unicast+0x876/0xa40 [ 46.417481][ T482] netlink_sendmsg+0x86a/0xb70 [ 46.422224][ T482] ? netlink_getsockopt+0x530/0x530 [ 46.427410][ T482] ? sock_alloc_file+0xba/0x260 [ 46.432240][ T482] ? security_socket_sendmsg+0x82/0xa0 [ 46.437676][ T482] ? netlink_getsockopt+0x530/0x530 [ 46.442854][ T482] ____sys_sendmsg+0x5a2/0x8c0 [ 46.447595][ T482] ? __sys_sendmsg_sock+0x40/0x40 [ 46.452804][ T482] ? import_iovec+0x7c/0xb0 [ 46.457377][ T482] ___sys_sendmsg+0x1f0/0x260 [ 46.462153][ T482] ? __sys_sendmsg+0x250/0x250 [ 46.467111][ T482] ? __fdget+0x1a1/0x230 [ 46.471598][ T482] __x64_sys_sendmsg+0x1e2/0x2a0 [ 46.476950][ T482] ? ___sys_sendmsg+0x260/0x260 [ 46.482025][ T482] ? __kasan_check_write+0x14/0x20 [ 46.487215][ T482] ? switch_fpu_return+0x15d/0x2c0 [ 46.492509][ T482] x64_sys_call+0x4b/0x9a0 [ 46.496919][ T482] do_syscall_64+0x4c/0xa0 [ 46.501409][ T482] ? clear_bhb_loop+0x50/0xa0 [ 46.506128][ T482] ? clear_bhb_loop+0x50/0xa0 [ 46.510792][ T482] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 46.517259][ T482] RIP: 0033:0x7f2f3b3e6be9 [ 46.522006][ T482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.541757][ T482] RSP: 002b:00007f2f3b257038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 46.550270][ T482] RAX: ffffffffffffffda RBX: 00007f2f3b60dfa0 RCX: 00007f2f3b3e6be9 [ 46.558719][ T482] RDX: 0000000000004000 RSI: 0000200000000580 RDI: 0000000000000005 [ 46.567152][ T482] RBP: 00007f2f3b469e19 R08: 0000000000000000 R09: 0000000000000000 [ 46.575726][ T482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 46.583685][ T482] R13: 00007f2f3b60e038 R14: 00007f2f3b60dfa0 R15: 00007ffe63b67248 [ 46.591645][ T482] [ 46.594645][ T482] [ 46.596942][ T482] Allocated by task 482: [ 46.601242][ T482] __kasan_kmalloc+0xda/0x110 [ 46.605909][ T482] __kmalloc+0x13d/0x2c0 [ 46.610147][ T482] sk_prot_alloc+0xed/0x320 [ 46.614714][ T482] sk_alloc+0x38/0x430 [ 46.618766][ T482] pfkey_create+0x12a/0x660 [ 46.623251][ T482] __sock_create+0x38d/0x7a0 [ 46.627824][ T482] __sys_socket+0xec/0x190 [ 46.632301][ T482] __x64_sys_socket+0x7a/0x90 [ 46.637055][ T482] x64_sys_call+0x8c5/0x9a0 [ 46.641539][ T482] do_syscall_64+0x4c/0xa0 [ 46.645940][ T482] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 46.651900][ T482] [ 46.654300][ T482] The buggy address belongs to the object at ffff8881185da000 [ 46.654300][ T482] which belongs to the cache kmalloc-1k of size 1024 [ 46.668505][ T482] The buggy address is located 1016 bytes inside of [ 46.668505][ T482] 1024-byte region [ffff8881185da000, ffff8881185da400) [ 46.682567][ T482] The buggy address belongs to the page: [ 46.688178][ T482] page:ffffea0004617600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1185d8 [ 46.699135][ T482] head:ffffea0004617600 order:3 compound_mapcount:0 compound_pincount:0 [ 46.707536][ T482] flags: 0x4000000000010200(slab|head|zone=1) [ 46.713608][ T482] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888100043080 [ 46.722281][ T482] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 46.731161][ T482] page dumped because: kasan: bad access detected [ 46.737704][ T482] page_owner tracks the page as allocated [ 46.743588][ T482] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 101, ts 46036278686, free_ts 45905977018 [ 46.764170][ T482] post_alloc_hook+0x192/0x1b0 [ 46.768919][ T482] prep_new_page+0x1c/0x110 [ 46.773575][ T482] get_page_from_freelist+0x2cc5/0x2d50 [ 46.779122][ T482] __alloc_pages+0x18f/0x440 [ 46.784094][ T482] new_slab+0xa1/0x4d0 [ 46.788263][ T482] ___slab_alloc+0x381/0x810 [ 46.792865][ T482] __slab_alloc+0x49/0x90 [ 46.797184][ T482] __kmalloc_track_caller+0x169/0x2c0 [ 46.802545][ T482] __alloc_skb+0x21a/0x740 [ 46.807033][ T482] alloc_uevent_skb+0x85/0x240 [ 46.812143][ T482] kobject_uevent_net_broadcast+0x335/0x5a0 [ 46.818621][ T482] kobject_uevent_env+0x52e/0x700 [ 46.823814][ T482] kobject_synth_uevent+0x520/0xaf0 [ 46.829104][ T482] uevent_store+0x25/0x60 [ 46.833581][ T482] dev_attr_store+0x5e/0x80 [ 46.838208][ T482] sysfs_kf_write+0x129/0x150 [ 46.843196][ T482] page last free stack trace: [ 46.848147][ T482] free_unref_page_prepare+0x542/0x550 [ 46.853690][ T482] free_unref_page+0xa2/0x550 [ 46.858359][ T482] __free_pages+0x6c/0x100 [ 46.863008][ T482] __free_slab+0xe8/0x1e0 [ 46.867930][ T482] __unfreeze_partials+0x160/0x190 [ 46.873122][ T482] put_cpu_partial+0xc6/0x120 [ 46.877811][ T482] __slab_free+0x1d4/0x290 [ 46.882309][ T482] ___cache_free+0x104/0x120 [ 46.886907][ T482] qlink_free+0x4d/0x90 [ 46.891138][ T482] qlist_free_all+0x5f/0xb0 [ 46.895625][ T482] kasan_quarantine_reduce+0x14a/0x170 [ 46.901179][ T482] __kasan_slab_alloc+0x2f/0xf0 [ 46.906027][ T482] slab_post_alloc_hook+0x4f/0x2b0 [ 46.911162][ T482] kmem_cache_alloc+0xf7/0x260 [ 46.915901][ T482] __alloc_skb+0xe0/0x740 [ 46.920297][ T482] inet6_netconf_notify_devconf+0xd6/0x190 [ 46.926085][ T482] [ 46.928395][ T482] Memory state around the buggy address: [ 46.934269][ T482] ffff8881185da280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.942568][ T482] ffff8881185da300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.950612][ T482] >ffff8881185da380: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 46.958650][ T482] ^ [ 46.966624][ T482] ffff8881185da400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.974746][ T482] ffff8881185da480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.982901][ T482] ================================================================== [ 46.991014][ T482] Disabling lock debugging due to kernel taint [ 47.000451][ T30] audit: type=1400 audit(1763469391.951:113): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 47.022992][ T30] audit: type=1400 audit(1763469391.951:114): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 2025/11/18 12:36:35 executed programs: 213 2025/11/18 12:36:40 executed programs: 514