Warning: Permanently added '10.128.10.3' (ED25519) to the list of known hosts. 2023/10/21 06:25:23 ignoring optional flag "sandboxArg"="0" 2023/10/21 06:25:23 parsed 1 programs 2023/10/21 06:25:23 executed programs: 0 [ 42.577761][ T29] kauditd_printk_skb: 74 callbacks suppressed [ 42.577768][ T29] audit: type=1400 audit(1697869523.326:150): avc: denied { mounton } for pid=338 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 42.610051][ T29] audit: type=1400 audit(1697869523.326:151): avc: denied { mount } for pid=338 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 42.634001][ T29] audit: type=1400 audit(1697869523.326:152): avc: denied { setattr } for pid=338 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 42.659257][ T29] audit: type=1400 audit(1697869523.336:153): avc: denied { mounton } for pid=342 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 42.686774][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.694477][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.701845][ T342] device bridge_slave_0 entered promiscuous mode [ 42.708516][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.715436][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.722445][ T342] device bridge_slave_1 entered promiscuous mode [ 42.762119][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.769347][ T342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.776699][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.783747][ T342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.800005][ T38] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.807164][ T38] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.814968][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.822368][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.831245][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.839694][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.846730][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.864140][ T342] device veth0_vlan entered promiscuous mode [ 42.871015][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 42.879691][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.887591][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 42.895631][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 42.902857][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 42.911185][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.918685][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.925986][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 42.933644][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 42.945359][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.954458][ T342] device veth1_macvtap entered promiscuous mode [ 42.965731][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.974438][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.993318][ T29] audit: type=1400 audit(1697869523.736:154): avc: denied { write } for pid=347 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 43.014244][ T29] audit: type=1400 audit(1697869523.746:155): avc: denied { nlmsg_write } for pid=347 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 43.035492][ T29] audit: type=1400 audit(1697869523.746:156): avc: denied { prog_load } for pid=347 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 43.624289][ C0] ================================================================== [ 43.632472][ C0] BUG: KASAN: stack-out-of-bounds in xfrm_state_find+0x4f95/0x5b20 [ 43.640311][ C0] Read of size 4 at addr ffffc90000007b88 by task swapper/0/0 [ 43.647605][ C0] [ 43.649915][ C0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.15.132-syzkaller #0 [ 43.657643][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 43.667819][ C0] Call Trace: [ 43.671013][ C0] [ 43.673695][ C0] dump_stack_lvl+0x38/0x49 [ 43.678031][ C0] print_address_description.constprop.0+0x24/0x160 [ 43.684555][ C0] ? xfrm_state_find+0x4f95/0x5b20 [ 43.689488][ C0] kasan_report.cold+0x82/0xdb [ 43.694088][ C0] ? netlink_has_listeners+0x70/0x170 [ 43.699504][ C0] ? xfrm_state_find+0x4f95/0x5b20 [ 43.704417][ C0] __asan_report_load4_noabort+0x14/0x20 [ 43.709881][ C0] xfrm_state_find+0x4f95/0x5b20 [ 43.715043][ C0] ? rcu_gp_cleanup+0x1f2/0xa10 [ 43.719914][ C0] ? xfrm_state_migrate+0x2180/0x2180 [ 43.725122][ C0] ? dst_release+0x44/0x60 [ 43.729462][ C0] ? xfrm4_get_saddr+0x12b/0x1a0 [ 43.734250][ C0] ? xfrm4_fill_dst+0x690/0x690 [ 43.739008][ C0] ? update_stack_state+0x12c/0x4d0 [ 43.744402][ C0] xfrm_tmpl_resolve+0x271/0xb40 [ 43.749285][ C0] ? xfrm_tmpl_resolve+0x271/0xb40 [ 43.754372][ C0] ? __xfrm_dst_lookup+0xe0/0xe0 [ 43.759804][ C0] ? __stack_depot_save+0x36/0x440 [ 43.765464][ C0] xfrm_resolve_and_create_bundle+0x125/0x20c0 [ 43.772226][ C0] ? policy_hash_bysel+0xdf0/0xdf0 [ 43.777254][ C0] ? xfrm_policy_find_inexact_candidates.part.0+0x11f/0x1c0 [ 43.784666][ C0] ? xdst_queue_output+0x5e0/0x5e0 [ 43.789609][ C0] ? xfrm_sk_policy_lookup+0x380/0x380 [ 43.794895][ C0] ? __kmalloc_track_caller+0x2d4/0x4f0 [ 43.800460][ C0] ? __alloc_skb+0x8b/0x250 [ 43.804800][ C0] ? igmpv3_newpack+0x1b1/0xde0 [ 43.809484][ C0] ? add_grec+0xbef/0xec0 [ 43.813759][ C0] ? __kasan_check_write+0x14/0x20 [ 43.819166][ C0] xfrm_lookup_with_ifid+0x408/0x1c50 [ 43.824394][ C0] ? xfrm_policy_lookup_bytype.constprop.0+0xab0/0xab0 [ 43.831063][ C0] ? __kasan_check_read+0x11/0x20 [ 43.835914][ C0] ? ip_route_output_key_hash_rcu+0x776/0x2b40 [ 43.842197][ C0] xfrm_lookup_route+0x1f/0x150 [ 43.846971][ C0] ip_route_output_flow+0x259/0x2d0 [ 43.852054][ C0] ? kasan_poison+0x55/0x60 [ 43.856482][ C0] ? inet_rtm_getroute+0x2080/0x2080 [ 43.861690][ C0] igmpv3_newpack+0x2a8/0xde0 [ 43.866209][ C0] ? ip_mc_find_dev+0x290/0x290 [ 43.870910][ C0] ? __kasan_check_write+0x14/0x20 [ 43.875947][ C0] ? ttwu_do_activate.isra.0+0x11c/0x250 [ 43.881691][ C0] add_grhead+0x235/0x320 [ 43.885869][ C0] add_grec+0xbef/0xec0 [ 43.889845][ C0] ? sched_setscheduler_nocheck+0x190/0x190 [ 43.895582][ C0] ? __kasan_check_write+0x14/0x20 [ 43.900745][ C0] ? igmpv3_sendpack.isra.0+0x200/0x200 [ 43.906091][ C0] ? insert_work+0x251/0x320 [ 43.910520][ C0] igmp_ifc_timer_expire+0x46e/0xb10 [ 43.915752][ C0] ? __kasan_check_write+0x14/0x20 [ 43.920785][ C0] ? _raw_spin_lock_bh+0x110/0x110 [ 43.925720][ C0] ? igmp_start_timer+0x100/0x100 [ 43.930657][ C0] call_timer_fn+0x28/0x190 [ 43.934992][ C0] __run_timers.part.0+0x45c/0x840 [ 43.939942][ C0] ? igmp_start_timer+0x100/0x100 [ 43.944889][ C0] ? call_timer_fn+0x190/0x190 [ 43.949661][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 43.954694][ C0] ? sched_clock+0x9/0x10 [ 43.958954][ C0] ? sched_clock_cpu+0x18/0x1b0 [ 43.963644][ C0] run_timer_softirq+0x9c/0x180 [ 43.968321][ C0] __do_softirq+0x1c1/0x5c8 [ 43.972752][ C0] ? irqtime_account_irq+0x2c4/0x430 [ 43.977954][ C0] irq_exit_rcu+0x64/0x110 [ 43.982210][ C0] sysvec_apic_timer_interrupt+0x9d/0xc0 [ 43.987849][ C0] [ 43.990630][ C0] [ 43.993506][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 43.999411][ C0] RIP: 0010:acpi_idle_do_entry+0x18e/0x200 [ 44.005089][ C0] Code: 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 75 5a 49 8b 04 24 a8 08 75 c5 66 90 0f 00 2d 64 c6 af 00 fb f4 eb b7 4c 89 e7 e8 17 f6 ff ff 4c 8b 65 f8 c9 c3 e8 0c 46 bc fd [ 44.024507][ C0] RSP: 0018:ffffffff85007c90 EFLAGS: 00000246 [ 44.030395][ C0] RAX: 0000000000004000 RBX: ffff8881061f5865 RCX: ffffffff83d83954 [ 44.038537][ C0] RDX: 1ffffffff0a03848 RSI: 0000000000000008 RDI: ffffffff8501c240 [ 44.046371][ C0] RBP: ffffffff85007c98 R08: 0000000000000000 R09: ffffffff8501c247 [ 44.054217][ C0] R10: fffffbfff0a03848 R11: 0000000000000001 R12: ffffffff8501c240 [ 44.062031][ C0] R13: ffff8881057c2800 R14: ffff8881057c2804 R15: ffff8881061f5864 [ 44.070097][ C0] ? acpi_idle_do_entry+0x164/0x200 [ 44.075124][ C0] acpi_idle_enter+0x2aa/0x460 [ 44.079728][ C0] ? rcu_dynticks_eqs_enter+0xe/0x10 [ 44.084846][ C0] cpuidle_enter_state+0x189/0xe00 [ 44.089790][ C0] ? cpuidle_enter_s2idle+0x420/0x420 [ 44.095086][ C0] ? menu_reflect+0x110/0x110 [ 44.099599][ C0] ? sched_clock_cpu+0x18/0x1b0 [ 44.104287][ C0] ? debug_smp_processor_id+0x17/0x20 [ 44.109508][ C0] cpuidle_enter+0x4a/0xa0 [ 44.113748][ C0] do_idle+0x3f7/0x5a0 [ 44.117742][ C0] ? arch_cpu_idle_exit+0x30/0x30 [ 44.122775][ C0] cpu_startup_entry+0x1b/0x20 [ 44.127564][ C0] rest_init+0x10e/0x140 [ 44.131832][ C0] arch_call_rest_init+0x9/0xc [ 44.136508][ C0] start_kernel+0x366/0x383 [ 44.140838][ C0] x86_64_start_reservations+0x29/0x2b [ 44.146137][ C0] x86_64_start_kernel+0x8e/0x92 [ 44.150912][ C0] secondary_startup_64_no_verify+0xb0/0xbb [ 44.156640][ C0] [ 44.159501][ C0] [ 44.161671][ C0] [ 44.163841][ C0] Memory state around the buggy address: [ 44.169441][ C0] ffffc90000007a80: 00 00 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 [ 44.177304][ C0] ffffc90000007b00: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00 00 00 [ 44.185197][ C0] >ffffc90000007b80: 00 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 [ 44.193303][ C0] ^ [ 44.197912][ C0] ffffc90000007c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 44.205805][ C0] ffffc90000007c80: 00 00 00 00 00 f1 f1 f1 f1 00 f3 f3 f3 00 00 00 [ 44.213810][ C0] ================================================================== [ 44.221716][ C0] Disabling lock debugging due to kernel taint 2023/10/21 06:25:28 executed programs: 762 2023/10/21 06:25:33 executed programs: 1752