Warning: Permanently added '10.128.0.233' (ED25519) to the list of known hosts. 2024/04/30 08:50:41 ignoring optional flag "sandboxArg"="0" 2024/04/30 08:50:41 parsed 1 programs 2024/04/30 08:50:41 executed programs: 0 [ 41.786022][ T29] kauditd_printk_skb: 74 callbacks suppressed [ 41.786031][ T29] audit: type=1400 audit(1714467041.531:150): avc: denied { mounton } for pid=337 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 41.817474][ T29] audit: type=1400 audit(1714467041.531:151): avc: denied { mount } for pid=337 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 41.841547][ T29] audit: type=1400 audit(1714467041.531:152): avc: denied { setattr } for pid=337 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 41.864841][ T29] audit: type=1400 audit(1714467041.541:153): avc: denied { mounton } for pid=341 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 41.896886][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.904337][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.912548][ T341] device bridge_slave_0 entered promiscuous mode [ 41.919409][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.926517][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.933575][ T341] device bridge_slave_1 entered promiscuous mode [ 41.969614][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.976707][ T341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.984165][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.991199][ T341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.006996][ T38] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.014188][ T38] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.021582][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.029253][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.038192][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.046340][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.053666][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.062112][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 42.070189][ T38] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.077141][ T38] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.087594][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 42.101565][ T341] device veth0_vlan entered promiscuous mode [ 42.108580][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 42.117016][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.124865][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 42.132260][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 42.139581][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 42.150924][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.159902][ T341] device veth1_macvtap entered promiscuous mode [ 42.168310][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.179508][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.198840][ T29] audit: type=1400 audit(1714467041.941:154): avc: denied { write } for pid=345 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 42.220714][ T29] audit: type=1400 audit(1714467041.941:155): avc: denied { nlmsg_write } for pid=345 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 42.242646][ T29] audit: type=1400 audit(1714467041.941:156): avc: denied { prog_load } for pid=345 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 42.822301][ C0] ================================================================== [ 42.830379][ C0] BUG: KASAN: stack-out-of-bounds in xfrm_state_find+0x4f95/0x5b20 [ 42.838421][ C0] Read of size 4 at addr ffffc90000007b88 by task syz-executor.0/341 [ 42.846414][ C0] [ 42.848579][ C0] CPU: 0 PID: 341 Comm: syz-executor.0 Not tainted 5.15.149-syzkaller #0 [ 42.857079][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 42.867156][ C0] Call Trace: [ 42.870276][ C0] [ 42.872959][ C0] dump_stack_lvl+0x38/0x49 [ 42.877733][ C0] print_address_description.constprop.0+0x24/0x160 [ 42.884166][ C0] ? xfrm_state_find+0x4f95/0x5b20 [ 42.889214][ C0] kasan_report.cold+0x82/0xdb [ 42.893913][ C0] ? netlink_has_listeners+0x100/0x170 [ 42.899517][ C0] ? xfrm_state_find+0x4f95/0x5b20 [ 42.904466][ C0] __asan_report_load4_noabort+0x14/0x20 [ 42.909942][ C0] xfrm_state_find+0x4f95/0x5b20 [ 42.914706][ C0] ? __note_gp_changes+0x242/0x910 [ 42.919655][ C0] ? xfrm_state_migrate+0x2180/0x2180 [ 42.924946][ C0] ? dst_release+0x44/0x60 [ 42.929195][ C0] ? xfrm4_get_saddr+0x12b/0x1a0 [ 42.933978][ C0] ? xfrm4_fill_dst+0x690/0x690 [ 42.938894][ C0] ? update_stack_state+0x12c/0x4d0 [ 42.944016][ C0] xfrm_tmpl_resolve+0x271/0xb40 [ 42.948972][ C0] ? xfrm_tmpl_resolve+0x271/0xb40 [ 42.954338][ C0] ? unwind_get_return_address+0x58/0xa0 [ 42.960069][ C0] ? __xfrm_dst_lookup+0xe0/0xe0 [ 42.965289][ C0] ? __stack_depot_save+0x36/0x440 [ 42.970205][ C0] xfrm_resolve_and_create_bundle+0x125/0x20c0 [ 42.976207][ C0] ? policy_hash_bysel+0xdf0/0xdf0 [ 42.981236][ C0] ? xfrm_policy_find_inexact_candidates.part.0+0x11f/0x1c0 [ 42.988702][ C0] ? xdst_queue_output+0x5e0/0x5e0 [ 42.994004][ C0] ? xfrm_sk_policy_lookup+0x380/0x380 [ 42.999286][ C0] ? __kmalloc_track_caller+0x2d4/0x4f0 [ 43.004817][ C0] ? __alloc_skb+0x8b/0x250 [ 43.009100][ C0] ? igmpv3_newpack+0x1b1/0xde0 [ 43.013788][ C0] ? add_grec+0xbef/0xec0 [ 43.017960][ C0] ? __kasan_check_write+0x14/0x20 [ 43.023019][ C0] xfrm_lookup_with_ifid+0x408/0x1c50 [ 43.028225][ C0] ? xfrm_policy_lookup_bytype.constprop.0+0xab0/0xab0 [ 43.035230][ C0] ? __kasan_check_read+0x11/0x20 [ 43.040225][ C0] ? ip_route_output_key_hash_rcu+0x776/0x2b40 [ 43.046356][ C0] xfrm_lookup_route+0x1f/0x150 [ 43.051203][ C0] ip_route_output_flow+0x259/0x2d0 [ 43.056237][ C0] ? kasan_poison+0x55/0x60 [ 43.060593][ C0] ? inet_rtm_getroute+0x20e0/0x20e0 [ 43.065704][ C0] igmpv3_newpack+0x2a8/0xde0 [ 43.070347][ C0] ? ip_mc_find_dev+0x290/0x290 [ 43.075240][ C0] ? __kasan_check_write+0x14/0x20 [ 43.080191][ C0] ? ttwu_do_activate.isra.0+0x125/0x250 [ 43.085749][ C0] add_grhead+0x235/0x320 [ 43.089930][ C0] add_grec+0xbef/0xec0 [ 43.094042][ C0] ? sched_setscheduler_nocheck+0x190/0x190 [ 43.100078][ C0] ? __kasan_check_write+0x14/0x20 [ 43.105148][ C0] ? igmpv3_sendpack.isra.0+0x200/0x200 [ 43.110573][ C0] ? insert_work+0x251/0x320 [ 43.115203][ C0] igmp_ifc_timer_expire+0x46e/0xb10 [ 43.120591][ C0] ? __kasan_check_write+0x14/0x20 [ 43.125543][ C0] ? _raw_spin_lock_bh+0x110/0x110 [ 43.130812][ C0] ? ip_mc_check_igmp+0xe60/0xe60 [ 43.135752][ C0] call_timer_fn+0x28/0x190 [ 43.140166][ C0] __run_timers.part.0+0x45c/0x840 [ 43.145200][ C0] ? ip_mc_check_igmp+0xe60/0xe60 [ 43.150157][ C0] ? call_timer_fn+0x190/0x190 [ 43.154832][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 43.160028][ C0] ? sched_clock+0x9/0x10 [ 43.164268][ C0] ? sched_clock_cpu+0x18/0x1b0 [ 43.168957][ C0] run_timer_softirq+0x9c/0x180 [ 43.173798][ C0] __do_softirq+0x1c1/0x5c8 [ 43.178267][ C0] irq_exit_rcu+0x64/0x110 [ 43.182853][ C0] sysvec_apic_timer_interrupt+0x9d/0xc0 [ 43.188321][ C0] [ 43.191084][ C0] [ 43.193886][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 43.200077][ C0] RIP: 0010:__unwind_start+0x0/0x3b0 [ 43.205479][ C0] Code: 17 31 c0 85 d2 74 05 e8 7e f8 ff ff c9 c3 48 89 7d f8 e8 c3 20 6a 00 48 8b 7d f8 eb e2 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 <55> 48 89 e5 41 57 49 89 ff 41 56 41 55 49 89 f5 31 f6 41 54 49 89 [ 43.225182][ C0] RSP: 0018:ffffc90000667600 EFLAGS: 00000246 [ 43.231079][ C0] RAX: ffff888122e13a80 RBX: ffffffff814ed940 RCX: ffffc90000667690 [ 43.238912][ C0] RDX: 0000000000000000 RSI: ffff888122e13a80 RDI: ffffc90000667608 [ 43.246787][ C0] RBP: ffffc90000667690 R08: 0000000000000080 R09: ffffed10220335d8 [ 43.254604][ C0] R10: ffffc90000000000 R11: ffffe8ffffffffff R12: ffffc900006676c0 [ 43.262492][ C0] R13: 0000000000000000 R14: ffff888122e13a80 R15: ffff88811019ae80 [ 43.270394][ C0] ? create_prof_cpu_mask+0x20/0x20 [ 43.275425][ C0] ? arch_stack_walk+0x5c/0xe0 [ 43.280122][ C0] ? is_bpf_text_address+0x1f/0x30 [ 43.285326][ C0] ? kernel_text_address+0xc0/0xf0 [ 43.290493][ C0] ? __kernel_text_address+0xd/0x40 [ 43.295685][ C0] stack_trace_save+0x8f/0xc0 [ 43.300259][ C0] ? filter_irq_stacks+0x90/0x90 [ 43.305110][ C0] kasan_save_stack+0x26/0x50 [ 43.309621][ C0] ? is_bpf_text_address+0x1f/0x30 [ 43.314568][ C0] ? kernel_text_address+0xc0/0xf0 [ 43.319512][ C0] ? __kernel_text_address+0xd/0x40 [ 43.324556][ C0] ? unwind_get_return_address+0x58/0xa0 [ 43.330097][ C0] ? create_prof_cpu_mask+0x20/0x20 [ 43.335140][ C0] ? arch_stack_walk+0x93/0xe0 [ 43.339914][ C0] ? is_bpf_text_address+0x1f/0x30 [ 43.345027][ C0] ? __kasan_check_write+0x14/0x20 [ 43.349969][ C0] ? memcpy+0x4e/0x60 [ 43.353809][ C0] ? avc_has_perm_noaudit+0x13b/0x200 [ 43.359082][ C0] ? avc_has_extended_perms+0xeb0/0xeb0 [ 43.364638][ C0] ? mutex_unlock+0x7e/0x240 [ 43.369062][ C0] __kasan_kmalloc+0xae/0xe0 [ 43.373586][ C0] kmem_cache_alloc_trace+0xbb/0x490 [ 43.378804][ C0] __get_vm_area_node.constprop.0.isra.0+0x9d/0x360 [ 43.385221][ C0] __vmalloc_node_range+0x114/0x9e0 [ 43.390292][ C0] ? do_ip6t_get_ctl+0x503/0x8a0 [ 43.395257][ C0] ? alloc_file_pseudo+0x16c/0x250 [ 43.400222][ C0] ? sock_alloc_file+0x42/0x170 [ 43.405048][ C0] ? __sys_socket+0xf3/0x1d0 [ 43.409694][ C0] ? do_ip6t_get_ctl+0x503/0x8a0 [ 43.414768][ C0] ? vfree_atomic+0x90/0x90 [ 43.419426][ C0] ? selinux_capable+0x44/0x70 [ 43.424735][ C0] ? do_ip6t_get_ctl+0x503/0x8a0 [ 43.429521][ C0] vzalloc+0x66/0x80 [ 43.433558][ C0] ? do_ip6t_get_ctl+0x503/0x8a0 [ 43.438510][ C0] do_ip6t_get_ctl+0x503/0x8a0 [ 43.443169][ C0] ? do_ipv6_mcast_group_source+0x170/0x170 [ 43.449340][ C0] ? get_info+0x5e0/0x5e0 [ 43.453718][ C0] ? __kasan_check_write+0x14/0x20 [ 43.458873][ C0] ? mutex_unlock+0x7e/0x240 [ 43.463291][ C0] ? mutex_trylock+0x260/0x260 [ 43.468267][ C0] ? nf_sockopt_find.constprop.0+0x17e/0x1f0 [ 43.474063][ C0] nf_getsockopt+0x5f/0xc0 [ 43.478560][ C0] ipv6_getsockopt+0x156/0x1a0 [ 43.483147][ C0] ? do_ipv6_getsockopt.constprop.0+0x2190/0x2190 [ 43.489586][ C0] ? alloc_file+0x223/0x500 [ 43.493923][ C0] tcp_getsockopt+0x6a/0xc0 [ 43.498267][ C0] sock_common_getsockopt+0x72/0xf0 [ 43.503384][ C0] __sys_getsockopt+0x1da/0x6d0 [ 43.508295][ C0] ? fd_install+0x14a/0x320 [ 43.512716][ C0] ? __ia32_sys_setsockopt+0x140/0x140 [ 43.518016][ C0] ? __sys_socket+0x11b/0x1d0 [ 43.522639][ C0] ? mem_cgroup_get_oom_group+0x440/0x440 [ 43.528638][ C0] __x64_sys_getsockopt+0xb9/0x140 [ 43.534065][ C0] ? syscall_exit_to_user_mode+0x2f/0x40 [ 43.540006][ C0] do_syscall_64+0x35/0xb0 [ 43.544256][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.550252][ C0] RIP: 0033:0x7efebc4f63fa [ 43.554583][ C0] Code: c4 c1 e0 1a 0d 00 00 04 00 89 01 e9 e0 fe ff ff e8 3b 05 00 00 66 2e 0f 1f 84 00 00 00 00 00 90 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 b0 ff ff ff f7 [ 43.574504][ C0] RSP: 002b:00007ffe5b9a9878 EFLAGS: 00000212 ORIG_RAX: 0000000000000037 [ 43.583021][ C0] RAX: ffffffffffffffda RBX: 00007ffe5b9a9900 RCX: 00007efebc4f63fa [ 43.590944][ C0] RDX: 0000000000000041 RSI: 0000000000000029 RDI: 0000000000000003 [ 43.598730][ C0] RBP: 0000000000000003 R08: 00007ffe5b9a989c R09: 0079746972756365 [ 43.606540][ C0] R10: 00007ffe5b9a9900 R11: 0000000000000212 R12: 00007efebc5edb40 [ 43.614346][ C0] R13: 00007ffe5b9a989c R14: 0000000000000000 R15: 00007efebc5efd00 [ 43.622435][ C0] [ 43.625394][ C0] [ 43.627640][ C0] [ 43.629815][ C0] Memory state around the buggy address: [ 43.635672][ C0] ffffc90000007a80: 00 00 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 [ 43.644182][ C0] ffffc90000007b00: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00 00 00 [ 43.653041][ C0] >ffffc90000007b80: 00 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 [ 43.661761][ C0] ^ [ 43.666187][ C0] ffffc90000007c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 43.674349][ C0] ffffc90000007c80: 00 00 00 00 00 f1 f1 f1 f1 00 f3 f3 f3 00 00 00 [ 43.682776][ C0] ================================================================== [ 43.690875][ C0] Disabling lock debugging due to kernel taint 2024/04/30 08:50:46 executed programs: 743 2024/04/30 08:50:51 executed programs: 1810