ss permissive=1 [ 15.079833][ T30] audit: type=1400 audit(1777827744.103:63): avc: denied { siginh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.161' (ED25519) to the list of known hosts. 2026/05/03 17:02:33 parsed 1 programs [ 24.827530][ T30] audit: type=1400 audit(1777827753.913:64): avc: denied { node_bind } for pid=293 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 24.849777][ T30] audit: type=1400 audit(1777827753.913:65): avc: denied { module_request } for pid=293 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 25.795034][ T30] audit: type=1400 audit(1777827754.873:66): avc: denied { mounton } for pid=299 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.798642][ T299] cgroup: Unknown subsys name 'net' [ 25.817790][ T30] audit: type=1400 audit(1777827754.883:67): avc: denied { mount } for pid=299 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.845554][ T30] audit: type=1400 audit(1777827754.903:68): avc: denied { unmount } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.846020][ T299] cgroup: Unknown subsys name 'devices' [ 25.987632][ T299] cgroup: Unknown subsys name 'hugetlb' [ 25.993258][ T299] cgroup: Unknown subsys name 'rlimit' [ 26.200198][ T30] audit: type=1400 audit(1777827755.283:69): avc: denied { setattr } for pid=299 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.224092][ T30] audit: type=1400 audit(1777827755.283:70): avc: denied { create } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.244787][ T30] audit: type=1400 audit(1777827755.283:71): avc: denied { write } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.244988][ T304] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.266342][ T30] audit: type=1400 audit(1777827755.283:72): avc: denied { read } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.294844][ T30] audit: type=1400 audit(1777827755.283:73): avc: denied { mounton } for pid=299 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.334193][ T299] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.753854][ T306] request_module fs-gadgetfs succeeded, but still no fs? [ 26.955362][ T315] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.962826][ T315] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.970353][ T315] device bridge_slave_0 entered promiscuous mode [ 26.977299][ T315] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.984325][ T315] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.991887][ T315] device bridge_slave_1 entered promiscuous mode [ 27.034293][ T315] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.041400][ T315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.049031][ T315] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.056250][ T315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.075477][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.083187][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.091022][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.098516][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.108303][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.116691][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.123811][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.132655][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.141046][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.148378][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.161407][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.170856][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.184827][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.197580][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.205701][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.213185][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.221656][ T315] device veth0_vlan entered promiscuous mode [ 27.231482][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.241565][ T315] device veth1_macvtap entered promiscuous mode [ 27.250746][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.261743][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.291074][ T315] syz-executor (315) used greatest stack depth: 21344 bytes left 2026/05/03 17:02:37 executed programs: 0 [ 28.010863][ T45] device bridge_slave_1 left promiscuous mode [ 28.017170][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.024839][ T45] device bridge_slave_0 left promiscuous mode [ 28.031460][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.039527][ T45] device veth1_macvtap left promiscuous mode [ 28.045541][ T45] device veth0_vlan left promiscuous mode [ 28.144454][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.151657][ T369] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.159586][ T369] device bridge_slave_0 entered promiscuous mode [ 28.166489][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.173624][ T369] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.181056][ T369] device bridge_slave_1 entered promiscuous mode [ 28.221989][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.229058][ T369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.236379][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.243421][ T369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.262855][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.270488][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.278052][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.287319][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.295508][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.302632][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.311694][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.320057][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.327108][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.338884][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.348183][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.364420][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.376421][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.384874][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.393177][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.402308][ T369] device veth0_vlan entered promiscuous mode [ 28.413744][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.423297][ T369] device veth1_macvtap entered promiscuous mode [ 28.434464][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.448317][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.471892][ T373] ================================================================== [ 28.480103][ T373] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x606/0x6c0 [ 28.489342][ T373] Read of size 1 at addr ffff88810bbe53f8 by task syz.2.17/373 [ 28.496883][ T373] [ 28.499228][ T373] CPU: 0 PID: 373 Comm: syz.2.17 Not tainted syzkaller #0 [ 28.506349][ T373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 28.516426][ T373] Call Trace: [ 28.519703][ T373] [ 28.522652][ T373] __dump_stack+0x21/0x30 [ 28.526991][ T373] dump_stack_lvl+0x110/0x170 [ 28.531687][ T373] ? show_regs_print_info+0x20/0x20 [ 28.536899][ T373] ? load_image+0x3e0/0x3e0 [ 28.541496][ T373] ? unwind_get_return_address+0x4d/0x90 [ 28.547215][ T373] print_address_description+0x7f/0x2c0 [ 28.552767][ T373] ? xfrm_policy_inexact_list_reinsert+0x606/0x6c0 [ 28.559277][ T373] kasan_report+0xf1/0x140 [ 28.563719][ T373] ? xfrm_policy_inexact_list_reinsert+0x606/0x6c0 [ 28.570345][ T373] __asan_report_load1_noabort+0x14/0x20 [ 28.575983][ T373] xfrm_policy_inexact_list_reinsert+0x606/0x6c0 [ 28.582335][ T373] xfrm_policy_inexact_insert_node+0x938/0xb50 [ 28.588492][ T373] ? xfrm_netlink_rcv+0x72/0x90 [ 28.593359][ T373] ? netlink_unicast+0x876/0xa40 [ 28.598309][ T373] ? ____sys_sendmsg+0x5b7/0x8f0 [ 28.603242][ T373] ? x64_sys_call+0x4b/0x9a0 [ 28.608270][ T373] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 28.614526][ T373] xfrm_policy_inexact_alloc_chain+0x53d/0xb30 [ 28.620872][ T373] xfrm_policy_inexact_insert+0x70/0x1130 [ 28.626592][ T373] ? __kasan_check_write+0x14/0x20 [ 28.631723][ T373] ? _raw_spin_lock_bh+0x94/0xf0 [ 28.636663][ T373] ? policy_hash_bysel+0x13f/0x6f0 [ 28.641772][ T373] xfrm_policy_insert+0x126/0x9a0 [ 28.646815][ T373] ? xfrm_policy_construct+0x54f/0x1f00 [ 28.652381][ T373] xfrm_add_policy+0x4ed/0x850 [ 28.657144][ T373] ? xfrm_dump_sa_done+0xc0/0xc0 [ 28.662085][ T373] xfrm_user_rcv_msg+0x4dc/0x7b0 [ 28.667040][ T373] ? xfrm_netlink_rcv+0x90/0x90 [ 28.671898][ T373] ? avc_has_perm_noaudit+0x490/0x490 [ 28.677275][ T373] ? x64_sys_call+0x4b/0x9a0 [ 28.682013][ T373] ? selinux_nlmsg_lookup+0x237/0x4c0 [ 28.687395][ T373] netlink_rcv_skb+0x1f5/0x440 [ 28.692185][ T373] ? xfrm_netlink_rcv+0x90/0x90 [ 28.697047][ T373] ? netlink_ack+0xb50/0xb50 [ 28.701671][ T373] ? wait_for_completion_killable_timeout+0x10/0x10 [ 28.708293][ T373] ? __netlink_lookup+0x387/0x3b0 [ 28.713417][ T373] xfrm_netlink_rcv+0x72/0x90 [ 28.718133][ T373] netlink_unicast+0x876/0xa40 [ 28.723371][ T373] netlink_sendmsg+0x879/0xb80 [ 28.728319][ T373] ? netlink_getsockopt+0x530/0x530 [ 28.733548][ T373] ? do_futex+0xde8/0x2800 [ 28.738130][ T373] ? security_socket_sendmsg+0x82/0xa0 [ 28.743678][ T373] ? netlink_getsockopt+0x530/0x530 [ 28.748995][ T373] ____sys_sendmsg+0x5b7/0x8f0 [ 28.753785][ T373] ? __sys_sendmsg_sock+0x40/0x40 [ 28.758834][ T373] ? import_iovec+0x7c/0xb0 [ 28.763369][ T373] ___sys_sendmsg+0x236/0x2e0 [ 28.768169][ T373] ? __sys_sendmsg+0x280/0x280 [ 28.773074][ T373] ? __kasan_check_read+0x11/0x20 [ 28.778212][ T373] ? __fdget+0x15b/0x230 [ 28.782495][ T373] __x64_sys_sendmsg+0x206/0x2f0 [ 28.787447][ T373] ? ___sys_sendmsg+0x2e0/0x2e0 [ 28.792395][ T373] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 28.798481][ T373] x64_sys_call+0x4b/0x9a0 [ 28.802912][ T373] do_syscall_64+0x4c/0xa0 [ 28.807499][ T373] ? clear_bhb_loop+0x50/0xa0 [ 28.812198][ T373] ? clear_bhb_loop+0x50/0xa0 [ 28.816998][ T373] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 28.822921][ T373] RIP: 0033:0x7f987e534dd9 [ 28.827542][ T373] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 28.847155][ T373] RSP: 002b:00007ffd736f42d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 28.855683][ T373] RAX: ffffffffffffffda RBX: 00007f987e7adfa0 RCX: 00007f987e534dd9 [ 28.863668][ T373] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 0000000000000007 [ 28.871848][ T373] RBP: 00007f987e5cad69 R08: 0000000000000000 R09: 0000000000000000 [ 28.879823][ T373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 28.887813][ T373] R13: 00007f987e7adfac R14: 00007f987e7adfa0 R15: 00007f987e7adfa0 [ 28.895879][ T373] [ 28.898931][ T373] [ 28.901274][ T373] Allocated by task 373: [ 28.905536][ T373] __kasan_kmalloc+0xda/0x110 [ 28.910228][ T373] __kmalloc+0x13d/0x2c0 [ 28.914478][ T373] sk_prot_alloc+0xed/0x320 [ 28.919094][ T373] sk_alloc+0x38/0x430 [ 28.923259][ T373] pfkey_create+0x12a/0x660 [ 28.927766][ T373] __sock_create+0x38d/0x7a0 [ 28.932533][ T373] __sys_socket+0xec/0x190 [ 28.937056][ T373] __x64_sys_socket+0x7a/0x90 [ 28.941749][ T373] x64_sys_call+0x8c5/0x9a0 [ 28.946267][ T373] do_syscall_64+0x4c/0xa0 [ 28.950717][ T373] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 28.956917][ T373] [ 28.959249][ T373] The buggy address belongs to the object at ffff88810bbe5000 [ 28.959249][ T373] which belongs to the cache kmalloc-1k of size 1024 [ 28.973410][ T373] The buggy address is located 1016 bytes inside of [ 28.973410][ T373] 1024-byte region [ffff88810bbe5000, ffff88810bbe5400) [ 28.986947][ T373] The buggy address belongs to the page: [ 28.992575][ T373] page:ffffea00042ef800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bbe0 [ 29.002839][ T373] head:ffffea00042ef800 order:3 compound_mapcount:0 compound_pincount:0 [ 29.011246][ T373] flags: 0x4000000000010200(slab|head|zone=1) [ 29.017448][ T373] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888100043080 [ 29.026042][ T373] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 29.034614][ T373] page dumped because: kasan: bad access detected [ 29.041022][ T373] page_owner tracks the page as allocated [ 29.046733][ T373] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 373, ts 28470655395, free_ts 28356883815 [ 29.067253][ T373] post_alloc_hook+0x192/0x1b0 [ 29.072025][ T373] prep_new_page+0x1c/0x110 [ 29.076720][ T373] get_page_from_freelist+0x2d3a/0x2dc0 [ 29.082279][ T373] __alloc_pages+0x1a2/0x460 [ 29.086869][ T373] new_slab+0xa1/0x4d0 [ 29.090944][ T373] ___slab_alloc+0x381/0x810 [ 29.095531][ T373] __slab_alloc+0x49/0x90 [ 29.099957][ T373] __kmalloc+0x16a/0x2c0 [ 29.104196][ T373] sk_prot_alloc+0xed/0x320 [ 29.108701][ T373] sk_alloc+0x38/0x430 [ 29.112767][ T373] pfkey_create+0x12a/0x660 [ 29.117271][ T373] __sock_create+0x38d/0x7a0 [ 29.122029][ T373] __sys_socket+0xec/0x190 [ 29.126457][ T373] __x64_sys_socket+0x7a/0x90 [ 29.131146][ T373] x64_sys_call+0x8c5/0x9a0 [ 29.135749][ T373] do_syscall_64+0x4c/0xa0 [ 29.140193][ T373] page last free stack trace: [ 29.144951][ T373] free_unref_page_prepare+0x542/0x550 [ 29.150514][ T373] free_unref_page+0xae/0x540 [ 29.155194][ T373] __free_pages+0x6c/0x100 [ 29.159758][ T373] free_nonslab_page+0x86/0xc0 [ 29.164534][ T373] kfree+0x19a/0x270 [ 29.168786][ T373] can_pernet_exit+0x75/0xd0 [ 29.173446][ T373] cleanup_net+0x593/0xae0 [ 29.177904][ T373] process_one_work+0x6be/0xba0 [ 29.182781][ T373] worker_thread+0xa59/0x1200 [ 29.187492][ T373] kthread+0x411/0x500 [ 29.191561][ T373] ret_from_fork+0x1f/0x30 [ 29.195999][ T373] [ 29.198334][ T373] Memory state around the buggy address: [ 29.203983][ T373] ffff88810bbe5280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.212037][ T373] ffff88810bbe5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.220184][ T373] >ffff88810bbe5380: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 29.228323][ T373] ^ [ 29.236299][ T373] ffff88810bbe5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.244367][ T373] ffff88810bbe5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.252415][ T373] ================================================================== [ 29.260467][ T373] Disabling lock debugging due to kernel taint