Warning: Permanently added '10.128.0.244' (ED25519) to the list of known hosts. 2026/03/07 13:03:17 parsed 1 programs [ 22.067689][ T30] audit: type=1400 audit(1772888597.623:64): avc: denied { node_bind } for pid=281 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 22.088423][ T30] audit: type=1400 audit(1772888597.623:65): avc: denied { module_request } for pid=281 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 22.685180][ T30] audit: type=1400 audit(1772888598.243:66): avc: denied { mounton } for pid=288 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.686219][ T288] cgroup: Unknown subsys name 'net' [ 22.707847][ T30] audit: type=1400 audit(1772888598.243:67): avc: denied { mount } for pid=288 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.735077][ T30] audit: type=1400 audit(1772888598.273:68): avc: denied { unmount } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.735220][ T288] cgroup: Unknown subsys name 'devices' [ 22.850768][ T288] cgroup: Unknown subsys name 'hugetlb' [ 22.856352][ T288] cgroup: Unknown subsys name 'rlimit' [ 23.057887][ T30] audit: type=1400 audit(1772888598.613:69): avc: denied { setattr } for pid=288 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.081028][ T30] audit: type=1400 audit(1772888598.613:70): avc: denied { create } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.101411][ T30] audit: type=1400 audit(1772888598.613:71): avc: denied { write } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.107051][ T291] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.121661][ T30] audit: type=1400 audit(1772888598.613:72): avc: denied { read } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 23.150333][ T30] audit: type=1400 audit(1772888598.623:73): avc: denied { mounton } for pid=288 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.186860][ T288] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.598337][ T293] request_module fs-gadgetfs succeeded, but still no fs? [ 23.973371][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.980430][ T322] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.987682][ T322] device bridge_slave_0 entered promiscuous mode [ 23.994533][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.001553][ T322] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.008777][ T322] device bridge_slave_1 entered promiscuous mode [ 24.041210][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.048231][ T322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.055521][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.062544][ T322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.079135][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.086372][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.094006][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.101371][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.118167][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.126276][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.133294][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.140633][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.149095][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.156108][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.163543][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.171669][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.185735][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.195464][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.203545][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.211040][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.218893][ T322] device veth0_vlan entered promiscuous mode [ 24.229327][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.238021][ T322] device veth1_macvtap entered promiscuous mode [ 24.246476][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.255836][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.290444][ T322] syz-executor (322) used greatest stack depth: 21408 bytes left 2026/03/07 13:03:20 executed programs: 0 [ 24.601523][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.608559][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.615938][ T354] device bridge_slave_0 entered promiscuous mode [ 24.622814][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.630117][ T354] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.637540][ T354] device bridge_slave_1 entered promiscuous mode [ 24.677073][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.684127][ T354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.691389][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.698414][ T354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.718545][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.726149][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.733755][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.742378][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.750557][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.757561][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.769023][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.777146][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.784173][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.795131][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.804027][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.818364][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.831779][ T354] device veth0_vlan entered promiscuous mode [ 24.839249][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.847203][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.855187][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.866184][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.876641][ T354] device veth1_macvtap entered promiscuous mode [ 24.886402][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.895831][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.916905][ T359] ================================================================== [ 24.924975][ T359] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x606/0x6c0 [ 24.934175][ T359] Read of size 1 at addr ffff8881101efbf8 by task syz.2.17/359 [ 24.941690][ T359] [ 24.943992][ T359] CPU: 1 PID: 359 Comm: syz.2.17 Not tainted syzkaller #0 [ 24.951073][ T359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 24.961112][ T359] Call Trace: [ 24.964373][ T359] [ 24.967281][ T359] __dump_stack+0x21/0x30 [ 24.971588][ T359] dump_stack_lvl+0x110/0x170 [ 24.976242][ T359] ? show_regs_print_info+0x20/0x20 [ 24.981415][ T359] ? load_image+0x3e0/0x3e0 [ 24.985890][ T359] ? unwind_get_return_address+0x4d/0x90 [ 24.991497][ T359] print_address_description+0x7f/0x2c0 [ 24.997016][ T359] ? xfrm_policy_inexact_list_reinsert+0x606/0x6c0 [ 25.003492][ T359] kasan_report+0xf1/0x140 [ 25.007882][ T359] ? xfrm_policy_inexact_list_reinsert+0x606/0x6c0 [ 25.014355][ T359] __asan_report_load1_noabort+0x14/0x20 [ 25.019961][ T359] xfrm_policy_inexact_list_reinsert+0x606/0x6c0 [ 25.026258][ T359] xfrm_policy_inexact_insert_node+0x938/0xb50 [ 25.032384][ T359] ? xfrm_netlink_rcv+0x72/0x90 [ 25.037210][ T359] ? netlink_unicast+0x876/0xa40 [ 25.042116][ T359] ? netlink_sendmsg+0x879/0xb80 [ 25.047023][ T359] ? ____sys_sendmsg+0x5b7/0x8f0 [ 25.051932][ T359] ? ___sys_sendmsg+0x236/0x2e0 [ 25.056755][ T359] ? x64_sys_call+0x4b/0x9a0 [ 25.061318][ T359] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 25.067359][ T359] xfrm_policy_inexact_alloc_chain+0x53d/0xb30 [ 25.073489][ T359] xfrm_policy_inexact_insert+0x70/0x1130 [ 25.079182][ T359] ? __kasan_check_write+0x14/0x20 [ 25.084266][ T359] ? _raw_spin_lock_bh+0x94/0xf0 [ 25.089176][ T359] ? policy_hash_bysel+0x13f/0x6f0 [ 25.094261][ T359] xfrm_policy_insert+0x126/0x9a0 [ 25.099256][ T359] ? xfrm_policy_construct+0x54f/0x1f00 [ 25.104775][ T359] xfrm_add_policy+0x4ed/0x850 [ 25.109512][ T359] ? xfrm_dump_sa_done+0xc0/0xc0 [ 25.114428][ T359] xfrm_user_rcv_msg+0x4dc/0x7b0 [ 25.119338][ T359] ? xfrm_netlink_rcv+0x90/0x90 [ 25.124167][ T359] ? avc_has_perm_noaudit+0x490/0x490 [ 25.129514][ T359] ? x64_sys_call+0x4b/0x9a0 [ 25.134079][ T359] ? selinux_nlmsg_lookup+0x237/0x4c0 [ 25.139425][ T359] netlink_rcv_skb+0x1f5/0x440 [ 25.144160][ T359] ? xfrm_netlink_rcv+0x90/0x90 [ 25.148990][ T359] ? netlink_ack+0xb50/0xb50 [ 25.153551][ T359] ? wait_for_completion_killable_timeout+0x10/0x10 [ 25.160111][ T359] ? __netlink_lookup+0x387/0x3b0 [ 25.165104][ T359] xfrm_netlink_rcv+0x72/0x90 [ 25.169759][ T359] netlink_unicast+0x876/0xa40 [ 25.174509][ T359] netlink_sendmsg+0x879/0xb80 [ 25.179243][ T359] ? netlink_getsockopt+0x530/0x530 [ 25.184409][ T359] ? do_futex+0xde8/0x2800 [ 25.188799][ T359] ? security_socket_sendmsg+0x82/0xa0 [ 25.194230][ T359] ? netlink_getsockopt+0x530/0x530 [ 25.199404][ T359] ____sys_sendmsg+0x5b7/0x8f0 [ 25.204144][ T359] ? __sys_sendmsg_sock+0x40/0x40 [ 25.209144][ T359] ? import_iovec+0x7c/0xb0 [ 25.213621][ T359] ___sys_sendmsg+0x236/0x2e0 [ 25.218278][ T359] ? __sys_sendmsg+0x280/0x280 [ 25.223017][ T359] ? __kasan_check_read+0x11/0x20 [ 25.228015][ T359] ? __fdget+0x15b/0x230 [ 25.232229][ T359] __x64_sys_sendmsg+0x206/0x2f0 [ 25.237141][ T359] ? ___sys_sendmsg+0x2e0/0x2e0 [ 25.241963][ T359] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 25.248004][ T359] x64_sys_call+0x4b/0x9a0 [ 25.252391][ T359] do_syscall_64+0x4c/0xa0 [ 25.256782][ T359] ? clear_bhb_loop+0x50/0xa0 [ 25.261431][ T359] ? clear_bhb_loop+0x50/0xa0 [ 25.266082][ T359] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 25.271956][ T359] RIP: 0033:0x7f8c0274c799 [ 25.276345][ T359] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 25.295947][ T359] RSP: 002b:00007fff2ee5bf48 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 25.304333][ T359] RAX: ffffffffffffffda RBX: 00007f8c029c5fa0 RCX: 00007f8c0274c799 [ 25.312278][ T359] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 0000000000000006 [ 25.320224][ T359] RBP: 00007f8c027e2bd9 R08: 0000000000000000 R09: 0000000000000000 [ 25.328170][ T359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 25.336111][ T359] R13: 00007f8c029c5fac R14: 00007f8c029c5fa0 R15: 00007f8c029c5fa0 [ 25.344059][ T359] [ 25.347052][ T359] [ 25.349351][ T359] Allocated by task 359: [ 25.353580][ T359] __kasan_kmalloc+0xda/0x110 [ 25.358235][ T359] __kmalloc+0x13d/0x2c0 [ 25.362446][ T359] sk_prot_alloc+0xed/0x320 [ 25.366921][ T359] sk_alloc+0x38/0x430 [ 25.370960][ T359] pfkey_create+0x12a/0x660 [ 25.375438][ T359] __sock_create+0x38d/0x7a0 [ 25.379997][ T359] __sys_socket+0xec/0x190 [ 25.384387][ T359] __x64_sys_socket+0x7a/0x90 [ 25.389035][ T359] x64_sys_call+0x8c5/0x9a0 [ 25.393512][ T359] do_syscall_64+0x4c/0xa0 [ 25.397897][ T359] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 25.403762][ T359] [ 25.406146][ T359] The buggy address belongs to the object at ffff8881101ef800 [ 25.406146][ T359] which belongs to the cache kmalloc-1k of size 1024 [ 25.420170][ T359] The buggy address is located 1016 bytes inside of [ 25.420170][ T359] 1024-byte region [ffff8881101ef800, ffff8881101efc00) [ 25.433594][ T359] The buggy address belongs to the page: [ 25.439209][ T359] page:ffffea0004407a00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1101e8 [ 25.449419][ T359] head:ffffea0004407a00 order:3 compound_mapcount:0 compound_pincount:0 [ 25.457718][ T359] flags: 0x4000000000010200(slab|head|zone=1) [ 25.463775][ T359] raw: 4000000000010200 ffffea0004401200 0000000200000002 ffff888100043080 [ 25.472327][ T359] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 25.480876][ T359] page dumped because: kasan: bad access detected [ 25.487256][ T359] page_owner tracks the page as allocated [ 25.492946][ T359] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 101, ts 4018031493, free_ts 0 [ 25.510978][ T359] post_alloc_hook+0x192/0x1b0 [ 25.515719][ T359] prep_new_page+0x1c/0x110 [ 25.520199][ T359] get_page_from_freelist+0x2d3a/0x2dc0 [ 25.525716][ T359] __alloc_pages+0x1a2/0x460 [ 25.530277][ T359] new_slab+0xa1/0x4d0 [ 25.534318][ T359] ___slab_alloc+0x381/0x810 [ 25.538879][ T359] __slab_alloc+0x49/0x90 [ 25.543180][ T359] __kmalloc_track_caller+0x169/0x2c0 [ 25.548525][ T359] __alloc_skb+0x21a/0x740 [ 25.552910][ T359] netlink_sendmsg+0x611/0xb80 [ 25.557647][ T359] ____sys_sendmsg+0x5b7/0x8f0 [ 25.562382][ T359] ___sys_sendmsg+0x236/0x2e0 [ 25.567029][ T359] __x64_sys_sendmsg+0x206/0x2f0 [ 25.571936][ T359] x64_sys_call+0x4b/0x9a0 [ 25.576324][ T359] do_syscall_64+0x4c/0xa0 [ 25.580710][ T359] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 25.586578][ T359] page_owner free stack trace missing [ 25.591920][ T359] [ 25.594228][ T359] Memory state around the buggy address: [ 25.599832][ T359] ffff8881101efa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.607862][ T359] ffff8881101efb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.615895][ T359] >ffff8881101efb80: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 25.623922][ T359] ^ [ 25.631867][ T359] ffff8881101efc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.639896][ T359] ffff8881101efc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.647921][ T359] ================================================================== [ 25.655948][ T359] Disabling lock debugging due to kernel taint