./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2248377044 <...> [ 3.754916][ T24] audit: type=1400 audit(1745210383.440:9): avc: denied { append open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3.759422][ T24] audit: type=1400 audit(1745210383.440:10): avc: denied { getattr } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3.947180][ T94] udevd[94]: starting version 3.2.11 [ 4.064001][ T95] udevd[95]: starting eudev-3.2.11 [ 13.470507][ T24] kauditd_printk_skb: 50 callbacks suppressed [ 13.470519][ T24] audit: type=1400 audit(1745210393.180:61): avc: denied { transition } for pid=220 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.480185][ T24] audit: type=1400 audit(1745210393.180:62): avc: denied { noatsecure } for pid=220 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.487124][ T24] audit: type=1400 audit(1745210393.180:63): avc: denied { write } for pid=220 comm="sh" path="pipe:[14026]" dev="pipefs" ino=14026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 13.497014][ T24] audit: type=1400 audit(1745210393.180:64): avc: denied { rlimitinh } for pid=220 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.515464][ T24] audit: type=1400 audit(1745210393.180:65): avc: denied { siginh } for pid=220 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.33' (ED25519) to the list of known hosts. execve("./syz-executor2248377044", ["./syz-executor2248377044"], 0x7fff54914110 /* 10 vars */) = 0 brk(NULL) = 0x5555836f2000 brk(0x5555836f2d00) = 0x5555836f2d00 arch_prctl(ARCH_SET_FS, 0x5555836f2380) = 0 set_tid_address(0x5555836f2650) = 289 set_robust_list(0x5555836f2660, 24) = 0 rseq(0x5555836f2ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2248377044", 4096) = 28 getrandom("\xa3\x8e\x5e\xcc\xfd\x97\xc0\x93", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x5555836f2d00 brk(0x555583713d00) = 0x555583713d00 brk(0x555583714000) = 0x555583714000 mprotect(0x7fedb3584000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18executing program ) = 18 socket(AF_INET6, SOCK_DGRAM, IPPROTO_IP) = 3 setsockopt(3, SOL_IPV6, IPV6_XFRM_POLICY, "\xac\x14\x14\xbb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 232) = 0 socket(AF_KEY, SOCK_RAW, 2) = 4 setsockopt(4, SOL_SOCKET, SO_RCVBUF, [0], 4) = 0 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x0b\x00\x01\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x12\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 5 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 6 sendmsg(6, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 184 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 7 sendmsg(7, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xee\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=MSG_EOR}, 0) = 184 [ 23.205594][ T24] audit: type=1400 audit(1745210402.910:66): avc: denied { execmem } for pid=289 comm="syz-executor224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.221318][ T289] ================================================================== [ 23.225380][ T24] audit: type=1400 audit(1745210402.930:67): avc: denied { create } for pid=289 comm="syz-executor224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 23.232696][ T289] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x5b0/0x660 [ 23.232706][ T289] Read of size 1 at addr ffff88811af9dbd8 by task syz-executor224/289 [ 23.232708][ T289] [ 23.232721][ T289] CPU: 1 PID: 289 Comm: syz-executor224 Not tainted 5.10.236-syzkaller #0 [ 23.232726][ T289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 23.232740][ T289] Call Trace: [ 23.252049][ T24] audit: type=1400 audit(1745210402.930:68): avc: denied { setopt } for pid=289 comm="syz-executor224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 23.261058][ T289] dump_stack_lvl+0x1e2/0x24b [ 23.261074][ T289] ? printk+0xd1/0x111 [ 23.269063][ T24] audit: type=1400 audit(1745210402.930:69): avc: denied { write } for pid=289 comm="syz-executor224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 23.271223][ T289] ? bfq_pos_tree_add_move+0x43b/0x43b [ 23.279603][ T24] audit: type=1400 audit(1745210402.930:70): avc: denied { create } for pid=289 comm="syz-executor224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 23.289441][ T289] ? wake_up_klogd+0xb8/0xf0 [ 23.289457][ T289] ? panic+0x812/0x812 [ 23.292566][ T24] audit: type=1400 audit(1745210402.930:71): avc: denied { write } for pid=289 comm="syz-executor224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 23.312007][ T289] print_address_description+0x81/0x3b0 [ 23.312024][ T289] ? stack_trace_save+0x113/0x1c0 [ 23.316533][ T24] audit: type=1400 audit(1745210402.930:72): avc: denied { nlmsg_write } for pid=289 comm="syz-executor224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 23.320519][ T289] kasan_report+0x179/0x1c0 [ 23.428844][ T289] ? xfrm_policy_inexact_list_reinsert+0x5b0/0x660 [ 23.435213][ T289] ? xfrm_policy_inexact_list_reinsert+0x5b0/0x660 [ 23.442042][ T289] __asan_report_load1_noabort+0x14/0x20 [ 23.447499][ T289] xfrm_policy_inexact_list_reinsert+0x5b0/0x660 [ 23.453658][ T289] ? ____kasan_kmalloc+0xed/0x110 [ 23.458524][ T289] ? ____kasan_kmalloc+0xdb/0x110 [ 23.463385][ T289] ? xfrm_policy_addr_delta+0x20b/0x330 [ 23.468765][ T289] xfrm_policy_inexact_insert_node+0x917/0xb00 [ 23.474753][ T289] ? xfrm_policy_inexact_alloc_bin+0x651/0x1520 [ 23.480833][ T289] xfrm_policy_inexact_alloc_chain+0x4ec/0xaf0 [ 23.486822][ T289] xfrm_policy_inexact_insert+0x6a/0x1160 [ 23.492461][ T289] ? __kasan_check_write+0x14/0x20 [ 23.497410][ T289] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 23.502267][ T289] ? policy_hash_bysel+0x137/0x700 [ 23.507218][ T289] xfrm_policy_insert+0xe7/0x940 [ 23.511994][ T289] xfrm_add_policy+0x4f2/0x980 [ 23.516590][ T289] ? cap_capable+0x1ce/0x270 [ 23.521015][ T289] ? xfrm_dump_sa_done+0xc0/0xc0 [ 23.525791][ T289] xfrm_user_rcv_msg+0x4e7/0x7c0 [ 23.530566][ T289] ? xfrm_netlink_rcv+0x90/0x90 [ 23.535252][ T289] ? stack_trace_save+0x113/0x1c0 [ 23.540119][ T289] ? avc_has_perm_noaudit+0x240/0x240 [ 23.545408][ T289] ? iov_iter_advance+0x258/0xb20 [ 23.550271][ T289] netlink_rcv_skb+0x1cf/0x410 [ 23.554866][ T289] ? xfrm_netlink_rcv+0x90/0x90 [ 23.559555][ T289] ? netlink_ack+0xb30/0xb30 [ 23.563980][ T289] ? mutex_trylock+0xa0/0xa0 [ 23.568409][ T289] ? netlink_autobind+0x190/0x190 [ 23.573271][ T289] ? selinux_vm_enough_memory+0x170/0x170 [ 23.578826][ T289] xfrm_netlink_rcv+0x72/0x90 [ 23.583342][ T289] netlink_unicast+0x8df/0xac0 [ 23.587942][ T289] ? netlink_detachskb+0x90/0x90 [ 23.592713][ T289] ? security_netlink_send+0x7b/0xa0 [ 23.597835][ T289] netlink_sendmsg+0xa46/0xd00 [ 23.602434][ T289] ? netlink_getsockopt+0x5c0/0x5c0 [ 23.607477][ T289] ? check_stack_object+0x114/0x130 [ 23.612502][ T289] ? security_socket_sendmsg+0x82/0xb0 [ 23.617796][ T289] ? netlink_getsockopt+0x5c0/0x5c0 [ 23.622833][ T289] ____sys_sendmsg+0x59e/0x8f0 [ 23.627435][ T289] ? iovec_from_user+0x2d9/0x330 [ 23.632206][ T289] ? __import_iovec+0x253/0x3b0 [ 23.636891][ T289] ? __sys_sendmsg_sock+0x40/0x40 [ 23.641753][ T289] ___sys_sendmsg+0x252/0x2e0 [ 23.646269][ T289] ? __sys_sendmsg+0x280/0x280 [ 23.650866][ T289] ? finish_task_switch+0x130/0x5a0 [ 23.655901][ T289] ? __schedule+0xbee/0x1330 [ 23.660330][ T289] ? __kasan_check_write+0x14/0x20 [ 23.665274][ T289] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 23.670228][ T289] ? __kasan_check_read+0x11/0x20 [ 23.675085][ T289] ? __fdget+0x179/0x240 [ 23.679166][ T289] __se_sys_sendmsg+0x1b1/0x280 [ 23.683862][ T289] ? _raw_spin_unlock_irq+0x4e/0x70 [ 23.688882][ T289] ? __x64_sys_sendmsg+0x90/0x90 [ 23.693663][ T289] ? fpu__clear_all+0x20/0x20 [ 23.698170][ T289] __x64_sys_sendmsg+0x7b/0x90 [ 23.702771][ T289] do_syscall_64+0x31/0x40 [ 23.707028][ T289] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 23.712753][ T289] RIP: 0033:0x7fedb3510ae9 [ 23.717006][ T289] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 23.736451][ T289] RSP: 002b:00007ffc5ffb9d38 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 23.744801][ T289] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fedb3510ae9 [ 23.752619][ T289] RDX: 0000000000004000 RSI: 0000200000000580 RDI: 0000000000000005 [ 23.760423][ T289] RBP: 0000200000000580 R08: 0000200000000017 R09: 0000000000000000 [ 23.768236][ T289] R10: 0000200000000012 R11: 0000000000000246 R12: 0000000000000000 [ 23.776048][ T289] R13: 0000000000000000 R14: 0000000000000000 R15: 000000000000000a [ 23.783861][ T289] [ 23.786028][ T289] Allocated by task 289: [ 23.790114][ T289] ____kasan_kmalloc+0xdb/0x110 [ 23.794798][ T289] __kasan_kmalloc+0x9/0x10 [ 23.799138][ T289] __kmalloc+0x1aa/0x330 [ 23.803220][ T289] sk_prot_alloc+0xbe/0x370 [ 23.807562][ T289] sk_alloc+0x38/0x4d0 [ 23.811465][ T289] pfkey_create+0x12c/0x620 [ 23.815805][ T289] __sock_create+0x3a6/0x760 [ 23.820232][ T289] __sys_socket+0x132/0x370 [ 23.824583][ T289] __x64_sys_socket+0x7a/0x90 [ 23.829089][ T289] do_syscall_64+0x31/0x40 [ 23.833340][ T289] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 23.839059][ T289] [ 23.841237][ T289] The buggy address belongs to the object at ffff88811af9d800 [ 23.841237][ T289] which belongs to the cache kmalloc-1k of size 1024 [ 23.855137][ T289] The buggy address is located 984 bytes inside of [ 23.855137][ T289] 1024-byte region [ffff88811af9d800, ffff88811af9dc00) [ 23.868319][ T289] The buggy address belongs to the page: [ 23.873792][ T289] page:ffffea00046be600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11af98 [ 23.883854][ T289] head:ffffea00046be600 order:3 compound_mapcount:0 compound_pincount:0 [ 23.892013][ T289] flags: 0x4000000000010200(slab|head) [ 23.897325][ T289] raw: 4000000000010200 dead000000000100 dead000000000122 ffff888100042f00 [ 23.905728][ T289] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 23.914145][ T289] page dumped because: kasan: bad access detected [ 23.920395][ T289] page_owner tracks the page as allocated [ 23.926045][ T289] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 284, ts 23205444915, free_ts 17607133497 [ 23.945070][ T289] prep_new_page+0x166/0x180 [ 23.949486][ T289] get_page_from_freelist+0x2d8c/0x2f30 [ 23.954857][ T289] __alloc_pages_nodemask+0x435/0xaf0 [ 23.960067][ T289] new_slab+0x80/0x400 [ 23.963969][ T289] ___slab_alloc+0x302/0x4b0 [ 23.968397][ T289] __slab_alloc+0x63/0xa0 [ 23.972563][ T289] __kmalloc_track_caller+0x1f8/0x320 [ 23.977771][ T289] __alloc_skb+0xbc/0x510 [ 23.981939][ T289] sk_stream_alloc_skb+0x1f8/0xae0 [ 23.986891][ T289] tcp_sendmsg_locked+0xce3/0x3ae0 [ 23.991831][ T289] tcp_sendmsg+0x2f/0x50 [ 23.996438][ T289] inet_sendmsg+0xa1/0xc0 [ 24.000596][ T289] sock_write_iter+0x39b/0x530 [ 24.005200][ T289] vfs_write+0xb4c/0xe70 [ 24.009286][ T289] ksys_write+0x199/0x2c0 [ 24.013442][ T289] __x64_sys_write+0x7b/0x90 [ 24.017867][ T289] page last free stack trace: [ 24.022384][ T289] __free_pages_ok+0x82c/0x850 [ 24.026987][ T289] free_compound_page+0x73/0x90 [ 24.031672][ T289] __put_compound_page+0x73/0xb0 [ 24.036448][ T289] __put_page+0xc0/0xe0 [ 24.040601][ T289] skb_release_data+0x240/0x6f0 [ 24.045339][ T289] __kfree_skb+0x50/0x70 [ 24.049365][ T289] tcp_recvmsg+0x1765/0x3590 [ 24.053776][ T289] inet_recvmsg+0x158/0x500 [ 24.058115][ T289] sock_read_iter+0x353/0x480 [ 24.062623][ T289] vfs_read+0x990/0xba0 [ 24.066619][ T289] ksys_read+0x199/0x2c0 [ 24.070696][ T289] __x64_sys_read+0x7b/0x90 [ 24.075038][ T289] do_syscall_64+0x31/0x40 [ 24.079292][ T289] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 24.085014][ T289] [ 24.087185][ T289] Memory state around the buggy address: [ 24.092658][ T289] ffff88811af9da80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.100553][ T289] ffff88811af9db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sendmsg(5, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x40\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xee\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x09\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, MSG_NOSIGNAL) = 184 exit_group(0) = ? +++ exited with 0 +++ [ 24.108453