./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor243376677 <...> syzkaller syzkaller login: [ 15.090562][ T30] kauditd_printk_skb: 31 callbacks suppressed [ 15.090578][ T30] audit: type=1400 audit(1754864379.996:59): avc: denied { transition } for pid=223 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.100973][ T30] audit: type=1400 audit(1754864379.996:60): avc: denied { noatsecure } for pid=223 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.107960][ T30] audit: type=1400 audit(1754864380.006:61): avc: denied { write } for pid=223 comm="sh" path="pipe:[371]" dev="pipefs" ino=371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 15.124767][ T30] audit: type=1400 audit(1754864380.006:62): avc: denied { rlimitinh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.143384][ T30] audit: type=1400 audit(1754864380.006:63): avc: denied { siginh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.222' (ED25519) to the list of known hosts. execve("./syz-executor243376677", ["./syz-executor243376677"], 0x7fff59dad3d0 /* 10 vars */) = 0 brk(NULL) = 0x555593817000 brk(0x555593817d00) = 0x555593817d00 arch_prctl(ARCH_SET_FS, 0x555593817380) = 0 set_tid_address(0x555593817650) = 288 set_robust_list(0x555593817660, 24) = 0 rseq(0x555593817ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor243376677", 4096) = 27 getrandom("\xd4\xeb\xe1\x33\x07\x9b\x9a\x13", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555593817d00 brk(0x555593838d00) = 0x555593838d00 brk(0x555593839000) = 0x555593839000 mprotect(0x7f1ded0b3000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18executing program ) = 18 socket(AF_INET6, SOCK_DGRAM, IPPROTO_IP) = 3 setsockopt(3, SOL_IPV6, IPV6_XFRM_POLICY, "\xac\x14\x14\xbb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 232) = 0 socket(AF_KEY, SOCK_RAW, 2) = 4 setsockopt(4, SOL_SOCKET, SO_RCVBUF, [0], 4) = 0 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x0b\x00\x01\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x12\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 5 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 6 sendmsg(6, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 184 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 7 sendmsg(7, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xee\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=MSG_EOR}, 0) = 184 [ 25.222860][ T30] audit: type=1400 audit(1754864390.136:64): avc: denied { execmem } for pid=288 comm="syz-executor243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 25.244099][ T30] audit: type=1400 audit(1754864390.156:65): avc: denied { create } for pid=288 comm="syz-executor243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 25.246319][ T288] ================================================================== [ 25.263944][ T30] audit: type=1400 audit(1754864390.156:66): avc: denied { setopt } for pid=288 comm="syz-executor243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 25.271711][ T288] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 25.271751][ T288] Read of size 1 at addr ffff88811f1193f8 by task syz-executor243/288 [ 25.271766][ T288] [ 25.271774][ T288] CPU: 0 PID: 288 Comm: syz-executor243 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 25.271793][ T288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 25.271809][ T288] Call Trace: [ 25.271815][ T288] [ 25.271821][ T288] __dump_stack+0x21/0x30 [ 25.271841][ T288] dump_stack_lvl+0xee/0x150 [ 25.271859][ T288] ? show_regs_print_info+0x20/0x20 [ 25.271878][ T288] ? load_image+0x3a0/0x3a0 [ 25.291465][ T30] audit: type=1400 audit(1754864390.156:67): avc: denied { write } for pid=288 comm="syz-executor243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 25.300548][ T288] ? unwind_get_return_address+0x4d/0x90 [ 25.308703][ T30] audit: type=1400 audit(1754864390.156:68): avc: denied { create } for pid=288 comm="syz-executor243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 25.310987][ T288] print_address_description+0x7f/0x2c0 [ 25.321527][ T30] audit: type=1400 audit(1754864390.156:69): avc: denied { write } for pid=288 comm="syz-executor243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 25.331509][ T288] ? xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 25.331536][ T288] kasan_report+0xf1/0x140 [ 25.334830][ T30] audit: type=1400 audit(1754864390.156:70): avc: denied { nlmsg_write } for pid=288 comm="syz-executor243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 25.337743][ T288] ? xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 25.465465][ T288] __asan_report_load1_noabort+0x14/0x20 [ 25.471092][ T288] xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 25.477409][ T288] xfrm_policy_inexact_insert_node+0x938/0xb50 [ 25.483548][ T288] ? xfrm_netlink_rcv+0x72/0x90 [ 25.488402][ T288] ? netlink_unicast+0x876/0xa40 [ 25.493324][ T288] ? netlink_sendmsg+0x86a/0xb70 [ 25.498243][ T288] ? ____sys_sendmsg+0x5a2/0x8c0 [ 25.503165][ T288] ? ___sys_sendmsg+0x1f0/0x260 [ 25.508007][ T288] ? x64_sys_call+0x4b/0x9a0 [ 25.512580][ T288] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 25.518634][ T288] xfrm_policy_inexact_alloc_chain+0x53a/0xb30 [ 25.524775][ T288] xfrm_policy_inexact_insert+0x70/0x1130 [ 25.530487][ T288] ? __get_hash_thresh+0x10c/0x420 [ 25.535578][ T288] ? policy_hash_bysel+0x110/0x4f0 [ 25.540673][ T288] xfrm_policy_insert+0x126/0x9a0 [ 25.545687][ T288] ? xfrm_policy_construct+0x54f/0x1f00 [ 25.551225][ T288] xfrm_add_policy+0x4d1/0x830 [ 25.555974][ T288] ? xfrm_dump_sa_done+0xc0/0xc0 [ 25.560902][ T288] xfrm_user_rcv_msg+0x45c/0x6e0 [ 25.565824][ T288] ? xfrm_netlink_rcv+0x90/0x90 [ 25.570666][ T288] ? avc_has_perm_noaudit+0x460/0x460 [ 25.576036][ T288] ? x64_sys_call+0x4b/0x9a0 [ 25.580617][ T288] ? selinux_nlmsg_lookup+0x237/0x4c0 [ 25.585976][ T288] netlink_rcv_skb+0x1e0/0x430 [ 25.590728][ T288] ? xfrm_netlink_rcv+0x90/0x90 [ 25.595568][ T288] ? netlink_ack+0xb60/0xb60 [ 25.600143][ T288] ? wait_for_completion_killable_timeout+0x10/0x10 [ 25.606719][ T288] ? __netlink_lookup+0x387/0x3b0 [ 25.611728][ T288] xfrm_netlink_rcv+0x72/0x90 [ 25.616401][ T288] netlink_unicast+0x876/0xa40 [ 25.621147][ T288] netlink_sendmsg+0x86a/0xb70 [ 25.625904][ T288] ? netlink_getsockopt+0x530/0x530 [ 25.631104][ T288] ? __update_load_avg_cfs_rq+0xaf/0x2f0 [ 25.636750][ T288] ? security_socket_sendmsg+0x82/0xa0 [ 25.642209][ T288] ? netlink_getsockopt+0x530/0x530 [ 25.647392][ T288] ____sys_sendmsg+0x5a2/0x8c0 [ 25.652142][ T288] ? __sys_sendmsg_sock+0x40/0x40 [ 25.657275][ T288] ? import_iovec+0x7c/0xb0 [ 25.661781][ T288] ___sys_sendmsg+0x1f0/0x260 [ 25.666452][ T288] ? _raw_spin_unlock+0x4d/0x70 [ 25.671290][ T288] ? __sys_sendmsg+0x250/0x250 [ 25.676039][ T288] ? __schedule+0xb76/0x14c0 [ 25.680645][ T288] ? _raw_spin_lock_irqsave+0x110/0x110 [ 25.686187][ T288] ? cgroup_update_frozen+0x15c/0x970 [ 25.691551][ T288] ? ptrace_stop+0x6f4/0xa80 [ 25.696131][ T288] ? __kasan_check_read+0x11/0x20 [ 25.701165][ T288] ? __fdget+0x15b/0x230 [ 25.705399][ T288] __x64_sys_sendmsg+0x1e2/0x2a0 [ 25.710325][ T288] ? ___sys_sendmsg+0x260/0x260 [ 25.715162][ T288] ? __kasan_check_write+0x14/0x20 [ 25.720265][ T288] ? switch_fpu_return+0x15d/0x2c0 [ 25.725367][ T288] x64_sys_call+0x4b/0x9a0 [ 25.729785][ T288] do_syscall_64+0x4c/0xa0 [ 25.734205][ T288] ? clear_bhb_loop+0x50/0xa0 [ 25.738871][ T288] ? clear_bhb_loop+0x50/0xa0 [ 25.743546][ T288] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 25.749424][ T288] RIP: 0033:0x7f1ded03fae9 [ 25.753825][ T288] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 25.773413][ T288] RSP: 002b:00007ffdeff38388 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 25.781812][ T288] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1ded03fae9 [ 25.789774][ T288] RDX: 0000000000004000 RSI: 0000200000000580 RDI: 0000000000000005 [ 25.797735][ T288] RBP: 0000200000000580 R08: 0000200000000017 R09: 0000000000000000 [ 25.805689][ T288] R10: 0000200000000012 R11: 0000000000000246 R12: 0000000000000000 [ 25.813733][ T288] R13: 0000000000000000 R14: 0000000000000000 R15: 000000000000000a [ 25.821700][ T288] [ 25.824707][ T288] [ 25.827015][ T288] Allocated by task 288: [ 25.831250][ T288] __kasan_kmalloc+0xda/0x110 [ 25.835915][ T288] __kmalloc+0x13d/0x2c0 [ 25.840141][ T288] sk_prot_alloc+0xed/0x320 [ 25.844627][ T288] sk_alloc+0x38/0x430 [ 25.848681][ T288] pfkey_create+0x12a/0x660 [ 25.853169][ T288] __sock_create+0x38d/0x7a0 [ 25.857745][ T288] __sys_socket+0xec/0x190 [ 25.862161][ T288] __x64_sys_socket+0x7a/0x90 [ 25.866826][ T288] x64_sys_call+0x8c5/0x9a0 [ 25.871310][ T288] do_syscall_64+0x4c/0xa0 [ 25.875723][ T288] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 25.881602][ T288] [ 25.883911][ T288] The buggy address belongs to the object at ffff88811f119000 [ 25.883911][ T288] which belongs to the cache kmalloc-1k of size 1024 [ 25.897974][ T288] The buggy address is located 1016 bytes inside of [ 25.897974][ T288] 1024-byte region [ffff88811f119000, ffff88811f119400) [ 25.911406][ T288] The buggy address belongs to the page: [ 25.917040][ T288] page:ffffea00047c4600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11f118 [ 25.927290][ T288] head:ffffea00047c4600 order:3 compound_mapcount:0 compound_pincount:0 [ 25.935598][ T288] flags: 0x4000000000010200(slab|head|zone=1) [ 25.941670][ T288] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888100043080 [ 25.950241][ T288] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 25.958811][ T288] page dumped because: kasan: bad access detected [ 25.965205][ T288] page_owner tracks the page as allocated [ 25.970902][ T288] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 284, ts 25242287295, free_ts 19562227419 [ 25.989897][ T288] post_alloc_hook+0x192/0x1b0 [ 25.994653][ T288] prep_new_page+0x1c/0x110 [ 25.999148][ T288] get_page_from_freelist+0x2cc5/0x2d50 [ 26.004684][ T288] __alloc_pages+0x18f/0x440 [ 26.009264][ T288] new_slab+0xa1/0x4d0 [ 26.013323][ T288] ___slab_alloc+0x381/0x810 [ 26.017905][ T288] __slab_alloc+0x49/0x90 [ 26.022225][ T288] __kmalloc_track_caller+0x169/0x2c0 [ 26.027590][ T288] __alloc_skb+0x21a/0x740 [ 26.031992][ T288] sk_stream_alloc_skb+0x21a/0xb60 [ 26.037087][ T288] tcp_sendmsg_locked+0xc3e/0x3590 [ 26.042198][ T288] tcp_sendmsg+0x2f/0x50 [ 26.046444][ T288] inet_sendmsg+0xa5/0xc0 [ 26.050760][ T288] sock_write_iter+0x29c/0x380 [ 26.055513][ T288] vfs_write+0x802/0xf70 [ 26.059741][ T288] ksys_write+0x140/0x240 [ 26.064065][ T288] page last free stack trace: [ 26.068718][ T288] free_unref_page_prepare+0x542/0x550 [ 26.074163][ T288] free_unref_page+0xa2/0x550 [ 26.078831][ T288] free_compound_page+0x78/0xa0 [ 26.083666][ T288] __put_compound_page+0x77/0xb0 [ 26.088592][ T288] __put_page+0xbc/0xe0 [ 26.092731][ T288] skb_release_data+0x3d3/0xa10 [ 26.097570][ T288] __kfree_skb+0x50/0x70 [ 26.101796][ T288] tcp_recvmsg_locked+0x14ac/0x2640 [ 26.106986][ T288] tcp_recvmsg+0x21b/0x720 [ 26.111391][ T288] inet_recvmsg+0x134/0x470 [ 26.115881][ T288] sock_read_iter+0x2a2/0x340 [ 26.120542][ T288] vfs_read+0x68b/0xbe0 [ 26.124687][ T288] ksys_read+0x140/0x240 [ 26.128937][ T288] __x64_sys_read+0x7b/0x90 [ 26.133423][ T288] x64_sys_call+0x96d/0x9a0 [ 26.137909][ T288] do_syscall_64+0x4c/0xa0 [ 26.142331][ T288] [ 26.144641][ T288] Memory state around the buggy address: [ 26.150256][ T288] ffff88811f119280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.158299][ T288] ffff88811f119300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.166365][ T288] >ffff88811f119380: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc sendmsg(5, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x40\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xee\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x09\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, MSG_NOSIGNAL) = 184 exit_group(0) = ? +++ exited with 0 +++ [ 26.174425][ T288]