./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3199433990 <...> ntk_skb: 21 callbacks suppressed [ 17.689413][ T23] audit: type=1400 audit(1738279727.550:61): avc: denied { transition } for pid=290 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.701102][ T23] audit: type=1400 audit(1738279727.550:62): avc: denied { noatsecure } for pid=290 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.707301][ T23] audit: type=1400 audit(1738279727.550:63): avc: denied { write } for pid=290 comm="sh" path="pipe:[11387]" dev="pipefs" ino=11387 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 17.726937][ T23] audit: type=1400 audit(1738279727.550:64): avc: denied { rlimitinh } for pid=290 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.745576][ T23] audit: type=1400 audit(1738279727.550:65): avc: denied { siginh } for pid=290 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.137' (ED25519) to the list of known hosts. execve("./syz-executor3199433990", ["./syz-executor3199433990"], 0x7ffe0f117d80 /* 10 vars */) = 0 brk(NULL) = 0x55556901d000 brk(0x55556901dd00) = 0x55556901dd00 arch_prctl(ARCH_SET_FS, 0x55556901d380) = 0 set_tid_address(0x55556901d650) = 359 set_robust_list(0x55556901d660, 24) = 0 rseq(0x55556901dca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor3199433990", 4096) = 28 getrandom("\x6b\x81\xbe\xa3\x34\xe7\x96\xb2", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55556901dd00 brk(0x55556903ed00) = 0x55556903ed00 brk(0x55556903f000) = 0x55556903f000 mprotect(0x7fc0187c8000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 write(1, "executing program\n", 18executing program ) = 18 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 3 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 4 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 184 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 5 sendmsg(5, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x30\x00\x00\x00\x00\x00\x00\x00\x00\x01\xee\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=MSG_EOR}, 0) = 184 socket(AF_INET6, SOCK_DGRAM, IPPROTO_IP) = 6 setsockopt(6, SOL_IPV6, IPV6_XFRM_POLICY, "\x7f\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 232) = 0 socket(AF_INET6, SOCK_DGRAM, IPPROTO_IP) = 7 setsockopt(7, SOL_IPV6, IPV6_XFRM_POLICY, "\x7f\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 232) = 0 sendmsg(-1, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x12\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = -1 EBADF (Bad file descriptor) socket(AF_KEY, SOCK_RAW, 2) = 8 setsockopt(8, SOL_SOCKET, SO_RCVBUF, [0], 4) = 0 sendmsg(8, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x12\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16 [ 26.950994][ T23] audit: type=1400 audit(1738279736.800:66): avc: denied { execmem } for pid=359 comm="syz-executor319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 26.963913][ T359] ================================================================== [ 26.970538][ T23] audit: type=1400 audit(1738279736.810:67): avc: denied { create } for pid=359 comm="syz-executor319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 26.978419][ T359] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 26.978430][ T359] Read of size 1 at addr ffff8881ef3473d8 by task syz-executor319/359 [ 26.978432][ T359] [ 26.978442][ T359] CPU: 0 PID: 359 Comm: syz-executor319 Not tainted 5.4.289-syzkaller-00025-g49530c73f82d #0 [ 26.978447][ T359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 26.978450][ T359] Call Trace: [ 26.978463][ T359] dump_stack+0x1d8/0x241 [ 26.978475][ T359] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 26.978484][ T359] ? printk+0xd1/0x111 [ 26.978493][ T359] ? xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 26.978503][ T359] ? wake_up_klogd+0xb2/0xf0 [ 26.978513][ T359] ? xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 26.978523][ T359] print_address_description+0x8c/0x600 [ 26.978530][ T359] ? panic+0x89d/0x89d [ 26.978542][ T359] ? xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 26.978551][ T359] __kasan_report+0xf3/0x120 [ 26.978561][ T359] ? xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 26.978570][ T359] kasan_report+0x30/0x60 [ 26.978580][ T359] xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 26.978593][ T359] xfrm_policy_inexact_insert_node+0x8f3/0xb00 [ 26.978605][ T359] ? xfrm_policy_inexact_alloc_bin+0x5b2/0x1440 [ 26.978615][ T359] xfrm_policy_inexact_alloc_chain+0x4f9/0xb10 [ 26.978629][ T359] xfrm_policy_inexact_insert+0x69/0x10e0 [ 26.978641][ T359] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 26.978651][ T359] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 26.978662][ T359] ? policy_hash_bysel+0x12c/0x6f0 [ 26.978670][ T359] ? memcpy+0x38/0x50 [ 26.978681][ T359] xfrm_policy_insert+0xe1/0x8a0 [ 26.978694][ T359] xfrm_add_policy+0x4f2/0x980 [ 26.978704][ T359] ? __nla_validate+0x50/0x50 [ 26.978714][ T359] ? xfrm_dump_sa_done+0xc0/0xc0 [ 26.978724][ T359] ? __nla_parse+0x3a/0x50 [ 26.978742][ T359] xfrm_user_rcv_msg+0x689/0x9b0 [ 26.999244][ T23] audit: type=1400 audit(1738279736.810:68): avc: denied { write } for pid=359 comm="syz-executor319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 27.008337][ T359] ? xfrm_netlink_rcv+0x80/0x80 [ 27.008355][ T359] ? avc_has_perm+0xd2/0x260 [ 27.008373][ T359] ? avc_has_perm+0x16f/0x260 [ 27.016339][ T23] audit: type=1400 audit(1738279736.810:69): avc: denied { nlmsg_write } for pid=359 comm="syz-executor319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 27.018473][ T359] ? avc_has_perm_noaudit+0x3d0/0x3d0 [ 27.028470][ T23] audit: type=1400 audit(1738279736.810:70): avc: denied { create } for pid=359 comm="syz-executor319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 27.038347][ T359] netlink_rcv_skb+0x1d5/0x420 [ 27.038362][ T359] ? xfrm_netlink_rcv+0x80/0x80 [ 27.041474][ T23] audit: type=1400 audit(1738279736.810:71): avc: denied { setopt } for pid=359 comm="syz-executor319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 27.045634][ T359] ? nla_put_string+0x30/0x30 [ 27.045643][ T359] ? mutex_trylock+0xa0/0xa0 [ 27.045657][ T359] ? __netlink_lookup+0x369/0x390 [ 27.051278][ T23] audit: type=1400 audit(1738279736.810:72): avc: denied { write } for pid=359 comm="syz-executor319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 27.055183][ T359] xfrm_netlink_rcv+0x6e/0x80 [ 27.055198][ T359] netlink_unicast+0x936/0xb20 [ 27.330888][ T359] ? netlink_detachskb+0x90/0x90 [ 27.336086][ T359] ? __virt_addr_valid+0x20e/0x2a0 [ 27.341137][ T359] netlink_sendmsg+0xa18/0xcf0 [ 27.346071][ T359] ? netlink_getsockopt+0x550/0x550 [ 27.351112][ T359] ? import_iovec+0x1bb/0x380 [ 27.355765][ T359] ? security_socket_sendmsg+0x7d/0xa0 [ 27.361143][ T359] ? netlink_getsockopt+0x550/0x550 [ 27.366940][ T359] ____sys_sendmsg+0x5ac/0x8f0 [ 27.371854][ T359] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 27.376969][ T359] __sys_sendmsg+0x28b/0x380 [ 27.381510][ T359] ? ____sys_sendmsg+0x8f0/0x8f0 [ 27.386268][ T359] ? ptrace_notify+0x24c/0x350 [ 27.391018][ T359] do_syscall_64+0xca/0x1c0 [ 27.395334][ T359] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 27.401146][ T359] RIP: 0033:0x7fc018754e29 [ 27.405411][ T359] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 27.424943][ T359] RSP: 002b:00007fff32d0def8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 27.433390][ T359] RAX: ffffffffffffffda RBX: 00007fff32d0e0c8 RCX: 00007fc018754e29 [ 27.441370][ T359] RDX: 0000000000000000 RSI: 0000000020000580 RDI: 0000000000000003 [ 27.449180][ T359] RBP: 00007fc0187c8610 R08: 000000000000000a R09: 00007fff32d0e0c8 [ 27.457007][ T359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 27.464804][ T359] R13: 00007fff32d0e0b8 R14: 0000000000000001 R15: 0000000000000001 [ 27.472748][ T359] [ 27.474921][ T359] Allocated by task 359: [ 27.479084][ T359] __kasan_kmalloc+0x171/0x210 [ 27.483684][ T359] sk_prot_alloc+0xbd/0x3e0 [ 27.488278][ T359] sk_alloc+0x35/0x2f0 [ 27.492330][ T359] pfkey_create+0x122/0x670 [ 27.496670][ T359] __sock_create+0x3cb/0x7a0 [ 27.501097][ T359] __sys_socket+0x132/0x370 [ 27.505536][ T359] __x64_sys_socket+0x76/0x80 [ 27.510157][ T359] do_syscall_64+0xca/0x1c0 [ 27.514472][ T359] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 27.520197][ T359] [ 27.522368][ T359] Freed by task 17: [ 27.526024][ T359] __kasan_slab_free+0x1b5/0x270 [ 27.530804][ T359] kfree+0x123/0x370 [ 27.534528][ T359] rcu_do_batch+0x492/0xa00 [ 27.538863][ T359] rcu_core+0x4c8/0xcb0 [ 27.543019][ T359] __do_softirq+0x23b/0x6b7 [ 27.547275][ T359] [ 27.549448][ T359] The buggy address belongs to the object at ffff8881ef347000 [ 27.549448][ T359] which belongs to the cache kmalloc-1k of size 1024 [ 27.563341][ T359] The buggy address is located 984 bytes inside of [ 27.563341][ T359] 1024-byte region [ffff8881ef347000, ffff8881ef347400) [ 27.576622][ T359] The buggy address belongs to the page: [ 27.582201][ T359] page:ffffea0007bcd000 refcount:1 mapcount:0 mapping:ffff8881f5c02280 index:0x0 compound_mapcount: 0 [ 27.593162][ T359] flags: 0x8000000000010200(slab|head) [ 27.598452][ T359] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881f5c02280 [ 27.606868][ T359] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 27.615369][ T359] page dumped because: kasan: bad access detected [ 27.621723][ T359] page_owner tracks the page as allocated [ 27.627362][ T359] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2000(__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC) [ 27.640643][ T359] prep_new_page+0x18f/0x370 [ 27.645061][ T359] get_page_from_freelist+0x2d13/0x2d90 [ 27.650537][ T359] __alloc_pages_nodemask+0x393/0x840 [ 27.655746][ T359] alloc_slab_page+0x39/0x3c0 [ 27.660378][ T359] new_slab+0x97/0x440 [ 27.664279][ T359] ___slab_alloc+0x2fe/0x490 [ 27.668705][ T359] __slab_alloc+0x62/0xa0 [ 27.672967][ T359] __kmalloc+0x19b/0x2e0 [ 27.677106][ T359] blk_mq_realloc_hw_ctxs+0x303/0x13b0 [ 27.682338][ T359] blk_mq_init_allocated_queue+0x52d/0x1990 [ 27.688070][ T359] blk_mq_init_queue+0x49/0xa0 [ 27.692895][ T359] scsi_mq_alloc_queue+0x40/0x110 [ 27.697737][ T359] scsi_alloc_sdev+0x654/0x960 [ 27.702346][ T359] scsi_probe_and_add_lun+0x1aa/0x4010 [ 27.707646][ T359] __scsi_scan_target+0x1fb/0xe80 [ 27.712502][ T359] scsi_scan_host_selected+0x349/0x620 [ 27.717781][ T359] page_owner free stack trace missing [ 27.723096][ T359] [ 27.725242][ T359] Memory state around the buggy address: [ 27.730719][ T359] ffff8881ef347280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.738796][ T359] ffff8881ef347300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.746697][ T359] >ffff8881ef347380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc sendmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x40\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xee\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 184 exit_group(0) = ? +++ exited with 0 +++