./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1303422445 <...> Warning: Permanently added '10.128.0.101' (ED25519) to the list of known hosts. execve("./syz-executor1303422445", ["./syz-executor1303422445"], 0x7fff2874f1a0 /* 10 vars */) = 0 brk(NULL) = 0x555572736000 brk(0x555572736d00) = 0x555572736d00 arch_prctl(ARCH_SET_FS, 0x555572736380) = 0 set_tid_address(0x555572736650) = 288 set_robust_list(0x555572736660, 24) = 0 rseq(0x555572736ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1303422445", 4096) = 28 getrandom("\xaa\x35\xed\x3f\x91\xa6\x0e\xf5", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555572736d00 brk(0x555572757d00) = 0x555572757d00 brk(0x555572758000) = 0x555572758000 mprotect(0x7f01eef8a000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18executing program ) = 18 socket(AF_INET6, SOCK_DGRAM, IPPROTO_IP) = 3 setsockopt(3, SOL_IPV6, IPV6_XFRM_POLICY, "\xac\x14\x14\xbb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 232) = 0 socket(AF_KEY, SOCK_RAW, 2) = 4 setsockopt(4, SOL_SOCKET, SO_RCVBUF, [0], 4) = 0 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x0b\x00\x01\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x12\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 5 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 6 sendmsg(6, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 184 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 7 sendmsg(7, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xee\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=MSG_EOR}, 0) = 184 [ 23.072615][ T24] audit: type=1400 audit(1745223718.320:66): avc: denied { execmem } for pid=288 comm="syz-executor130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.094071][ T24] audit: type=1400 audit(1745223718.340:67): avc: denied { create } for pid=288 comm="syz-executor130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 23.099535][ T288] ================================================================== [ 23.114589][ T24] audit: type=1400 audit(1745223718.340:68): avc: denied { setopt } for pid=288 comm="syz-executor130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 23.121628][ T288] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x5b0/0x660 [ 23.121651][ T288] Read of size 1 at addr ffff88811c90fbd8 by task syz-executor130/288 [ 23.141027][ T24] audit: type=1400 audit(1745223718.340:69): avc: denied { write } for pid=288 comm="syz-executor130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 23.150229][ T288] [ 23.158250][ T24] audit: type=1400 audit(1745223718.340:70): avc: denied { create } for pid=288 comm="syz-executor130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 23.177454][ T288] CPU: 1 PID: 288 Comm: syz-executor130 Not tainted 5.10.236-syzkaller #0 [ 23.177460][ T288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 23.177475][ T288] Call Trace: [ 23.177496][ T288] dump_stack_lvl+0x1e2/0x24b [ 23.177515][ T288] ? printk+0xd1/0x111 [ 23.179668][ T24] audit: type=1400 audit(1745223718.340:71): avc: denied { write } for pid=288 comm="syz-executor130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 23.199933][ T288] ? bfq_pos_tree_add_move+0x43b/0x43b [ 23.199946][ T288] ? wake_up_klogd+0xb8/0xf0 [ 23.199956][ T288] ? panic+0x812/0x812 [ 23.199968][ T288] print_address_description+0x81/0x3b0 [ 23.199988][ T288] ? stack_trace_save+0x113/0x1c0 [ 23.274454][ T288] kasan_report+0x179/0x1c0 [ 23.278819][ T288] ? xfrm_policy_inexact_list_reinsert+0x5b0/0x660 [ 23.285115][ T288] ? xfrm_policy_inexact_list_reinsert+0x5b0/0x660 [ 23.291447][ T288] __asan_report_load1_noabort+0x14/0x20 [ 23.296926][ T288] xfrm_policy_inexact_list_reinsert+0x5b0/0x660 [ 23.303156][ T288] ? ____kasan_kmalloc+0xed/0x110 [ 23.308024][ T288] ? ____kasan_kmalloc+0xdb/0x110 [ 23.312876][ T288] ? xfrm_policy_addr_delta+0x20b/0x330 [ 23.318273][ T288] xfrm_policy_inexact_insert_node+0x917/0xb00 [ 23.324281][ T288] ? xfrm_policy_inexact_alloc_bin+0x651/0x1520 [ 23.330519][ T288] xfrm_policy_inexact_alloc_chain+0x4ec/0xaf0 [ 23.336801][ T288] xfrm_policy_inexact_insert+0x6a/0x1160 [ 23.342675][ T288] ? __kasan_check_write+0x14/0x20 [ 23.347621][ T288] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 23.352483][ T288] ? policy_hash_bysel+0x137/0x700 [ 23.357431][ T288] xfrm_policy_insert+0xe7/0x940 [ 23.362202][ T288] xfrm_add_policy+0x4f2/0x980 [ 23.366801][ T288] ? cap_capable+0x1ce/0x270 [ 23.371232][ T288] ? xfrm_dump_sa_done+0xc0/0xc0 [ 23.376014][ T288] xfrm_user_rcv_msg+0x4e7/0x7c0 [ 23.380777][ T288] ? xfrm_netlink_rcv+0x90/0x90 [ 23.385460][ T288] ? stack_trace_save+0x113/0x1c0 [ 23.390415][ T288] ? avc_has_perm_noaudit+0x240/0x240 [ 23.395623][ T288] ? iov_iter_advance+0x258/0xb20 [ 23.400587][ T288] netlink_rcv_skb+0x1cf/0x410 [ 23.405177][ T288] ? xfrm_netlink_rcv+0x90/0x90 [ 23.409866][ T288] ? netlink_ack+0xb30/0xb30 [ 23.414291][ T288] ? mutex_trylock+0xa0/0xa0 [ 23.418718][ T288] ? netlink_autobind+0x190/0x190 [ 23.423577][ T288] ? selinux_vm_enough_memory+0x170/0x170 [ 23.429135][ T288] xfrm_netlink_rcv+0x72/0x90 [ 23.433652][ T288] netlink_unicast+0x8df/0xac0 [ 23.438253][ T288] ? netlink_detachskb+0x90/0x90 [ 23.443020][ T288] ? security_netlink_send+0x7b/0xa0 [ 23.448145][ T288] netlink_sendmsg+0xa46/0xd00 [ 23.452751][ T288] ? netlink_getsockopt+0x5c0/0x5c0 [ 23.457782][ T288] ? check_stack_object+0x114/0x130 [ 23.462811][ T288] ? security_socket_sendmsg+0x82/0xb0 [ 23.468201][ T288] ? netlink_getsockopt+0x5c0/0x5c0 [ 23.474055][ T288] ____sys_sendmsg+0x59e/0x8f0 [ 23.478774][ T288] ? iovec_from_user+0x2d9/0x330 [ 23.484141][ T288] ? __import_iovec+0x253/0x3b0 [ 23.488815][ T288] ? __sys_sendmsg_sock+0x40/0x40 [ 23.493758][ T288] ___sys_sendmsg+0x252/0x2e0 [ 23.498193][ T288] ? __sys_sendmsg+0x280/0x280 [ 23.502793][ T288] ? finish_task_switch+0x130/0x5a0 [ 23.507839][ T288] ? __schedule+0xbee/0x1330 [ 23.512356][ T288] ? __kasan_check_write+0x14/0x20 [ 23.517303][ T288] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 23.522345][ T288] ? __kasan_check_read+0x11/0x20 [ 23.527362][ T288] ? __fdget+0x179/0x240 [ 23.531422][ T288] __se_sys_sendmsg+0x1b1/0x280 [ 23.536100][ T288] ? _raw_spin_unlock_irq+0x4e/0x70 [ 23.541134][ T288] ? __x64_sys_sendmsg+0x90/0x90 [ 23.546084][ T288] ? fpu__clear_all+0x20/0x20 [ 23.550681][ T288] __x64_sys_sendmsg+0x7b/0x90 [ 23.555283][ T288] do_syscall_64+0x31/0x40 [ 23.559534][ T288] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 23.565269][ T288] RIP: 0033:0x7f01eef16ae9 [ 23.569513][ T288] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 23.589047][ T288] RSP: 002b:00007ffe6587cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 23.597295][ T288] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f01eef16ae9 [ 23.605099][ T288] RDX: 0000000000004000 RSI: 0000200000000580 RDI: 0000000000000005 [ 23.612913][ T288] RBP: 0000200000000580 R08: 0000200000000017 R09: 0000000000000000 [ 23.620850][ T288] R10: 0000200000000012 R11: 0000000000000246 R12: 0000000000000000 [ 23.628726][ T288] R13: 0000000000000000 R14: 0000000000000000 R15: 000000000000000a [ 23.636543][ T288] [ 23.638731][ T288] Allocated by task 288: [ 23.642965][ T288] ____kasan_kmalloc+0xdb/0x110 [ 23.647647][ T288] __kasan_kmalloc+0x9/0x10 [ 23.651997][ T288] __kmalloc+0x1aa/0x330 [ 23.656076][ T288] sk_prot_alloc+0xbe/0x370 [ 23.660406][ T288] sk_alloc+0x38/0x4d0 [ 23.664315][ T288] pfkey_create+0x12c/0x620 [ 23.668654][ T288] __sock_create+0x3a6/0x760 [ 23.673166][ T288] __sys_socket+0x132/0x370 [ 23.677541][ T288] __x64_sys_socket+0x7a/0x90 [ 23.682023][ T288] do_syscall_64+0x31/0x40 [ 23.686281][ T288] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 23.691997][ T288] [ 23.694167][ T288] The buggy address belongs to the object at ffff88811c90f800 [ 23.694167][ T288] which belongs to the cache kmalloc-1k of size 1024 [ 23.708066][ T288] The buggy address is located 984 bytes inside of [ 23.708066][ T288] 1024-byte region [ffff88811c90f800, ffff88811c90fc00) [ 23.721269][ T288] The buggy address belongs to the page: [ 23.726739][ T288] page:ffffea0004724200 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11c908 [ 23.737174][ T288] head:ffffea0004724200 order:3 compound_mapcount:0 compound_pincount:0 [ 23.745414][ T288] flags: 0x4000000000010200(slab|head) [ 23.750701][ T288] raw: 4000000000010200 dead000000000100 dead000000000122 ffff888100042f00 [ 23.759119][ T288] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 23.767533][ T288] page dumped because: kasan: bad access detected [ 23.773879][ T288] page_owner tracks the page as allocated [ 23.779519][ T288] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x52a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 288, ts 23092955854, free_ts 23092770525 [ 23.796534][ T288] prep_new_page+0x166/0x180 [ 23.800954][ T288] get_page_from_freelist+0x2d8c/0x2f30 [ 23.806646][ T288] __alloc_pages_nodemask+0x435/0xaf0 [ 23.811836][ T288] new_slab+0x80/0x400 [ 23.815737][ T288] ___slab_alloc+0x302/0x4b0 [ 23.820172][ T288] __slab_alloc+0x63/0xa0 [ 23.824342][ T288] kmem_cache_alloc_trace+0x1bd/0x2e0 [ 23.829554][ T288] xfrm_policy_alloc+0x60/0x250 [ 23.834249][ T288] xfrm_compile_policy+0x805/0xd20 [ 23.839174][ T288] xfrm_user_policy+0x314/0x650 [ 23.843869][ T288] ipv6_setsockopt+0x1129/0x3d10 [ 23.848634][ T288] udpv6_setsockopt+0x8c/0xa0 [ 23.853152][ T288] sock_common_setsockopt+0xa2/0xc0 [ 23.858182][ T288] __sys_setsockopt+0x478/0x7e0 [ 23.862865][ T288] __x64_sys_setsockopt+0xbf/0xd0 [ 23.867742][ T288] do_syscall_64+0x31/0x40 [ 23.871979][ T288] page last free stack trace: [ 23.876501][ T288] __free_pages_ok+0x82c/0x850 [ 23.881092][ T288] free_compound_page+0x73/0x90 [ 23.885780][ T288] __put_compound_page+0x73/0xb0 [ 23.890556][ T288] __put_page+0xc0/0xe0 [ 23.894575][ T288] page_to_skb+0x3f6/0x900 [ 23.898810][ T288] receive_buf+0xe79/0x53d0 [ 23.903138][ T288] virtnet_poll+0x5df/0x1240 [ 23.907564][ T288] net_rx_action+0x516/0x10d0 [ 23.912078][ T288] __do_softirq+0x268/0x5bb [ 23.916419][ T288] [ 23.918584][ T288] Memory state around the buggy address: [ 23.924062][ T288] ffff88811c90fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.932133][ T288] ffff88811c90fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.940026][ T288] >ffff88811c90fb80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 23.948073][ T288] ^ [ 23.955053][ T288] ffff88811c90fc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.962944][ T288] ffff88811c90fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc sendmsg(5, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x40\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xee\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x09\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, MSG_NOSIGNAL) = 184 exit_group(0) = ? +++ exited with 0 +++ [ 23.970843][ T288] ===========================================