./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3576272401 <...> Warning: Permanently added '10.128.1.92' (ED25519) to the list of known hosts. execve("./syz-executor3576272401", ["./syz-executor3576272401"], 0x7fff70273f30 /* 10 vars */) = 0 brk(NULL) = 0x55556c23c000 brk(0x55556c23cd00) = 0x55556c23cd00 arch_prctl(ARCH_SET_FS, 0x55556c23c380) = 0 set_tid_address(0x55556c23c650) = 363 set_robust_list(0x55556c23c660, 24) = 0 rseq(0x55556c23cca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor3576272401", 4096) = 28 getrandom("\xb5\xd6\x6f\x74\x39\xbe\x96\xa4", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55556c23cd00 brk(0x55556c25dd00) = 0x55556c25dd00 brk(0x55556c25e000) = 0x55556c25e000 mprotect(0x7f7eacae7000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18executing program ) = 18 socket(AF_INET6, SOCK_DGRAM, IPPROTO_IP) = 3 setsockopt(3, SOL_IPV6, IPV6_XFRM_POLICY, "\xac\x14\x14\xbb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 232) = 0 socket(AF_KEY, SOCK_RAW, 2) = 4 setsockopt(4, SOL_SOCKET, SO_RCVBUF, [0], 4) = 0 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x0b\x00\x01\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x12\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 5 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 6 sendmsg(6, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 184 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 7 sendmsg(7, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xee\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=MSG_EOR}, 0) = 184 [ 28.673754][ T23] audit: type=1400 audit(1738792281.230:66): avc: denied { execmem } for pid=363 comm="syz-executor357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 28.679274][ T23] audit: type=1400 audit(1738792281.240:67): avc: denied { create } for pid=363 comm="syz-executor357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 28.682252][ T23] audit: type=1400 audit(1738792281.240:68): avc: denied { setopt } for pid=363 comm="syz-executor357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 28.685285][ T23] audit: type=1400 audit(1738792281.240:69): avc: denied { write } for pid=363 comm="syz-executor357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 28.688947][ T23] audit: type=1400 audit(1738792281.250:70): avc: denied { create } for pid=363 comm="syz-executor357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 28.692385][ T23] audit: type=1400 audit(1738792281.250:71): avc: denied { write } for pid=363 comm="syz-executor357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 28.694120][ T363] ================================================================== [ 28.704184][ T23] audit: type=1400 audit(1738792281.250:72): avc: denied { nlmsg_write } for pid=363 comm="syz-executor357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 28.711949][ T363] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 28.711957][ T363] Read of size 1 at addr ffff8881eee5bbd8 by task syz-executor357/363 [ 28.711964][ T363] [ 28.751690][ T363] CPU: 0 PID: 363 Comm: syz-executor357 Not tainted 5.4.289-syzkaller-00030-gcb850525fc3e #0 [ 28.761660][ T363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 28.771554][ T363] Call Trace: [ 28.774686][ T363] dump_stack+0x1d8/0x241 [ 28.778851][ T363] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 28.784496][ T363] ? printk+0xd1/0x111 [ 28.788399][ T363] ? xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 28.794735][ T363] ? wake_up_klogd+0xb2/0xf0 [ 28.799158][ T363] ? xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 28.805494][ T363] print_address_description+0x8c/0x600 [ 28.810876][ T363] ? panic+0x89d/0x89d [ 28.814782][ T363] ? xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 28.821116][ T363] __kasan_report+0xf3/0x120 [ 28.825544][ T363] ? xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 28.831881][ T363] kasan_report+0x30/0x60 [ 28.836046][ T363] xfrm_policy_inexact_list_reinsert+0x599/0x650 [ 28.842211][ T363] ? xfrm_policy_addr_delta+0x234/0x340 [ 28.847588][ T363] xfrm_policy_inexact_insert_node+0x8f3/0xb00 [ 28.853581][ T363] ? xfrm_policy_inexact_alloc_bin+0x5b2/0x1440 [ 28.859655][ T363] xfrm_policy_inexact_alloc_chain+0x4f9/0xb10 [ 28.865645][ T363] xfrm_policy_inexact_insert+0x69/0x10e0 [ 28.871200][ T363] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 28.876055][ T363] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 28.881091][ T363] ? policy_hash_bysel+0x12c/0x6f0 [ 28.886037][ T363] ? memcpy+0x38/0x50 [ 28.889856][ T363] xfrm_policy_insert+0xe1/0x8a0 [ 28.894634][ T363] xfrm_add_policy+0x4f2/0x980 [ 28.899230][ T363] ? __nla_validate+0x50/0x50 [ 28.903742][ T363] ? xfrm_dump_sa_done+0xc0/0xc0 [ 28.908515][ T363] ? __nla_parse+0x3a/0x50 [ 28.912768][ T363] xfrm_user_rcv_msg+0x689/0x9b0 [ 28.917543][ T363] ? xfrm_netlink_rcv+0x80/0x80 [ 28.922235][ T363] ? avc_has_perm+0xd2/0x260 [ 28.926655][ T363] ? avc_has_perm+0x16f/0x260 [ 28.931182][ T363] ? avc_has_perm_noaudit+0x3d0/0x3d0 [ 28.936378][ T363] netlink_rcv_skb+0x1d5/0x420 [ 28.940999][ T363] ? xfrm_netlink_rcv+0x80/0x80 [ 28.945661][ T363] ? nla_put_string+0x30/0x30 [ 28.950177][ T363] ? mutex_trylock+0xa0/0xa0 [ 28.954602][ T363] ? __netlink_lookup+0x369/0x390 [ 28.959466][ T363] xfrm_netlink_rcv+0x6e/0x80 [ 28.963981][ T363] netlink_unicast+0x936/0xb20 [ 28.968577][ T363] ? netlink_detachskb+0x90/0x90 [ 28.973351][ T363] ? __virt_addr_valid+0x20e/0x2a0 [ 28.978299][ T363] netlink_sendmsg+0xa18/0xcf0 [ 28.982899][ T363] ? netlink_getsockopt+0x550/0x550 [ 28.987930][ T363] ? import_iovec+0x1bb/0x380 [ 28.992447][ T363] ? security_socket_sendmsg+0x7d/0xa0 [ 28.997765][ T363] ? netlink_getsockopt+0x550/0x550 [ 29.002775][ T363] ____sys_sendmsg+0x5ac/0x8f0 [ 29.007375][ T363] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 29.012417][ T363] __sys_sendmsg+0x28b/0x380 [ 29.016833][ T363] ? ____sys_sendmsg+0x8f0/0x8f0 [ 29.021609][ T363] ? ptrace_notify+0x24c/0x350 [ 29.026214][ T363] do_syscall_64+0xca/0x1c0 [ 29.030547][ T363] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 29.036289][ T363] RIP: 0033:0x7f7eaca73ae9 [ 29.040526][ T363] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 29.059967][ T363] RSP: 002b:00007ffe0d424388 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 29.068213][ T363] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7eaca73ae9 [ 29.076022][ T363] RDX: 0000000000004000 RSI: 0000200000000580 RDI: 0000000000000005 [ 29.083833][ T363] RBP: 0000200000000580 R08: 0000200000000017 R09: 0000000000000000 [ 29.091643][ T363] R10: 0000200000000012 R11: 0000000000000246 R12: 0000000000000000 [ 29.099455][ T363] R13: 0000000000000000 R14: 0000000000000000 R15: 000000000000000a [ 29.107266][ T363] [ 29.109434][ T363] Allocated by task 363: [ 29.113518][ T363] __kasan_kmalloc+0x171/0x210 [ 29.118117][ T363] sk_prot_alloc+0xbd/0x3e0 [ 29.122454][ T363] sk_alloc+0x35/0x2f0 [ 29.126362][ T363] pfkey_create+0x122/0x670 [ 29.130702][ T363] __sock_create+0x3cb/0x7a0 [ 29.135129][ T363] __sys_socket+0x132/0x370 [ 29.139469][ T363] __x64_sys_socket+0x76/0x80 [ 29.143979][ T363] do_syscall_64+0xca/0x1c0 [ 29.148319][ T363] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 29.154045][ T363] [ 29.156216][ T363] Freed by task 10: [ 29.159863][ T363] __kasan_slab_free+0x1b5/0x270 [ 29.164638][ T363] kfree+0x123/0x370 [ 29.168370][ T363] blk_stat_free_callback_rcu+0x5d/0x70 [ 29.173750][ T363] rcu_do_batch+0x492/0xa00 [ 29.178088][ T363] rcu_core+0x4c8/0xcb0 [ 29.182083][ T363] __do_softirq+0x23b/0x6b7 [ 29.186418][ T363] [ 29.188589][ T363] The buggy address belongs to the object at ffff8881eee5b800 [ 29.188589][ T363] which belongs to the cache kmalloc-1k of size 1024 [ 29.202478][ T363] The buggy address is located 984 bytes inside of [ 29.202478][ T363] 1024-byte region [ffff8881eee5b800, ffff8881eee5bc00) [ 29.215665][ T363] The buggy address belongs to the page: [ 29.221149][ T363] page:ffffea0007bb9600 refcount:1 mapcount:0 mapping:ffff8881f5c02280 index:0x0 compound_mapcount: 0 [ 29.231898][ T363] flags: 0x8000000000010200(slab|head) [ 29.237198][ T363] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881f5c02280 [ 29.245614][ T363] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 29.254027][ T363] page dumped because: kasan: bad access detected [ 29.260283][ T363] page_owner tracks the page as allocated [ 29.265835][ T363] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2000(__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC) [ 29.279116][ T363] prep_new_page+0x18f/0x370 [ 29.283543][ T363] get_page_from_freelist+0x2d13/0x2d90 [ 29.288926][ T363] __alloc_pages_nodemask+0x393/0x840 [ 29.294129][ T363] alloc_slab_page+0x39/0x3c0 [ 29.298647][ T363] new_slab+0x97/0x440 [ 29.302547][ T363] ___slab_alloc+0x2fe/0x490 [ 29.306974][ T363] __slab_alloc+0x62/0xa0 [ 29.311140][ T363] __kmalloc+0x19b/0x2e0 [ 29.315219][ T363] blk_mq_realloc_hw_ctxs+0x303/0x13b0 [ 29.320514][ T363] blk_mq_init_allocated_queue+0x52d/0x1990 [ 29.326244][ T363] blk_mq_init_queue+0x49/0xa0 [ 29.330844][ T363] scsi_mq_alloc_queue+0x40/0x110 [ 29.335702][ T363] scsi_alloc_sdev+0x654/0x960 [ 29.340304][ T363] scsi_probe_and_add_lun+0x1aa/0x4010 [ 29.345598][ T363] __scsi_scan_target+0x1fb/0xe80 [ 29.350459][ T363] scsi_scan_host_selected+0x349/0x620 [ 29.355746][ T363] page_owner free stack trace missing [ 29.360955][ T363] [ 29.363125][ T363] Memory state around the buggy address: [ 29.368598][ T363] ffff8881eee5ba80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.376495][ T363] ffff8881eee5bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.384392][ T363] >ffff8881eee5bb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.392287][ T363] ^ [ 29.399058][ T363] ffff8881eee5bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.406957][ T363] ffff8881eee5bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.414852][ T363] ================================================================== sendmsg(5, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x40\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xee\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x09\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, MSG_NOSIGNAL) = 184 exit_group(0) = ? +++ exited with 0 +++ [ 29.422751][ T363] Disabling lock debugging due to