./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor4110592789 <...> Warning: Permanently added '10.128.0.202' (ED25519) to the list of known hosts. execve("./syz-executor4110592789", ["./syz-executor4110592789"], 0x7ffcda924e40 /* 10 vars */) = 0 brk(NULL) = 0x55559517e000 brk(0x55559517ed00) = 0x55559517ed00 arch_prctl(ARCH_SET_FS, 0x55559517e380) = 0 set_tid_address(0x55559517e650) = 282 set_robust_list(0x55559517e660, 24) = 0 rseq(0x55559517eca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor4110592789", 4096) = 28 getrandom("\x3f\xcb\x37\x43\x3c\x7d\x73\xfd", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55559517ed00 brk(0x55559519fd00) = 0x55559519fd00 brk(0x5555951a0000) = 0x5555951a0000 mprotect(0x7fece596c000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18executing program ) = 18 socket(AF_INET6, SOCK_DGRAM, IPPROTO_IP) = 3 setsockopt(3, SOL_IPV6, IPV6_XFRM_POLICY, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 232) = 0 socket(AF_KEY, SOCK_RAW, 2) = 4 setsockopt(4, SOL_SOCKET, SO_RCVBUF, [0], 4) = 0 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x0b\x00\x01\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x12\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 5 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 6 sendmsg(6, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 184 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 7 sendmsg(7, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=MSG_EOR}, MSG_NOSIGNAL) = 184 [ 23.843853][ T24] audit: type=1400 audit(1754535693.460:64): avc: denied { execmem } for pid=282 comm="syz-executor411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.864459][ T24] audit: type=1400 audit(1754535693.480:65): avc: denied { create } for pid=282 comm="syz-executor411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 23.867644][ T282] ================================================================== [ 23.885183][ T24] audit: type=1400 audit(1754535693.480:66): avc: denied { setopt } for pid=282 comm="syz-executor411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 23.892290][ T282] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 23.892301][ T282] Read of size 1 at addr ffff888120586bd8 by task syz-executor411/282 [ 23.892303][ T282] [ 23.892321][ T282] CPU: 0 PID: 282 Comm: syz-executor411 Not tainted 5.10.240-syzkaller-00225-g1154f779f3f3 #0 [ 23.892328][ T282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 23.892336][ T282] Call Trace: [ 23.892351][ T282] __dump_stack+0x21/0x24 [ 23.892371][ T282] dump_stack_lvl+0x169/0x1d8 [ 23.912388][ T24] audit: type=1400 audit(1754535693.480:67): avc: denied { write } for pid=282 comm="syz-executor411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 23.921221][ T282] ? show_regs_print_info+0x18/0x18 [ 23.921245][ T282] ? thaw_kernel_threads+0x220/0x220 [ 23.929395][ T24] audit: type=1400 audit(1754535693.480:68): avc: denied { create } for pid=282 comm="syz-executor411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 23.931714][ T282] ? unwind_get_return_address+0x4d/0x90 [ 23.931726][ T282] print_address_description+0x7f/0x2c0 [ 23.931741][ T282] ? xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 23.931752][ T282] kasan_report+0xe2/0x130 [ 23.931765][ T282] ? xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 23.931786][ T282] __asan_report_load1_noabort+0x14/0x20 [ 23.943237][ T24] audit: type=1400 audit(1754535693.480:69): avc: denied { write } for pid=282 comm="syz-executor411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 23.952214][ T282] xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 23.952230][ T282] xfrm_policy_inexact_insert_node+0x938/0xb50 [ 23.952251][ T282] ? xfrm_netlink_rcv+0x72/0x90 [ 23.955850][ T24] audit: type=1400 audit(1754535693.480:70): avc: denied { nlmsg_write } for pid=282 comm="syz-executor411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 23.959878][ T282] ? netlink_unicast+0x876/0xa40 [ 24.111955][ T282] ? netlink_sendmsg+0x88d/0xb30 [ 24.116879][ T282] ? ____sys_sendmsg+0x5a2/0x8c0 [ 24.121802][ T282] ? ___sys_sendmsg+0x1f0/0x260 [ 24.126640][ T282] ? do_syscall_64+0x31/0x40 [ 24.131308][ T282] xfrm_policy_inexact_alloc_chain+0x53a/0xb30 [ 24.137453][ T282] xfrm_policy_inexact_insert+0x70/0x1130 [ 24.143174][ T282] ? __get_hash_thresh+0x10c/0x420 [ 24.148298][ T282] ? policy_hash_bysel+0x110/0x4f0 [ 24.153414][ T282] xfrm_policy_insert+0x126/0x9a0 [ 24.158444][ T282] ? xfrm_policy_construct+0x54f/0x1f00 [ 24.163984][ T282] xfrm_add_policy+0x4d1/0x830 [ 24.169289][ T282] ? xfrm_dump_sa_done+0xc0/0xc0 [ 24.174230][ T282] xfrm_user_rcv_msg+0x450/0x6d0 [ 24.179178][ T282] ? xfrm_netlink_rcv+0x90/0x90 [ 24.184031][ T282] ? selinux_nlmsg_lookup+0x219/0x4a0 [ 24.189398][ T282] netlink_rcv_skb+0x1e0/0x430 [ 24.194153][ T282] ? xfrm_netlink_rcv+0x90/0x90 [ 24.198996][ T282] ? netlink_ack+0xb80/0xb80 [ 24.203598][ T282] ? mutex_trylock+0xa0/0xa0 [ 24.208179][ T282] ? __netlink_lookup+0x387/0x3b0 [ 24.213198][ T282] xfrm_netlink_rcv+0x72/0x90 [ 24.217869][ T282] netlink_unicast+0x876/0xa40 [ 24.222746][ T282] netlink_sendmsg+0x88d/0xb30 [ 24.227506][ T282] ? netlink_getsockopt+0x530/0x530 [ 24.232708][ T282] ? copy_fpregs_to_fpstate+0x14a/0x1b0 [ 24.238249][ T282] ? security_socket_sendmsg+0x82/0xa0 [ 24.243701][ T282] ? netlink_getsockopt+0x530/0x530 [ 24.248900][ T282] ____sys_sendmsg+0x5a2/0x8c0 [ 24.253747][ T282] ? __sys_sendmsg_sock+0x40/0x40 [ 24.258771][ T282] ? import_iovec+0x7c/0xb0 [ 24.263268][ T282] ___sys_sendmsg+0x1f0/0x260 [ 24.267935][ T282] ? __switch_to_asm+0x34/0x60 [ 24.272692][ T282] ? __sys_sendmsg+0x250/0x250 [ 24.277458][ T282] ? __kasan_check_read+0x11/0x20 [ 24.282475][ T282] ? __fdget+0x15b/0x230 [ 24.286726][ T282] __x64_sys_sendmsg+0x1e2/0x2a0 [ 24.291676][ T282] ? do_notify_parent+0x7e0/0x7e0 [ 24.296705][ T282] ? ___sys_sendmsg+0x260/0x260 [ 24.301681][ T282] ? syscall_trace_enter+0x4b/0x170 [ 24.306978][ T282] do_syscall_64+0x31/0x40 [ 24.311397][ T282] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 24.317290][ T282] RIP: 0033:0x7fece58f9869 [ 24.321800][ T282] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 24.341556][ T282] RSP: 002b:00007ffd291e8ae8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 24.349968][ T282] RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007fece58f9869 [ 24.357940][ T282] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 0000000000000005 [ 24.365908][ T282] RBP: 0000200000000180 R08: 0000000000000000 R09: 0000000000000000 [ 24.373870][ T282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000200000000580 [ 24.381836][ T282] R13: 0000200000000590 R14: 0000000000000001 R15: 0000200000000588 [ 24.389939][ T282] [ 24.392278][ T282] Allocated by task 282: [ 24.396543][ T282] __kasan_kmalloc+0xda/0x110 [ 24.401222][ T282] __kmalloc+0x1a7/0x330 [ 24.405462][ T282] sk_prot_alloc+0xb2/0x340 [ 24.409959][ T282] sk_alloc+0x38/0x4e0 [ 24.414158][ T282] pfkey_create+0x12a/0x660 [ 24.418709][ T282] __sock_create+0x38d/0x770 [ 24.423322][ T282] __sys_socket+0xec/0x190 [ 24.427748][ T282] __x64_sys_socket+0x7a/0x90 [ 24.432476][ T282] do_syscall_64+0x31/0x40 [ 24.436891][ T282] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 24.442882][ T282] [ 24.445217][ T282] The buggy address belongs to the object at ffff888120586800 [ 24.445217][ T282] which belongs to the cache kmalloc-1k of size 1024 [ 24.459276][ T282] The buggy address is located 984 bytes inside of [ 24.459276][ T282] 1024-byte region [ffff888120586800, ffff888120586c00) [ 24.472639][ T282] The buggy address belongs to the page: [ 24.478297][ T282] page:ffffea0004816000 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x120580 [ 24.488555][ T282] head:ffffea0004816000 order:3 compound_mapcount:0 compound_pincount:0 [ 24.496897][ T282] flags: 0x4000000000010200(slab|head) [ 24.502354][ T282] raw: 4000000000010200 dead000000000100 dead000000000122 ffff888100042f00 [ 24.510934][ T282] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 24.519504][ T282] page dumped because: kasan: bad access detected [ 24.526002][ T282] page_owner tracks the page as allocated [ 24.531725][ T282] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x52a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 282, ts 23862675946, free_ts 23842922849 [ 24.548732][ T282] prep_new_page+0x179/0x180 [ 24.553320][ T282] get_page_from_freelist+0x2235/0x23d0 [ 24.558862][ T282] __alloc_pages_nodemask+0x268/0x5f0 [ 24.564235][ T282] new_slab+0x84/0x3f0 [ 24.568313][ T282] ___slab_alloc+0x2a6/0x450 [ 24.572910][ T282] __slab_alloc+0x63/0xa0 [ 24.577264][ T282] kmem_cache_alloc_trace+0x1b3/0x2e0 [ 24.582731][ T282] xfrm_policy_alloc+0x61/0x250 [ 24.587765][ T282] xfrm_compile_policy+0x74e/0xc70 [ 24.592959][ T282] xfrm_user_policy+0x29f/0x510 [ 24.597800][ T282] ipv6_setsockopt+0x1088/0x3860 [ 24.602844][ T282] udpv6_setsockopt+0x92/0xb0 [ 24.607536][ T282] sock_common_setsockopt+0xa0/0xb0 [ 24.612759][ T282] __sys_setsockopt+0x2ed/0x460 [ 24.617614][ T282] __x64_sys_setsockopt+0xbf/0xd0 [ 24.622635][ T282] do_syscall_64+0x31/0x40 [ 24.627046][ T282] page last free stack trace: [ 24.631722][ T282] __free_pages_ok+0x7fc/0x820 [ 24.636481][ T282] free_compound_page+0x73/0x90 [ 24.641351][ T282] __put_compound_page+0x77/0xb0 [ 24.646493][ T282] __put_page+0xbd/0xe0 [ 24.650678][ T282] page_to_skb+0x3bf/0x8b0 [ 24.655123][ T282] receive_buf+0xba1/0x4590 [ 24.659628][ T282] virtnet_poll+0x4f2/0xef0 [ 24.664130][ T282] net_rx_action+0x432/0xdd0 [ 24.668740][ T282] __do_softirq+0x255/0x563 [ 24.673240][ T282] [ 24.675567][ T282] Memory state around the buggy address: [ 24.681195][ T282] ffff888120586a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.689255][ T282] ffff888120586b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sendmsg(5, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x20\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x40\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 184 exit_group(0) = ? +++ exited with 0 +++ [ 2