./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2211052708 <...> Warning: Permanently added '10.128.0.208' (ED25519) to the list of known hosts. execve("./syz-executor2211052708", ["./syz-executor2211052708"], 0x7ffd1cb11fc0 /* 10 vars */) = 0 brk(NULL) = 0x55558ec2c000 brk(0x55558ec2cd00) = 0x55558ec2cd00 arch_prctl(ARCH_SET_FS, 0x55558ec2c380) = 0 set_tid_address(0x55558ec2c650) = 294 set_robust_list(0x55558ec2c660, 24) = 0 rseq(0x55558ec2cca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2211052708", 4096) = 28 getrandom("\x3d\x44\x00\x12\x34\x29\x39\xae", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55558ec2cd00 brk(0x55558ec4dd00) = 0x55558ec4dd00 brk(0x55558ec4e000) = 0x55558ec4e000 mprotect(0x7fc2d6901000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 write(1, "executing program\n", 18executing program ) = 18 socket(AF_INET6, SOCK_DGRAM, IPPROTO_IP) = 3 setsockopt(3, SOL_IPV6, IPV6_XFRM_POLICY, "\xac\x14\x14\xbb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 232) = 0 socket(AF_KEY, SOCK_RAW, 2) = 4 setsockopt(4, SOL_SOCKET, SO_RCVBUF, [0], 4) = 0 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x0b\x00\x01\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x12\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 5 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 6 sendmsg(6, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 184 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 7 sendmsg(7, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xee\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=MSG_EOR}, 0) = 184 [ 22.267295][ T30] audit: type=1400 audit(1738291681.203:66): avc: denied { execmem } for pid=294 comm="syz-executor221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 22.281574][ T294] ================================================================== [ 22.287204][ T30] audit: type=1400 audit(1738291681.203:67): avc: denied { create } for pid=294 comm="syz-executor221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 22.294490][ T294] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x5b0/0x660 [ 22.314888][ T30] audit: type=1400 audit(1738291681.203:68): avc: denied { setopt } for pid=294 comm="syz-executor221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 22.322970][ T294] Read of size 1 at addr ffff88810cc3cbf8 by task syz-executor221/294 [ 22.322986][ T294] [ 22.322991][ T294] CPU: 1 PID: 294 Comm: syz-executor221 Not tainted 5.15.176-syzkaller-00066-gd1a25a6a4b3b #0 [ 22.342996][ T30] audit: type=1400 audit(1738291681.203:69): avc: denied { write } for pid=294 comm="syz-executor221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 22.350309][ T294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 22.350328][ T294] Call Trace: [ 22.350334][ T294] [ 22.352760][ T30] audit: type=1400 audit(1738291681.203:70): avc: denied { create } for pid=294 comm="syz-executor221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 22.362547][ T294] dump_stack_lvl+0x151/0x1c0 [ 22.362574][ T294] ? io_uring_drop_tctx_refs+0x190/0x190 [ 22.382058][ T30] audit: type=1400 audit(1738291681.203:71): avc: denied { write } for pid=294 comm="syz-executor221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 22.391710][ T294] ? panic+0x760/0x760 [ 22.391729][ T294] print_address_description+0x87/0x3b0 [ 22.395140][ T30] audit: type=1400 audit(1738291681.203:72): avc: denied { nlmsg_write } for pid=294 comm="syz-executor221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 22.397611][ T294] ? stack_trace_save+0x113/0x1c0 [ 22.397632][ T294] ? ___sys_sendmsg+0x252/0x2e0 [ 22.487184][ T294] kasan_report+0x179/0x1c0 [ 22.491521][ T294] ? xfrm_policy_inexact_list_reinsert+0x5b0/0x660 [ 22.497858][ T294] ? xfrm_policy_inexact_list_reinsert+0x5b0/0x660 [ 22.504192][ T294] __asan_report_load1_noabort+0x14/0x20 [ 22.509662][ T294] xfrm_policy_inexact_list_reinsert+0x5b0/0x660 [ 22.515825][ T294] ? ____kasan_kmalloc+0xed/0x110 [ 22.520683][ T294] ? ____kasan_kmalloc+0xdb/0x110 [ 22.525552][ T294] ? xfrm_policy_addr_delta+0x23b/0x370 [ 22.530925][ T294] xfrm_policy_inexact_insert_node+0x917/0xb00 [ 22.536914][ T294] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 22.542817][ T294] ? xfrm_policy_inexact_alloc_bin+0x5ad/0x13f0 [ 22.548892][ T294] xfrm_policy_inexact_alloc_chain+0x4ec/0xaf0 [ 22.554883][ T294] xfrm_policy_inexact_insert+0x6a/0x1160 [ 22.560440][ T294] ? __kasan_check_write+0x14/0x20 [ 22.565385][ T294] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 22.570244][ T294] ? policy_hash_bysel+0x137/0x700 [ 22.575192][ T294] xfrm_policy_insert+0xe7/0x940 [ 22.579965][ T294] xfrm_add_policy+0x4f2/0x980 [ 22.584564][ T294] ? cap_capable+0x1d2/0x270 [ 22.588991][ T294] ? xfrm_dump_sa_done+0xc0/0xc0 [ 22.593772][ T294] xfrm_user_rcv_msg+0x4f3/0x7d0 [ 22.598539][ T294] ? xfrm_netlink_rcv+0x90/0x90 [ 22.603226][ T294] ? avc_has_perm+0x16f/0x260 [ 22.607740][ T294] ? ____kasan_kmalloc+0xed/0x110 [ 22.612597][ T294] ? avc_has_perm_noaudit+0x430/0x430 [ 22.617806][ T294] ? x64_sys_call+0x16a/0x9a0 [ 22.622323][ T294] netlink_rcv_skb+0x1cf/0x410 [ 22.626923][ T294] ? xfrm_netlink_rcv+0x90/0x90 [ 22.631608][ T294] ? netlink_ack+0xb10/0xb10 [ 22.636046][ T294] ? mutex_lock+0xb6/0x1e0 [ 22.640287][ T294] ? wait_for_completion_killable_timeout+0x10/0x10 [ 22.646709][ T294] ? __netlink_lookup+0x37b/0x3a0 [ 22.651569][ T294] xfrm_netlink_rcv+0x72/0x90 [ 22.656085][ T294] netlink_unicast+0x8df/0xac0 [ 22.660684][ T294] ? netlink_detachskb+0x90/0x90 [ 22.665459][ T294] ? security_netlink_send+0x7b/0xa0 [ 22.670578][ T294] netlink_sendmsg+0xa0a/0xd20 [ 22.675180][ T294] ? netlink_getsockopt+0x560/0x560 [ 22.680209][ T294] ? security_socket_sendmsg+0x82/0xb0 [ 22.685507][ T294] ? netlink_getsockopt+0x560/0x560 [ 22.690538][ T294] ____sys_sendmsg+0x59e/0x8f0 [ 22.695143][ T294] ? __sys_sendmsg_sock+0x40/0x40 [ 22.700000][ T294] ? import_iovec+0xe5/0x120 [ 22.704426][ T294] ___sys_sendmsg+0x252/0x2e0 [ 22.708938][ T294] ? __sys_sendmsg+0x260/0x260 [ 22.713544][ T294] ? cgroup_leave_frozen+0x164/0x2c0 [ 22.718659][ T294] ? __kasan_check_read+0x11/0x20 [ 22.723519][ T294] ? __fdget+0x179/0x240 [ 22.727598][ T294] __se_sys_sendmsg+0x19a/0x260 [ 22.732285][ T294] ? __x64_sys_sendmsg+0x90/0x90 [ 22.737067][ T294] ? ptrace_notify+0x24c/0x350 [ 22.741663][ T294] ? __kasan_check_write+0x14/0x20 [ 22.746608][ T294] __x64_sys_sendmsg+0x7b/0x90 [ 22.751206][ T294] x64_sys_call+0x16a/0x9a0 [ 22.755552][ T294] do_syscall_64+0x3b/0xb0 [ 22.759800][ T294] ? clear_bhb_loop+0x35/0x90 [ 22.764312][ T294] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 22.770053][ T294] RIP: 0033:0x7fc2d688dbe9 [ 22.774297][ T294] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 22.793917][ T294] RSP: 002b:00007ffebe18c0e8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 22.802153][ T294] RAX: ffffffffffffffda RBX: 00007ffebe18c2b8 RCX: 00007fc2d688dbe9 [ 22.809964][ T294] RDX: 0000000000004000 RSI: 0000000020000580 RDI: 0000000000000005 [ 22.817775][ T294] RBP: 00007fc2d6901610 R08: 00007ffebe18c2b8 R09: 00007ffebe18c2b8 [ 22.825591][ T294] R10: 000000000000000a R11: 0000000000000246 R12: 0000000000000001 [ 22.833398][ T294] R13: 00007ffebe18c2a8 R14: 0000000000000001 R15: 0000000000000001 [ 22.841216][ T294] [ 22.844074][ T294] [ 22.846249][ T294] Allocated by task 294: [ 22.850324][ T294] ____kasan_kmalloc+0xdb/0x110 [ 22.855013][ T294] __kasan_kmalloc+0x9/0x10 [ 22.859349][ T294] __kmalloc+0x13f/0x2c0 [ 22.863428][ T294] sk_prot_alloc+0xf9/0x330 [ 22.867772][ T294] sk_alloc+0x38/0x430 [ 22.871675][ T294] pfkey_create+0x12c/0x620 [ 22.876033][ T294] __sock_create+0x3be/0x7e0 [ 22.880440][ T294] __sys_socket+0x132/0x370 [ 22.884780][ T294] __x64_sys_socket+0x7a/0x90 [ 22.889295][ T294] x64_sys_call+0x147/0x9a0 [ 22.893635][ T294] do_syscall_64+0x3b/0xb0 [ 22.897886][ T294] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 22.903615][ T294] [ 22.905786][ T294] The buggy address belongs to the object at ffff88810cc3c800 [ 22.905786][ T294] which belongs to the cache kmalloc-1k of size 1024 [ 22.919671][ T294] The buggy address is located 1016 bytes inside of [ 22.919671][ T294] 1024-byte region [ffff88810cc3c800, ffff88810cc3cc00) [ 22.932952][ T294] The buggy address belongs to the page: [ 22.938432][ T294] page:ffffea0004330e00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10cc38 [ 22.948487][ T294] head:ffffea0004330e00 order:3 compound_mapcount:0 compound_pincount:0 [ 22.956649][ T294] flags: 0x4000000000010200(slab|head|zone=1) [ 22.962553][ T294] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888100043080 [ 22.970973][ T294] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 22.979389][ T294] page dumped because: kasan: bad access detected [ 22.985646][ T294] page_owner tracks the page as allocated [ 22.991190][ T294] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 289, ts 22266998997, free_ts 17927860872 [ 23.010026][ T294] post_alloc_hook+0x1a3/0x1b0 [ 23.014624][ T294] prep_new_page+0x1b/0x110 [ 23.018962][ T294] get_page_from_freelist+0x3550/0x35d0 [ 23.024345][ T294] __alloc_pages+0x27e/0x8f0 [ 23.028770][ T294] new_slab+0x9a/0x4e0 [ 23.032676][ T294] ___slab_alloc+0x39e/0x830 [ 23.037102][ T294] __slab_alloc+0x4a/0x90 [ 23.041270][ T294] __kmalloc_track_caller+0x171/0x2c0 [ 23.046480][ T294] __alloc_skb+0x10c/0x550 [ 23.050730][ T294] sk_stream_alloc_skb+0x1f8/0xad0 [ 23.055679][ T294] tcp_sendmsg_locked+0xd34/0x3a90 [ 23.060626][ T294] tcp_sendmsg+0x2f/0x50 [ 23.064706][ T294] inet_sendmsg+0xa1/0xc0 [ 23.068868][ T294] sock_write_iter+0x39b/0x530 [ 23.073471][ T294] vfs_write+0xd5d/0x1110 [ 23.077637][ T294] ksys_write+0x199/0x2c0 [ 23.081803][ T294] page last free stack trace: [ 23.086315][ T294] free_unref_page_prepare+0x7c8/0x7d0 [ 23.091611][ T294] free_unref_page+0xe8/0x750 [ 23.096125][ T294] __free_pages+0x61/0xf0 [ 23.100298][ T294] __free_slab+0xec/0x1d0 [ 23.104456][ T294] __unfreeze_partials+0x165/0x1a0 [ 23.109403][ T294] put_cpu_partial+0xc4/0x120 [ 23.113914][ T294] __slab_free+0x1c8/0x290 [ 23.118167][ T294] ___cache_free+0x109/0x120 [ 23.122593][ T294] qlink_free+0x4d/0x90 [ 23.126588][ T294] qlist_free_all+0x44/0xb0 [ 23.130927][ T294] kasan_quarantine_reduce+0x15a/0x180 [ 23.136245][ T294] __kasan_slab_alloc+0x2f/0xe0 [ 23.140908][ T294] slab_post_alloc_hook+0x53/0x2c0 [ 23.145855][ T294] kmem_cache_alloc+0xf5/0x250 [ 23.150453][ T294] getname_flags+0xba/0x520 [ 23.154796][ T294] user_path_at_empty+0x2d/0x1a0 [ 23.159568][ T294] [ 23.161735][ T294] Memory state around the buggy address: [ 23.167208][ T294] ffff88810cc3ca80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.175107][ T294] ffff88810cc3cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.183003][ T294] >ffff88810cc3cb80: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 23.190902][ T294] ^ [ 23.198714][ T294] ffff88810cc3cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.206610][ T294] ffff88810cc3cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc sendmsg(5, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x40\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xee\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x09\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, MSG_NOSIGNAL) = 184 exit_group(0) = ? +++ exited with 0 +++ [ 23.214510][ T294] ================================================================