./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor4033256337 <...> Warning: Permanently added '10.128.1.220' (ED25519) to the list of known hosts. execve("./syz-executor4033256337", ["./syz-executor4033256337"], 0x7fffb24af860 /* 10 vars */) = 0 brk(NULL) = 0x555561834000 brk(0x555561834d00) = 0x555561834d00 arch_prctl(ARCH_SET_FS, 0x555561834380) = 0 set_tid_address(0x555561834650) = 289 set_robust_list(0x555561834660, 24) = 0 rseq(0x555561834ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor4033256337", 4096) = 28 getrandom("\x09\xcd\x96\x9a\x3f\x58\xa9\x6f", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555561834d00 brk(0x555561855d00) = 0x555561855d00 brk(0x555561856000) = 0x555561856000 mprotect(0x7f8316733000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18executing program ) = 18 socket(AF_INET6, SOCK_DGRAM, IPPROTO_IP) = 3 setsockopt(3, SOL_IPV6, IPV6_XFRM_POLICY, "\xac\x14\x14\xbb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 232) = 0 socket(AF_KEY, SOCK_RAW, 2) = 4 setsockopt(4, SOL_SOCKET, SO_RCVBUF, [0], 4) = 0 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x0b\x00\x01\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x12\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 5 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 6 sendmsg(6, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 184 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 7 sendmsg(7, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xee\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=MSG_EOR}, 0) = 184 [ 25.469601][ T30] audit: type=1400 audit(1754861533.530:64): avc: denied { execmem } for pid=289 comm="syz-executor403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 25.477455][ T289] ================================================================== [ 25.489025][ T30] audit: type=1400 audit(1754861533.530:65): avc: denied { create } for pid=289 comm="syz-executor403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 25.497035][ T289] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 25.516580][ T30] audit: type=1400 audit(1754861533.530:66): avc: denied { setopt } for pid=289 comm="syz-executor403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 25.525727][ T289] Read of size 1 at addr ffff8881202c1bf8 by task syz-executor403/289 [ 25.525743][ T289] [ 25.545296][ T30] audit: type=1400 audit(1754861533.530:67): avc: denied { write } for pid=289 comm="syz-executor403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 25.553397][ T289] CPU: 1 PID: 289 Comm: syz-executor403 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 25.555729][ T30] audit: type=1400 audit(1754861533.530:68): avc: denied { create } for pid=289 comm="syz-executor403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 25.575139][ T289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 25.575158][ T289] Call Trace: [ 25.575163][ T289] [ 25.585673][ T30] audit: type=1400 audit(1754861533.530:69): avc: denied { write } for pid=289 comm="syz-executor403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 25.605937][ T289] __dump_stack+0x21/0x30 [ 25.605963][ T289] dump_stack_lvl+0xee/0x150 [ 25.605980][ T289] ? show_regs_print_info+0x20/0x20 [ 25.616575][ T30] audit: type=1400 audit(1754861533.530:70): avc: denied { nlmsg_write } for pid=289 comm="syz-executor403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 25.619287][ T289] ? load_image+0x3a0/0x3a0 [ 25.619308][ T289] ? unwind_get_return_address+0x4d/0x90 [ 25.687301][ T289] print_address_description+0x7f/0x2c0 [ 25.692833][ T289] ? xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 25.699324][ T289] kasan_report+0xf1/0x140 [ 25.703729][ T289] ? xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 25.710227][ T289] __asan_report_load1_noabort+0x14/0x20 [ 25.715850][ T289] xfrm_policy_inexact_list_reinsert+0x620/0x6d0 [ 25.722164][ T289] xfrm_policy_inexact_insert_node+0x938/0xb50 [ 25.728308][ T289] ? xfrm_netlink_rcv+0x72/0x90 [ 25.733144][ T289] ? netlink_unicast+0x876/0xa40 [ 25.738069][ T289] ? netlink_sendmsg+0x86a/0xb70 [ 25.742993][ T289] ? ____sys_sendmsg+0x5a2/0x8c0 [ 25.747919][ T289] ? ___sys_sendmsg+0x1f0/0x260 [ 25.752768][ T289] ? x64_sys_call+0x4b/0x9a0 [ 25.757346][ T289] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 25.763422][ T289] xfrm_policy_inexact_alloc_chain+0x53a/0xb30 [ 25.769564][ T289] xfrm_policy_inexact_insert+0x70/0x1130 [ 25.775283][ T289] ? __get_hash_thresh+0x10c/0x420 [ 25.780379][ T289] ? policy_hash_bysel+0x110/0x4f0 [ 25.785480][ T289] xfrm_policy_insert+0x126/0x9a0 [ 25.790495][ T289] ? xfrm_policy_construct+0x54f/0x1f00 [ 25.796033][ T289] xfrm_add_policy+0x4d1/0x830 [ 25.800785][ T289] ? xfrm_dump_sa_done+0xc0/0xc0 [ 25.805713][ T289] xfrm_user_rcv_msg+0x45c/0x6e0 [ 25.810645][ T289] ? xfrm_netlink_rcv+0x90/0x90 [ 25.815490][ T289] ? avc_has_perm_noaudit+0x460/0x460 [ 25.820849][ T289] ? x64_sys_call+0x4b/0x9a0 [ 25.825427][ T289] ? selinux_nlmsg_lookup+0x237/0x4c0 [ 25.830792][ T289] netlink_rcv_skb+0x1e0/0x430 [ 25.835548][ T289] ? xfrm_netlink_rcv+0x90/0x90 [ 25.840389][ T289] ? netlink_ack+0xb60/0xb60 [ 25.844999][ T289] ? wait_for_completion_killable_timeout+0x10/0x10 [ 25.851583][ T289] ? __netlink_lookup+0x387/0x3b0 [ 25.856623][ T289] xfrm_netlink_rcv+0x72/0x90 [ 25.861290][ T289] netlink_unicast+0x876/0xa40 [ 25.866044][ T289] netlink_sendmsg+0x86a/0xb70 [ 25.870807][ T289] ? netlink_getsockopt+0x530/0x530 [ 25.875997][ T289] ? __update_load_avg_cfs_rq+0xaf/0x2f0 [ 25.881633][ T289] ? security_socket_sendmsg+0x82/0xa0 [ 25.887082][ T289] ? netlink_getsockopt+0x530/0x530 [ 25.892267][ T289] ____sys_sendmsg+0x5a2/0x8c0 [ 25.897030][ T289] ? __sys_sendmsg_sock+0x40/0x40 [ 25.902045][ T289] ? import_iovec+0x7c/0xb0 [ 25.906540][ T289] ___sys_sendmsg+0x1f0/0x260 [ 25.911225][ T289] ? _raw_spin_unlock+0x4d/0x70 [ 25.916067][ T289] ? __sys_sendmsg+0x250/0x250 [ 25.920820][ T289] ? __schedule+0xb76/0x14c0 [ 25.925428][ T289] ? _raw_spin_lock_irqsave+0x110/0x110 [ 25.930974][ T289] ? cgroup_update_frozen+0x15c/0x970 [ 25.936338][ T289] ? ptrace_stop+0x6f4/0xa80 [ 25.940922][ T289] ? __kasan_check_read+0x11/0x20 [ 25.945954][ T289] ? __fdget+0x15b/0x230 [ 25.950208][ T289] __x64_sys_sendmsg+0x1e2/0x2a0 [ 25.955134][ T289] ? ___sys_sendmsg+0x260/0x260 [ 25.959975][ T289] ? __kasan_check_write+0x14/0x20 [ 25.965109][ T289] ? switch_fpu_return+0x15d/0x2c0 [ 25.970211][ T289] x64_sys_call+0x4b/0x9a0 [ 25.974615][ T289] do_syscall_64+0x4c/0xa0 [ 25.979020][ T289] ? clear_bhb_loop+0x50/0xa0 [ 25.983719][ T289] ? clear_bhb_loop+0x50/0xa0 [ 25.988393][ T289] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 25.994273][ T289] RIP: 0033:0x7f83166bfae9 [ 25.998677][ T289] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 26.018273][ T289] RSP: 002b:00007ffd70ff5ed8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 26.026676][ T289] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f83166bfae9 [ 26.034635][ T289] RDX: 0000000000004000 RSI: 0000200000000580 RDI: 0000000000000005 [ 26.042593][ T289] RBP: 0000200000000580 R08: 0000200000000017 R09: 0000000000000000 [ 26.050564][ T289] R10: 0000200000000012 R11: 0000000000000246 R12: 0000000000000000 [ 26.058531][ T289] R13: 0000000000000000 R14: 0000000000000000 R15: 000000000000000a [ 26.066503][ T289] [ 26.069834][ T289] [ 26.072145][ T289] Allocated by task 289: [ 26.076393][ T289] __kasan_kmalloc+0xda/0x110 [ 26.081056][ T289] __kmalloc+0x13d/0x2c0 [ 26.085288][ T289] sk_prot_alloc+0xed/0x320 [ 26.089775][ T289] sk_alloc+0x38/0x430 [ 26.093840][ T289] pfkey_create+0x12a/0x660 [ 26.098329][ T289] __sock_create+0x38d/0x7a0 [ 26.102908][ T289] __sys_socket+0xec/0x190 [ 26.107310][ T289] __x64_sys_socket+0x7a/0x90 [ 26.112015][ T289] x64_sys_call+0x8c5/0x9a0 [ 26.116506][ T289] do_syscall_64+0x4c/0xa0 [ 26.120908][ T289] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 26.126801][ T289] [ 26.129112][ T289] The buggy address belongs to the object at ffff8881202c1800 [ 26.129112][ T289] which belongs to the cache kmalloc-1k of size 1024 [ 26.143152][ T289] The buggy address is located 1016 bytes inside of [ 26.143152][ T289] 1024-byte region [ffff8881202c1800, ffff8881202c1c00) [ 26.156584][ T289] The buggy address belongs to the page: [ 26.162215][ T289] page:ffffea000480b000 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1202c0 [ 26.172456][ T289] head:ffffea000480b000 order:3 compound_mapcount:0 compound_pincount:0 [ 26.180775][ T289] flags: 0x4000000000010200(slab|head|zone=1) [ 26.186840][ T289] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888100043080 [ 26.195413][ T289] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 26.203978][ T289] page dumped because: kasan: bad access detected [ 26.210377][ T289] page_owner tracks the page as allocated [ 26.216088][ T289] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x52a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 289, ts 25471762114, free_ts 25468714264 [ 26.233023][ T289] post_alloc_hook+0x192/0x1b0 [ 26.237791][ T289] prep_new_page+0x1c/0x110 [ 26.242281][ T289] get_page_from_freelist+0x2cc5/0x2d50 [ 26.247818][ T289] __alloc_pages+0x18f/0x440 [ 26.252411][ T289] new_slab+0xa1/0x4d0 [ 26.256498][ T289] ___slab_alloc+0x381/0x810 [ 26.261079][ T289] __slab_alloc+0x49/0x90 [ 26.265396][ T289] kmem_cache_alloc_trace+0x146/0x270 [ 26.270753][ T289] xfrm_policy_alloc+0x79/0x280 [ 26.275593][ T289] xfrm_compile_policy+0x74e/0xc70 [ 26.280692][ T289] xfrm_user_policy+0x29f/0x510 [ 26.285538][ T289] ipv6_setsockopt+0x10bc/0x38a0 [ 26.290465][ T289] udpv6_setsockopt+0x92/0xb0 [ 26.295129][ T289] sock_common_setsockopt+0xa0/0xb0 [ 26.300313][ T289] __sys_setsockopt+0x2f0/0x460 [ 26.305152][ T289] __x64_sys_setsockopt+0xbf/0xd0 [ 26.310168][ T289] page last free stack trace: [ 26.314823][ T289] free_unref_page_prepare+0x542/0x550 [ 26.320281][ T289] free_unref_page+0xa2/0x550 [ 26.324962][ T289] free_compound_page+0x78/0xa0 [ 26.329800][ T289] __put_compound_page+0x77/0xb0 [ 26.334725][ T289] __put_page+0xbc/0xe0 [ 26.338866][ T289] page_to_skb+0x7b9/0xb60 [ 26.343266][ T289] receive_buf+0xc64/0x4ad0 [ 26.347783][ T289] virtnet_poll+0x545/0xef0 [ 26.352274][ T289] __napi_poll+0xbe/0x590 [ 26.356591][ T289] net_rx_action+0x371/0x8e0 [ 26.361170][ T289] handle_softirqs+0x250/0x560 [ 26.365944][ T289] __do_softirq+0xb/0xd [ 26.370091][ T289] [ 26.372398][ T289] Memory state around the buggy address: [ 26.378013][ T289] ffff8881202c1a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.386057][ T289] ffff8881202c1b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.394102][ T289] >ffff8881202c1b80: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 26.402147][ T289] ^ [ 26.410140][ T289] ffff8881202c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc sendmsg(5, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x40\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xee\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x09\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, MSG_NOSIGNAL) = 184 exit_group(0) = ? +++ exited with 0 +++ [ 26.418187][ T289] ffff8881202c1c80: fc fc fc fc fc fc fc fc