./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1934154825 <...> Warning: Permanently added '10.128.0.253' (ED25519) to the list of known hosts. execve("./syz-executor1934154825", ["./syz-executor1934154825"], 0x7ffc2619daa0 /* 10 vars */) = 0 brk(NULL) = 0x55558e752000 brk(0x55558e752d00) = 0x55558e752d00 arch_prctl(ARCH_SET_FS, 0x55558e752380) = 0 set_tid_address(0x55558e752650) = 287 set_robust_list(0x55558e752660, 24) = 0 rseq(0x55558e752ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1934154825", 4096) = 28 getrandom("\x72\x60\x4f\x93\x4f\xdb\x79\x3f", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55558e752d00 brk(0x55558e773d00) = 0x55558e773d00 brk(0x55558e774000) = 0x55558e774000 mprotect(0x7f47b7ac5000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 write(1, "executing program\n", 18executing program ) = 18 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 3 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 4 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 184 socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM) = 5 sendmsg(5, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x60\x30\x00\x00\x00\x00\x00\x00\x00\x00\x01\xee\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=MSG_EOR}, 0) = 184 socket(AF_INET6, SOCK_DGRAM, IPPROTO_IP) = 6 setsockopt(6, SOL_IPV6, IPV6_XFRM_POLICY, "\x7f\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 232) = 0 socket(AF_INET6, SOCK_DGRAM, IPPROTO_IP) = 7 setsockopt(7, SOL_IPV6, IPV6_XFRM_POLICY, "\x7f\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 232) = 0 sendmsg(-1, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x12\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = -1 EBADF (Bad file descriptor) socket(AF_KEY, SOCK_RAW, 2) = 8 setsockopt(8, SOL_SOCKET, SO_RCVBUF, [0], 4) = 0 sendmsg(8, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x02\x12\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=16}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16 [ 20.879906][ T24] audit: type=1400 audit(1737927990.710:66): avc: denied { execmem } for pid=287 comm="syz-executor193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.883951][ T24] audit: type=1400 audit(1737927990.710:67): avc: denied { create } for pid=287 comm="syz-executor193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 20.886049][ T287] ================================================================== [ 20.887605][ T24] audit: type=1400 audit(1737927990.710:68): avc: denied { write } for pid=287 comm="syz-executor193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 20.888905][ T287] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x5b0/0x660 [ 20.892502][ T24] audit: type=1400 audit(1737927990.710:69): avc: denied { nlmsg_write } for pid=287 comm="syz-executor193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 20.893958][ T287] Read of size 1 at addr ffff88811ce0dbd8 by task syz-executor193/287 [ 20.896917][ T24] audit: type=1400 audit(1737927990.720:70): avc: denied { create } for pid=287 comm="syz-executor193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 20.898055][ T287] [ 20.908889][ T24] audit: type=1400 audit(1737927990.720:71): avc: denied { setopt } for pid=287 comm="syz-executor193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 20.910727][ T287] CPU: 1 PID: 287 Comm: syz-executor193 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 20.910732][ T287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 20.910745][ T287] Call Trace: [ 20.910761][ T287] dump_stack_lvl+0x1e2/0x24b [ 20.910775][ T287] ? printk+0xd1/0x111 [ 20.930524][ T24] audit: type=1400 audit(1737927990.720:72): avc: denied { write } for pid=287 comm="syz-executor193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 20.940157][ T287] ? bfq_pos_tree_add_move+0x43b/0x43b [ 20.940168][ T287] ? wake_up_klogd+0xb8/0xf0 [ 20.940175][ T287] ? panic+0x812/0x812 [ 20.940194][ T287] print_address_description+0x81/0x3b0 [ 20.999876][ T287] ? stack_trace_save+0x113/0x1c0 [ 21.004731][ T287] kasan_report+0x179/0x1c0 [ 21.009166][ T287] ? xfrm_policy_inexact_list_reinsert+0x5b0/0x660 [ 21.015585][ T287] ? xfrm_policy_inexact_list_reinsert+0x5b0/0x660 [ 21.021916][ T287] __asan_report_load1_noabort+0x14/0x20 [ 21.027403][ T287] xfrm_policy_inexact_list_reinsert+0x5b0/0x660 [ 21.033623][ T287] ? ____kasan_kmalloc+0xed/0x110 [ 21.038482][ T287] ? ____kasan_kmalloc+0xdb/0x110 [ 21.043354][ T287] xfrm_policy_inexact_insert_node+0x917/0xb00 [ 21.049329][ T287] ? xfrm_policy_inexact_alloc_bin+0x5ad/0x13f0 [ 21.055416][ T287] xfrm_policy_inexact_alloc_chain+0x4ec/0xaf0 [ 21.061403][ T287] xfrm_policy_inexact_insert+0x6a/0x1160 [ 21.067050][ T287] ? __kasan_check_write+0x14/0x20 [ 21.071993][ T287] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 21.076857][ T287] ? policy_hash_bysel+0x137/0x700 [ 21.081789][ T287] xfrm_policy_insert+0xe7/0x940 [ 21.086628][ T287] xfrm_add_policy+0x4f2/0x980 [ 21.091190][ T287] ? cap_capable+0x1ce/0x270 [ 21.095593][ T287] ? xfrm_dump_sa_done+0xc0/0xc0 [ 21.100375][ T287] xfrm_user_rcv_msg+0x4e7/0x7c0 [ 21.105141][ T287] ? xfrm_netlink_rcv+0x90/0x90 [ 21.109833][ T287] ? stack_trace_save+0x113/0x1c0 [ 21.114698][ T287] ? avc_has_perm_noaudit+0x240/0x240 [ 21.119894][ T287] ? iov_iter_advance+0x258/0xb20 [ 21.124750][ T287] netlink_rcv_skb+0x1cf/0x410 [ 21.129355][ T287] ? xfrm_netlink_rcv+0x90/0x90 [ 21.134171][ T287] ? netlink_ack+0xb30/0xb30 [ 21.138595][ T287] ? mutex_trylock+0xa0/0xa0 [ 21.143006][ T287] ? __netlink_lookup+0x37b/0x3a0 [ 21.147899][ T287] xfrm_netlink_rcv+0x72/0x90 [ 21.152388][ T287] netlink_unicast+0x8df/0xac0 [ 21.156981][ T287] ? netlink_detachskb+0x90/0x90 [ 21.161756][ T287] ? security_netlink_send+0x7b/0xa0 [ 21.166901][ T287] netlink_sendmsg+0xa46/0xd00 [ 21.171473][ T287] ? netlink_getsockopt+0x5c0/0x5c0 [ 21.176508][ T287] ? security_socket_sendmsg+0x82/0xb0 [ 21.181815][ T287] ? netlink_getsockopt+0x5c0/0x5c0 [ 21.186935][ T287] ____sys_sendmsg+0x59e/0x8f0 [ 21.191542][ T287] ? __sys_sendmsg_sock+0x40/0x40 [ 21.196402][ T287] ? import_iovec+0xe5/0x120 [ 21.200914][ T287] ___sys_sendmsg+0x252/0x2e0 [ 21.205426][ T287] ? __sys_sendmsg+0x280/0x280 [ 21.210026][ T287] ? finish_task_switch+0x130/0x5a0 [ 21.215061][ T287] ? __schedule+0xbee/0x1330 [ 21.219495][ T287] ? __kasan_check_write+0x14/0x20 [ 21.224430][ T287] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 21.229992][ T287] ? __kasan_check_read+0x11/0x20 [ 21.235456][ T287] ? __fdget+0x179/0x240 [ 21.239544][ T287] __se_sys_sendmsg+0x1b1/0x280 [ 21.244222][ T287] ? _raw_spin_unlock_irq+0x4e/0x70 [ 21.249257][ T287] ? __x64_sys_sendmsg+0x90/0x90 [ 21.254033][ T287] ? fpu__clear_all+0x20/0x20 [ 21.258541][ T287] __x64_sys_sendmsg+0x7b/0x90 [ 21.263143][ T287] do_syscall_64+0x34/0x70 [ 21.267393][ T287] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 21.273122][ T287] RIP: 0033:0x7f47b7a51e29 [ 21.277465][ T287] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 21.296903][ T287] RSP: 002b:00007ffd09ba7498 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 21.305147][ T287] RAX: ffffffffffffffda RBX: 00007ffd09ba7668 RCX: 00007f47b7a51e29 [ 21.313099][ T287] RDX: 0000000000000000 RSI: 0000000020000580 RDI: 0000000000000003 [ 21.320970][ T287] RBP: 00007f47b7ac5610 R08: 000000000000000a R09: 00007ffd09ba7668 [ 21.328888][ T287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 21.336691][ T287] R13: 00007ffd09ba7658 R14: 0000000000000001 R15: 0000000000000001 [ 21.344509][ T287] [ 21.346659][ T287] Allocated by task 287: [ 21.350748][ T287] ____kasan_kmalloc+0xdb/0x110 [ 21.355426][ T287] __kasan_kmalloc+0x9/0x10 [ 21.359784][ T287] __kmalloc+0x1aa/0x330 [ 21.363848][ T287] sk_prot_alloc+0xbe/0x370 [ 21.368187][ T287] sk_alloc+0x38/0x4d0 [ 21.372095][ T287] pfkey_create+0x12c/0x620 [ 21.376445][ T287] __sock_create+0x3a6/0x760 [ 21.380861][ T287] __sys_socket+0x132/0x370 [ 21.385232][ T287] __x64_sys_socket+0x7a/0x90 [ 21.389734][ T287] do_syscall_64+0x34/0x70 [ 21.393968][ T287] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 21.399733][ T287] [ 21.401865][ T287] The buggy address belongs to the object at ffff88811ce0d800 [ 21.401865][ T287] which belongs to the cache kmalloc-1k of size 1024 [ 21.415837][ T287] The buggy address is located 984 bytes inside of [ 21.415837][ T287] 1024-byte region [ffff88811ce0d800, ffff88811ce0dc00) [ 21.429031][ T287] The buggy address belongs to the page: [ 21.434548][ T287] page:ffffea0004738200 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11ce08 [ 21.444566][ T287] head:ffffea0004738200 order:3 compound_mapcount:0 compound_pincount:0 [ 21.452737][ T287] flags: 0x4000000000010200(slab|head) [ 21.458018][ T287] raw: 4000000000010200 dead000000000100 dead000000000122 ffff888100042f00 [ 21.466436][ T287] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 21.474850][ T287] page dumped because: kasan: bad access detected [ 21.481108][ T287] page_owner tracks the page as allocated [ 21.486668][ T287] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 281, ts 20884197848, free_ts 20877317649 [ 21.505502][ T287] prep_new_page+0x166/0x180 [ 21.509917][ T287] get_page_from_freelist+0x2d8c/0x2f30 [ 21.515298][ T287] __alloc_pages_nodemask+0x435/0xaf0 [ 21.520511][ T287] new_slab+0x80/0x400 [ 21.524505][ T287] ___slab_alloc+0x302/0x4b0 [ 21.528944][ T287] __slab_alloc+0x63/0xa0 [ 21.533109][ T287] __kmalloc_track_caller+0x1f8/0x320 [ 21.538435][ T287] __alloc_skb+0xbc/0x510 [ 21.542599][ T287] sk_stream_alloc_skb+0x1f8/0xae0 [ 21.547538][ T287] tcp_sendmsg_locked+0xce3/0x3ae0 [ 21.552487][ T287] tcp_sendmsg+0x2f/0x50 [ 21.556564][ T287] inet_sendmsg+0xa1/0xc0 [ 21.560736][ T287] sock_write_iter+0x39b/0x530 [ 21.565328][ T287] vfs_write+0xb4c/0xe70 [ 21.569408][ T287] ksys_write+0x199/0x2c0 [ 21.573576][ T287] __x64_sys_write+0x7b/0x90 [ 21.578176][ T287] page last free stack trace: [ 21.582687][ T287] __free_pages_ok+0x82c/0x850 [ 21.587460][ T287] free_compound_page+0x73/0x90 [ 21.592319][ T287] __put_compound_page+0x73/0xb0 [ 21.597092][ T287] __put_page+0xc0/0xe0 [ 21.601080][ T287] page_to_skb+0x3f6/0x900 [ 21.605337][ T287] receive_buf+0xe79/0x53d0 [ 21.609676][ T287] virtnet_poll+0x5df/0x1240 [ 21.614275][ T287] net_rx_action+0x516/0x10d0 [ 21.618793][ T287] __do_softirq+0x268/0x5bb [ 21.623124][ T287] [ 21.625295][ T287] Memory state around the buggy address: [ 21.630773][ T287] ffff88811ce0da80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.638850][ T287] ffff88811ce0db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.646745][ T287] >ffff88811ce0db80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.654639][ T287] ^ [ 21.661423][ T287] ffff88811ce0dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.669465][ T287] ffff88811ce0dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc sendmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xb8\x00\x00\x00\x13\x00\xe9\x99\x00\x00\x00\x00\x00\x00\x00\x00\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0a\x00\x40\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xee\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=184}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 184 exit_group(0) = ? +++ exited with 0 +++ [ 21.677351][ T287] =================================================