Warning: Permanently added '10.128.0.109' (ED25519) to the list of known hosts. 2026/04/03 08:43:54 parsed 1 programs [ 54.922854][ T30] audit: type=1400 audit(1775205834.204:62): avc: denied { node_bind } for pid=5801 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 56.894926][ T30] audit: type=1400 audit(1775205836.174:63): avc: denied { mounton } for pid=5809 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 56.918587][ T30] audit: type=1400 audit(1775205836.194:64): avc: denied { mount } for pid=5809 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 56.921167][ T5809] cgroup: Unknown subsys name 'net' [ 56.947664][ T30] audit: type=1400 audit(1775205836.224:65): avc: denied { unmount } for pid=5809 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 57.114240][ T5809] cgroup: Unknown subsys name 'cpuset' [ 57.122493][ T5809] cgroup: Unknown subsys name 'rlimit' [ 57.282690][ T30] audit: type=1400 audit(1775205836.564:66): avc: denied { setattr } for pid=5809 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 57.306141][ T30] audit: type=1400 audit(1775205836.564:67): avc: denied { create } for pid=5809 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 57.354861][ T30] audit: type=1400 audit(1775205836.564:68): avc: denied { write } for pid=5809 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 57.375910][ T30] audit: type=1400 audit(1775205836.564:69): avc: denied { read } for pid=5809 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 57.396297][ T30] audit: type=1400 audit(1775205836.584:70): avc: denied { mounton } for pid=5809 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 57.421141][ T30] audit: type=1400 audit(1775205836.584:71): avc: denied { mount } for pid=5809 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 57.448118][ T5811] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 58.362948][ T5809] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 59.972820][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 59.972836][ T30] audit: type=1400 audit(1775205839.254:77): avc: denied { read } for pid=5818 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 60.000505][ T30] audit: type=1400 audit(1775205839.254:78): avc: denied { open } for pid=5818 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 60.024118][ T30] audit: type=1400 audit(1775205839.254:79): avc: denied { mounton } for pid=5818 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 60.045528][ T30] audit: type=1400 audit(1775205839.304:80): avc: denied { mounton } for pid=5818 comm="syz-executor" path="/root/syzkaller.DQRDJD/syz-tmp" dev="sda1" ino=2030 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 60.070267][ T30] audit: type=1400 audit(1775205839.304:81): avc: denied { mount } for pid=5818 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 60.092672][ T30] audit: type=1400 audit(1775205839.304:82): avc: denied { mounton } for pid=5818 comm="syz-executor" path="/root/syzkaller.DQRDJD/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 60.118049][ T30] audit: type=1400 audit(1775205839.304:83): avc: denied { mount } for pid=5818 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 60.140029][ T30] audit: type=1400 audit(1775205839.304:84): avc: denied { mounton } for pid=5818 comm="syz-executor" path="/root/syzkaller.DQRDJD/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 60.166776][ T30] audit: type=1400 audit(1775205839.304:85): avc: denied { mounton } for pid=5818 comm="syz-executor" path="/root/syzkaller.DQRDJD/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4581 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 60.170941][ T5818] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 60.194372][ T30] audit: type=1400 audit(1775205839.304:86): avc: denied { unmount } for pid=5818 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 60.633780][ T5828] chnl_net:caif_netlink_parms(): no params data found [ 60.694145][ T5828] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.701820][ T5828] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.708906][ T5828] bridge_slave_0: entered allmulticast mode [ 60.716069][ T5828] bridge_slave_0: entered promiscuous mode [ 60.724018][ T5828] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.731091][ T5828] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.738463][ T5828] bridge_slave_1: entered allmulticast mode [ 60.745242][ T5828] bridge_slave_1: entered promiscuous mode [ 60.767740][ T5828] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.778435][ T5828] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.800129][ T5828] team0: Port device team_slave_0 added [ 60.807295][ T5828] team0: Port device team_slave_1 added [ 60.824222][ T5828] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 60.831170][ T5828] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 60.857153][ T5828] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 60.869284][ T5828] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 60.876268][ T5828] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 60.902144][ T5828] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 60.933576][ T5828] hsr_slave_0: entered promiscuous mode [ 60.939892][ T5828] hsr_slave_1: entered promiscuous mode [ 61.039632][ T5828] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 61.049879][ T5828] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 61.058861][ T5828] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 61.067905][ T5828] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 61.090771][ T5828] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.097928][ T5828] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.105599][ T5828] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.112669][ T5828] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.148973][ T5828] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.166798][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.174758][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.185942][ T5828] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.197891][ T3536] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.204995][ T3536] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.216784][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.223909][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.338670][ T5828] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.370164][ T5828] veth0_vlan: entered promiscuous mode [ 61.380830][ T5828] veth1_vlan: entered promiscuous mode [ 61.402335][ T5828] veth0_macvtap: entered promiscuous mode [ 61.410648][ T5828] veth1_macvtap: entered promiscuous mode [ 61.425041][ T5828] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 61.438575][ T5828] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 61.450815][ T3536] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.460975][ T3536] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.472533][ T3536] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.482214][ T3536] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.577715][ T3536] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 61.655620][ T3536] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 61.740543][ T3536] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 61.801110][ T3536] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 62.255519][ T48] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 62.267336][ T48] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 62.293624][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 62.302344][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 62.528272][ T5880] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 62.537048][ T5880] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 62.545016][ T5880] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 62.553601][ T5880] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 62.560942][ T5880] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 2026/04/03 08:44:02 executed programs: 0 [ 63.591663][ T5880] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 63.599293][ T5880] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 63.607045][ T5880] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 63.616566][ T5880] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 63.624457][ T5880] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 63.717641][ T5912] chnl_net:caif_netlink_parms(): no params data found [ 63.767276][ T5912] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.774497][ T5912] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.781975][ T5912] bridge_slave_0: entered allmulticast mode [ 63.788613][ T5912] bridge_slave_0: entered promiscuous mode [ 63.797447][ T5912] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.805352][ T5912] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.817301][ T5912] bridge_slave_1: entered allmulticast mode [ 63.824210][ T5912] bridge_slave_1: entered promiscuous mode [ 63.844263][ T5912] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.854955][ T5912] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.884116][ T5912] team0: Port device team_slave_0 added [ 63.891053][ T5912] team0: Port device team_slave_1 added [ 63.909383][ T5912] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 63.916388][ T5912] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 63.942524][ T5912] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 63.954253][ T5912] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 63.961183][ T5912] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 63.987323][ T5912] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 64.018208][ T5912] hsr_slave_0: entered promiscuous mode [ 64.024274][ T5912] hsr_slave_1: entered promiscuous mode [ 64.030118][ T5912] debugfs: 'hsr0' already exists in 'hsr' [ 64.035923][ T5912] Cannot create hsr debugfs directory [ 64.157577][ T3536] bridge_slave_1: left allmulticast mode [ 64.164797][ T3536] bridge_slave_1: left promiscuous mode [ 64.170985][ T3536] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.181290][ T3536] bridge_slave_0: left allmulticast mode [ 64.187049][ T3536] bridge_slave_0: left promiscuous mode [ 64.192992][ T3536] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.315148][ T3536] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 64.325415][ T3536] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 64.335006][ T3536] bond0 (unregistering): Released all slaves [ 64.427720][ T3536] hsr_slave_0: left promiscuous mode [ 64.437510][ T3536] hsr_slave_1: left promiscuous mode [ 64.446830][ T3536] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 64.458063][ T3536] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 64.469316][ T3536] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 64.476809][ T3536] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 64.491108][ T3536] veth1_macvtap: left promiscuous mode [ 64.496796][ T3536] veth0_macvtap: left promiscuous mode [ 64.502526][ T3536] veth1_vlan: left promiscuous mode [ 64.507825][ T3536] veth0_vlan: left promiscuous mode [ 64.708247][ T3536] team0 (unregistering): Port device team_slave_1 removed [ 64.726756][ T3536] team0 (unregistering): Port device team_slave_0 removed [ 65.050584][ T5912] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 65.064702][ T5912] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 65.083227][ T5912] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 65.096035][ T5912] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 65.190820][ T5912] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.207610][ T5912] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.225211][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.232356][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.245523][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.252689][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.644890][ T5880] Bluetooth: hci0: command tx timeout [ 65.885668][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 65.897315][ T1295] ieee802154 phy1 wpan1: encryption failed: -22 [ 66.059007][ T5912] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.140569][ T5912] veth0_vlan: entered promiscuous mode [ 66.154492][ T5912] veth1_vlan: entered promiscuous mode [ 66.180703][ T5912] veth0_macvtap: entered promiscuous mode [ 66.189039][ T5912] veth1_macvtap: entered promiscuous mode [ 66.206037][ T5912] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 66.247225][ T5912] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 66.260885][ T48] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.270825][ T48] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.280610][ T48] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.294344][ T48] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.359008][ T63] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 66.378995][ T63] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 66.408151][ T147] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 66.416278][ T147] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 66.463304][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 66.463319][ T30] audit: type=1400 audit(1775205845.744:105): avc: denied { create } for pid=5992 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 66.489133][ T30] audit: type=1400 audit(1775205845.744:106): avc: denied { bind } for pid=5992 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 66.509477][ T30] audit: type=1400 audit(1775205845.744:107): avc: denied { setopt } for pid=5992 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 66.531223][ T5993] ================================================================== [ 66.531444][ T30] audit: type=1400 audit(1775205845.744:108): avc: denied { accept } for pid=5992 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 66.539296][ T5993] BUG: KASAN: slab-out-of-bounds in af_alg_pull_tsgl+0x8fb/0xa80 [ 66.558751][ T30] audit: type=1400 audit(1775205845.744:109): avc: denied { read } for pid=5992 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 66.566050][ T5993] Read of size 8 at addr ffff8880763420e0 by task syz.0.17/5993 [ 66.566066][ T5993] [ 66.566075][ T5993] CPU: 1 UID: 0 PID: 5993 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full) [ 66.566094][ T5993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 66.566103][ T5993] Call Trace: [ 66.566108][ T5993] [ 66.566114][ T5993] dump_stack_lvl+0x100/0x190 [ 66.566140][ T5993] print_report+0x156/0x4c9 [ 66.566160][ T5993] ? __virt_addr_valid+0x81/0x620 [ 66.566181][ T5993] ? __phys_addr+0xe8/0x180 [ 66.566201][ T5993] ? af_alg_pull_tsgl+0x8fb/0xa80 [ 66.566222][ T5993] kasan_report+0xdf/0x1e0 [ 66.566237][ T5993] ? af_alg_pull_tsgl+0x8fb/0xa80 [ 66.566259][ T5993] af_alg_pull_tsgl+0x8fb/0xa80 [ 66.566283][ T5993] skcipher_recvmsg+0x512/0x1020 [ 66.566300][ T5993] ? __pfx_skcipher_recvmsg+0x10/0x10 [ 66.566315][ T5993] ? __pfx_skcipher_recvmsg+0x10/0x10 [ 66.566330][ T5993] sock_recvmsg+0x1a4/0x1f0 [ 66.566344][ T5993] ____sys_recvmsg+0x218/0x640 [ 66.566360][ T5993] ? __pfx_____sys_recvmsg+0x10/0x10 [ 66.566377][ T5993] ? __lock_acquire+0x4a5/0x2630 [ 66.566393][ T5993] ___sys_recvmsg+0x16a/0x1a0 [ 66.566408][ T5993] ? __pfx____sys_recvmsg+0x10/0x10 [ 66.566430][ T5993] __sys_recvmsg+0x16d/0x220 [ 66.566450][ T5993] ? __pfx___sys_recvmsg+0x10/0x10 [ 66.566469][ T5993] ? __x64_sys_futex+0x34f/0x4d0 [ 66.566489][ T5993] do_syscall_64+0x106/0xf80 [ 66.566512][ T5993] ? clear_bhb_loop+0x40/0x90 [ 66.566528][ T5993] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 66.566543][ T5993] RIP: 0033:0x7f2e3ef9c819 [ 66.566555][ T5993] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 66.566568][ T5993] RSP: 002b:00007f2e3fe39028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 66.566583][ T5993] RAX: ffffffffffffffda RBX: 00007f2e3f215fa0 RCX: 00007f2e3ef9c819 [ 66.566593][ T5993] RDX: 000000000000001c RSI: 0000200000000480 RDI: 0000000000000004 [ 66.566601][ T5993] RBP: 00007f2e3f032c91 R08: 0000000000000000 R09: 0000000000000000 [ 66.566610][ T5993] R10: 0000000040002022 R11: 0000000000000246 R12: 0000000000000000 [ 66.566619][ T5993] R13: 00007f2e3f216038 R14: 00007f2e3f215fa0 R15: 00007ffd38493c78 [ 66.566632][ T5993] [ 66.566637][ T5993] [ 66.587185][ T30] audit: type=1400 audit(1775205845.804:110): avc: denied { write } for pid=5992 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 66.592566][ T5993] Allocated by task 5993: [ 66.592576][ T5993] kasan_save_stack+0x30/0x50 [ 66.592601][ T5993] kasan_save_track+0x14/0x30 [ 66.592621][ T5993] __kasan_kmalloc+0xaa/0xb0 [ 66.592641][ T5993] __kmalloc_noprof+0x301/0x850 [ 66.592668][ T5993] sock_kmalloc+0x111/0x170 [ 66.592682][ T5993] skcipher_recvmsg+0x48b/0x1020 [ 66.592697][ T5993] sock_recvmsg+0x1a4/0x1f0 [ 66.592710][ T5993] ____sys_recvmsg+0x218/0x640 [ 66.592723][ T5993] ___sys_recvmsg+0x16a/0x1a0 [ 66.592736][ T5993] __sys_recvmsg+0x16d/0x220 [ 66.879507][ T5993] do_syscall_64+0x106/0xf80 [ 66.884088][ T5993] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 66.889958][ T5993] [ 66.892260][ T5993] The buggy address belongs to the object at ffff8880763420c0 [ 66.892260][ T5993] which belongs to the cache kmalloc-32 of size 32 [ 66.906114][ T5993] The buggy address is located 0 bytes to the right of [ 66.906114][ T5993] allocated 32-byte region [ffff8880763420c0, ffff8880763420e0) [ 66.920494][ T5993] [ 66.922797][ T5993] The buggy address belongs to the physical page: [ 66.929186][ T5993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x76342 [ 66.937921][ T5993] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 66.945005][ T5993] page_type: f5(slab) [ 66.948968][ T5993] raw: 00fff00000000000 ffff88813fe40780 dead000000000100 dead000000000122 [ 66.957530][ T5993] raw: 0000000000000000 0000000800400040 00000000f5000000 0000000000000000 [ 66.966089][ T5993] page dumped because: kasan: bad access detected [ 66.972486][ T5993] page_owner tracks the page as allocated [ 66.978174][ T5993] page last allocated via order 0, migratetype Unmovable, gfp_mask 0xd2800(GFP_NOWAIT|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5645, tgid 5645 (dhcpcd), ts 41947478103, free_ts 41863272395 [ 66.997260][ T5993] post_alloc_hook+0x153/0x170 [ 67.002021][ T5993] get_page_from_freelist+0x111d/0x3140 [ 67.007551][ T5993] __alloc_frozen_pages_noprof+0x27c/0x2ba0 [ 67.013426][ T5993] new_slab+0xa6/0x6b0 [ 67.017478][ T5993] refill_objects+0x26b/0x400 [ 67.022136][ T5993] __pcs_replace_empty_main+0x1ab/0x660 [ 67.027675][ T5993] __kmalloc_cache_noprof+0x493/0x6f0 [ 67.033067][ T5993] kmem_cache_free+0x41f/0x6a0 [ 67.037838][ T5993] __put_anon_vma+0x114/0x3a0 [ 67.042506][ T5993] unlink_anon_vmas+0x5f3/0x8e0 [ 67.047344][ T5993] free_pgtables+0x2e7/0xd80 [ 67.051936][ T5993] exit_mmap+0x44c/0xa30 [ 67.056160][ T5993] __mmput+0x12a/0x410 [ 67.060211][ T5993] mmput+0x67/0x80 [ 67.063912][ T5993] do_exit+0x819/0x2b60 [ 67.068051][ T5993] do_group_exit+0xd5/0x2a0 [ 67.072541][ T5993] page last free pid 23 tgid 23 stack trace: [ 67.078496][ T5993] __free_frozen_pages+0x7e1/0x10d0 [ 67.083673][ T5993] tlb_remove_table_rcu+0x2cf/0x380 [ 67.088859][ T5993] rcu_core+0x5a2/0x10d0 [ 67.093098][ T5993] handle_softirqs+0x1eb/0x9e0 [ 67.097857][ T5993] run_ksoftirqd+0x38/0x60 [ 67.102267][ T5993] smpboot_thread_fn+0x3d3/0xaa0 [ 67.107194][ T5993] kthread+0x370/0x450 [ 67.111251][ T5993] ret_from_fork+0x754/0xd80 [ 67.115820][ T5993] ret_from_fork_asm+0x1a/0x30 [ 67.120572][ T5993] [ 67.122873][ T5993] Memory state around the buggy address: [ 67.128480][ T5993] ffff888076341f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 67.136519][ T5993] ffff888076342000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 67.144558][ T5993] >ffff888076342080: fa fb fb fb fc fc fc fc 00 00 00 00 fc fc fc fc [ 67.152593][ T5993] ^ [ 67.159763][ T5993] ffff888076342100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 67.167799][ T5993] ffff888076342180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 67.175834][ T5993] ================================================================== [ 67.192323][ T30] audit: type=1400 audit(1775205846.474:111): avc: denied { read } for pid=5162 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 67.211850][ T5993] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 67.211870][ T5993] CPU: 1 UID: 0 PID: 5993 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full) [ 67.211889][ T5993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 67.211898][ T5993] Call Trace: [ 67.211903][ T5993] [ 67.211909][ T5993] dump_stack_lvl+0x100/0x190 [ 67.211938][ T5993] vpanic+0x552/0x970 [ 67.211952][ T5993] ? __pfx_vpanic+0x10/0x10 [ 67.211968][ T5993] ? af_alg_pull_tsgl+0x8fb/0xa80 [ 67.211990][ T5993] panic+0xd1/0xe0 [ 67.212003][ T5993] ? __pfx_panic+0x10/0x10 [ 67.212018][ T5993] ? af_alg_pull_tsgl+0x8fb/0xa80 [ 67.212038][ T5993] ? preempt_schedule_common+0x42/0xc0 [ 67.212061][ T5993] ? check_panic_on_warn+0x1f/0x90 [ 67.212076][ T5993] check_panic_on_warn.cold+0x19/0x34 [ 67.212092][ T5993] end_report.part.0+0x3a/0x90 [ 67.212112][ T5993] kasan_report.cold+0xe/0x18 [ 67.212132][ T5993] ? af_alg_pull_tsgl+0x8fb/0xa80 [ 67.212154][ T5993] af_alg_pull_tsgl+0x8fb/0xa80 [ 67.212179][ T5993] skcipher_recvmsg+0x512/0x1020 [ 67.212197][ T5993] ? __pfx_skcipher_recvmsg+0x10/0x10 [ 67.212212][ T5993] ? __pfx_skcipher_recvmsg+0x10/0x10 [ 67.212227][ T5993] sock_recvmsg+0x1a4/0x1f0 [ 67.212242][ T5993] ____sys_recvmsg+0x218/0x640 [ 67.212258][ T5993] ? __pfx_____sys_recvmsg+0x10/0x10 [ 67.212276][ T5993] ? __lock_acquire+0x4a5/0x2630 [ 67.212292][ T5993] ___sys_recvmsg+0x16a/0x1a0 [ 67.212307][ T5993] ? __pfx____sys_recvmsg+0x10/0x10 [ 67.212329][ T5993] __sys_recvmsg+0x16d/0x220 [ 67.212349][ T5993] ? __pfx___sys_recvmsg+0x10/0x10 [ 67.212369][ T5993] ? __x64_sys_futex+0x34f/0x4d0 [ 67.212390][ T5993] do_syscall_64+0x106/0xf80 [ 67.212411][ T5993] ? clear_bhb_loop+0x40/0x90 [ 67.212427][ T5993] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 67.212443][ T5993] RIP: 0033:0x7f2e3ef9c819 [ 67.212455][ T5993] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 67.212468][ T5993] RSP: 002b:00007f2e3fe39028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 67.212484][ T5993] RAX: ffffffffffffffda RBX: 00007f2e3f215fa0 RCX: 00007f2e3ef9c819 [ 67.212493][ T5993] RDX: 000000000000001c RSI: 0000200000000480 RDI: 0000000000000004 [ 67.212502][ T5993] RBP: 00007f2e3f032c91 R08: 0000000000000000 R09: 0000000000000000 [ 67.212511][ T5993] R10: 0000000040002022 R11: 0000000000000246 R12: 0000000000000000 [ 67.212520][ T5993] R13: 00007f2e3f216038 R14: 00007f2e3f215fa0 R15: 00007ffd38493c78 [ 67.212534][ T5993] [ 67.214539][ T5993] Kernel Offset: disabled