Warning: Permanently added '10.128.0.109' (ED25519) to the list of known hosts.
2026/04/03 08:43:54 parsed 1 programs
[ 54.922854][ T30] audit: type=1400 audit(1775205834.204:62): avc: denied { node_bind } for pid=5801 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 56.894926][ T30] audit: type=1400 audit(1775205836.174:63): avc: denied { mounton } for pid=5809 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 56.918587][ T30] audit: type=1400 audit(1775205836.194:64): avc: denied { mount } for pid=5809 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 56.921167][ T5809] cgroup: Unknown subsys name 'net'
[ 56.947664][ T30] audit: type=1400 audit(1775205836.224:65): avc: denied { unmount } for pid=5809 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 57.114240][ T5809] cgroup: Unknown subsys name 'cpuset'
[ 57.122493][ T5809] cgroup: Unknown subsys name 'rlimit'
[ 57.282690][ T30] audit: type=1400 audit(1775205836.564:66): avc: denied { setattr } for pid=5809 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 57.306141][ T30] audit: type=1400 audit(1775205836.564:67): avc: denied { create } for pid=5809 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 57.354861][ T30] audit: type=1400 audit(1775205836.564:68): avc: denied { write } for pid=5809 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 57.375910][ T30] audit: type=1400 audit(1775205836.564:69): avc: denied { read } for pid=5809 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 57.396297][ T30] audit: type=1400 audit(1775205836.584:70): avc: denied { mounton } for pid=5809 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 57.421141][ T30] audit: type=1400 audit(1775205836.584:71): avc: denied { mount } for pid=5809 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
Setting up swapspace version 1, size = 127995904 bytes
[ 57.448118][ T5811] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 58.362948][ T5809] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 59.972820][ T30] kauditd_printk_skb: 5 callbacks suppressed
[ 59.972836][ T30] audit: type=1400 audit(1775205839.254:77): avc: denied { read } for pid=5818 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 60.000505][ T30] audit: type=1400 audit(1775205839.254:78): avc: denied { open } for pid=5818 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 60.024118][ T30] audit: type=1400 audit(1775205839.254:79): avc: denied { mounton } for pid=5818 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 60.045528][ T30] audit: type=1400 audit(1775205839.304:80): avc: denied { mounton } for pid=5818 comm="syz-executor" path="/root/syzkaller.DQRDJD/syz-tmp" dev="sda1" ino=2030 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1
[ 60.070267][ T30] audit: type=1400 audit(1775205839.304:81): avc: denied { mount } for pid=5818 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[ 60.092672][ T30] audit: type=1400 audit(1775205839.304:82): avc: denied { mounton } for pid=5818 comm="syz-executor" path="/root/syzkaller.DQRDJD/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1
[ 60.118049][ T30] audit: type=1400 audit(1775205839.304:83): avc: denied { mount } for pid=5818 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1
[ 60.140029][ T30] audit: type=1400 audit(1775205839.304:84): avc: denied { mounton } for pid=5818 comm="syz-executor" path="/root/syzkaller.DQRDJD/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1
[ 60.166776][ T30] audit: type=1400 audit(1775205839.304:85): avc: denied { mounton } for pid=5818 comm="syz-executor" path="/root/syzkaller.DQRDJD/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4581 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1
[ 60.170941][ T5818] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[ 60.194372][ T30] audit: type=1400 audit(1775205839.304:86): avc: denied { unmount } for pid=5818 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[ 60.633780][ T5828] chnl_net:caif_netlink_parms(): no params data found
[ 60.694145][ T5828] bridge0: port 1(bridge_slave_0) entered blocking state
[ 60.701820][ T5828] bridge0: port 1(bridge_slave_0) entered disabled state
[ 60.708906][ T5828] bridge_slave_0: entered allmulticast mode
[ 60.716069][ T5828] bridge_slave_0: entered promiscuous mode
[ 60.724018][ T5828] bridge0: port 2(bridge_slave_1) entered blocking state
[ 60.731091][ T5828] bridge0: port 2(bridge_slave_1) entered disabled state
[ 60.738463][ T5828] bridge_slave_1: entered allmulticast mode
[ 60.745242][ T5828] bridge_slave_1: entered promiscuous mode
[ 60.767740][ T5828] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 60.778435][ T5828] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 60.800129][ T5828] team0: Port device team_slave_0 added
[ 60.807295][ T5828] team0: Port device team_slave_1 added
[ 60.824222][ T5828] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 60.831170][ T5828] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[ 60.857153][ T5828] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 60.869284][ T5828] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 60.876268][ T5828] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[ 60.902144][ T5828] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 60.933576][ T5828] hsr_slave_0: entered promiscuous mode
[ 60.939892][ T5828] hsr_slave_1: entered promiscuous mode
[ 61.039632][ T5828] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 61.049879][ T5828] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 61.058861][ T5828] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 61.067905][ T5828] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 61.090771][ T5828] bridge0: port 2(bridge_slave_1) entered blocking state
[ 61.097928][ T5828] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 61.105599][ T5828] bridge0: port 1(bridge_slave_0) entered blocking state
[ 61.112669][ T5828] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 61.148973][ T5828] 8021q: adding VLAN 0 to HW filter on device bond0
[ 61.166798][ T12] bridge0: port 1(bridge_slave_0) entered disabled state
[ 61.174758][ T12] bridge0: port 2(bridge_slave_1) entered disabled state
[ 61.185942][ T5828] 8021q: adding VLAN 0 to HW filter on device team0
[ 61.197891][ T3536] bridge0: port 1(bridge_slave_0) entered blocking state
[ 61.204995][ T3536] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 61.216784][ T12] bridge0: port 2(bridge_slave_1) entered blocking state
[ 61.223909][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 61.338670][ T5828] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 61.370164][ T5828] veth0_vlan: entered promiscuous mode
[ 61.380830][ T5828] veth1_vlan: entered promiscuous mode
[ 61.402335][ T5828] veth0_macvtap: entered promiscuous mode
[ 61.410648][ T5828] veth1_macvtap: entered promiscuous mode
[ 61.425041][ T5828] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 61.438575][ T5828] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 61.450815][ T3536] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 61.460975][ T3536] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 61.472533][ T3536] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 61.482214][ T3536] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 61.577715][ T3536] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 61.655620][ T3536] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 61.740543][ T3536] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 61.801110][ T3536] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 62.255519][ T48] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 62.267336][ T48] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 62.293624][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 62.302344][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 62.528272][ T5880] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 62.537048][ T5880] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 62.545016][ T5880] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 62.553601][ T5880] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 62.560942][ T5880] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
2026/04/03 08:44:02 executed programs: 0
[ 63.591663][ T5880] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 63.599293][ T5880] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 63.607045][ T5880] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 63.616566][ T5880] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 63.624457][ T5880] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 63.717641][ T5912] chnl_net:caif_netlink_parms(): no params data found
[ 63.767276][ T5912] bridge0: port 1(bridge_slave_0) entered blocking state
[ 63.774497][ T5912] bridge0: port 1(bridge_slave_0) entered disabled state
[ 63.781975][ T5912] bridge_slave_0: entered allmulticast mode
[ 63.788613][ T5912] bridge_slave_0: entered promiscuous mode
[ 63.797447][ T5912] bridge0: port 2(bridge_slave_1) entered blocking state
[ 63.805352][ T5912] bridge0: port 2(bridge_slave_1) entered disabled state
[ 63.817301][ T5912] bridge_slave_1: entered allmulticast mode
[ 63.824210][ T5912] bridge_slave_1: entered promiscuous mode
[ 63.844263][ T5912] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 63.854955][ T5912] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 63.884116][ T5912] team0: Port device team_slave_0 added
[ 63.891053][ T5912] team0: Port device team_slave_1 added
[ 63.909383][ T5912] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 63.916388][ T5912] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[ 63.942524][ T5912] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 63.954253][ T5912] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 63.961183][ T5912] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[ 63.987323][ T5912] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 64.018208][ T5912] hsr_slave_0: entered promiscuous mode
[ 64.024274][ T5912] hsr_slave_1: entered promiscuous mode
[ 64.030118][ T5912] debugfs: 'hsr0' already exists in 'hsr'
[ 64.035923][ T5912] Cannot create hsr debugfs directory
[ 64.157577][ T3536] bridge_slave_1: left allmulticast mode
[ 64.164797][ T3536] bridge_slave_1: left promiscuous mode
[ 64.170985][ T3536] bridge0: port 2(bridge_slave_1) entered disabled state
[ 64.181290][ T3536] bridge_slave_0: left allmulticast mode
[ 64.187049][ T3536] bridge_slave_0: left promiscuous mode
[ 64.192992][ T3536] bridge0: port 1(bridge_slave_0) entered disabled state
[ 64.315148][ T3536] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 64.325415][ T3536] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 64.335006][ T3536] bond0 (unregistering): Released all slaves
[ 64.427720][ T3536] hsr_slave_0: left promiscuous mode
[ 64.437510][ T3536] hsr_slave_1: left promiscuous mode
[ 64.446830][ T3536] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 64.458063][ T3536] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 64.469316][ T3536] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 64.476809][ T3536] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 64.491108][ T3536] veth1_macvtap: left promiscuous mode
[ 64.496796][ T3536] veth0_macvtap: left promiscuous mode
[ 64.502526][ T3536] veth1_vlan: left promiscuous mode
[ 64.507825][ T3536] veth0_vlan: left promiscuous mode
[ 64.708247][ T3536] team0 (unregistering): Port device team_slave_1 removed
[ 64.726756][ T3536] team0 (unregistering): Port device team_slave_0 removed
[ 65.050584][ T5912] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 65.064702][ T5912] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 65.083227][ T5912] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 65.096035][ T5912] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 65.190820][ T5912] 8021q: adding VLAN 0 to HW filter on device bond0
[ 65.207610][ T5912] 8021q: adding VLAN 0 to HW filter on device team0
[ 65.225211][ T48] bridge0: port 1(bridge_slave_0) entered blocking state
[ 65.232356][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 65.245523][ T63] bridge0: port 2(bridge_slave_1) entered blocking state
[ 65.252689][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 65.644890][ T5880] Bluetooth: hci0: command tx timeout
[ 65.885668][ T1295] ieee802154 phy0 wpan0: encryption failed: -22
[ 65.897315][ T1295] ieee802154 phy1 wpan1: encryption failed: -22
[ 66.059007][ T5912] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 66.140569][ T5912] veth0_vlan: entered promiscuous mode
[ 66.154492][ T5912] veth1_vlan: entered promiscuous mode
[ 66.180703][ T5912] veth0_macvtap: entered promiscuous mode
[ 66.189039][ T5912] veth1_macvtap: entered promiscuous mode
[ 66.206037][ T5912] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 66.247225][ T5912] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 66.260885][ T48] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 66.270825][ T48] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 66.280610][ T48] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 66.294344][ T48] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 66.359008][ T63] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 66.378995][ T63] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 66.408151][ T147] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 66.416278][ T147] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 66.463304][ T30] kauditd_printk_skb: 18 callbacks suppressed
[ 66.463319][ T30] audit: type=1400 audit(1775205845.744:105): avc: denied { create } for pid=5992 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[ 66.489133][ T30] audit: type=1400 audit(1775205845.744:106): avc: denied { bind } for pid=5992 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[ 66.509477][ T30] audit: type=1400 audit(1775205845.744:107): avc: denied { setopt } for pid=5992 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[ 66.531223][ T5993] ==================================================================
[ 66.531444][ T30] audit: type=1400 audit(1775205845.744:108): avc: denied { accept } for pid=5992 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[ 66.539296][ T5993] BUG: KASAN: slab-out-of-bounds in af_alg_pull_tsgl+0x8fb/0xa80
[ 66.558751][ T30] audit: type=1400 audit(1775205845.744:109): avc: denied { read } for pid=5992 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[ 66.566050][ T5993] Read of size 8 at addr ffff8880763420e0 by task syz.0.17/5993
[ 66.566066][ T5993]
[ 66.566075][ T5993] CPU: 1 UID: 0 PID: 5993 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full)
[ 66.566094][ T5993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026
[ 66.566103][ T5993] Call Trace:
[ 66.566108][ T5993]
[ 66.566114][ T5993] dump_stack_lvl+0x100/0x190
[ 66.566140][ T5993] print_report+0x156/0x4c9
[ 66.566160][ T5993] ? __virt_addr_valid+0x81/0x620
[ 66.566181][ T5993] ? __phys_addr+0xe8/0x180
[ 66.566201][ T5993] ? af_alg_pull_tsgl+0x8fb/0xa80
[ 66.566222][ T5993] kasan_report+0xdf/0x1e0
[ 66.566237][ T5993] ? af_alg_pull_tsgl+0x8fb/0xa80
[ 66.566259][ T5993] af_alg_pull_tsgl+0x8fb/0xa80
[ 66.566283][ T5993] skcipher_recvmsg+0x512/0x1020
[ 66.566300][ T5993] ? __pfx_skcipher_recvmsg+0x10/0x10
[ 66.566315][ T5993] ? __pfx_skcipher_recvmsg+0x10/0x10
[ 66.566330][ T5993] sock_recvmsg+0x1a4/0x1f0
[ 66.566344][ T5993] ____sys_recvmsg+0x218/0x640
[ 66.566360][ T5993] ? __pfx_____sys_recvmsg+0x10/0x10
[ 66.566377][ T5993] ? __lock_acquire+0x4a5/0x2630
[ 66.566393][ T5993] ___sys_recvmsg+0x16a/0x1a0
[ 66.566408][ T5993] ? __pfx____sys_recvmsg+0x10/0x10
[ 66.566430][ T5993] __sys_recvmsg+0x16d/0x220
[ 66.566450][ T5993] ? __pfx___sys_recvmsg+0x10/0x10
[ 66.566469][ T5993] ? __x64_sys_futex+0x34f/0x4d0
[ 66.566489][ T5993] do_syscall_64+0x106/0xf80
[ 66.566512][ T5993] ? clear_bhb_loop+0x40/0x90
[ 66.566528][ T5993] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 66.566543][ T5993] RIP: 0033:0x7f2e3ef9c819
[ 66.566555][ T5993] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
[ 66.566568][ T5993] RSP: 002b:00007f2e3fe39028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f
[ 66.566583][ T5993] RAX: ffffffffffffffda RBX: 00007f2e3f215fa0 RCX: 00007f2e3ef9c819
[ 66.566593][ T5993] RDX: 000000000000001c RSI: 0000200000000480 RDI: 0000000000000004
[ 66.566601][ T5993] RBP: 00007f2e3f032c91 R08: 0000000000000000 R09: 0000000000000000
[ 66.566610][ T5993] R10: 0000000040002022 R11: 0000000000000246 R12: 0000000000000000
[ 66.566619][ T5993] R13: 00007f2e3f216038 R14: 00007f2e3f215fa0 R15: 00007ffd38493c78
[ 66.566632][ T5993]
[ 66.566637][ T5993]
[ 66.587185][ T30] audit: type=1400 audit(1775205845.804:110): avc: denied { write } for pid=5992 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[ 66.592566][ T5993] Allocated by task 5993:
[ 66.592576][ T5993] kasan_save_stack+0x30/0x50
[ 66.592601][ T5993] kasan_save_track+0x14/0x30
[ 66.592621][ T5993] __kasan_kmalloc+0xaa/0xb0
[ 66.592641][ T5993] __kmalloc_noprof+0x301/0x850
[ 66.592668][ T5993] sock_kmalloc+0x111/0x170
[ 66.592682][ T5993] skcipher_recvmsg+0x48b/0x1020
[ 66.592697][ T5993] sock_recvmsg+0x1a4/0x1f0
[ 66.592710][ T5993] ____sys_recvmsg+0x218/0x640
[ 66.592723][ T5993] ___sys_recvmsg+0x16a/0x1a0
[ 66.592736][ T5993] __sys_recvmsg+0x16d/0x220
[ 66.879507][ T5993] do_syscall_64+0x106/0xf80
[ 66.884088][ T5993] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 66.889958][ T5993]
[ 66.892260][ T5993] The buggy address belongs to the object at ffff8880763420c0
[ 66.892260][ T5993] which belongs to the cache kmalloc-32 of size 32
[ 66.906114][ T5993] The buggy address is located 0 bytes to the right of
[ 66.906114][ T5993] allocated 32-byte region [ffff8880763420c0, ffff8880763420e0)
[ 66.920494][ T5993]
[ 66.922797][ T5993] The buggy address belongs to the physical page:
[ 66.929186][ T5993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x76342
[ 66.937921][ T5993] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
[ 66.945005][ T5993] page_type: f5(slab)
[ 66.948968][ T5993] raw: 00fff00000000000 ffff88813fe40780 dead000000000100 dead000000000122
[ 66.957530][ T5993] raw: 0000000000000000 0000000800400040 00000000f5000000 0000000000000000
[ 66.966089][ T5993] page dumped because: kasan: bad access detected
[ 66.972486][ T5993] page_owner tracks the page as allocated
[ 66.978174][ T5993] page last allocated via order 0, migratetype Unmovable, gfp_mask 0xd2800(GFP_NOWAIT|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5645, tgid 5645 (dhcpcd), ts 41947478103, free_ts 41863272395
[ 66.997260][ T5993] post_alloc_hook+0x153/0x170
[ 67.002021][ T5993] get_page_from_freelist+0x111d/0x3140
[ 67.007551][ T5993] __alloc_frozen_pages_noprof+0x27c/0x2ba0
[ 67.013426][ T5993] new_slab+0xa6/0x6b0
[ 67.017478][ T5993] refill_objects+0x26b/0x400
[ 67.022136][ T5993] __pcs_replace_empty_main+0x1ab/0x660
[ 67.027675][ T5993] __kmalloc_cache_noprof+0x493/0x6f0
[ 67.033067][ T5993] kmem_cache_free+0x41f/0x6a0
[ 67.037838][ T5993] __put_anon_vma+0x114/0x3a0
[ 67.042506][ T5993] unlink_anon_vmas+0x5f3/0x8e0
[ 67.047344][ T5993] free_pgtables+0x2e7/0xd80
[ 67.051936][ T5993] exit_mmap+0x44c/0xa30
[ 67.056160][ T5993] __mmput+0x12a/0x410
[ 67.060211][ T5993] mmput+0x67/0x80
[ 67.063912][ T5993] do_exit+0x819/0x2b60
[ 67.068051][ T5993] do_group_exit+0xd5/0x2a0
[ 67.072541][ T5993] page last free pid 23 tgid 23 stack trace:
[ 67.078496][ T5993] __free_frozen_pages+0x7e1/0x10d0
[ 67.083673][ T5993] tlb_remove_table_rcu+0x2cf/0x380
[ 67.088859][ T5993] rcu_core+0x5a2/0x10d0
[ 67.093098][ T5993] handle_softirqs+0x1eb/0x9e0
[ 67.097857][ T5993] run_ksoftirqd+0x38/0x60
[ 67.102267][ T5993] smpboot_thread_fn+0x3d3/0xaa0
[ 67.107194][ T5993] kthread+0x370/0x450
[ 67.111251][ T5993] ret_from_fork+0x754/0xd80
[ 67.115820][ T5993] ret_from_fork_asm+0x1a/0x30
[ 67.120572][ T5993]
[ 67.122873][ T5993] Memory state around the buggy address:
[ 67.128480][ T5993] ffff888076341f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 67.136519][ T5993] ffff888076342000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 67.144558][ T5993] >ffff888076342080: fa fb fb fb fc fc fc fc 00 00 00 00 fc fc fc fc
[ 67.152593][ T5993] ^
[ 67.159763][ T5993] ffff888076342100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 67.167799][ T5993] ffff888076342180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 67.175834][ T5993] ==================================================================
[ 67.192323][ T30] audit: type=1400 audit(1775205846.474:111): avc: denied { read } for pid=5162 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[ 67.211850][ T5993] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 67.211870][ T5993] CPU: 1 UID: 0 PID: 5993 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full)
[ 67.211889][ T5993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026
[ 67.211898][ T5993] Call Trace:
[ 67.211903][ T5993]
[ 67.211909][ T5993] dump_stack_lvl+0x100/0x190
[ 67.211938][ T5993] vpanic+0x552/0x970
[ 67.211952][ T5993] ? __pfx_vpanic+0x10/0x10
[ 67.211968][ T5993] ? af_alg_pull_tsgl+0x8fb/0xa80
[ 67.211990][ T5993] panic+0xd1/0xe0
[ 67.212003][ T5993] ? __pfx_panic+0x10/0x10
[ 67.212018][ T5993] ? af_alg_pull_tsgl+0x8fb/0xa80
[ 67.212038][ T5993] ? preempt_schedule_common+0x42/0xc0
[ 67.212061][ T5993] ? check_panic_on_warn+0x1f/0x90
[ 67.212076][ T5993] check_panic_on_warn.cold+0x19/0x34
[ 67.212092][ T5993] end_report.part.0+0x3a/0x90
[ 67.212112][ T5993] kasan_report.cold+0xe/0x18
[ 67.212132][ T5993] ? af_alg_pull_tsgl+0x8fb/0xa80
[ 67.212154][ T5993] af_alg_pull_tsgl+0x8fb/0xa80
[ 67.212179][ T5993] skcipher_recvmsg+0x512/0x1020
[ 67.212197][ T5993] ? __pfx_skcipher_recvmsg+0x10/0x10
[ 67.212212][ T5993] ? __pfx_skcipher_recvmsg+0x10/0x10
[ 67.212227][ T5993] sock_recvmsg+0x1a4/0x1f0
[ 67.212242][ T5993] ____sys_recvmsg+0x218/0x640
[ 67.212258][ T5993] ? __pfx_____sys_recvmsg+0x10/0x10
[ 67.212276][ T5993] ? __lock_acquire+0x4a5/0x2630
[ 67.212292][ T5993] ___sys_recvmsg+0x16a/0x1a0
[ 67.212307][ T5993] ? __pfx____sys_recvmsg+0x10/0x10
[ 67.212329][ T5993] __sys_recvmsg+0x16d/0x220
[ 67.212349][ T5993] ? __pfx___sys_recvmsg+0x10/0x10
[ 67.212369][ T5993] ? __x64_sys_futex+0x34f/0x4d0
[ 67.212390][ T5993] do_syscall_64+0x106/0xf80
[ 67.212411][ T5993] ? clear_bhb_loop+0x40/0x90
[ 67.212427][ T5993] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 67.212443][ T5993] RIP: 0033:0x7f2e3ef9c819
[ 67.212455][ T5993] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
[ 67.212468][ T5993] RSP: 002b:00007f2e3fe39028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f
[ 67.212484][ T5993] RAX: ffffffffffffffda RBX: 00007f2e3f215fa0 RCX: 00007f2e3ef9c819
[ 67.212493][ T5993] RDX: 000000000000001c RSI: 0000200000000480 RDI: 0000000000000004
[ 67.212502][ T5993] RBP: 00007f2e3f032c91 R08: 0000000000000000 R09: 0000000000000000
[ 67.212511][ T5993] R10: 0000000040002022 R11: 0000000000000246 R12: 0000000000000000
[ 67.212520][ T5993] R13: 00007f2e3f216038 R14: 00007f2e3f215fa0 R15: 00007ffd38493c78
[ 67.212534][ T5993]
[ 67.214539][ T5993] Kernel Offset: disabled