Warning: Permanently added '10.128.1.189' (ED25519) to the list of known hosts. 2026/02/17 10:13:27 parsed 1 programs [ 23.980896][ T30] audit: type=1400 audit(1771323207.591:64): avc: denied { node_bind } for pid=281 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 24.003691][ T30] audit: type=1400 audit(1771323207.591:65): avc: denied { module_request } for pid=281 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 24.954315][ T30] audit: type=1400 audit(1771323208.561:66): avc: denied { mounton } for pid=287 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.958007][ T287] cgroup: Unknown subsys name 'net' [ 24.977382][ T30] audit: type=1400 audit(1771323208.561:67): avc: denied { mount } for pid=287 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.005246][ T30] audit: type=1400 audit(1771323208.601:68): avc: denied { unmount } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.005726][ T287] cgroup: Unknown subsys name 'devices' [ 25.179734][ T287] cgroup: Unknown subsys name 'hugetlb' [ 25.185400][ T287] cgroup: Unknown subsys name 'rlimit' [ 25.483458][ T30] audit: type=1400 audit(1771323209.091:69): avc: denied { setattr } for pid=287 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.506984][ T30] audit: type=1400 audit(1771323209.091:70): avc: denied { create } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.527875][ T30] audit: type=1400 audit(1771323209.091:71): avc: denied { write } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.547719][ T292] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.549274][ T30] audit: type=1400 audit(1771323209.091:72): avc: denied { read } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.579277][ T30] audit: type=1400 audit(1771323209.101:73): avc: denied { mounton } for pid=287 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 25.680562][ T287] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.240795][ T296] request_module fs-gadgetfs succeeded, but still no fs? [ 26.548076][ T322] syz-executor (322) used greatest stack depth: 22016 bytes left [ 26.859722][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.867067][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.874671][ T342] device bridge_slave_0 entered promiscuous mode [ 26.881821][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.889371][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.897032][ T342] device bridge_slave_1 entered promiscuous mode [ 26.943237][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.950635][ T342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.958015][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.965170][ T342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.986040][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.994000][ T340] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.002043][ T340] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.016699][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.025014][ T340] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.032158][ T340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.041235][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.049653][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.056757][ T340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.069777][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.084722][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.098812][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.110613][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.118746][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.126159][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.135558][ T342] device veth0_vlan entered promiscuous mode [ 27.151224][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.160750][ T342] device veth1_macvtap entered promiscuous mode [ 27.170564][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.187701][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.228246][ T342] syz-executor (342) used greatest stack depth: 21280 bytes left 2026/02/17 10:13:31 executed programs: 0 [ 27.438896][ T362] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.446166][ T362] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.454143][ T362] device bridge_slave_0 entered promiscuous mode [ 27.462111][ T362] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.469527][ T362] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.476910][ T362] device bridge_slave_1 entered promiscuous mode [ 27.553821][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.561779][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.578428][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.587161][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.595813][ T340] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.603011][ T340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.612294][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.621082][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.629635][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.637233][ T340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.644807][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.652959][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.661312][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.669622][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.677965][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.701304][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.709760][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.722517][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.730683][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.739098][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.747117][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.756678][ T362] device veth0_vlan entered promiscuous mode [ 27.767603][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.776889][ T362] device veth1_macvtap entered promiscuous mode [ 27.786540][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.795393][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.805161][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.813655][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.010896][ T373] ================================================================== [ 28.019108][ T373] BUG: KASAN: slab-out-of-bounds in hci_sock_setsockopt+0x7f1/0x820 [ 28.027133][ T373] Read of size 4 at addr ffff88810cb1e5a3 by task syz.2.17/373 [ 28.034724][ T373] [ 28.037143][ T373] CPU: 0 PID: 373 Comm: syz.2.17 Not tainted syzkaller #0 [ 28.044246][ T373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 28.054746][ T373] Call Trace: [ 28.058034][ T373] [ 28.061122][ T373] __dump_stack+0x21/0x30 [ 28.065465][ T373] dump_stack_lvl+0x110/0x170 [ 28.070141][ T373] ? show_regs_print_info+0x20/0x20 [ 28.075372][ T373] ? load_image+0x3e0/0x3e0 [ 28.079882][ T373] ? lock_sock_nested+0x21c/0x2a0 [ 28.085043][ T373] print_address_description+0x7f/0x2c0 [ 28.090768][ T373] ? hci_sock_setsockopt+0x7f1/0x820 [ 28.096057][ T373] kasan_report+0xf1/0x140 [ 28.100564][ T373] ? hci_sock_setsockopt+0x7f1/0x820 [ 28.105853][ T373] __asan_report_load_n_noabort+0xf/0x20 [ 28.111490][ T373] hci_sock_setsockopt+0x7f1/0x820 [ 28.116607][ T373] ? hci_sock_compat_ioctl+0x50/0x50 [ 28.121890][ T373] ? security_socket_setsockopt+0x82/0xa0 [ 28.127625][ T373] ? hci_sock_compat_ioctl+0x50/0x50 [ 28.133848][ T373] __sys_setsockopt+0x2e9/0x470 [ 28.138750][ T373] ? __ia32_sys_recv+0xb0/0xb0 [ 28.143522][ T373] ? ____fput+0x15/0x20 [ 28.147691][ T373] __x64_sys_setsockopt+0xbf/0xd0 [ 28.152812][ T373] x64_sys_call+0x982/0x9a0 [ 28.157455][ T373] do_syscall_64+0x4c/0xa0 [ 28.161873][ T373] ? clear_bhb_loop+0x50/0xa0 [ 28.166590][ T373] ? clear_bhb_loop+0x50/0xa0 [ 28.171293][ T373] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 28.177207][ T373] RIP: 0033:0x7fc59df6af79 [ 28.181629][ T373] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 28.201281][ T373] RSP: 002b:00007ffd238c18c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 28.209790][ T373] RAX: ffffffffffffffda RBX: 00007fc59e1e4fa0 RCX: 00007fc59df6af79 [ 28.217861][ T373] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000008 [ 28.225856][ T373] RBP: 00007fc59e0017e0 R08: 0000000000000001 R09: 0000000000000000 [ 28.233827][ T373] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000000 [ 28.242076][ T373] R13: 00007fc59e1e4fac R14: 00007fc59e1e4fa0 R15: 00007fc59e1e4fa0 [ 28.250052][ T373] [ 28.253167][ T373] [ 28.255487][ T373] Allocated by task 373: [ 28.259744][ T373] __kasan_kmalloc+0xda/0x110 [ 28.264422][ T373] __kmalloc+0x13d/0x2c0 [ 28.268665][ T373] __cgroup_bpf_run_filter_setsockopt+0x8e7/0xaa0 [ 28.275106][ T373] __sys_setsockopt+0x40e/0x470 [ 28.280074][ T373] __x64_sys_setsockopt+0xbf/0xd0 [ 28.285105][ T373] x64_sys_call+0x982/0x9a0 [ 28.289605][ T373] do_syscall_64+0x4c/0xa0 [ 28.294018][ T373] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 28.300059][ T373] [ 28.302481][ T373] The buggy address belongs to the object at ffff88810cb1e5a0 [ 28.302481][ T373] which belongs to the cache kmalloc-8 of size 8 [ 28.316699][ T373] The buggy address is located 3 bytes inside of [ 28.316699][ T373] 8-byte region [ffff88810cb1e5a0, ffff88810cb1e5a8) [ 28.329725][ T373] The buggy address belongs to the page: [ 28.335484][ T373] page:ffffea000432c780 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10cb1e [ 28.345919][ T373] flags: 0x4000000000000200(slab|zone=1) [ 28.351831][ T373] raw: 4000000000000200 ffffea000432c640 0000000300000003 ffff888100042300 [ 28.360519][ T373] raw: 0000000000000000 0000000080660066 00000001ffffffff 0000000000000000 [ 28.369327][ T373] page dumped because: kasan: bad access detected [ 28.375749][ T373] page_owner tracks the page as allocated [ 28.381480][ T373] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY), pid 1, ts 4916515396, free_ts 0 [ 28.396563][ T373] post_alloc_hook+0x192/0x1b0 [ 28.401332][ T373] prep_new_page+0x1c/0x110 [ 28.405994][ T373] get_page_from_freelist+0x2d3a/0x2dc0 [ 28.411783][ T373] __alloc_pages+0x1a2/0x460 [ 28.416389][ T373] new_slab+0xa1/0x4d0 [ 28.420468][ T373] ___slab_alloc+0x381/0x810 [ 28.425064][ T373] __slab_alloc+0x49/0x90 [ 28.429400][ T373] __kmalloc_track_caller+0x169/0x2c0 [ 28.434783][ T373] kstrdup+0x36/0x70 [ 28.438701][ T373] get_permissions_callback+0x46/0xa0 [ 28.444444][ T373] hashtab_map+0xf4/0x1f0 [ 28.448912][ T373] security_get_permissions+0x105/0x330 [ 28.454610][ T373] sel_make_policy_nodes+0xd95/0x1360 [ 28.460094][ T373] sel_write_load+0x3dc/0x600 [ 28.464912][ T373] vfs_write+0x3f9/0xfd0 [ 28.469347][ T373] ksys_write+0x149/0x250 [ 28.473762][ T373] page_owner free stack trace missing [ 28.479220][ T373] [ 28.481719][ T373] Memory state around the buggy address: [ 28.487342][ T373] ffff88810cb1e480: fc fa fc fc fc fc fb fc fc fc fc fb fc fc fc fc [ 28.495599][ T373] ffff88810cb1e500: fb fc fc fc fc fb fc fc fc fc fb fc fc fc fc 05 [ 28.503835][ T373] >ffff88810cb1e580: fc fc fc fc 01 fc fc fc fc fb fc fc fc fc fb fc [ 28.511896][ T373] ^ [ 28.517049][ T373] ffff88810cb1e600: fc fc fc fb fc fc fc fc fa fc fc fc fc fb fc fc [ 28.525393][ T373] ffff88810cb1e680: fc fc fb fc fc fc fc fb fc fc fc fc fb fc fc fc [ 28.533884][ T373] ================================================================== [ 28.542262][ T373] Disabling lock debugging due to kernel taint