Warning: Permanently added '10.128.1.76' (ED25519) to the list of known hosts. 2026/01/28 15:26:09 parsed 1 programs Setting up swapspace version 1, size = 127995904 bytes [ 45.345211][ T30] audit: type=1400 audit(1769613969.927:105): avc: denied { unlink } for pid=398 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 45.382092][ T398] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 46.268143][ T30] audit: type=1401 audit(1769613970.847:106): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 46.449651][ T452] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.457016][ T452] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.464403][ T452] device bridge_slave_0 entered promiscuous mode [ 46.471269][ T452] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.478529][ T452] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.485960][ T452] device bridge_slave_1 entered promiscuous mode [ 46.521892][ T452] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.529086][ T452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.536347][ T452] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.543404][ T452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.559807][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.567386][ T325] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.574728][ T325] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.583493][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.591786][ T325] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.598813][ T325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.607356][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.615567][ T325] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.622723][ T325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.634010][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.643518][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.657078][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.672051][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.680357][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.687893][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.702182][ T452] device veth0_vlan entered promiscuous mode [ 46.711615][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.720685][ T452] device veth1_macvtap entered promiscuous mode [ 46.736022][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.752110][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2026/01/28 15:26:11 executed programs: 0 [ 47.007352][ T468] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.014430][ T468] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.022137][ T468] device bridge_slave_0 entered promiscuous mode [ 47.029536][ T468] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.038014][ T468] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.046185][ T468] device bridge_slave_1 entered promiscuous mode [ 47.113506][ T468] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.120688][ T468] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.128141][ T468] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.135179][ T468] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.143808][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.151593][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.168895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.176831][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.186382][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.195703][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.204169][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.211408][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.221201][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.230769][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.239593][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.247214][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.258776][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 47.267964][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.277817][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 47.286214][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.299036][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 47.307581][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.318360][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 47.326930][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.335459][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.342910][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.351011][ T468] device veth0_vlan entered promiscuous mode [ 47.360169][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 47.368407][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.377828][ T468] device veth1_macvtap entered promiscuous mode [ 47.386895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 47.395248][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 47.403759][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.413929][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 47.422912][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.466237][ T30] audit: type=1400 audit(1769613972.047:107): avc: denied { prog_load } for pid=479 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 47.491761][ T30] audit: type=1400 audit(1769613972.047:108): avc: denied { bpf } for pid=479 comm="syz.2.17" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 47.524849][ T30] audit: type=1400 audit(1769613972.097:109): avc: denied { setopt } for pid=479 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 47.603242][ T30] audit: type=1400 audit(1769613972.177:110): avc: denied { perfmon } for pid=479 comm="syz.2.17" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 47.630779][ T30] audit: type=1400 audit(1769613972.207:111): avc: denied { prog_run } for pid=479 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 47.657865][ T483] ================================================================== [ 47.666932][ T483] BUG: KASAN: slab-out-of-bounds in l2cap_sock_setsockopt+0x1a1f/0x1df0 [ 47.675378][ T483] Read of size 4 at addr ffff888112ea6323 by task syz.2.18/483 [ 47.683496][ T483] [ 47.685826][ T483] CPU: 1 PID: 483 Comm: syz.2.18 Not tainted syzkaller #0 [ 47.693020][ T483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 47.703344][ T483] Call Trace: [ 47.706782][ T483] [ 47.709735][ T483] __dump_stack+0x21/0x30 [ 47.714153][ T483] dump_stack_lvl+0x110/0x170 [ 47.718974][ T483] ? show_regs_print_info+0x20/0x20 [ 47.724373][ T483] ? load_image+0x3e0/0x3e0 [ 47.728980][ T483] ? lock_sock_nested+0x21c/0x2a0 [ 47.734127][ T483] print_address_description+0x7f/0x2c0 [ 47.740091][ T483] ? l2cap_sock_setsockopt+0x1a1f/0x1df0 [ 47.746740][ T483] kasan_report+0xf1/0x140 [ 47.751562][ T483] ? memcpy+0x56/0x70 [ 47.756433][ T483] ? l2cap_sock_setsockopt+0x1a1f/0x1df0 [ 47.762561][ T483] __asan_report_load_n_noabort+0xf/0x20 [ 47.768766][ T483] l2cap_sock_setsockopt+0x1a1f/0x1df0 [ 47.774331][ T483] ? selinux_socket_setsockopt+0x282/0x360 [ 47.780464][ T483] ? __cgroup_bpf_run_filter_sysctl+0x760/0x760 [ 47.786716][ T483] ? l2cap_sock_shutdown+0xba0/0xba0 [ 47.792667][ T483] ? __fget_files+0x2c4/0x320 [ 47.797770][ T483] ? security_socket_setsockopt+0x82/0xa0 [ 47.804332][ T483] ? l2cap_sock_shutdown+0xba0/0xba0 [ 47.809631][ T483] __sys_setsockopt+0x2e9/0x470 [ 47.814663][ T483] ? __ia32_sys_recv+0xb0/0xb0 [ 47.819703][ T483] ? __kasan_check_write+0x14/0x20 [ 47.825004][ T483] __x64_sys_setsockopt+0xbf/0xd0 [ 47.830745][ T483] x64_sys_call+0x982/0x9a0 [ 47.836842][ T483] do_syscall_64+0x4c/0xa0 [ 47.842261][ T483] ? clear_bhb_loop+0x50/0xa0 [ 47.847287][ T483] ? clear_bhb_loop+0x50/0xa0 [ 47.852722][ T483] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.859497][ T483] RIP: 0033:0x7f7fe8f02ef9 [ 47.864668][ T483] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 47.886573][ T483] RSP: 002b:00007f7fe8d67028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 47.895985][ T483] RAX: ffffffffffffffda RBX: 00007f7fe916dfa0 RCX: 00007f7fe8f02ef9 [ 47.905119][ T483] RDX: 0000000000000008 RSI: 0000000000000112 RDI: 0000000000000004 [ 47.914458][ T483] RBP: 00007f7fe8f97ee0 R08: 0000000000000001 R09: 0000000000000000 [ 47.922897][ T483] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000000 [ 47.931708][ T483] R13: 00007f7fe916e038 R14: 00007f7fe916dfa0 R15: 00007ffdbaf3d7b8 [ 47.939915][ T483] [ 47.943149][ T483] [ 47.945559][ T483] Allocated by task 483: [ 47.949811][ T483] __kasan_kmalloc+0xda/0x110 [ 47.954615][ T483] __kmalloc+0x13d/0x2c0 [ 47.958879][ T483] __cgroup_bpf_run_filter_setsockopt+0x8e7/0xaa0 [ 47.965418][ T483] __sys_setsockopt+0x40e/0x470 [ 47.970643][ T483] __x64_sys_setsockopt+0xbf/0xd0 [ 47.975893][ T483] x64_sys_call+0x982/0x9a0 [ 47.980963][ T483] do_syscall_64+0x4c/0xa0 [ 47.986396][ T483] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.993236][ T483] [ 47.996683][ T483] The buggy address belongs to the object at ffff888112ea6320 [ 47.996683][ T483] which belongs to the cache kmalloc-8 of size 8 [ 48.012880][ T483] The buggy address is located 3 bytes inside of [ 48.012880][ T483] 8-byte region [ffff888112ea6320, ffff888112ea6328) [ 48.028434][ T483] The buggy address belongs to the page: [ 48.036239][ T483] page:ffffea00044ba980 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x112ea6 [ 48.051115][ T483] flags: 0x4000000000000200(slab|zone=1) [ 48.057818][ T483] raw: 4000000000000200 ffffea000432a5c0 0000000e0000000e ffff888100042300 [ 48.069388][ T483] raw: 0000000000000000 0000000080660066 00000001ffffffff 0000000000000000 [ 48.080655][ T483] page dumped because: kasan: bad access detected [ 48.088449][ T483] page_owner tracks the page as allocated [ 48.095268][ T483] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 112, ts 5006521114, free_ts 0 [ 48.113311][ T483] post_alloc_hook+0x192/0x1b0 [ 48.118313][ T483] prep_new_page+0x1c/0x110 [ 48.123496][ T483] get_page_from_freelist+0x2d3a/0x2dc0 [ 48.129524][ T483] __alloc_pages+0x1a2/0x460 [ 48.134298][ T483] new_slab+0xa1/0x4d0 [ 48.138462][ T483] ___slab_alloc+0x381/0x810 [ 48.143275][ T483] __slab_alloc+0x49/0x90 [ 48.147822][ T483] __kmalloc+0x16a/0x2c0 [ 48.153012][ T483] kernfs_fop_write_iter+0x156/0x400 [ 48.159503][ T483] vfs_write+0x835/0xfd0 [ 48.163863][ T483] ksys_write+0x149/0x250 [ 48.168713][ T483] __x64_sys_write+0x7b/0x90 [ 48.174897][ T483] x64_sys_call+0x8ef/0x9a0 [ 48.179996][ T483] do_syscall_64+0x4c/0xa0 [ 48.185931][ T483] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 48.193490][ T483] page_owner free stack trace missing [ 48.205182][ T483] [ 48.208257][ T483] Memory state around the buggy address: [ 48.214325][ T483] ffff888112ea6200: fc 00 fc fc fc fc 00 fc fc fc fc fa fc fc fc fc [ 48.223065][ T483] ffff888112ea6280: fb fc fc fc fc 00 fc fc fc fc 05 fc fc fc fc 06 [ 48.231494][ T483] >ffff888112ea6300: fc fc fc fc 01 fc fc fc fc 00 fc fc fc fc fa fc [ 48.239805][ T483] ^ [ 48.245373][ T483] ffff888112ea6380: fc fc fc fa fc fc fc fc fa fc fc fc fc fa fc fc [ 48.255564][ T483] ffff888112ea6400: fc fc fa fc fc fc fc 04 fc fc fc fc fa fc fc fc [ 48.263958][ T483] ================================================================== [ 48.272750][ T483] Disabling lock debugging due to kernel taint [ 48.285576][ T30] audit: type=1400 audit(1769613972.867:112): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 48.319320][ T30] audit: type=1400 audit(1769613972.867:113): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 48.344140][ T30] audit: type=1400 audit(1769613972.867:114): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 48.656242][ T45] device bridge_slave_1 left promiscuous mode [ 48.662501][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.670181][ T45] device bridge_slave_0 left promiscuous mode [ 48.676480][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.685123][ T45] device veth1_macvtap left promiscuous mode [ 48.693621][ T45] device veth0_vlan left promiscuous mode 2026/01/28 15:26:16 executed programs: 219 2026/01/28 15:26:21 executed programs: 519