Warning: Permanently added '10.128.0.227' (ED25519) to the list of known hosts. 2026/02/17 09:04:36 parsed 1 programs [ 23.571390][ T30] audit: type=1400 audit(1771319076.909:64): avc: denied { node_bind } for pid=281 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 23.592120][ T30] audit: type=1400 audit(1771319076.909:65): avc: denied { module_request } for pid=281 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 24.194601][ T30] audit: type=1400 audit(1771319077.529:66): avc: denied { mounton } for pid=289 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.195624][ T289] cgroup: Unknown subsys name 'net' [ 24.217266][ T30] audit: type=1400 audit(1771319077.529:67): avc: denied { mount } for pid=289 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.244516][ T30] audit: type=1400 audit(1771319077.559:68): avc: denied { unmount } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.244703][ T289] cgroup: Unknown subsys name 'devices' [ 24.422405][ T289] cgroup: Unknown subsys name 'hugetlb' [ 24.428002][ T289] cgroup: Unknown subsys name 'rlimit' [ 24.628748][ T30] audit: type=1400 audit(1771319077.959:69): avc: denied { setattr } for pid=289 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.651932][ T30] audit: type=1400 audit(1771319077.959:70): avc: denied { create } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.672833][ T30] audit: type=1400 audit(1771319077.959:71): avc: denied { write } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.673242][ T292] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.693332][ T30] audit: type=1400 audit(1771319077.959:72): avc: denied { read } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 24.721826][ T30] audit: type=1400 audit(1771319077.959:73): avc: denied { mounton } for pid=289 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.736705][ T289] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.119650][ T294] request_module fs-gadgetfs succeeded, but still no fs? [ 25.560561][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.567708][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.575213][ T333] device bridge_slave_0 entered promiscuous mode [ 25.582032][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.589037][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.596472][ T333] device bridge_slave_1 entered promiscuous mode [ 25.640990][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.648041][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.655337][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.662359][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.679944][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.687532][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.695211][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.704300][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.712594][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.719602][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.727989][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.736167][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.743194][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.754065][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.763031][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.775074][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.785521][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.793642][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.801623][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.809390][ T333] device veth0_vlan entered promiscuous mode [ 25.818393][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.827283][ T333] device veth1_macvtap entered promiscuous mode [ 25.835785][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.845351][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.870806][ T333] syz-executor (333) used greatest stack depth: 21120 bytes left 2026/02/17 09:04:39 executed programs: 0 [ 26.117226][ T360] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.124388][ T360] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.131964][ T360] device bridge_slave_0 entered promiscuous mode [ 26.138863][ T360] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.145957][ T360] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.153413][ T360] device bridge_slave_1 entered promiscuous mode [ 26.191375][ T360] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.198403][ T360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.205672][ T360] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.212700][ T360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.232846][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.240386][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.247800][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.256333][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.264679][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.271696][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.280926][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.289033][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.296056][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.312418][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.321242][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.333540][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.349594][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.357626][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.365071][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.373129][ T360] device veth0_vlan entered promiscuous mode [ 26.382360][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.397952][ T360] device veth1_macvtap entered promiscuous mode [ 26.406669][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.416475][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.561375][ T370] ================================================================== [ 26.569448][ T370] BUG: KASAN: slab-out-of-bounds in hci_sock_setsockopt+0x7f1/0x820 [ 26.577416][ T370] Read of size 4 at addr ffff88810ca9ce63 by task syz.2.17/370 [ 26.584933][ T370] [ 26.587239][ T370] CPU: 1 PID: 370 Comm: syz.2.17 Not tainted syzkaller #0 [ 26.594316][ T370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 26.604353][ T370] Call Trace: [ 26.607613][ T370] [ 26.610518][ T370] __dump_stack+0x21/0x30 [ 26.614833][ T370] dump_stack_lvl+0x110/0x170 [ 26.619506][ T370] ? show_regs_print_info+0x20/0x20 [ 26.624697][ T370] ? load_image+0x3e0/0x3e0 [ 26.629183][ T370] ? lock_sock_nested+0x21c/0x2a0 [ 26.634192][ T370] print_address_description+0x7f/0x2c0 [ 26.639723][ T370] ? hci_sock_setsockopt+0x7f1/0x820 [ 26.644990][ T370] kasan_report+0xf1/0x140 [ 26.649397][ T370] ? hci_sock_setsockopt+0x7f1/0x820 [ 26.654675][ T370] __asan_report_load_n_noabort+0xf/0x20 [ 26.660288][ T370] hci_sock_setsockopt+0x7f1/0x820 [ 26.665373][ T370] ? hci_sock_compat_ioctl+0x50/0x50 [ 26.670634][ T370] ? security_socket_setsockopt+0x82/0xa0 [ 26.676327][ T370] ? hci_sock_compat_ioctl+0x50/0x50 [ 26.681588][ T370] __sys_setsockopt+0x2e9/0x470 [ 26.686420][ T370] ? __ia32_sys_recv+0xb0/0xb0 [ 26.691163][ T370] ? ____fput+0x15/0x20 [ 26.695317][ T370] __x64_sys_setsockopt+0xbf/0xd0 [ 26.700318][ T370] x64_sys_call+0x982/0x9a0 [ 26.704795][ T370] do_syscall_64+0x4c/0xa0 [ 26.709185][ T370] ? clear_bhb_loop+0x50/0xa0 [ 26.713831][ T370] ? clear_bhb_loop+0x50/0xa0 [ 26.718490][ T370] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 26.724359][ T370] RIP: 0033:0x7ff430351f79 [ 26.728747][ T370] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 26.748329][ T370] RSP: 002b:00007ffde2da8a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 26.756726][ T370] RAX: ffffffffffffffda RBX: 00007ff4305cbfa0 RCX: 00007ff430351f79 [ 26.764936][ T370] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000008 [ 26.772880][ T370] RBP: 00007ff4303e87e0 R08: 0000000000000001 R09: 0000000000000000 [ 26.780834][ T370] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000000 [ 26.788779][ T370] R13: 00007ff4305cbfac R14: 00007ff4305cbfa0 R15: 00007ff4305cbfa0 [ 26.796728][ T370] [ 26.799723][ T370] [ 26.802021][ T370] Allocated by task 370: [ 26.806230][ T370] __kasan_kmalloc+0xda/0x110 [ 26.810882][ T370] __kmalloc+0x13d/0x2c0 [ 26.815097][ T370] __cgroup_bpf_run_filter_setsockopt+0x8e7/0xaa0 [ 26.821514][ T370] __sys_setsockopt+0x40e/0x470 [ 26.826337][ T370] __x64_sys_setsockopt+0xbf/0xd0 [ 26.831344][ T370] x64_sys_call+0x982/0x9a0 [ 26.835851][ T370] do_syscall_64+0x4c/0xa0 [ 26.840251][ T370] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 26.846181][ T370] [ 26.848480][ T370] The buggy address belongs to the object at ffff88810ca9ce60 [ 26.848480][ T370] which belongs to the cache kmalloc-8 of size 8 [ 26.862162][ T370] The buggy address is located 3 bytes inside of [ 26.862162][ T370] 8-byte region [ffff88810ca9ce60, ffff88810ca9ce68) [ 26.875061][ T370] The buggy address belongs to the page: [ 26.880667][ T370] page:ffffea000432a700 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ca9c [ 26.890884][ T370] flags: 0x4000000000000200(slab|zone=1) [ 26.896505][ T370] raw: 4000000000000200 ffffea000432a5c0 0000000800000008 ffff888100042300 [ 26.905066][ T370] raw: 0000000000000000 0000000080660066 00000001ffffffff 0000000000000000 [ 26.913629][ T370] page dumped because: kasan: bad access detected [ 26.920025][ T370] page_owner tracks the page as allocated [ 26.925717][ T370] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY), pid 1, ts 3067712302, free_ts 0 [ 26.940543][ T370] post_alloc_hook+0x192/0x1b0 [ 26.945294][ T370] prep_new_page+0x1c/0x110 [ 26.949770][ T370] get_page_from_freelist+0x2d3a/0x2dc0 [ 26.955287][ T370] __alloc_pages+0x1a2/0x460 [ 26.959849][ T370] new_slab+0xa1/0x4d0 [ 26.963888][ T370] ___slab_alloc+0x381/0x810 [ 26.969019][ T370] __slab_alloc+0x49/0x90 [ 26.973329][ T370] __kmalloc_track_caller+0x169/0x2c0 [ 26.978685][ T370] kstrdup+0x36/0x70 [ 26.982561][ T370] get_permissions_callback+0x46/0xa0 [ 26.987916][ T370] hashtab_map+0xf4/0x1f0 [ 26.992225][ T370] security_get_permissions+0x105/0x330 [ 26.997749][ T370] sel_make_policy_nodes+0xd95/0x1360 [ 27.003097][ T370] sel_write_load+0x3dc/0x600 [ 27.007754][ T370] vfs_write+0x3f9/0xfd0 [ 27.011968][ T370] ksys_write+0x149/0x250 [ 27.016289][ T370] page_owner free stack trace missing [ 27.021629][ T370] [ 27.023930][ T370] Memory state around the buggy address: [ 27.029530][ T370] ffff88810ca9cd00: fc fc fc fc fb fc fc fc fc 06 fc fc fc fc 05 fc [ 27.037564][ T370] ffff88810ca9cd80: fc fc fc fb fc fc fc fc 05 fc fc fc fc fb fc fc [ 27.045614][ T370] >ffff88810ca9ce00: fc fc 05 fc fc fc fc fb fc fc fc fc 01 fc fc fc [ 27.053643][ T370] ^ [ 27.060809][ T370] ffff88810ca9ce80: fc 05 fc fc fc fc fb fc fc fc fc fb fc fc fc fc [ 27.068841][ T370] ffff88810ca9cf00: fb fc fc fc fc fb fc fc fc fc fa fc fc fc fc fb [ 27.076884][ T370] ================================================================== [ 27.084920][ T370] Disabling lock debugging due to kernel taint