Warning: Permanently added '10.128.1.199' (ED25519) to the list of known hosts. 2026/03/03 16:31:26 parsed 1 programs Setting up swapspace version 1, size = 127995904 bytes [ 45.004797][ T30] audit: type=1400 audit(1772555487.126:105): avc: denied { unlink } for pid=386 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 45.053391][ T386] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 46.046144][ T435] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.053796][ T435] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.062125][ T435] device bridge_slave_0 entered promiscuous mode [ 46.069081][ T435] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.076836][ T435] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.084967][ T435] device bridge_slave_1 entered promiscuous mode [ 46.125768][ T435] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.133769][ T435] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.142042][ T435] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.149569][ T435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.167375][ T419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.175561][ T419] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.183554][ T419] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.197641][ T419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.208320][ T419] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.217399][ T419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.228998][ T419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.238693][ T419] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.247466][ T419] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.263902][ T419] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.276237][ T419] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.293039][ T419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.311118][ T419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.319950][ T419] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.329270][ T419] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.343610][ T435] device veth0_vlan entered promiscuous mode [ 46.356301][ T419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.366481][ T435] device veth1_macvtap entered promiscuous mode [ 46.377307][ T419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.393554][ T419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.476347][ T30] audit: type=1401 audit(1772555488.596:106): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 2026/03/03 16:31:28 executed programs: 0 [ 46.656384][ T450] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.663863][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.672309][ T450] device bridge_slave_0 entered promiscuous mode [ 46.681145][ T450] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.689208][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.699370][ T450] device bridge_slave_1 entered promiscuous mode [ 46.745093][ T450] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.753165][ T450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.761885][ T450] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.770326][ T450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.789485][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.797272][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.805592][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.815216][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.824445][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.832074][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.842869][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.853086][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.861116][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.876676][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.887197][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.900640][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.920170][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.928868][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.937305][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.946874][ T450] device veth0_vlan entered promiscuous mode [ 46.963279][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.974930][ T450] device veth1_macvtap entered promiscuous mode [ 46.990689][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.002656][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.035988][ T30] audit: type=1400 audit(1772555489.156:107): avc: denied { prog_load } for pid=454 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 47.059405][ T30] audit: type=1400 audit(1772555489.156:108): avc: denied { bpf } for pid=454 comm="syz.2.17" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 47.090419][ T30] audit: type=1400 audit(1772555489.206:109): avc: denied { setopt } for pid=454 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 47.161775][ T30] audit: type=1400 audit(1772555489.276:110): avc: denied { perfmon } for pid=454 comm="syz.2.17" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 47.184680][ T30] audit: type=1400 audit(1772555489.306:111): avc: denied { prog_run } for pid=454 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 47.216716][ T458] ================================================================== [ 47.226501][ T458] BUG: KASAN: slab-out-of-bounds in hci_sock_setsockopt+0x7f1/0x820 [ 47.236838][ T458] Read of size 4 at addr ffff8881065c4b93 by task syz.2.18/458 [ 47.245581][ T458] [ 47.248348][ T458] CPU: 1 PID: 458 Comm: syz.2.18 Not tainted syzkaller #0 [ 47.256472][ T458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 47.268521][ T458] Call Trace: [ 47.272031][ T458] [ 47.275235][ T458] __dump_stack+0x21/0x30 [ 47.279832][ T458] dump_stack_lvl+0x110/0x170 [ 47.285229][ T458] ? show_regs_print_info+0x20/0x20 [ 47.291148][ T458] ? load_image+0x3e0/0x3e0 [ 47.295745][ T458] ? lock_sock_nested+0x21c/0x2a0 [ 47.301570][ T458] print_address_description+0x7f/0x2c0 [ 47.307373][ T458] ? hci_sock_setsockopt+0x7f1/0x820 [ 47.313260][ T458] kasan_report+0xf1/0x140 [ 47.318574][ T458] ? hci_sock_setsockopt+0x7f1/0x820 [ 47.325541][ T458] __asan_report_load_n_noabort+0xf/0x20 [ 47.331797][ T458] hci_sock_setsockopt+0x7f1/0x820 [ 47.337677][ T458] ? __fget_files+0x2c4/0x320 [ 47.343466][ T458] ? hci_sock_compat_ioctl+0x50/0x50 [ 47.349839][ T458] ? security_socket_setsockopt+0x82/0xa0 [ 47.356135][ T458] ? hci_sock_compat_ioctl+0x50/0x50 [ 47.361944][ T458] __sys_setsockopt+0x2e9/0x470 [ 47.367660][ T458] ? __ia32_sys_recv+0xb0/0xb0 [ 47.372705][ T458] ? __kasan_check_write+0x14/0x20 [ 47.378277][ T458] __x64_sys_setsockopt+0xbf/0xd0 [ 47.384083][ T458] x64_sys_call+0x982/0x9a0 [ 47.389289][ T458] do_syscall_64+0x4c/0xa0 [ 47.393789][ T458] ? clear_bhb_loop+0x50/0xa0 [ 47.398735][ T458] ? clear_bhb_loop+0x50/0xa0 [ 47.403588][ T458] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.410521][ T458] RIP: 0033:0x7f9b0d55bf79 [ 47.415024][ T458] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 47.437836][ T458] RSP: 002b:00007f9b0d3bf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 47.449142][ T458] RAX: ffffffffffffffda RBX: 00007f9b0d7d5fa0 RCX: 00007f9b0d55bf79 [ 47.458860][ T458] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000008 [ 47.467782][ T458] RBP: 00007f9b0d5f27e0 R08: 0000000000000001 R09: 0000000000000000 [ 47.477418][ T458] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000000 [ 47.486107][ T458] R13: 00007f9b0d7d6038 R14: 00007f9b0d7d5fa0 R15: 00007ffdddfd1e78 [ 47.496511][ T458] [ 47.499989][ T458] [ 47.502999][ T458] Allocated by task 458: [ 47.509836][ T458] __kasan_kmalloc+0xda/0x110 [ 47.515794][ T458] __kmalloc+0x13d/0x2c0 [ 47.520370][ T458] __cgroup_bpf_run_filter_setsockopt+0x8e7/0xaa0 [ 47.527574][ T458] __sys_setsockopt+0x40e/0x470 [ 47.532855][ T458] __x64_sys_setsockopt+0xbf/0xd0 [ 47.538490][ T458] x64_sys_call+0x982/0x9a0 [ 47.543781][ T458] do_syscall_64+0x4c/0xa0 [ 47.548551][ T458] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.555341][ T458] [ 47.558264][ T458] The buggy address belongs to the object at ffff8881065c4b90 [ 47.558264][ T458] which belongs to the cache kmalloc-8 of size 8 [ 47.576608][ T458] The buggy address is located 3 bytes inside of [ 47.576608][ T458] 8-byte region [ffff8881065c4b90, ffff8881065c4b98) [ 47.591181][ T458] The buggy address belongs to the page: [ 47.597456][ T458] page:ffffea0004197100 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c4 [ 47.609736][ T458] flags: 0x4000000000000200(slab|zone=1) [ 47.616033][ T458] raw: 4000000000000200 dead000000000100 dead000000000122 ffff888100042300 [ 47.625781][ T458] raw: 0000000000000000 0000000080660066 00000001ffffffff 0000000000000000 [ 47.634954][ T458] page dumped because: kasan: bad access detected [ 47.643174][ T458] page_owner tracks the page as allocated [ 47.649655][ T458] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1, ts 1578054912, free_ts 1559924595 [ 47.666386][ T458] post_alloc_hook+0x192/0x1b0 [ 47.671953][ T458] prep_new_page+0x1c/0x110 [ 47.677001][ T458] get_page_from_freelist+0x2d3a/0x2dc0 [ 47.683358][ T458] __alloc_pages+0x1a2/0x460 [ 47.688710][ T458] new_slab+0xa1/0x4d0 [ 47.693552][ T458] ___slab_alloc+0x381/0x810 [ 47.698676][ T458] __slab_alloc+0x49/0x90 [ 47.703653][ T458] __kmalloc+0x16a/0x2c0 [ 47.708276][ T458] acpi_ns_internalize_name+0x2c8/0x3b0 [ 47.714692][ T458] acpi_ns_get_node+0x1a7/0x360 [ 47.719801][ T458] acpi_ns_evaluate+0x358/0xa00 [ 47.725076][ T458] acpi_evaluate_object+0x557/0xa20 [ 47.731154][ T458] acpi_evaluate_integer+0x103/0x1e0 [ 47.737049][ T458] acpi_init_device_object+0x21de/0x26e0 [ 47.743502][ T458] acpi_add_single_object+0xde/0x1770 [ 47.749729][ T458] acpi_bus_check_add+0x38d/0x790 [ 47.755422][ T458] page last free stack trace: [ 47.760301][ T458] free_unref_page_prepare+0x542/0x550 [ 47.767049][ T458] free_unref_page+0xae/0x540 [ 47.773832][ T458] __free_pages+0x6c/0x100 [ 47.778427][ T458] __free_slab+0xe8/0x1e0 [ 47.783006][ T458] __unfreeze_partials+0x160/0x190 [ 47.789466][ T458] flush_cpu_slab+0x10a/0x1b0 [ 47.795803][ T458] process_one_work+0x6be/0xba0 [ 47.801391][ T458] worker_thread+0xd84/0x1200 [ 47.806162][ T458] kthread+0x411/0x500 [ 47.810474][ T458] ret_from_fork+0x1f/0x30 [ 47.815231][ T458] [ 47.817720][ T458] Memory state around the buggy address: [ 47.823978][ T458] ffff8881065c4a80: fc fc fc fc fa fc fc fc fc fb fc fc fc fc fa fc [ 47.834221][ T458] ffff8881065c4b00: fc fc fc fa fc fc fc fc fa fc fc fc fc fa fc fc [ 47.843496][ T458] >ffff8881065c4b80: fc fc 01 fc fc fc fc fb fc fc fc fc fb fc fc fc [ 47.852727][ T458] ^ [ 47.857802][ T458] ffff8881065c4c00: fc fa fc fc fc fc fb fc fc fc fc fa fc fc fc fc [ 47.866405][ T458] ffff8881065c4c80: 05 fc fc fc fc fb fc fc fc fc 05 fc fc fc fc 07 [ 47.875412][ T458] ================================================================== [ 47.883536][ T458] Disabling lock debugging due to kernel taint [ 47.895005][ T30] audit: type=1400 audit(1772555490.016:112): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 47.931197][ T30] audit: type=1400 audit(1772555490.016:113): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 47.954041][ T30] audit: type=1400 audit(1772555490.016:114): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 48.094611][ T10] device bridge_slave_1 left promiscuous mode [ 48.101187][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.112661][ T10] device bridge_slave_0 left promiscuous mode [ 48.120026][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.129240][ T10] device veth1_macvtap left promiscuous mode [ 48.135851][ T10] device veth0_vlan left promiscuous mode 2026/03/03 16:31:33 executed programs: 221 2026/03/03 16:31:38 executed programs: 521