Warning: Permanently added '10.128.1.179' (ED25519) to the list of known hosts. 2026/01/14 13:59:16 parsed 1 programs [ 29.205256][ T30] audit: type=1400 audit(1768399156.105:64): avc: denied { node_bind } for pid=281 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 29.233669][ T30] audit: type=1400 audit(1768399156.105:65): avc: denied { module_request } for pid=281 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 30.413535][ T30] audit: type=1400 audit(1768399157.305:66): avc: denied { mounton } for pid=289 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 30.421061][ T289] cgroup: Unknown subsys name 'net' [ 30.446540][ T30] audit: type=1400 audit(1768399157.315:67): avc: denied { mount } for pid=289 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.489034][ T30] audit: type=1400 audit(1768399157.355:68): avc: denied { unmount } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.489537][ T289] cgroup: Unknown subsys name 'devices' [ 30.737302][ T289] cgroup: Unknown subsys name 'hugetlb' [ 30.746594][ T289] cgroup: Unknown subsys name 'rlimit' [ 31.049125][ T30] audit: type=1400 audit(1768399157.945:69): avc: denied { setattr } for pid=289 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.076224][ T30] audit: type=1400 audit(1768399157.945:70): avc: denied { create } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.103947][ T30] audit: type=1400 audit(1768399157.945:71): avc: denied { write } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.133563][ T30] audit: type=1400 audit(1768399157.945:72): avc: denied { read } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.148669][ T291] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 31.159961][ T30] audit: type=1400 audit(1768399157.945:73): avc: denied { mounton } for pid=289 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 31.228506][ T289] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 31.732683][ T294] request_module fs-gadgetfs succeeded, but still no fs? [ 32.651853][ T346] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.662435][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.672500][ T346] device bridge_slave_0 entered promiscuous mode [ 32.682081][ T346] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.691807][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.700905][ T346] device bridge_slave_1 entered promiscuous mode [ 32.782657][ T346] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.792245][ T346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.803624][ T346] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.813998][ T346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.838283][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.848037][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.857685][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.876016][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.886383][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.896463][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.906619][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.916148][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.926030][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.946871][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.959320][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 32.981671][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.004584][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.014628][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.030610][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.043376][ T346] device veth0_vlan entered promiscuous mode [ 33.065658][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.076872][ T346] device veth1_macvtap entered promiscuous mode [ 33.090526][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.110821][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.163906][ T346] syz-executor (346) used greatest stack depth: 20736 bytes left 2026/01/14 13:59:20 executed programs: 0 [ 33.511536][ T363] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.520767][ T363] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.530935][ T363] device bridge_slave_0 entered promiscuous mode [ 33.547242][ T363] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.555916][ T363] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.568503][ T363] device bridge_slave_1 entered promiscuous mode [ 33.652726][ T363] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.664068][ T363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.674818][ T363] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.684788][ T363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.721129][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.731989][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.742617][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.757213][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 33.768326][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.776699][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.789162][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 33.801314][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.815961][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.836409][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 33.859401][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.876822][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.897789][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.910988][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.922213][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.935682][ T363] device veth0_vlan entered promiscuous mode [ 33.956331][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.968482][ T363] device veth1_macvtap entered promiscuous mode [ 33.979076][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.997115][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.114925][ T45] device bridge_slave_1 left promiscuous mode [ 34.126696][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.138512][ T45] device bridge_slave_0 left promiscuous mode [ 34.148334][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.160730][ T45] device veth1_macvtap left promiscuous mode [ 34.170196][ T45] device veth0_vlan left promiscuous mode [ 34.342958][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 34.342975][ T30] audit: type=1400 audit(1768399161.235:106): avc: denied { perfmon } for pid=373 comm="syz.2.17" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 34.380113][ T30] audit: type=1400 audit(1768399161.285:107): avc: denied { prog_run } for pid=373 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 34.405041][ T373] ================================================================== [ 34.405484][ T30] audit: type=1400 audit(1768399161.315:108): avc: denied { setopt } for pid=373 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 34.418545][ T373] BUG: KASAN: slab-out-of-bounds in l2cap_sock_setsockopt+0x1b8e/0x1f60 [ 34.418598][ T373] Read of size 4 at addr ffff88810f879463 by task syz.2.17/373 [ 34.418614][ T373] [ 34.418625][ T373] CPU: 0 PID: 373 Comm: syz.2.17 Not tainted syzkaller #0 [ 34.488579][ T373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 34.500737][ T373] Call Trace: [ 34.506480][ T373] [ 34.510413][ T373] __dump_stack+0x21/0x30 [ 34.516339][ T373] dump_stack_lvl+0xee/0x150 [ 34.523001][ T373] ? show_regs_print_info+0x20/0x20 [ 34.531010][ T373] ? load_image+0x3a0/0x3a0 [ 34.537665][ T373] ? lock_sock_nested+0x1f1/0x290 [ 34.543754][ T373] print_address_description+0x7f/0x2c0 [ 34.550799][ T373] ? l2cap_sock_setsockopt+0x1b8e/0x1f60 [ 34.558569][ T373] kasan_report+0xf1/0x140 [ 34.565016][ T373] ? memcpy+0x56/0x70 [ 34.570776][ T373] ? l2cap_sock_setsockopt+0x1b8e/0x1f60 [ 34.576923][ T373] __asan_report_load_n_noabort+0xf/0x20 [ 34.583595][ T373] l2cap_sock_setsockopt+0x1b8e/0x1f60 [ 34.593312][ T373] ? selinux_socket_setsockopt+0x21c/0x300 [ 34.601541][ T373] ? __cgroup_bpf_run_filter_sysctl+0x700/0x700 [ 34.613036][ T373] ? link_create+0x623/0x960 [ 34.620625][ T373] ? l2cap_sock_shutdown+0xbe0/0xbe0 [ 34.627640][ T373] ? security_socket_setsockopt+0x82/0xa0 [ 34.635456][ T373] ? l2cap_sock_shutdown+0xbe0/0xbe0 [ 34.644269][ T373] __sys_setsockopt+0x2f0/0x460 [ 34.650808][ T373] ? __ia32_sys_recv+0xb0/0xb0 [ 34.657917][ T373] __x64_sys_setsockopt+0xbf/0xd0 [ 34.667322][ T373] x64_sys_call+0x982/0x9a0 [ 34.673159][ T373] do_syscall_64+0x4c/0xa0 [ 34.678718][ T373] ? clear_bhb_loop+0x50/0xa0 [ 34.686545][ T373] ? clear_bhb_loop+0x50/0xa0 [ 34.692326][ T373] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 34.700376][ T373] RIP: 0033:0x7f069f4cc749 [ 34.706552][ T373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.731098][ T373] RSP: 002b:00007ffc1832a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 34.741806][ T373] RAX: ffffffffffffffda RBX: 00007f069f722fa0 RCX: 00007f069f4cc749 [ 34.752047][ T373] RDX: 0000000000000008 RSI: 0000000000000112 RDI: 0000000000000004 [ 34.761358][ T373] RBP: 00007f069f550f91 R08: 0000000000000001 R09: 0000000000000000 [ 34.770892][ T373] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000000 [ 34.782875][ T373] R13: 00007f069f722fa0 R14: 00007f069f722fa0 R15: 0000000000000005 [ 34.794373][ T373] [ 34.799748][ T373] [ 34.804614][ T373] Allocated by task 373: [ 34.812130][ T373] __kasan_kmalloc+0xda/0x110 [ 34.817467][ T373] __kmalloc+0x13d/0x2c0 [ 34.826983][ T373] __cgroup_bpf_run_filter_setsockopt+0x891/0xa40 [ 34.836411][ T373] __sys_setsockopt+0x413/0x460 [ 34.843070][ T373] __x64_sys_setsockopt+0xbf/0xd0 [ 34.849585][ T373] x64_sys_call+0x982/0x9a0 [ 34.854995][ T373] do_syscall_64+0x4c/0xa0 [ 34.861313][ T373] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 34.870203][ T373] [ 34.873081][ T373] The buggy address belongs to the object at ffff88810f879460 [ 34.873081][ T373] which belongs to the cache kmalloc-8 of size 8 [ 34.889652][ T373] The buggy address is located 3 bytes inside of [ 34.889652][ T373] 8-byte region [ffff88810f879460, ffff88810f879468) [ 34.906517][ T373] The buggy address belongs to the page: [ 34.914509][ T373] page:ffffea00043e1e40 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10f879 [ 34.929238][ T373] flags: 0x4000000000000200(slab|zone=1) [ 34.936212][ T373] raw: 4000000000000200 ffffea000437ffc0 0000000d0000000d ffff888100042300 [ 34.947641][ T373] raw: 0000000000000000 0000000080660066 00000001ffffffff 0000000000000000 [ 34.958930][ T373] page dumped because: kasan: bad access detected [ 34.968876][ T373] page_owner tracks the page as allocated [ 34.978497][ T373] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 102, ts 7439402501, free_ts 0 [ 34.996824][ T373] post_alloc_hook+0x192/0x1b0 [ 35.004711][ T373] prep_new_page+0x1c/0x110 [ 35.011912][ T373] get_page_from_freelist+0x2cc5/0x2d50 [ 35.021429][ T373] __alloc_pages+0x18f/0x440 [ 35.029593][ T373] new_slab+0xa1/0x4d0 [ 35.035952][ T373] ___slab_alloc+0x381/0x810 [ 35.043376][ T373] __slab_alloc+0x49/0x90 [ 35.049815][ T373] __kmalloc+0x16a/0x2c0 [ 35.054588][ T373] kernfs_fop_write_iter+0x156/0x400 [ 35.062137][ T373] vfs_write+0x802/0xf70 [ 35.067840][ T373] ksys_write+0x140/0x240 [ 35.073291][ T373] __x64_sys_write+0x7b/0x90 [ 35.079769][ T373] x64_sys_call+0x8ef/0x9a0 [ 35.086921][ T373] do_syscall_64+0x4c/0xa0 [ 35.093403][ T373] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 35.100790][ T373] page_owner free stack trace missing [ 35.107219][ T373] [ 35.109928][ T373] Memory state around the buggy address: [ 35.116858][ T373] ffff88810f879300: fc fc fc fc 04 fc fc fc fc 05 fc fc fc fc fb fc [ 35.128908][ T373] ffff88810f879380: fc fc fc fb fc fc fc fc fa fc fc fc fc 06 fc fc [ 35.139462][ T373] >ffff88810f879400: fc fc fb fc fc fc fc 06 fc fc fc fc 01 fc fc fc [ 35.151229][ T373] ^ [ 35.162261][ T373] ffff88810f879480: fc fb fc fc fc fc fa fc fc fc fc fa fc fc fc fc [ 35.174995][ T373] ffff88810f879500: 01 fc fc fc fc fa fc fc fc fc fb fc fc fc fc fb [ 35.184234][ T373] ================================================================== [ 35.195424][ T373] Disabling lock debugging due to kernel taint [ 35.208544][ T30] audit: type=1400 audit(1768399162.105:109): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 35.234339][ T30] audit: type=1400 audit(1768399162.105:110): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 35.260376][ T30] audit: type=1400 audit(1768399162.105:111): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 35.286262][ T30] audit: type=1400 audit(1768399162.105:112): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 35.311954][ T30] audit: type=1400 audit(1768399162.105:113): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 35.336400][ T30] audit: type=1400 audit(1768399162.105:114): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 35.379940][ T30] audit: type=1400 audit(1768399162.105:115): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 2026/01/14 13:59:25 executed programs: 187 2026/01/14 13:59:30 executed programs: 487