program: r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f0000000080), 0x1, 0x561, &(0x7f0000000f80)="$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") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000002300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x4000000}, [@NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x9}], {0x14}}, 0x7c}}, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f0000000180), &(0x7f0000002340)=ANY=[], 0x361, 0x0) r2 = open(&(0x7f0000000580)='./file1\x00', 0x80242, 0x0) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000180)={0xa0, 0xffffffffffffffda, 0x0, {{0x4, 0x3, 0x5, 0x6, 0x3, 0x1, {0x0, 0x9, 0x20ff, 0x5, 0x89, 0xd615, 0x9, 0x7fffffff, 0xfffffffe, 0x8000, 0x0, 0x0, 0x0, 0x3ff, 0x1}}, {0x0, 0x13}}}, 0xa0) sendfile(r2, r2, &(0x7f0000000080), 0x7f03) ioctl$IOMMU_IOAS_ALLOC(0xffffffffffffffff, 0x3b81, &(0x7f00000001c0)={0xc, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r2, 0x3ba0, &(0x7f0000000340)={0x48, 0x2, r3}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x840041, 0x0) lsm_list_modules(&(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=0x50, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140), &(0x7f00000013c0)=ANY=[], 0x700, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000280)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000100)=ANY=[@ANYRESHEX=r0, @ANYRESHEX], 0xfe37, 0x0) [ 69.292483][ T5335] Bluetooth: hci0: command tx timeout [ 69.296072][ T5355] loop0: detected capacity change from 0 to 1024 [ 69.319023][ T5355] ======================================================= [ 69.319023][ T5355] WARNING: The mand mount option has been deprecated and [ 69.319023][ T5355] and is ignored by this kernel. Remove the mand [ 69.319023][ T5355] option from the mount to silence this warning. [ 69.319023][ T5355] ======================================================= [ 69.394411][ T5355] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 69.492956][ T5356] ================================================================== [ 69.496114][ T5356] BUG: KASAN: slab-out-of-bounds in ext4_xattr_set_entry+0x179e/0x1e20 [ 69.499660][ T5356] Read of size 26214 at addr ffff888011c7e800 by task syz.0.0/5356 [ 69.503178][ T5356] [ 69.504238][ T5356] CPU: 0 UID: 0 PID: 5356 Comm: syz.0.0 Not tainted syzkaller #0 PREEMPT(full) [ 69.504255][ T5356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 [ 69.504262][ T5356] Call Trace: [ 69.504270][ T5356] [ 69.504277][ T5356] dump_stack_lvl+0x189/0x250 [ 69.504297][ T5356] ? __kasan_check_byte+0x12/0x40 [ 69.504315][ T5356] ? __pfx_dump_stack_lvl+0x10/0x10 [ 69.504328][ T5356] ? lock_release+0x4b/0x3e0 [ 69.504347][ T5356] ? __virt_addr_valid+0x4a5/0x5c0 [ 69.504362][ T5356] print_report+0xca/0x240 [ 69.504373][ T5356] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 69.504388][ T5356] kasan_report+0x118/0x150 [ 69.504402][ T5356] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 69.504418][ T5356] kasan_check_range+0x2b0/0x2c0 [ 69.504432][ T5356] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 69.504446][ T5356] __asan_memmove+0x29/0x70 [ 69.504457][ T5356] ext4_xattr_set_entry+0x179e/0x1e20 [ 69.504476][ T5356] ext4_xattr_block_set+0x872/0x2ac0 [ 69.504491][ T5356] ? __pfx_ext4_free_in_core_inode+0x10/0x10 [ 69.504505][ T5356] ? __pfx_evict+0x10/0x10 [ 69.504516][ T5356] ? do_raw_spin_unlock+0x4d/0x240 [ 69.504531][ T5356] ? _raw_spin_unlock+0x28/0x50 [ 69.504594][ T5356] ? __pfx_ext4_xattr_block_set+0x10/0x10 [ 69.504611][ T5356] ? ext4_xattr_ibody_set+0x510/0x6a0 [ 69.504626][ T5356] ext4_xattr_set_handle+0xdfb/0x1590 [ 69.504643][ T5356] ? __pfx_ext4_xattr_set_handle+0x10/0x10 [ 69.504659][ T5356] ? __ext4_journal_start_sb+0x27e/0x5c0 [ 69.504675][ T5356] ext4_xattr_set+0x230/0x320 [ 69.504691][ T5356] ? __pfx_ext4_xattr_set+0x10/0x10 [ 69.504706][ T5356] ? __pfx_evm_protect_xattr+0x10/0x10 [ 69.504719][ T5356] ? __pfx_ext4_xattr_trusted_set+0x10/0x10 [ 69.504732][ T5356] __vfs_setxattr+0x43c/0x480 [ 69.504749][ T5356] __vfs_setxattr_noperm+0x12d/0x660 [ 69.504765][ T5356] vfs_setxattr+0x16b/0x2f0 [ 69.504779][ T5356] ? __pfx_vfs_setxattr+0x10/0x10 [ 69.504792][ T5356] ? mnt_get_write_access+0x223/0x2a0 [ 69.504805][ T5356] filename_setxattr+0x274/0x600 [ 69.504821][ T5356] ? __pfx_filename_setxattr+0x10/0x10 [ 69.504837][ T5356] ? getname_flags+0x1e5/0x540 [ 69.504853][ T5356] path_setxattrat+0x364/0x3a0 [ 69.504865][ T5356] ? __pfx_path_setxattrat+0x10/0x10 [ 69.504881][ T5356] ? rcu_is_watching+0x15/0xb0 [ 69.504895][ T5356] __x64_sys_lsetxattr+0xbf/0xe0 [ 69.504911][ T5356] do_syscall_64+0xfa/0x3b0 [ 69.504922][ T5356] ? lockdep_hardirqs_on+0x9c/0x150 [ 69.504933][ T5356] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.504943][ T5356] ? clear_bhb_loop+0x60/0xb0 [ 69.504955][ T5356] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.504966][ T5356] RIP: 0033:0x7fab98d8eec9 [ 69.504978][ T5356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.504989][ T5356] RSP: 002b:00007fab99b7a038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 69.505003][ T5356] RAX: ffffffffffffffda RBX: 00007fab98fe6090 RCX: 00007fab98d8eec9 [ 69.505012][ T5356] RDX: 0000200000000100 RSI: 00002000000000c0 RDI: 0000200000000280 [ 69.505019][ T5356] RBP: 00007fab98e11f91 R08: 0000000000000000 R09: 0000000000000000 [ 69.505025][ T5356] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000 [ 69.505032][ T5356] R13: 00007fab98fe6128 R14: 00007fab98fe6090 R15: 00007ffed0314078 [ 69.505042][ T5356] [ 69.505047][ T5356] [ 69.648739][ T5356] Allocated by task 5356: [ 69.650616][ T5356] kasan_save_track+0x3e/0x80 [ 69.652748][ T5356] __kasan_kmalloc+0x93/0xb0 [ 69.654777][ T5356] __kmalloc_node_track_caller_noprof+0x271/0x4e0 [ 69.657546][ T5356] kmemdup_noprof+0x2b/0x70 [ 69.659551][ T5356] ext4_xattr_block_set+0x781/0x2ac0 [ 69.661843][ T5356] ext4_xattr_set_handle+0xdfb/0x1590 [ 69.664191][ T5356] ext4_xattr_set+0x230/0x320 [ 69.666241][ T5356] __vfs_setxattr+0x43c/0x480 [ 69.668304][ T5356] __vfs_setxattr_noperm+0x12d/0x660 [ 69.670671][ T5356] vfs_setxattr+0x16b/0x2f0 [ 69.672887][ T5356] filename_setxattr+0x274/0x600 [ 69.675434][ T5356] path_setxattrat+0x364/0x3a0 [ 69.677647][ T5356] __x64_sys_lsetxattr+0xbf/0xe0 [ 69.679867][ T5356] do_syscall_64+0xfa/0x3b0 [ 69.681922][ T5356] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.684474][ T5356] [ 69.685504][ T5356] The buggy address belongs to the object at ffff888011c7e800 [ 69.685504][ T5356] which belongs to the cache kmalloc-1k of size 1024 [ 69.691582][ T5356] The buggy address is located 0 bytes inside of [ 69.691582][ T5356] allocated 1024-byte region [ffff888011c7e800, ffff888011c7ec00) [ 69.697454][ T5356] [ 69.698511][ T5356] The buggy address belongs to the physical page: [ 69.701363][ T5356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11c7c [ 69.705002][ T5356] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 69.708623][ T5356] ksm flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff) [ 69.712123][ T5356] page_type: f5(slab) [ 69.713937][ T5356] raw: 00fff00000000040 ffff88801a841dc0 ffffea0000d66800 dead000000000003 [ 69.717812][ T5356] raw: 0000000000000000 0000000080080008 00000000f5000000 0000000000000000 [ 69.721621][ T5356] head: 00fff00000000040 ffff88801a841dc0 ffffea0000d66800 dead000000000003 [ 69.725177][ T5356] head: 0000000000000000 0000000080080008 00000000f5000000 0000000000000000 [ 69.728804][ T5356] head: 00fff00000000002 ffffea0000471f01 00000000ffffffff 00000000ffffffff [ 69.732496][ T5356] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 69.736166][ T5356] page dumped because: kasan: bad access detected [ 69.738781][ T5356] page_owner tracks the page as allocated [ 69.741229][ T5356] page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 4731, tgid 4731 (init), ts 25014301267, free_ts 24469814070 [ 69.749443][ T5356] post_alloc_hook+0x240/0x2a0 [ 69.751525][ T5356] get_page_from_freelist+0x21e4/0x22c0 [ 69.753788][ T5356] __alloc_frozen_pages_noprof+0x181/0x370 [ 69.760313][ T5356] alloc_pages_mpol+0x232/0x4a0 [ 69.762387][ T5356] allocate_slab+0x8a/0x370 [ 69.764416][ T5356] ___slab_alloc+0xbeb/0x1420 [ 69.766586][ T5356] __kmalloc_noprof+0x305/0x4f0 [ 69.768734][ T5356] tomoyo_init_log+0x1a6e/0x1f70 [ 69.770802][ T5356] tomoyo_supervisor+0x340/0x1480 [ 69.772869][ T5356] tomoyo_env_perm+0x149/0x1e0 [ 69.774824][ T5356] tomoyo_find_next_domain+0x15cf/0x1aa0 [ 69.777180][ T5356] tomoyo_bprm_check_security+0x11c/0x180 [ 69.779481][ T5356] security_bprm_check+0x89/0x270 [ 69.781396][ T5356] bprm_execve+0x8ee/0x1450 [ 69.783340][ T5356] do_execveat_common+0x510/0x6a0 [ 69.785418][ T5356] __x64_sys_execve+0x94/0xb0 [ 69.787381][ T5356] page last free pid 1 tgid 1 stack trace: [ 69.789866][ T5356] __free_frozen_pages+0xbc4/0xd30 [ 69.791961][ T5356] free_reserved_page+0xce/0x120 [ 69.794060][ T5356] free_reserved_area+0x90/0x190 [ 69.796216][ T5356] free_kernel_image_pages+0xa2/0x100 [ 69.798432][ T5356] kernel_init+0x31/0x1d0 [ 69.800129][ T5356] ret_from_fork+0x439/0x7d0 [ 69.802190][ T5356] ret_from_fork_asm+0x1a/0x30 [ 69.804223][ T5356] [ 69.805262][ T5356] Memory state around the buggy address: [ 69.807535][ T5356] ffff888011c7eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 69.810834][ T5356] ffff888011c7eb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 69.814216][ T5356] >ffff888011c7ec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.817596][ T5356] ^ [ 69.819193][ T5356] ffff888011c7ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.822660][ T5356] ffff888011c7ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.826224][ T5356] ================================================================== [ 69.843513][ T5356] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 69.846500][ T5356] CPU: 0 UID: 0 PID: 5356 Comm: syz.0.0 Not tainted syzkaller #0 PREEMPT(full) [ 69.850160][ T5356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 [ 69.854788][ T5356] Call Trace: [ 69.856248][ T5356] [ 69.857581][ T5356] dump_stack_lvl+0x99/0x250 [ 69.859564][ T5356] ? __asan_memcpy+0x40/0x70 [ 69.861568][ T5356] ? __pfx_dump_stack_lvl+0x10/0x10 [ 69.863642][ T5356] ? __pfx__printk+0x10/0x10 [ 69.865632][ T5356] vpanic+0x281/0x750 [ 69.867605][ T5356] ? preempt_schedule+0xae/0xc0 [ 69.869857][ T5356] ? __pfx_vpanic+0x10/0x10 [ 69.871941][ T5356] ? preempt_schedule_common+0x83/0xd0 [ 69.874258][ T5356] ? preempt_schedule+0xae/0xc0 [ 69.876354][ T5356] ? __pfx_preempt_schedule+0x10/0x10 [ 69.878606][ T5356] panic+0xb9/0xc0 [ 69.880223][ T5356] ? __pfx_panic+0x10/0x10 [ 69.882178][ T5356] ? _raw_spin_unlock_irqrestore+0xfd/0x110 [ 69.884575][ T5356] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 69.886917][ T5356] check_panic_on_warn+0x89/0xb0 [ 69.889040][ T5356] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 69.891560][ T5356] end_report+0x78/0x160 [ 69.893650][ T5356] kasan_report+0x129/0x150 [ 69.895586][ T5356] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 69.897956][ T5356] kasan_check_range+0x2b0/0x2c0 [ 69.900070][ T5356] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 69.902353][ T5356] __asan_memmove+0x29/0x70 [ 69.904214][ T5356] ext4_xattr_set_entry+0x179e/0x1e20 [ 69.906521][ T5356] ext4_xattr_block_set+0x872/0x2ac0 [ 69.908599][ T5356] ? __pfx_ext4_free_in_core_inode+0x10/0x10 [ 69.911110][ T5356] ? __pfx_evict+0x10/0x10 [ 69.912796][ T5356] ? do_raw_spin_unlock+0x4d/0x240 [ 69.914729][ T5356] ? _raw_spin_unlock+0x28/0x50 [ 69.916868][ T5356] ? __pfx_ext4_xattr_block_set+0x10/0x10 [ 69.919349][ T5356] ? ext4_xattr_ibody_set+0x510/0x6a0 [ 69.921800][ T5356] ext4_xattr_set_handle+0xdfb/0x1590 [ 69.924230][ T5356] ? __pfx_ext4_xattr_set_handle+0x10/0x10 [ 69.926776][ T5356] ? __ext4_journal_start_sb+0x27e/0x5c0 [ 69.929593][ T5356] ext4_xattr_set+0x230/0x320 [ 69.931758][ T5356] ? __pfx_ext4_xattr_set+0x10/0x10 [ 69.934079][ T5356] ? __pfx_evm_protect_xattr+0x10/0x10 [ 69.936625][ T5356] ? __pfx_ext4_xattr_trusted_set+0x10/0x10 [ 69.939380][ T5356] __vfs_setxattr+0x43c/0x480 [ 69.941581][ T5356] __vfs_setxattr_noperm+0x12d/0x660 [ 69.944019][ T5356] vfs_setxattr+0x16b/0x2f0 [ 69.946073][ T5356] ? __pfx_vfs_setxattr+0x10/0x10 [ 69.948394][ T5356] ? mnt_get_write_access+0x223/0x2a0 [ 69.950857][ T5356] filename_setxattr+0x274/0x600 [ 69.953201][ T5356] ? __pfx_filename_setxattr+0x10/0x10 [ 69.955299][ T5356] ? getname_flags+0x1e5/0x540 [ 69.957385][ T5356] path_setxattrat+0x364/0x3a0 [ 69.959498][ T5356] ? __pfx_path_setxattrat+0x10/0x10 [ 69.961762][ T5356] ? rcu_is_watching+0x15/0xb0 [ 69.963780][ T5356] __x64_sys_lsetxattr+0xbf/0xe0 [ 69.965838][ T5356] do_syscall_64+0xfa/0x3b0 [ 69.968147][ T5356] ? lockdep_hardirqs_on+0x9c/0x150 [ 69.970836][ T5356] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.973456][ T5356] ? clear_bhb_loop+0x60/0xb0 [ 69.975506][ T5356] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.978017][ T5356] RIP: 0033:0x7fab98d8eec9 [ 69.979905][ T5356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.989730][ T5356] RSP: 002b:00007fab99b7a038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 69.994190][ T5356] RAX: ffffffffffffffda RBX: 00007fab98fe6090 RCX: 00007fab98d8eec9 [ 69.998363][ T5356] RDX: 0000200000000100 RSI: 00002000000000c0 RDI: 0000200000000280 [ 70.002054][ T5356] RBP: 00007fab98e11f91 R08: 0000000000000000 R09: 0000000000000000 [ 70.005313][ T5356] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000 [ 70.008481][ T5356] R13: 00007fab98fe6128 R14: 00007fab98fe6090 R15: 00007ffed0314078 [ 70.011641][ T5356] [ 70.013265][ T5356] Kernel Offset: disabled [ 70.015125][ T5356] Rebooting in 86400 seconds..