Warning: Permanently added '10.128.1.145' (ED25519) to the list of known hosts. 2025/10/23 04:38:04 parsed 1 programs [ 21.834883][ T28] audit: type=1400 audit(1761194284.824:64): avc: denied { node_bind } for pid=283 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 21.855582][ T28] audit: type=1400 audit(1761194284.824:65): avc: denied { module_request } for pid=283 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 22.588667][ T28] audit: type=1400 audit(1761194285.574:66): avc: denied { mounton } for pid=291 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.589605][ T291] cgroup: Unknown subsys name 'net' [ 22.611319][ T28] audit: type=1400 audit(1761194285.574:67): avc: denied { mount } for pid=291 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.638551][ T28] audit: type=1400 audit(1761194285.604:68): avc: denied { unmount } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.638729][ T291] cgroup: Unknown subsys name 'devices' [ 22.761993][ T291] cgroup: Unknown subsys name 'hugetlb' [ 22.767586][ T291] cgroup: Unknown subsys name 'rlimit' [ 22.904922][ T28] audit: type=1400 audit(1761194285.894:69): avc: denied { setattr } for pid=291 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.928162][ T28] audit: type=1400 audit(1761194285.894:70): avc: denied { create } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.936457][ T293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.948671][ T28] audit: type=1400 audit(1761194285.894:71): avc: denied { write } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.977293][ T28] audit: type=1400 audit(1761194285.894:72): avc: denied { read } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.997450][ T28] audit: type=1400 audit(1761194285.894:73): avc: denied { mounton } for pid=291 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.034220][ T291] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.706903][ T295] request_module fs-gadgetfs succeeded, but still no fs? [ 24.086107][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.093167][ T326] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.100660][ T326] device bridge_slave_0 entered promiscuous mode [ 24.108327][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.115384][ T326] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.122696][ T326] device bridge_slave_1 entered promiscuous mode [ 24.161706][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.168733][ T326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.176009][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.183036][ T326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.199572][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.207320][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.214535][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.223765][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.231957][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.238960][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.247353][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.255569][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.262600][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.274720][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.283565][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.296164][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.306710][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.314728][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.322284][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.330315][ T326] device veth0_vlan entered promiscuous mode [ 24.339400][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.348907][ T326] device veth1_macvtap entered promiscuous mode [ 24.359007][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.368660][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.395361][ T326] syz-executor (326) used greatest stack depth: 22176 bytes left 2025/10/23 04:38:07 executed programs: 0 [ 24.754728][ T364] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.762115][ T364] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.769414][ T364] device bridge_slave_0 entered promiscuous mode [ 24.782342][ T364] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.789355][ T364] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.796717][ T364] device bridge_slave_1 entered promiscuous mode [ 24.842157][ T364] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.849178][ T364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.856455][ T364] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.863484][ T364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.872083][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.879236][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.898932][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.906468][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.915490][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.924181][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.932399][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.939412][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.952398][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.960707][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.968786][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.975909][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.986881][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.994990][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.003736][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.011947][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.027080][ T364] device veth0_vlan entered promiscuous mode [ 25.033371][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.041641][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.049847][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.057706][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.066451][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.073929][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.087791][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.095957][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.104818][ T364] device veth1_macvtap entered promiscuous mode [ 25.114318][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.122114][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.130602][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.139637][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.147894][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.173020][ T374] loop2: detected capacity change from 0 to 512 [ 25.186685][ T374] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 25.199835][ T374] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 25.213769][ T374] EXT4-fs warning (device loop2): ext4_expand_extra_isize_ea:2818: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 25.226985][ T374] EXT4-fs (loop2): 1 truncate cleaned up [ 25.232665][ T374] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 25.245149][ T374] ================================================================== [ 25.253215][ T374] BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0xaf2/0x21d0 [ 25.260928][ T374] Read of size 18446744073709551540 at addr ffff888113e60070 by task syz.2.17/374 [ 25.270097][ T374] [ 25.272401][ T374] CPU: 1 PID: 374 Comm: syz.2.17 Not tainted syzkaller #0 [ 25.279492][ T374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 25.289550][ T374] Call Trace: [ 25.292821][ T374] [ 25.295739][ T374] __dump_stack+0x21/0x24 [ 25.300048][ T374] dump_stack_lvl+0xee/0x150 [ 25.304746][ T374] ? __cfi_dump_stack_lvl+0x8/0x8 [ 25.309748][ T374] ? ext4_xattr_block_set+0x9dc/0x3270 [ 25.315193][ T374] ? __vfs_setxattr+0x3f2/0x440 [ 25.320034][ T374] ? ext4_xattr_set_entry+0xaf2/0x21d0 [ 25.325479][ T374] print_address_description+0x71/0x200 [ 25.331017][ T374] print_report+0x4a/0x60 [ 25.335328][ T374] kasan_report+0x122/0x150 [ 25.339822][ T374] ? ext4_xattr_set_entry+0xaf2/0x21d0 [ 25.345275][ T374] ? ext4_xattr_set_entry+0xaf2/0x21d0 [ 25.350727][ T374] kasan_check_range+0x280/0x290 [ 25.355645][ T374] memmove+0x2d/0x70 [ 25.359525][ T374] ext4_xattr_set_entry+0xaf2/0x21d0 [ 25.364890][ T374] ext4_xattr_block_set+0xada/0x3270 [ 25.370162][ T374] ? inode_add_lru+0x20/0x20 [ 25.374741][ T374] ? _raw_spin_unlock+0x4c/0x70 [ 25.379568][ T374] ? iput+0x543/0x670 [ 25.383525][ T374] ? ext4_xattr_block_find+0x310/0x310 [ 25.388972][ T374] ext4_xattr_set_handle+0xba5/0x12b0 [ 25.394325][ T374] ? __cfi_ext4_xattr_set_handle+0x10/0x10 [ 25.400115][ T374] ? __kasan_check_read+0x11/0x20 [ 25.405117][ T374] ? __ext4_journal_start_sb+0x2ed/0x4a0 [ 25.410722][ T374] ext4_xattr_set+0x22a/0x320 [ 25.415383][ T374] ? __cfi_ext4_xattr_set+0x10/0x10 [ 25.420554][ T374] ? selinux_inode_setxattr+0x5aa/0xba0 [ 25.426076][ T374] ext4_xattr_trusted_set+0x3c/0x50 [ 25.431338][ T374] ? __cfi_ext4_xattr_trusted_set+0x10/0x10 [ 25.437208][ T374] __vfs_setxattr+0x3f2/0x440 [ 25.441894][ T374] __vfs_setxattr_noperm+0x12a/0x5e0 [ 25.447162][ T374] __vfs_setxattr_locked+0x212/0x230 [ 25.452427][ T374] vfs_setxattr+0x168/0x2f0 [ 25.456909][ T374] ? __cfi_vfs_setxattr+0x10/0x10 [ 25.461914][ T374] ? copy_user_enhanced_fast_string+0xa/0x40 [ 25.467882][ T374] setxattr+0x2b2/0x2d0 [ 25.472018][ T374] ? path_setxattr+0x280/0x280 [ 25.476774][ T374] ? __mnt_want_write+0x1e6/0x260 [ 25.481781][ T374] ? mnt_want_write+0x220/0x300 [ 25.486611][ T374] path_setxattr+0x142/0x280 [ 25.491184][ T374] ? simple_xattr_list_add+0x120/0x120 [ 25.496623][ T374] ? do_sys_truncate+0x12f/0x190 [ 25.501539][ T374] __x64_sys_lsetxattr+0xc2/0xe0 [ 25.506475][ T374] x64_sys_call+0x8b7/0x9a0 [ 25.510958][ T374] do_syscall_64+0x4c/0xa0 [ 25.515359][ T374] ? clear_bhb_loop+0x30/0x80 [ 25.520016][ T374] ? clear_bhb_loop+0x30/0x80 [ 25.524676][ T374] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 25.530555][ T374] RIP: 0033:0x7f005f58efc9 [ 25.535056][ T374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 25.554642][ T374] RSP: 002b:00007fffa80ab288 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 25.563047][ T374] RAX: ffffffffffffffda RBX: 00007f005f7e5fa0 RCX: 00007f005f58efc9 [ 25.570997][ T374] RDX: 0000200000000040 RSI: 00002000000000c0 RDI: 0000200000000100 [ 25.578950][ T374] RBP: 00007f005f611f91 R08: 0000000000000000 R09: 0000000000000000 [ 25.586902][ T374] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000 [ 25.594851][ T374] R13: 00007f005f7e5fa0 R14: 00007f005f7e5fa0 R15: 0000000000000005 [ 25.602803][ T374] [ 25.605800][ T374] [ 25.608100][ T374] Allocated by task 374: [ 25.612316][ T374] kasan_set_track+0x4b/0x70 [ 25.617064][ T374] kasan_save_alloc_info+0x25/0x30 [ 25.622159][ T374] __kasan_kmalloc+0x95/0xb0 [ 25.626731][ T374] __kmalloc_node_track_caller+0xb1/0x1e0 [ 25.632434][ T374] kmemdup+0x2b/0x60 [ 25.636308][ T374] ext4_xattr_block_set+0x9dc/0x3270 [ 25.641573][ T374] ext4_xattr_set_handle+0xba5/0x12b0 [ 25.646927][ T374] ext4_xattr_set+0x22a/0x320 [ 25.651582][ T374] ext4_xattr_trusted_set+0x3c/0x50 [ 25.656783][ T374] __vfs_setxattr+0x3f2/0x440 [ 25.661438][ T374] __vfs_setxattr_noperm+0x12a/0x5e0 [ 25.666700][ T374] __vfs_setxattr_locked+0x212/0x230 [ 25.671965][ T374] vfs_setxattr+0x168/0x2f0 [ 25.676454][ T374] setxattr+0x2b2/0x2d0 [ 25.680600][ T374] path_setxattr+0x142/0x280 [ 25.685175][ T374] __x64_sys_lsetxattr+0xc2/0xe0 [ 25.690096][ T374] x64_sys_call+0x8b7/0x9a0 [ 25.694586][ T374] do_syscall_64+0x4c/0xa0 [ 25.698986][ T374] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 25.704866][ T374] [ 25.707171][ T374] The buggy address belongs to the object at ffff888113e60000 [ 25.707171][ T374] which belongs to the cache kmalloc-1k of size 1024 [ 25.721203][ T374] The buggy address is located 112 bytes inside of [ 25.721203][ T374] 1024-byte region [ffff888113e60000, ffff888113e60400) [ 25.734544][ T374] [ 25.736845][ T374] The buggy address belongs to the physical page: [ 25.743235][ T374] page:ffffea00044f9800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113e60 [ 25.753469][ T374] head:ffffea00044f9800 order:3 compound_mapcount:0 compound_pincount:0 [ 25.761866][ T374] flags: 0x4000000000010200(slab|head|zone=1) [ 25.767935][ T374] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888100043080 [ 25.776499][ T374] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 25.785064][ T374] page dumped because: kasan: bad access detected [ 25.791461][ T374] page_owner tracks the page as allocated [ 25.797147][ T374] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 92, tgid 92 (klogd), ts 25186105562, free_ts 25163339803 [ 25.818924][ T374] post_alloc_hook+0x1f5/0x210 [ 25.823676][ T374] prep_new_page+0x1c/0x110 [ 25.828192][ T374] get_page_from_freelist+0x2c7b/0x2cf0 [ 25.833731][ T374] __alloc_pages+0x1c3/0x450 [ 25.838306][ T374] alloc_slab_page+0x6e/0xf0 [ 25.842880][ T374] new_slab+0x98/0x3d0 [ 25.846936][ T374] ___slab_alloc+0x6bd/0xb20 [ 25.851509][ T374] __slab_alloc+0x5e/0xa0 [ 25.855822][ T374] __kmem_cache_alloc_node+0x203/0x2c0 [ 25.861260][ T374] kmalloc_trace+0x29/0xb0 [ 25.865664][ T374] syslog_print+0xea/0x550 [ 25.870061][ T374] do_syslog+0x675/0x730 [ 25.874289][ T374] __x64_sys_syslog+0x7c/0x90 [ 25.878950][ T374] x64_sys_call+0x610/0x9a0 [ 25.883437][ T374] do_syscall_64+0x4c/0xa0 [ 25.887833][ T374] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 25.893710][ T374] page last free stack trace: [ 25.898360][ T374] free_unref_page_prepare+0x742/0x750 [ 25.903804][ T374] free_unref_page+0x8f/0x530 [ 25.908583][ T374] __free_pages+0x67/0x100 [ 25.912982][ T374] __free_slab+0xca/0x1a0 [ 25.917300][ T374] __unfreeze_partials+0x160/0x190 [ 25.922392][ T374] put_cpu_partial+0xa9/0x100 [ 25.927052][ T374] __slab_free+0x1c4/0x280 [ 25.931449][ T374] ___cache_free+0xbf/0xd0 [ 25.935846][ T374] qlist_free_all+0xc6/0x140 [ 25.940416][ T374] kasan_quarantine_reduce+0x14a/0x170 [ 25.945853][ T374] __kasan_slab_alloc+0x24/0x80 [ 25.950682][ T374] slab_post_alloc_hook+0x4f/0x2d0 [ 25.955777][ T374] kmem_cache_alloc_node+0x181/0x340 [ 25.961044][ T374] __alloc_skb+0xea/0x4b0 [ 25.965437][ T374] netlink_ack+0x372/0x1100 [ 25.970010][ T374] netlink_rcv_skb+0x277/0x440 [ 25.974754][ T374] [ 25.977054][ T374] Memory state around the buggy address: [ 25.982659][ T374] ffff888113e5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.990701][ T374] ffff888113e5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.998741][ T374] >ffff888113e60000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.006779][ T374] ^ [ 26.014472][ T374] ffff888113e60080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.022510][ T374] ffff888113e60100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.030571][ T374] ================================================================== [ 26.045485][ T374] Disabling lock debugging due to kernel taint [ 26.059377][ T364] EXT4-fs (loop2): unmounting filesystem.