SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop5 ino=15 ================================================================== BUG: KCSAN: data-race in data_alloc / prb_reserve write to 0xffffffff866687f0 of 8 bytes by task 29 on cpu 0: data_alloc+0x291/0x2c0 kernel/printk/printk_ringbuffer.c:1096 prb_reserve+0x85e/0xb60 kernel/printk/printk_ringbuffer.c:1669 vprintk_store+0x558/0x870 kernel/printk/printk.c:2326 vprintk_emit+0x15e/0x680 kernel/printk/printk.c:2408 vprintk_default+0x26/0x30 kernel/printk/printk.c:2447 vprintk+0x75/0x80 kernel/printk/printk_safe.c:86 _printk+0x7a/0xa0 kernel/printk/printk.c:2457 kauditd_printk_skb kernel/audit.c:546 [inline] kauditd_hold_skb+0x1a3/0x1b0 kernel/audit.c:581 kauditd_send_queue+0x288/0x2e0 kernel/audit.c:766 kauditd_thread+0x42a/0x650 kernel/audit.c:890 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read to 0xffffffff866687f0 of 8 bytes by task 30869 on cpu 1: desc_read kernel/printk/printk_ringbuffer.c:482 [inline] desc_push_tail kernel/printk/printk_ringbuffer.c:778 [inline] desc_reserve kernel/printk/printk_ringbuffer.c:924 [inline] prb_reserve+0x235/0xb60 kernel/printk/printk_ringbuffer.c:1619 vprintk_store+0x558/0x870 kernel/printk/printk.c:2326 vprintk_emit+0x15e/0x680 kernel/printk/printk.c:2408 vprintk_default+0x26/0x30 kernel/printk/printk.c:2447 vprintk+0x75/0x80 kernel/printk/printk_safe.c:86 _printk+0x7a/0xa0 kernel/printk/printk.c:2457 __ext4_error_inode+0x2da/0x400 fs/ext4/super.c:861 check_xattrs+0x244/0x780 fs/ext4/xattr.c:289 __ext4_xattr_check_block fs/ext4/xattr.c:303 [inline] ext4_xattr_block_get fs/ext4/xattr.c:596 [inline] ext4_xattr_get+0x1e3/0x580 fs/ext4/xattr.c:714 ext4_xattr_security_get+0x32/0x40 fs/ext4/xattr_security.c:20 __vfs_getxattr+0x29f/0x2b0 fs/xattr.c:423 inode_doinit_use_xattr+0x7a/0x2b0 security/selinux/hooks.c:1366 inode_doinit_with_dentry+0x5e2/0x840 security/selinux/hooks.c:1491 __inode_security_revalidate security/selinux/hooks.c:300 [inline] inode_security security/selinux/hooks.c:325 [inline] selinux_file_permission+0x184/0x360 security/selinux/hooks.c:3636 security_file_permission+0x3d/0x80 security/security.c:2839 rw_verify_area fs/read_write.c:466 [inline] kernel_read+0x7e/0x170 fs/read_write.c:538 prepare_binprm fs/exec.c:1683 [inline] search_binary_handler fs/exec.c:1732 [inline] exec_binprm fs/exec.c:1790 [inline] bprm_execve+0x42d/0xc60 fs/exec.c:1842 do_execveat_common+0x793/0x800 fs/exec.c:1949 do_execve fs/exec.c:2023 [inline] __do_sys_execve fs/exec.c:2099 [inline] __se_sys_execve fs/exec.c:2094 [inline] __x64_sys_execve+0x5a/0x70 fs/exec.c:2094 x64_sys_call+0x1333/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:60 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x000000000006cfd0 -> 0x000000000011e558 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 30869 Comm: syz.5.6680 Not tainted 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== EXT4-fs error (device loop5): ext4_xattr_block_get:596: inode #15: comm syz.5.6680: corrupted xattr block 19: ea_inode specified without ea_inode feature enabled SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop5 ino=15