Warning: Permanently added '10.128.1.249' (ED25519) to the list of known hosts. 2025/09/27 13:55:05 parsed 1 programs [ 49.010680][ T24] kauditd_printk_skb: 31 callbacks suppressed [ 49.010693][ T24] audit: type=1400 audit(1758981306.500:105): avc: denied { unlink } for pid=405 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 49.093448][ T405] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 49.484169][ T24] audit: type=1401 audit(1758981306.970:106): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 49.540150][ T410] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.547498][ T410] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.555539][ T410] device bridge_slave_0 entered promiscuous mode [ 49.563744][ T410] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.571045][ T410] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.578816][ T410] device bridge_slave_1 entered promiscuous mode [ 49.626239][ T410] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.633448][ T410] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.640872][ T410] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.647939][ T410] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.665141][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.672489][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.679939][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.687476][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.697171][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.705470][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.712497][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.721591][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.729791][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.737008][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.748958][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.759200][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.772497][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.783851][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.792210][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.799910][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.809468][ T410] device veth0_vlan entered promiscuous mode [ 49.819486][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.828481][ T410] device veth1_macvtap entered promiscuous mode [ 49.837729][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.848478][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.883034][ T24] audit: type=1400 audit(1758981307.370:107): avc: denied { create } for pid=418 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 50.645227][ T294] device bridge_slave_1 left promiscuous mode [ 50.654455][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.665377][ T294] device bridge_slave_0 left promiscuous mode [ 50.672000][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.684660][ T294] device veth1_macvtap left promiscuous mode 2025/09/27 13:55:08 executed programs: 0 [ 50.690702][ T294] device veth0_vlan left promiscuous mode [ 50.707255][ T24] audit: type=1400 audit(1758981308.200:108): avc: denied { write } for pid=396 comm="syz-execprog" path="pipe:[15053]" dev="pipefs" ino=15053 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 50.791759][ T469] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.798889][ T469] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.806525][ T469] device bridge_slave_0 entered promiscuous mode [ 50.813392][ T469] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.820730][ T469] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.828151][ T469] device bridge_slave_1 entered promiscuous mode [ 50.864236][ T469] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.871312][ T469] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.878706][ T469] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.885842][ T469] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.903506][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.911521][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.919598][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.928495][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.936717][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.943751][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.952197][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.960450][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.967593][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.983467][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.002663][ T469] device veth0_vlan entered promiscuous mode [ 51.009285][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.017881][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.026202][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.033602][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.041964][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.056441][ T469] device veth1_macvtap entered promiscuous mode [ 51.063264][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.074928][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.084756][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 51.137059][ T488] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 51.150789][ T488] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 51.162382][ T488] EXT4-fs warning (device loop2): ext4_expand_extra_isize_ea:2815: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 51.175636][ T488] EXT4-fs (loop2): 1 truncate cleaned up [ 51.181291][ T488] EXT4-fs (loop2): mounted filesystem without journal. Opts: init_itable=0x0000000000000000,jqfmt=vfsold,debug_want_extra_isize=0x000000000000006a,user_xattr,errors=remount-ro,quota, [ 51.199996][ T24] audit: type=1400 audit(1758981308.700:109): avc: denied { mount } for pid=487 comm="syz.2.17" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 51.205287][ T488] ================================================================== [ 51.228881][ T24] audit: type=1400 audit(1758981308.700:110): avc: denied { setattr } for pid=487 comm="syz.2.17" name="file1" dev="loop2" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 51.229565][ T488] BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0x1339/0x36c0 [ 51.251936][ T24] audit: type=1400 audit(1758981308.700:111): avc: denied { write } for pid=487 comm="syz.2.17" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 51.259445][ T488] Read of size 18446744073709551540 at addr ffff888117dc8870 by task syz.2.17/488 [ 51.259447][ T488] [ 51.259475][ T488] CPU: 0 PID: 488 Comm: syz.2.17 Not tainted syzkaller #0 [ 51.281060][ T24] audit: type=1400 audit(1758981308.700:112): avc: denied { add_name } for pid=487 comm="syz.2.17" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 51.289999][ T488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 51.290004][ T488] Call Trace: [ 51.290021][ T488] __dump_stack+0x21/0x24 [ 51.290032][ T488] dump_stack_lvl+0x169/0x1d8 [ 51.290044][ T488] ? show_regs_print_info+0x18/0x18 [ 51.290055][ T488] ? thaw_kernel_threads+0x220/0x220 [ 51.290067][ T488] print_address_description+0x7f/0x2c0 [ 51.290079][ T488] ? ext4_xattr_set_entry+0x1339/0x36c0 [ 51.290095][ T488] kasan_report+0xe2/0x130 [ 51.290106][ T488] ? ext4_xattr_set_entry+0x1339/0x36c0 [ 51.290116][ T488] ? ext4_xattr_set_entry+0x1339/0x36c0 [ 51.290127][ T488] kasan_check_range+0x280/0x290 [ 51.290137][ T488] memmove+0x2d/0x70 [ 51.290147][ T488] ext4_xattr_set_entry+0x1339/0x36c0 [ 51.290169][ T488] ? fscrypt_drop_inode+0xad/0x110 [ 51.293169][ T24] audit: type=1400 audit(1758981308.700:113): avc: denied { create } for pid=487 comm="syz.2.17" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 51.299602][ T488] ? ext4_xattr_ibody_set+0x360/0x360 [ 51.299623][ T488] ? slab_post_alloc_hook+0x7d/0x2f0 [ 51.320102][ T24] audit: type=1400 audit(1758981308.700:114): avc: denied { write } for pid=487 comm="syz.2.17" name="file2" dev="loop2" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 51.330227][ T488] ? ext4_xattr_block_set+0x847/0x2a50 [ 51.330239][ T488] ? ext4_xattr_block_set+0x847/0x2a50 [ 51.330260][ T488] ? __kmalloc_track_caller+0x181/0x320 [ 51.468057][ T488] ? memcpy+0x56/0x70 [ 51.472046][ T488] ext4_xattr_block_set+0x92f/0x2a50 [ 51.477336][ T488] ? __kasan_check_read+0x11/0x20 [ 51.482516][ T488] ? __ext4_xattr_check_block+0x265/0x8e0 [ 51.488231][ T488] ? ext4_xattr_block_find+0x4f0/0x4f0 [ 51.493785][ T488] ? __kasan_check_write+0x14/0x20 [ 51.498903][ T488] ext4_xattr_set_handle+0xba5/0x12a0 [ 51.504273][ T488] ? ext4_xattr_set_entry+0x36c0/0x36c0 [ 51.509886][ T488] ? __kasan_check_read+0x11/0x20 [ 51.514938][ T488] ? __ext4_journal_start_sb+0x2e2/0x490 [ 51.520584][ T488] ext4_xattr_set+0x1ec/0x320 [ 51.525259][ T488] ? ext4_xattr_set_credits+0x290/0x290 [ 51.530923][ T488] ext4_xattr_trusted_set+0x3b/0x50 [ 51.536204][ T488] ? ext4_xattr_trusted_get+0x40/0x40 [ 51.541680][ T488] __vfs_setxattr+0x42a/0x480 [ 51.546540][ T488] __vfs_setxattr_noperm+0x11e/0x4e0 [ 51.551939][ T488] __vfs_setxattr_locked+0x203/0x220 [ 51.557218][ T488] vfs_setxattr+0x8d/0x1c0 [ 51.561717][ T488] setxattr+0x1a9/0x370 [ 51.565889][ T488] ? path_setxattr+0x210/0x210 [ 51.570646][ T488] ? __mnt_want_write+0x1e6/0x260 [ 51.575694][ T488] ? mnt_want_write+0x19d/0x270 [ 51.580541][ T488] path_setxattr+0x110/0x210 [ 51.585219][ T488] ? simple_xattr_list_add+0x120/0x120 [ 51.590750][ T488] ? ____fput+0x15/0x20 [ 51.594913][ T488] __x64_sys_lsetxattr+0xc2/0xe0 [ 51.599952][ T488] do_syscall_64+0x31/0x40 [ 51.604376][ T488] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.610531][ T488] RIP: 0033:0x7fc4d730cbe9 [ 51.614954][ T488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.634739][ T488] RSP: 002b:00007fc4d717d038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 51.643323][ T488] RAX: ffffffffffffffda RBX: 00007fc4d7543fa0 RCX: 00007fc4d730cbe9 [ 51.651460][ T488] RDX: 0000200000000040 RSI: 0000200000000300 RDI: 0000200000000100 [ 51.659509][ T488] RBP: 00007fc4d738fe19 R08: 0000000000000000 R09: 0000000000000000 [ 51.667469][ T488] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000 [ 51.675619][ T488] R13: 00007fc4d7544038 R14: 00007fc4d7543fa0 R15: 00007ffdb0ee4478 [ 51.683584][ T488] [ 51.685988][ T488] Allocated by task 0: [ 51.690037][ T488] (stack is not available) [ 51.694431][ T488] [ 51.696835][ T488] The buggy address belongs to the object at ffff888117dc8800 [ 51.696835][ T488] which belongs to the cache kmalloc-1k of size 1024 [ 51.710877][ T488] The buggy address is located 112 bytes inside of [ 51.710877][ T488] 1024-byte region [ffff888117dc8800, ffff888117dc8c00) [ 51.724519][ T488] The buggy address belongs to the page: [ 51.730148][ T488] page:ffffea00045f7200 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888117dc8000 pfn:0x117dc8 [ 51.741685][ T488] head:ffffea00045f7200 order:3 compound_mapcount:0 compound_pincount:0 [ 51.750182][ T488] flags: 0x4000000000010200(slab|head) [ 51.755804][ T488] raw: 4000000000010200 ffffea00045eb800 0000000200000002 ffff888100042f00 [ 51.764674][ T488] raw: ffff888117dc8000 000000008010000d 00000001ffffffff 0000000000000000 [ 51.773288][ T488] page dumped because: kasan: bad access detected [ 51.779691][ T488] page_owner tracks the page as allocated [ 51.785415][ T488] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 95, ts 6598144705, free_ts 0 [ 51.803890][ T488] prep_new_page+0x179/0x180 [ 51.808603][ T488] get_page_from_freelist+0x2235/0x23d0 [ 51.814183][ T488] __alloc_pages_nodemask+0x268/0x5f0 [ 51.819545][ T488] new_slab+0x84/0x3f0 [ 51.823610][ T488] ___slab_alloc+0x2a6/0x450 [ 51.828210][ T488] __slab_alloc+0x63/0xa0 [ 51.832936][ T488] __kmalloc_track_caller+0x1ef/0x320 [ 51.838409][ T488] __alloc_skb+0xdc/0x520 [ 51.842842][ T488] netlink_sendmsg+0x5f6/0xb30 [ 51.847693][ T488] ____sys_sendmsg+0x5a2/0x8c0 [ 51.852544][ T488] ___sys_sendmsg+0x1f0/0x260 [ 51.857315][ T488] __x64_sys_sendmsg+0x1e2/0x2a0 [ 51.862276][ T488] do_syscall_64+0x31/0x40 [ 51.866694][ T488] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.872656][ T488] page_owner free stack trace missing [ 51.878020][ T488] [ 51.880337][ T488] Memory state around the buggy address: [ 51.886093][ T488] ffff888117dc8700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.894158][ T488] ffff888117dc8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.902412][ T488] >ffff888117dc8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.910463][ T488] ^ [ 51.918176][ T488] ffff888117dc8880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.926331][ T488] ffff888117dc8900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.934425][ T488] ================================================================== [ 51.942573][ T488] Disabling lock debugging due to kernel taint [ 52.115458][ T492] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 52.126941][ T492] EXT4-fs (loop2): 1 truncate cleaned up [ 52.132721][ T492] EXT4-fs (loop2): mounted filesystem without journal. Opts: init_itable=0x0000000000000000,jqfmt=vfsold,debug_want_extra_isize=0x000000000000006a,user_xattr,errors=remount-ro,quota, [ 52.156312][ T416] general protection fault, probably for non-canonical address 0x1ffebe15c000000: 0000 [#1] PREEMPT SMP KASAN [ 52.168055][ T416] CPU: 1 PID: 416 Comm: udevd Tainted: G B syzkaller #0 [ 52.176288][ T416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 52.186430][ T416] RIP: 0010:qlist_free_all+0x46/0xb0 [ 52.191699][ T416] Code: 49 89 f6 49 bf 00 00 00 80 7f 77 00 00 49 bc 00 00 00 00 00 ea ff ff eb 32 48 01 f8 48 2d 00 00 00 80 48 c1 e8 06 48 83 e0 c0 <4a> 8b 4c 20 08 f6 c1 01 75 34 4c 01 e0 48 8b 70 18 4c 8b 2f e8 c1 [ 52.211605][ T416] RSP: 0018:ffffc90000cc77c0 EFLAGS: 00010206 [ 52.217670][ T416] RAX: 020001e15c000000 RBX: ffffc90000cc77f8 RCX: 000000008040003f [ 52.225646][ T416] RDX: 0000000080400040 RSI: 0000000000000000 RDI: 800000d700000064 [ 52.233624][ T416] RBP: ffffc90000cc77e8 R08: ffff8881180ca740 R09: 0000000000000000 [ 52.241670][ T416] R10: fffff52000198eec R11: 1ffff92000198eec R12: ffffea0000000000 [ 52.249730][ T416] R13: 800000d700000064 R14: 0000000000000000 R15: 0000777f80000000 [ 52.257799][ T416] FS: 00007fa82f6dc880(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 52.266824][ T416] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 52.273582][ T416] CR2: 00007fa82f52b000 CR3: 000000010e810000 CR4: 00000000003506a0 [ 52.281541][ T416] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 52.289720][ T416] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 52.297700][ T416] Call Trace: [ 52.300980][ T416] kasan_quarantine_reduce+0x14a/0x160 [ 52.306427][ T416] __kasan_slab_alloc+0x2f/0xf0 [ 52.311368][ T416] ? ____kasan_slab_free+0x125/0x160 [ 52.316641][ T416] ? __kasan_slab_free+0x11/0x20 [ 52.321568][ T416] ? slab_free_freelist_hook+0xc5/0x190 [ 52.327099][ T416] ? kmem_cache_free+0x100/0x2d0 [ 52.332056][ T416] ? filename_lookup+0x459/0x600 [ 52.336980][ T416] ? user_path_at_empty+0x43/0x50 [ 52.341995][ T416] ? do_utimes+0x138/0x2a0 [ 52.346580][ T416] ? __x64_sys_utimensat+0x14c/0x230 [ 52.351975][ T416] ? do_syscall_64+0x31/0x40 [ 52.356638][ T416] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.362689][ T416] ? memcpy+0x56/0x70 [ 52.366772][ T416] ? avc_has_perm+0x234/0x360 [ 52.371436][ T416] ? avc_has_perm_noaudit+0x240/0x240 [ 52.376795][ T416] ? memset+0x35/0x40 [ 52.380774][ T416] slab_post_alloc_hook+0x5d/0x2f0 [ 52.385933][ T416] ? getname_flags+0xb9/0x500 [ 52.390624][ T416] ? getname_flags+0xb9/0x500 [ 52.395288][ T416] kmem_cache_alloc+0x165/0x2e0 [ 52.400125][ T416] ? getname_flags+0xb9/0x500 [ 52.404786][ T416] getname_flags+0xb9/0x500 [ 52.409387][ T416] user_path_at_empty+0x2f/0x50 [ 52.414220][ T416] vfs_statx+0xff/0x520 [ 52.418476][ T416] ? mnt_drop_write+0x10f/0x190 [ 52.423314][ T416] ? vfs_fstatat+0x40/0x40 [ 52.427729][ T416] ? mntput_no_expire+0xfb/0x6b0 [ 52.432652][ T416] __se_sys_newfstatat+0xc6/0x340 [ 52.437672][ T416] ? __kasan_check_write+0x14/0x20 [ 52.442787][ T416] ? __x64_sys_newfstatat+0xb0/0xb0 [ 52.447967][ T416] ? mntput+0x5f/0xc0 [ 52.451934][ T416] ? path_put+0x57/0x60 [ 52.456075][ T416] ? do_utimes+0x230/0x2a0 [ 52.460493][ T416] ? percpu_counter_add_batch+0x13c/0x160 [ 52.466207][ T416] ? debug_smp_processor_id+0x17/0x20 [ 52.471700][ T416] __x64_sys_newfstatat+0x9b/0xb0 [ 52.476764][ T416] do_syscall_64+0x31/0x40 [ 52.481265][ T416] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.487149][ T416] RIP: 0033:0x7fa82f834b0a [ 52.491555][ T416] Code: 48 8b 15 f1 f2 0d 00 f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 41 89 ca b8 06 01 00 00 0f 05 <3d> 00 f0 ff ff 77 07 31 c0 c3 0f 1f 40 00 48 8b 15 b9 f2 0d 00 f7 [ 52.511343][ T416] RSP: 002b:00007ffe5095f5e8 EFLAGS: 00000202 ORIG_RAX: 0000000000000106 [ 52.519837][ T416] RAX: ffffffffffffffda RBX: 00007ffe5095ffc0 RCX: 00007fa82f834b0a [ 52.527973][ T416] RDX: 00007ffe5095f610 RSI: 00007ffe5095ffc0 RDI: 00000000ffffff9c [ 52.535944][ T416] RBP: 00007ffe5095ffcf R08: 0000000000000075 R09: 0000000000000000 [ 52.544139][ T416] R10: 0000000000000100 R11: 0000000000000202 R12: 0000564414fb5fe5 [ 52.552319][ T416] R13: 00007ffe5095f6a0 R14: 000056440e6116d7 R15: 0000564414fb5fe0 [ 52.560537][ T416] Modules linked in: [ 52.564517][ C0] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#2] PREEMPT SMP KASAN [ 52.576387][ C0] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] [ 52.585093][ C0] CPU: 0 PID: 405618920 Comm: Tainted: G B D syzkaller #0 [ 52.593602][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 52.603743][ C0] RIP: 0010:cpuacct_charge+0x74/0x180 [ 52.609107][ C0] Code: 49 81 c7 68 09 00 00 4c 89 f8 48 c1 e8 03 80 3c 18 00 74 08 4c 89 ff e8 7a 7b 53 00 4d 8b 3f 49 83 c7 10 4c 89 f8 48 c1 e8 03 <80> 3c 18 00 74 08 4c 89 ff e8 5e 7b 53 00 4d 8b 3f 4d 85 ff 0f 84 [ 52.629296][ C0] RSP: 0018:ffffc90000007918 EFLAGS: 00010002 [ 52.635576][ C0] RAX: 0000000000000002 RBX: dffffc0000000000 RCX: 0000000000000001 [ 52.643555][ C0] RDX: 000000000000000b RSI: 0000000bf1985da1 RDI: ffff8881182d3b40 [ 52.651714][ C0] RBP: ffffc90000007950 R08: dffffc0000000000 R09: fffffbfff0c5f77f [ 52.659793][ C0] R10: fffffbfff0c5f77f R11: 1ffffffff0c5f77e R12: dffffc0000000000 [ 52.667840][ C0] R13: 0000000000000000 R14: ffff8881182d3b80 R15: 0000000000000010 [ 52.676040][ C0] FS: 00007fc4d717d6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 52.685066][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 52.691640][ C0] CR2: 000020000000f000 CR3: 0000000117f3e000 CR4: 00000000003506b0 [ 52.699751][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 52.707898][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 52.715940][ C0] Call Trace: [ 52.719401][ C0] [ 52.722260][ C0] update_curr+0x2f0/0x5b0 [ 52.726835][ C0] enqueue_task_fair+0x3e4/0x2250 [ 52.732116][ C0] ? sched_group_set_shares+0x4c0/0x4c0 [ 52.737649][ C0] enqueue_task+0x176/0xff0 [ 52.742317][ C0] ? activate_task+0xa0/0xa0 [ 52.746890][ C0] ? update_irq_load_avg+0x10f/0x360 [ 52.752259][ C0] ? update_rq_clock+0x21d/0x660 [ 52.757433][ C0] ? task_rq_lock+0x2d0/0x2d0 [ 52.762111][ C0] ttwu_do_activate+0x1c3/0x2b0 [ 52.767043][ C0] try_to_wake_up+0x474/0xd70 [ 52.771803][ C0] ? __lock_text_start+0x8/0x8 [ 52.776573][ C0] wake_up_process+0x10/0x20 [ 52.781154][ C0] hrtimer_wakeup+0x4e/0x60 [ 52.785733][ C0] ? enqueue_hrtimer+0x1e0/0x1e0 [ 52.790943][ C0] __hrtimer_run_queues+0x37a/0x960 [ 52.796184][ C0] ? hrtimer_interrupt+0xdc0/0xdc0 [ 52.801290][ C0] ? ktime_get_update_offsets_now+0x293/0x2b0 [ 52.807362][ C0] hrtimer_interrupt+0x3a6/0xdc0 [ 52.812288][ C0] ? sched_clock_cpu+0x1b/0x3d0 [ 52.817151][ C0] __sysvec_apic_timer_interrupt+0xfa/0x3f0 [ 52.823057][ C0] asm_call_irq_on_stack+0xf/0x20 [ 52.828314][ C0] [ 52.831242][ C0] Modules linked in: [ 52.835184][ C0] ---[ end trace f5810fe035656905 ]--- [ 52.835221][ T84] general protection fault, probably for non-canonical address 0x57cb53c3b279d99a: 0000 [#3] PREEMPT SMP KASAN [ 52.840660][ C0] RIP: 0010:qlist_free_all+0x46/0xb0 [ 52.852363][ T84] CPU: 1 PID: 84 Comm: klogd Tainted: G B D syzkaller #0 [ 52.857735][ C0] Code: 49 89 f6 49 bf 00 00 00 80 7f 77 00 00 49 bc 00 00 00 00 00 ea ff ff eb 32 48 01 f8 48 2d 00 00 00 80 48 c1 e8 06 48 83 e0 c0 <4a> 8b 4c 20 08 f6 c1 01 75 34 4c 01 e0 48 8b 70 18 4c 8b 2f e8 c1 [ 52.866055][ T84] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 52.885743][ C0] RSP: 0018:ffffc90000cc77c0 EFLAGS: 00010206 [ 52.896059][ T84] RIP: 0010:__kmalloc_track_caller+0x12e/0x320 [ 52.896062][ C0] [ 52.896080][ C0] RAX: 020001e15c000000 RBX: ffffc90000cc77f8 RCX: 000000008040003f [ 52.902374][ T84] Code: e5 48 8b 38 48 85 ff 0f 84 cd 00 00 00 48 83 78 10 00 0f 84 c2 00 00 00 41 8b 45 28 48 8d 0c 07 49 8b 9d d8 00 00 00 48 0f c9 <48> 33 1c 07 48 31 cb 48 89 d1 48 83 c1 08 4d 8b 45 00 48 89 f8 65 [ 52.908796][ C0] RDX: 0000000080400040 RSI: 0000000000000000 RDI: 800000d700000064 [ 52.911118][ T84] RSP: 0018:ffffc90000bc7870 EFLAGS: 00010286 [ 52.919108][ C0] RBP: ffffc90000cc77e8 R08: ffff8881180ca740 R09: 0000000000000000 [ 52.938806][ T84] [ 52.946779][ C0] R10: fffff52000198eec R11: 1ffff92000198eec R12: ffffea0000000000 [ 52.952832][ T84] RAX: 0000000000000200 RBX: 57b14bdb33f12865 RCX: 9ad979b2c353cb57 [ 52.960898][ C0] R13: 800000d700000064 R14: 0000000000000000 R15: 0000777f80000000 [ 52.963301][ T84] RDX: 00000000000169e1 RSI: 0000000000000400 RDI: 57cb53c3b279d79a [ 52.971270][ C0] FS: 00007fc4d717d6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 52.979319][ T84] RBP: ffffc90000bc78c0 R08: 0000000000000140 R09: ffff888117b0e780 [ 52.987320][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 52.995478][ T84] R10: 0000000000000000 R11: 00000000571100ac R12: ffffffff8393c9a2 [ 53.004672][ C0] CR2: 000020000000f000 CR3: 0000000117f3e000 CR4: 00000000003506b0 [ 53.012634][ T84] R13: ffff888100042f00 R14: 0000000000482cc0 R15: 0000000000000240 [ 53.019210][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 53.027294][ T84] FS: 00007f5af53efc80(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 53.035363][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 53.043326][ T84] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.051495][ C0] Kernel panic - not syncing: Fatal exception in interrupt [ 53.060587][ T84] CR2: 00007fa82f52b000 CR3: 000000010d2a4000 CR4: 00000000003506a0 [ 53.090438][ T84] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 53.098415][ T84] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 53.106463][ T84] Call Trace: [ 53.109754][ T84] ? kmem_cache_alloc+0x165/0x2e0 [ 53.114868][ T84] ? avc_has_perm+0x234/0x360 [ 53.119713][ T84] ? alloc_skb_with_frags+0xa2/0x560 [ 53.125116][ T84] ? alloc_skb_with_frags+0xa2/0x560 [ 53.130405][ T84] __alloc_skb+0xdc/0x520 [ 53.134738][ T84] ? avc_has_perm_noaudit+0x240/0x240 [ 53.140300][ T84] alloc_skb_with_frags+0xa2/0x560 [ 53.145410][ T84] sock_alloc_send_pskb+0x853/0x980 [ 53.150602][ T84] ? sock_kzfree_s+0x60/0x60 [ 53.155189][ T84] ? __kasan_check_write+0x14/0x20 [ 53.160418][ T84] ? _raw_spin_lock+0x8e/0xe0 [ 53.165102][ T84] ? _raw_spin_trylock_bh+0x130/0x130 [ 53.170656][ T84] ? security_socket_getpeersec_dgram+0x93/0xb0 [ 53.176906][ T84] unix_dgram_sendmsg+0x5f4/0x17d0 [ 53.182013][ T84] ? selinux_socket_accept+0x500/0x500 [ 53.187476][ T84] ? unix_dgram_poll+0x620/0x620 [ 53.192583][ T84] ? cap_capable+0x19c/0x220 [ 53.197181][ T84] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 53.203064][ T84] ? security_socket_sendmsg+0x82/0xa0 [ 53.208518][ T84] __sys_sendto+0x41d/0x580 [ 53.213018][ T84] ? __ia32_sys_getpeername+0x90/0x90 [ 53.218487][ T84] ? fpu__clear_all+0x20/0x20 [ 53.223186][ T84] __x64_sys_sendto+0xe5/0x100 [ 53.227992][ T84] do_syscall_64+0x31/0x40 [ 53.232416][ T84] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 53.238304][ T84] RIP: 0033:0x7f5af553f407 [ 53.242715][ T84] Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff [ 53.262408][ T84] RSP: 002b:00007ffc20de4de0 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 53.270820][ T84] RAX: ffffffffffffffda RBX: 00007f5af53efc80 RCX: 00007f5af553f407 [ 53.278991][ T84] RDX: 000000000000008b RSI: 00007ffc20de4f20 RDI: 0000000000000003 [ 53.287343][ T84] RBP: 00007ffc20de5350 R08: 0000000000000000 R09: 0000000000000000 [ 53.295399][ T84] R10: 0000000000004000 R11: 0000000000000202 R12: 00007ffc20de5368 [ 53.303486][ T84] R13: 00007ffc20de4f20 R14: 0000000000000070 R15: 00007ffc20de4f20 [ 53.311458][ T84] Modules linked in: [ 53.315623][ C0] Kernel Offset: disabled [ 53.320215][ C0] Rebooting in 86400 seconds..