Warning: Permanently added '10.128.1.3' (ED25519) to the list of known hosts.
2025/08/18 19:41:31 ignoring optional flag "sandboxArg"="0"
2025/08/18 19:41:31 parsed 1 programs
[ 51.995610][ T30] kauditd_printk_skb: 30 callbacks suppressed
[ 51.995626][ T30] audit: type=1400 audit(1755546092.659:104): avc: denied { unlink } for pid=399 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 52.036336][ T399] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 52.744194][ T30] audit: type=1401 audit(1755546093.399:105): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768"
[ 52.839823][ T439] bridge0: port 1(bridge_slave_0) entered blocking state
[ 52.847237][ T439] bridge0: port 1(bridge_slave_0) entered disabled state
[ 52.854623][ T439] device bridge_slave_0 entered promiscuous mode
[ 52.861526][ T439] bridge0: port 2(bridge_slave_1) entered blocking state
[ 52.868771][ T439] bridge0: port 2(bridge_slave_1) entered disabled state
[ 52.876301][ T439] device bridge_slave_1 entered promiscuous mode
[ 52.916243][ T439] bridge0: port 2(bridge_slave_1) entered blocking state
[ 52.923279][ T439] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 52.930604][ T439] bridge0: port 1(bridge_slave_0) entered blocking state
[ 52.937731][ T439] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 52.953175][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 52.961444][ T45] bridge0: port 1(bridge_slave_0) entered disabled state
[ 52.968861][ T45] bridge0: port 2(bridge_slave_1) entered disabled state
[ 52.982533][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 52.990755][ T45] bridge0: port 1(bridge_slave_0) entered blocking state
[ 52.997866][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 53.006388][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 53.014630][ T45] bridge0: port 2(bridge_slave_1) entered blocking state
[ 53.021672][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 53.036742][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 53.046249][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 53.064262][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 53.075240][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 53.083483][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 53.090960][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 53.102715][ T439] device veth0_vlan entered promiscuous mode
[ 53.112030][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 53.120961][ T439] device veth1_macvtap entered promiscuous mode
[ 53.129810][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 53.144360][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 53.179044][ T30] audit: type=1400 audit(1755546093.839:106): avc: denied { create } for pid=452 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1
2025/08/18 19:41:34 executed programs: 0
[ 53.461967][ T30] audit: type=1400 audit(1755546094.119:107): avc: denied { write } for pid=390 comm="syz-execprog" path="pipe:[14931]" dev="pipefs" ino=14931 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1
[ 53.500554][ T467] bridge0: port 1(bridge_slave_0) entered blocking state
[ 53.507742][ T467] bridge0: port 1(bridge_slave_0) entered disabled state
[ 53.515418][ T467] device bridge_slave_0 entered promiscuous mode
[ 53.522334][ T467] bridge0: port 2(bridge_slave_1) entered blocking state
[ 53.529523][ T467] bridge0: port 2(bridge_slave_1) entered disabled state
[ 53.536953][ T467] device bridge_slave_1 entered promiscuous mode
[ 53.573905][ T467] bridge0: port 2(bridge_slave_1) entered blocking state
[ 53.580966][ T467] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 53.588363][ T467] bridge0: port 1(bridge_slave_0) entered blocking state
[ 53.595389][ T467] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 53.615342][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 53.623050][ T45] bridge0: port 1(bridge_slave_0) entered disabled state
[ 53.630552][ T45] bridge0: port 2(bridge_slave_1) entered disabled state
[ 53.639494][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 53.647740][ T45] bridge0: port 1(bridge_slave_0) entered blocking state
[ 53.654782][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 53.666238][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 53.674562][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 53.683046][ T45] bridge0: port 2(bridge_slave_1) entered blocking state
[ 53.690208][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 53.700773][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 53.709285][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 53.720786][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 53.729175][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 53.741343][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 53.749899][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 53.763406][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 53.771583][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 53.780377][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 53.787973][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 53.796225][ T467] device veth0_vlan entered promiscuous mode
[ 53.806617][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 53.815059][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 53.824257][ T467] device veth1_macvtap entered promiscuous mode
[ 53.835257][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 53.843287][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 53.851554][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 53.860678][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 53.868976][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 53.893921][ T478] loop2: detected capacity change from 0 to 512
[ 53.938444][ T478] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support!
[ 53.951577][ T478] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode
[ 53.963676][ T478] EXT4-fs warning (device loop2): ext4_expand_extra_isize_ea:2825: Unable to expand inode 15. Delete some EAs or run e2fsck.
[ 53.977011][ T478] EXT4-fs (loop2): 1 truncate cleaned up
[ 53.982667][ T478] EXT4-fs (loop2): mounted filesystem without journal. Opts: nogrpid,min_batch_time=0x0000000000000000,debug_want_extra_isize=0x0000000000000068,nobarrier,nodiscard,quota,,errors=continue. Quota mode: writeback.
[ 54.003532][ T30] audit: type=1400 audit(1755546094.669:108): avc: denied { mount } for pid=477 comm="syz.2.17" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[ 54.006912][ T478] ==================================================================
[ 54.031173][ T30] audit: type=1400 audit(1755546094.669:109): avc: denied { write } for pid=477 comm="syz.2.17" name="file2" dev="loop2" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[ 54.033225][ T478] BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0x13a3/0x37d0
[ 54.056291][ T30] audit: type=1400 audit(1755546094.669:110): avc: denied { open } for pid=477 comm="syz.2.17" name="file2" dev="loop2" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[ 54.063825][ T478] Read of size 18446744073709551540 at addr ffff888118c93070 by task syz.2.17/478
[ 54.085874][ T30] audit: type=1400 audit(1755546094.669:111): avc: denied { setattr } for pid=477 comm="syz.2.17" name="file1" dev="loop2" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[ 54.094758][ T478]
[ 54.094779][ T478] CPU: 0 PID: 478 Comm: syz.2.17 Not tainted 5.15.189-syzkaller-1081280-gf32b52534f1d #0
[ 54.129313][ T478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
[ 54.139470][ T478] Call Trace:
[ 54.142829][ T478]
[ 54.145738][ T478] __dump_stack+0x21/0x30
[ 54.150077][ T478] dump_stack_lvl+0xee/0x150
[ 54.154660][ T478] ? show_regs_print_info+0x20/0x20
[ 54.159871][ T478] ? load_image+0x3a0/0x3a0
[ 54.164385][ T478] ? unwind_get_return_address+0x4d/0x90
[ 54.170006][ T478] print_address_description+0x7f/0x2c0
[ 54.176288][ T478] ? ext4_xattr_set_entry+0x13a3/0x37d0
[ 54.182236][ T478] kasan_report+0xf1/0x140
[ 54.186790][ T478] ? ext4_xattr_set_entry+0x13a3/0x37d0
[ 54.192350][ T478] ? ext4_xattr_set_entry+0x13a3/0x37d0
[ 54.198020][ T478] kasan_check_range+0x280/0x290
[ 54.202973][ T478] memmove+0x2d/0x70
[ 54.206891][ T478] ext4_xattr_set_entry+0x13a3/0x37d0
[ 54.212528][ T478] ? __kasan_kmalloc+0xda/0x110
[ 54.217472][ T478] ? __kmalloc_track_caller+0x13c/0x2c0
[ 54.223024][ T478] ? kmemdup+0x26/0x60
[ 54.227120][ T478] ? setxattr+0x251/0x300
[ 54.231720][ T478] ? x64_sys_call+0x8cc/0x9a0
[ 54.236487][ T478] ? do_syscall_64+0x4c/0xa0
[ 54.241087][ T478] ? ext4_xattr_ibody_set+0x360/0x360
[ 54.246709][ T478] ? __kmalloc_track_caller+0x13c/0x2c0
[ 54.252751][ T478] ? memcpy+0x56/0x70
[ 54.256760][ T478] ext4_xattr_block_set+0x8cd/0x2cb0
[ 54.262417][ T478] ? errseq_check+0x41/0x80
[ 54.266949][ T478] ? ext4_xattr_block_find+0x4f0/0x4f0
[ 54.272410][ T478] ? __kasan_check_write+0x14/0x20
[ 54.277516][ T478] ext4_xattr_set_handle+0xba5/0x12b0
[ 54.282985][ T478] ? ext4_xattr_set_entry+0x37d0/0x37d0
[ 54.288696][ T478] ? ext4_xattr_set+0x1f6/0x320
[ 54.293679][ T478] ? __ext4_journal_start_sb+0x154/0x2b0
[ 54.299336][ T478] ext4_xattr_set+0x22a/0x320
[ 54.304239][ T478] ? ext4_xattr_set_credits+0x290/0x290
[ 54.310011][ T478] ? selinux_inode_setxattr+0x5b4/0xbb0
[ 54.315680][ T478] ext4_xattr_trusted_set+0x3c/0x50
[ 54.320881][ T478] ? ext4_xattr_trusted_get+0x40/0x40
[ 54.326462][ T478] __vfs_setxattr+0x3e1/0x430
[ 54.331130][ T478] __vfs_setxattr_noperm+0x12a/0x5e0
[ 54.336905][ T478] __vfs_setxattr_locked+0x212/0x230
[ 54.342183][ T478] vfs_setxattr+0x168/0x2f0
[ 54.346675][ T478] ? xattr_permission+0x550/0x550
[ 54.351684][ T478] ? _copy_from_user+0x95/0xd0
[ 54.356431][ T478] setxattr+0x2da/0x300
[ 54.360574][ T478] ? path_setxattr+0x280/0x280
[ 54.365437][ T478] ? debug_smp_processor_id+0x17/0x20
[ 54.370859][ T478] ? __mnt_want_write+0x1e6/0x260
[ 54.376145][ T478] ? mnt_want_write+0x20b/0x2e0
[ 54.381018][ T478] path_setxattr+0x142/0x280
[ 54.385681][ T478] ? simple_xattr_list_add+0x120/0x120
[ 54.391129][ T478] ? do_sys_truncate+0x12f/0x190
[ 54.396047][ T478] ? __kasan_check_write+0x14/0x20
[ 54.401233][ T478] __x64_sys_lsetxattr+0xc2/0xe0
[ 54.406149][ T478] x64_sys_call+0x8cc/0x9a0
[ 54.410649][ T478] do_syscall_64+0x4c/0xa0
[ 54.415052][ T478] ? clear_bhb_loop+0x50/0xa0
[ 54.420005][ T478] ? clear_bhb_loop+0x50/0xa0
[ 54.424786][ T478] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 54.430924][ T478] RIP: 0033:0x7f7fd21b4b69
[ 54.435432][ T478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 54.455444][ T478] RSP: 002b:00007f7fd1c25038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd
[ 54.463932][ T478] RAX: ffffffffffffffda RBX: 00007f7fd23dbfa0 RCX: 00007f7fd21b4b69
[ 54.472495][ T478] RDX: 0000200000000040 RSI: 00002000000000c0 RDI: 0000200000000100
[ 54.480451][ T478] RBP: 00007f7fd2237df1 R08: 0000000000000000 R09: 0000000000000000
[ 54.488590][ T478] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000
[ 54.496645][ T478] R13: 0000000000000000 R14: 00007f7fd23dbfa0 R15: 00007ffc0e42d678
[ 54.504745][ T478]
[ 54.507855][ T478]
[ 54.510166][ T478] Allocated by task 478:
[ 54.514505][ T478] __kasan_kmalloc+0xda/0x110
[ 54.519192][ T478] __kmalloc_track_caller+0x13c/0x2c0
[ 54.524736][ T478] kmemdup+0x26/0x60
[ 54.528611][ T478] ext4_xattr_block_set+0x7e2/0x2cb0
[ 54.533879][ T478] ext4_xattr_set_handle+0xba5/0x12b0
[ 54.539333][ T478] ext4_xattr_set+0x22a/0x320
[ 54.544011][ T478] ext4_xattr_trusted_set+0x3c/0x50
[ 54.549195][ T478] __vfs_setxattr+0x3e1/0x430
[ 54.553981][ T478] __vfs_setxattr_noperm+0x12a/0x5e0
[ 54.559594][ T478] __vfs_setxattr_locked+0x212/0x230
[ 54.564920][ T478] vfs_setxattr+0x168/0x2f0
[ 54.569431][ T478] setxattr+0x2da/0x300
[ 54.573660][ T478] path_setxattr+0x142/0x280
[ 54.578473][ T478] __x64_sys_lsetxattr+0xc2/0xe0
[ 54.583418][ T478] x64_sys_call+0x8cc/0x9a0
[ 54.587957][ T478] do_syscall_64+0x4c/0xa0
[ 54.592368][ T478] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 54.598357][ T478]
[ 54.600673][ T478] The buggy address belongs to the object at ffff888118c93000
[ 54.600673][ T478] which belongs to the cache kmalloc-1k of size 1024
[ 54.614939][ T478] The buggy address is located 112 bytes inside of
[ 54.614939][ T478] 1024-byte region [ffff888118c93000, ffff888118c93400)
[ 54.628500][ T478] The buggy address belongs to the page:
[ 54.634132][ T478] page:ffffea0004632400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118c90
[ 54.644560][ T478] head:ffffea0004632400 order:3 compound_mapcount:0 compound_pincount:0
[ 54.653082][ T478] flags: 0x4000000000010200(slab|head|zone=1)
[ 54.659239][ T478] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888100043080
[ 54.667893][ T478] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 54.676577][ T478] page dumped because: kasan: bad access detected
[ 54.682982][ T478] page_owner tracks the page as allocated
[ 54.688790][ T478] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 399, ts 53889014101, free_ts 53877511310
[ 54.709975][ T478] post_alloc_hook+0x192/0x1b0
[ 54.714867][ T478] prep_new_page+0x1c/0x110
[ 54.719359][ T478] get_page_from_freelist+0x2cc5/0x2d50
[ 54.724888][ T478] __alloc_pages+0x18f/0x440
[ 54.729567][ T478] new_slab+0xa1/0x4d0
[ 54.733624][ T478] ___slab_alloc+0x381/0x810
[ 54.738303][ T478] __slab_alloc+0x49/0x90
[ 54.742618][ T478] __kmalloc_track_caller+0x169/0x2c0
[ 54.747979][ T478] __alloc_skb+0x21a/0x740
[ 54.752393][ T478] sk_stream_alloc_skb+0x21a/0xb60
[ 54.757490][ T478] tcp_sendmsg_locked+0xc3e/0x3590
[ 54.762598][ T478] tcp_sendmsg+0x2f/0x50
[ 54.766966][ T478] inet_sendmsg+0xa5/0xc0
[ 54.771390][ T478] sock_write_iter+0x29c/0x380
[ 54.776257][ T478] vfs_write+0x802/0xf70
[ 54.780477][ T478] ksys_write+0x140/0x240
[ 54.784779][ T478] page last free stack trace:
[ 54.789527][ T478] free_unref_page_prepare+0x542/0x550
[ 54.795072][ T478] free_unref_page+0xa2/0x550
[ 54.799737][ T478] __free_pages+0x6c/0x100
[ 54.804307][ T478] __free_slab+0xe8/0x1e0
[ 54.808627][ T478] __unfreeze_partials+0x160/0x190
[ 54.813745][ T478] put_cpu_partial+0xc6/0x120
[ 54.818428][ T478] __slab_free+0x1d4/0x290
[ 54.822828][ T478] ___cache_free+0x104/0x120
[ 54.827606][ T478] qlink_free+0x4d/0x90
[ 54.831757][ T478] qlist_free_all+0x5f/0xb0
[ 54.836461][ T478] kasan_quarantine_reduce+0x14a/0x170
[ 54.842061][ T478] __kasan_slab_alloc+0x2f/0xf0
[ 54.847163][ T478] slab_post_alloc_hook+0x4f/0x2b0
[ 54.852373][ T478] __kmalloc+0x120/0x2c0
[ 54.856818][ T478] fib6_info_alloc+0x34/0xe0
[ 54.861427][ T478] ip6_route_info_create+0x526/0x1510
[ 54.866792][ T478]
[ 54.869132][ T478] Memory state around the buggy address:
[ 54.874853][ T478] ffff888118c92f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 54.883088][ T478] ffff888118c92f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 54.891236][ T478] >ffff888118c93000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 54.899661][ T478] ^
[ 54.907471][ T478] ffff888118c93080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 54.915521][ T478] ffff888118c93100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 54.923556][ T478] ==================================================================
[ 54.931678][ T478] Disabling lock debugging due to kernel taint
[ 54.943400][ T30] audit: type=1400 audit(1755546095.599:112): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[ 54.965663][ T30] audit: type=1400 audit(1755546095.599:113): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 55.001747][ T482] loop2: detected capacity change from 0 to 512
[ 55.015809][ T10] device bridge_slave_1 left promiscuous mode
[ 55.022075][ T10] bridge0: port 2(bridge_slave_1) entered disabled state
[ 55.029634][ T10] device bridge_slave_0 left promiscuous mode
[ 55.036095][ T10] bridge0: port 1(bridge_slave_0) entered disabled state
[ 55.044190][ T10] device veth1_macvtap left promiscuous mode
[ 55.050342][ T10] device veth0_vlan left promiscuous mode
[ 55.059579][ T482] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode
[ 55.078582][ T482] EXT4-fs (loop2): 1 truncate cleaned up
[ 55.084246][ T482] EXT4-fs (loop2): mounted filesystem without journal. Opts: nogrpid,min_batch_time=0x0000000000000000,debug_want_extra_isize=0x0000000000000068,nobarrier,nodiscard,quota,,errors=continue. Quota mode: writeback.
[ 55.110058][ T404] general protection fault, probably for non-canonical address 0x58d3a76375e14db1: 0000 [#1] PREEMPT SMP KASAN
[ 55.121897][ T404] CPU: 0 PID: 404 Comm: udevd Tainted: G B 5.15.189-syzkaller-1081280-gf32b52534f1d #0
[ 55.132807][ T404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
[ 55.142837][ T404] RIP: 0010:kmem_cache_alloc+0x8a/0x260
[ 55.148636][ T404] Code: 08 48 8b 38 48 85 ff 0f 84 bd 00 00 00 48 83 78 10 00 0f 84 b2 00 00 00 41 8b 45 28 48 8d 0c 07 49 8b 9d d8 00 00 00 48 0f c9 <48> 33 1c 07 48 31 cb 48 8d 4a 08 4d 8b 45 00 48 89 f8 65 49 0f c7
[ 55.168495][ T404] RSP: 0018:ffffc90000a87ab8 EFLAGS: 00010286
[ 55.174639][ T404] RAX: 0000000000000800 RBX: 584ac27af469ba4e RCX: b14de17563a7d358
[ 55.182589][ T404] RDX: 00000000000266c0 RSI: 0000000000001000 RDI: 58d3a76375e145b1
[ 55.190655][ T404] RBP: ffffc90000a87af8 R08: 0000000000000000 R09: ffffc90000a87c20
[ 55.198785][ T404] R10: fffff52000150f86 R11: 1ffff92000150f84 R12: ffff8881001c5680
[ 55.206758][ T404] R13: ffff8881001c5680 R14: 0000000000000cc0 R15: ffffffff81b10929
[ 55.214715][ T404] FS: 00007f4f60801880(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
[ 55.223632][ T404] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 55.230190][ T404] CR2: 00007f4f60650000 CR3: 000000010f5f6000 CR4: 00000000003506b0
[ 55.238139][ T404] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 55.246087][ T404] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 55.254215][ T404] Call Trace:
[ 55.257485][ T404]
[ 55.260392][ T404] getname_flags+0xb9/0x500
[ 55.264974][ T404] user_path_at_empty+0x30/0x1c0
[ 55.269913][ T404] vfs_statx+0xfb/0xa60
[ 55.274057][ T404] ? vfs_fstatat+0x40/0x40
[ 55.278449][ T404] __se_sys_newfstatat+0xc6/0x340
[ 55.283450][ T404] ? __x64_sys_newfstatat+0xb0/0xb0
[ 55.288633][ T404] ? rcu_gp_kthread_wake+0x90/0x90
[ 55.293728][ T404] ? percpu_counter_add_batch+0x13c/0x160
[ 55.299434][ T404] ? blkcg_maybe_throttle_current+0x1df/0x9e0
[ 55.305680][ T404] ? ____fput+0x15/0x20
[ 55.309815][ T404] __x64_sys_newfstatat+0x9b/0xb0
[ 55.315250][ T404] x64_sys_call+0x2c1/0x9a0
[ 55.320029][ T404] do_syscall_64+0x4c/0xa0
[ 55.324428][ T404] ? clear_bhb_loop+0x50/0xa0
[ 55.329167][ T404] ? clear_bhb_loop+0x50/0xa0
[ 55.334043][ T404] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 55.340036][ T404] RIP: 0033:0x7f4f60959b0a
[ 55.344613][ T404] Code: 48 8b 15 f1 f2 0d 00 f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 41 89 ca b8 06 01 00 00 0f 05 <3d> 00 f0 ff ff 77 07 31 c0 c3 0f 1f 40 00 48 8b 15 b9 f2 0d 00 f7
[ 55.364565][ T404] RSP: 002b:00007ffceebdbcc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000106
[ 55.373066][ T404] RAX: ffffffffffffffda RBX: 000000000000000e RCX: 00007f4f60959b0a
[ 55.381024][ T404] RDX: 00007ffceebdbcd0 RSI: 00007ffceebdbda0 RDI: 00000000ffffff9c
[ 55.388971][ T404] RBP: 00007ffceebdcde0 R08: 0000000000000000 R09: 0000000000000000
[ 55.396921][ T404] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffceebdd200
[ 55.404894][ T404] R13: 0000000000000000 R14: 000055bb77db4100 R15: 000055bb77db4140
[ 55.412884][ T404]
[ 55.416044][ T404] Modules linked in:
[ 55.420206][ T482] BUG: unable to handle page fault for address: ffff888119f70000
[ 55.428074][ T482] #PF: supervisor write access in kernel mode
[ 55.434136][ T482] #PF: error_code(0x0003) - permissions violation
[ 55.440531][ T482] PGD 7201067 P4D 7201067 PUD 1087e3063 PMD 11a547063 PTE 8000000119f70161
[ 55.449389][ T482] Oops: 0003 [#2] PREEMPT SMP KASAN
[ 55.454667][ T482] CPU: 1 PID: 482 Comm: syz.2.18 Tainted: G B D 5.15.189-syzkaller-1081280-gf32b52534f1d #0
[ 55.465854][ T482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
[ 55.476096][ T482] RIP: 0010:__memmove+0x19c/0x1a0
[ 55.481106][ T482] Code: fa 02 72 16 66 44 8b 1e 66 44 8b 54 16 fe 66 44 89 1f 66 44 89 54 17 fe eb 0c 48 83 fa 01 72 06 44 8a 1e 44 88 1f c3 48 89 d1 a4 c3 00 eb 2e 0f 1f 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03
[ 55.501351][ T482] RSP: 0018:ffffc90000c87240 EFLAGS: 00010282
[ 55.507484][ T482] RAX: ffff888119462850 RBX: ffffffffffffffb4 RCX: ffffffffff4f2804
[ 55.515532][ T482] RDX: ffffffffffffffb4 RSI: ffff888119f70020 RDI: ffff888119f70000
[ 55.523492][ T482] RBP: ffffc90000c87270 R08: ffff888119462804 R09: ffffed102328c580
[ 55.531657][ T482] R10: 0000000000000000 R11: 0000000000000080 R12: 0000000000000000
[ 55.539781][ T482] R13: ffffffff81e7b983 R14: ffff888119462870 R15: ffff888119462850
[ 55.547954][ T482] FS: 00007f7fd1c256c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[ 55.557061][ T482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 55.563730][ T482] CR2: ffff888119f70000 CR3: 000000011db3c000 CR4: 00000000003506a0
[ 55.571724][ T482] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 55.579999][ T482] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 55.587951][ T482] Call Trace:
[ 55.591232][ T482]
[ 55.594151][ T482] ? memmove+0x56/0x70
[ 55.598319][ T482] ext4_xattr_set_entry+0x13a3/0x37d0
[ 55.603817][ T482] ? __kasan_kmalloc+0xda/0x110
[ 55.608774][ T482] ? __kmalloc_track_caller+0x13c/0x2c0
[ 55.614743][ T482] ? kmemdup+0x26/0x60
[ 55.619019][ T482] ? setxattr+0x251/0x300
[ 55.623340][ T482] ? x64_sys_call+0x8cc/0x9a0
[ 55.628028][ T482] ? do_syscall_64+0x4c/0xa0
[ 55.632699][ T482] ? ext4_xattr_ibody_set+0x360/0x360
[ 55.638083][ T482] ? __kmalloc_track_caller+0x13c/0x2c0
[ 55.643721][ T482] ? memcpy+0x56/0x70
[ 55.647696][ T482] ext4_xattr_block_set+0x8cd/0x2cb0
[ 55.653065][ T482] ? errseq_check+0x41/0x80
[ 55.657591][ T482] ? ext4_xattr_block_find+0x4f0/0x4f0
[ 55.663452][ T482] ? __kasan_check_write+0x14/0x20
[ 55.668619][ T482] ext4_xattr_set_handle+0xba5/0x12b0
[ 55.674202][ T482] ? ext4_xattr_set_entry+0x37d0/0x37d0
[ 55.679828][ T482] ? ext4_xattr_set+0x1f6/0x320
[ 55.684692][ T482] ? __ext4_journal_start_sb+0x154/0x2b0
[ 55.690359][ T482] ext4_xattr_set+0x22a/0x320
[ 55.695115][ T482] ? ext4_xattr_set_credits+0x290/0x290
[ 55.700646][ T482] ? selinux_inode_setxattr+0x5b4/0xbb0
[ 55.706170][ T482] ext4_xattr_trusted_set+0x3c/0x50
[ 55.711458][ T482] ? ext4_xattr_trusted_get+0x40/0x40
[ 55.716853][ T482] __vfs_setxattr+0x3e1/0x430
[ 55.721527][ T482] __vfs_setxattr_noperm+0x12a/0x5e0
[ 55.727082][ T482] __vfs_setxattr_locked+0x212/0x230
[ 55.732367][ T482] vfs_setxattr+0x168/0x2f0
[ 55.736864][ T482] ? xattr_permission+0x550/0x550
[ 55.742051][ T482] ? _copy_from_user+0x95/0xd0
[ 55.746808][ T482] setxattr+0x2da/0x300
[ 55.751038][ T482] ? path_setxattr+0x280/0x280
[ 55.755902][ T482] ? debug_smp_processor_id+0x17/0x20
[ 55.761348][ T482] ? __mnt_want_write+0x1e6/0x260
[ 55.766350][ T482] ? mnt_want_write+0x20b/0x2e0
[ 55.771172][ T482] path_setxattr+0x142/0x280
[ 55.775738][ T482] ? simple_xattr_list_add+0x120/0x120
[ 55.781167][ T482] ? do_sys_truncate+0x12f/0x190
[ 55.786418][ T482] ? __kasan_check_write+0x14/0x20
[ 55.791540][ T482] __x64_sys_lsetxattr+0xc2/0xe0
[ 55.796488][ T482] x64_sys_call+0x8cc/0x9a0
[ 55.800970][ T482] do_syscall_64+0x4c/0xa0
[ 55.805363][ T482] ? clear_bhb_loop+0x50/0xa0
[ 55.810131][ T482] ? clear_bhb_loop+0x50/0xa0
[ 55.814806][ T482] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 55.820699][ T482] RIP: 0033:0x7f7fd21b4b69
[ 55.825117][ T482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 55.846164][ T482] RSP: 002b:00007f7fd1c25038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd
[ 55.854854][ T482] RAX: ffffffffffffffda RBX: 00007f7fd23dbfa0 RCX: 00007f7fd21b4b69
[ 55.862812][ T482] RDX: 0000200000000040 RSI: 00002000000000c0 RDI: 0000200000000100
[ 55.870764][ T482] RBP: 00007f7fd2237df1 R08: 0000000000000000 R09: 0000000000000000
[ 55.878715][ T482] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000
[ 55.886696][ T482] R13: 0000000000000000 R14: 00007f7fd23dbfa0 R15: 00007ffc0e42d678
[ 55.894741][ T482]
[ 55.897739][ T482] Modules linked in:
[ 55.901868][ T482] CR2: ffff888119f70000
[ 55.906023][ T482] ---[ end trace 57235e369a920304 ]---
[ 55.906064][ T90] general protection fault, probably for non-canonical address 0xa07e183f254f3e2f: 0000 [#3] PREEMPT SMP KASAN
[ 55.911486][ T482] RIP: 0010:kmem_cache_alloc+0x8a/0x260
[ 55.923340][ T90] CPU: 0 PID: 90 Comm: klogd Tainted: G B D 5.15.189-syzkaller-1081280-gf32b52534f1d #0
[ 55.928856][ T482] Code: 08 48 8b 38 48 85 ff 0f 84 bd 00 00 00 48 83 78 10 00 0f 84 b2 00 00 00 41 8b 45 28 48 8d 0c 07 49 8b 9d d8 00 00 00 48 0f c9 <48> 33 1c 07 48 31 cb 48 8d 4a 08 4d 8b 45 00 48 89 f8 65 49 0f c7
[ 55.939961][ T90] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
[ 55.939974][ T90] RIP: 0010:__kmalloc_track_caller+0xb2/0x2c0
[ 55.959988][ T482] RSP: 0018:ffffc90000a87ab8 EFLAGS: 00010286
[ 55.970139][ T90] Code: 08 48 8b 38 48 85 ff 0f 84 c5 00 00 00 48 83 78 10 00 0f 84 ba 00 00 00 41 8b 45 28 48 8d 0c 07 49 8b 9d d8 00 00 00 48 0f c9 <48> 33 1c 07 48 31 cb 48 8d 4a 08 4d 8b 45 00 48 89 f8 65 49 0f c7
[ 55.976189][ T482]
[ 55.976195][ T482] RAX: 0000000000000800 RBX: 584ac27af469ba4e RCX: b14de17563a7d358
[ 55.982371][ T90] RSP: 0018:ffffc90000957838 EFLAGS: 00010286
[ 56.002134][ T482] RDX: 00000000000266c0 RSI: 0000000000001000 RDI: 58d3a76375e145b1
[ 56.004543][ T90]
[ 56.004548][ T90] RAX: 0000000000000200 RBX: a0bc4c26a4c7c3d0 RCX: 2f3e4f253f187ea0
[ 56.012576][ T482] RBP: ffffc90000a87af8 R08: 0000000000000000 R09: ffffc90000a87c20
[ 56.018889][ T90] RDX: 0000000000013e68 RSI: 0000000000000400 RDI: a07e183f254f3c2f
[ 56.026835][ T482] R10: fffff52000150f86 R11: 1ffff92000150f84 R12: ffff8881001c5680
[ 56.029139][ T90] RBP: ffffc90000957888 R08: 0000000000000140 R09: ffff888115fdc000
[ 56.037169][ T482] R13: ffff8881001c5680 R14: 0000000000000cc0 R15: ffffffff81b10929
[ 56.045120][ T90] R10: 0000000087a864e4 R11: 1ffff9200012ae8d R12: ffff888100043080
[ 56.053080][ T482] FS: 00007f7fd1c256c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[ 56.061025][ T90] R13: ffff888100043080 R14: 0000000000482cc0 R15: 0000000000000240
[ 56.068971][ T482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 56.076923][ T90] FS: 00007f0db53adc80(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
[ 56.084888][ T482] CR2: ffff888119f70000 CR3: 000000011db3c000 CR4: 00000000003506a0
[ 56.093884][ T90] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 56.101851][ T482] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 56.108403][ T90] CR2: 00007f4f60650000 CR3: 000000010d896000 CR4: 00000000003506b0
[ 56.117305][ T482] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 56.125343][ T90] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 56.132158][ T482] Kernel panic - not syncing: Fatal exception
[ 56.140200][ T90] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 56.178136][ T90] Call Trace:
[ 56.181430][ T90]
[ 56.184434][ T90] ? alloc_skb_with_frags+0xa8/0x620
[ 56.189919][ T90] ? alloc_skb_with_frags+0xa8/0x620
[ 56.195301][ T90] __alloc_skb+0x21a/0x740
[ 56.199704][ T90] alloc_skb_with_frags+0xa8/0x620
[ 56.204894][ T90] ? memcpy+0x56/0x70
[ 56.208861][ T90] sock_alloc_send_pskb+0x853/0x980
[ 56.214043][ T90] ? sock_kzfree_s+0x60/0x60
[ 56.218613][ T90] ? __kasan_check_write+0x14/0x20
[ 56.223706][ T90] ? _raw_spin_lock+0x8e/0xe0
[ 56.228539][ T90] ? _raw_spin_trylock_bh+0x130/0x130
[ 56.233904][ T90] ? security_socket_getpeersec_dgram+0xaa/0xc0
[ 56.240130][ T90] unix_dgram_sendmsg+0x5ea/0x1880
[ 56.245266][ T90] ? unix_dgram_poll+0x6b0/0x6b0
[ 56.250376][ T90] ? security_socket_sendmsg+0x82/0xa0
[ 56.255912][ T90] __sys_sendto+0x423/0x580
[ 56.260502][ T90] ? __ia32_sys_getpeername+0x90/0x90
[ 56.265875][ T90] __x64_sys_sendto+0xe5/0x100
[ 56.270852][ T90] x64_sys_call+0x178/0x9a0
[ 56.275365][ T90] do_syscall_64+0x4c/0xa0
[ 56.279838][ T90] ? clear_bhb_loop+0x50/0xa0
[ 56.284516][ T90] ? clear_bhb_loop+0x50/0xa0
[ 56.289190][ T90] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 56.295076][ T90] RIP: 0033:0x7f0db54fd407
[ 56.299565][ T90] Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff
[ 56.320390][ T90] RSP: 002b:00007fff441b9420 EFLAGS: 00000202 ORIG_RAX: 000000000000002c
[ 56.329240][ T90] RAX: ffffffffffffffda RBX: 00007f0db53adc80 RCX: 00007f0db54fd407
[ 56.337580][ T90] RDX: 0000000000000095 RSI: 00007fff441b9560 RDI: 0000000000000003
[ 56.345891][ T90] RBP: 00007fff441b9990 R08: 0000000000000000 R09: 0000000000000000
[ 56.353856][ T90] R10: 0000000000004000 R11: 0000000000000202 R12: 00007fff441b99a8
[ 56.361824][ T90] R13: 00007fff441b9560 R14: 000000000000007a R15: 00007fff441b9560
[ 56.369962][ T90]
[ 56.373052][ T90] Modules linked in:
[ 56.377207][ T482] Kernel Offset: disabled
[ 56.381644][ T482] Rebooting in 86400 seconds..