Warning: Permanently added '10.128.1.39' (ED25519) to the list of known hosts.
2025/07/19 02:49:28 ignoring optional flag "sandboxArg"="0"
2025/07/19 02:49:29 parsed 1 programs
[ 49.530973][ T30] audit: type=1400 audit(1752893370.339:105): avc: denied { unlink } for pid=391 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 49.564905][ T391] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 50.445160][ T30] audit: type=1401 audit(1752893371.249:106): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768"
[ 50.504668][ T428] bridge0: port 1(bridge_slave_0) entered blocking state
[ 50.512180][ T428] bridge0: port 1(bridge_slave_0) entered disabled state
[ 50.520102][ T428] device bridge_slave_0 entered promiscuous mode
[ 50.534555][ T428] bridge0: port 2(bridge_slave_1) entered blocking state
[ 50.542444][ T428] bridge0: port 2(bridge_slave_1) entered disabled state
[ 50.550574][ T428] device bridge_slave_1 entered promiscuous mode
[ 50.618341][ T428] bridge0: port 2(bridge_slave_1) entered blocking state
[ 50.625608][ T428] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 50.633029][ T428] bridge0: port 1(bridge_slave_0) entered blocking state
[ 50.640253][ T428] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 50.659881][ T8] bridge0: port 1(bridge_slave_0) entered disabled state
[ 50.667293][ T8] bridge0: port 2(bridge_slave_1) entered disabled state
[ 50.674976][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 50.682661][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 50.692161][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 50.700409][ T8] bridge0: port 1(bridge_slave_0) entered blocking state
[ 50.707452][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 50.720034][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 50.728496][ T345] bridge0: port 2(bridge_slave_1) entered blocking state
[ 50.735573][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 50.747644][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 50.757629][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 50.772000][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 50.783692][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 50.791993][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 50.799491][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 50.808647][ T428] device veth0_vlan entered promiscuous mode
[ 50.819435][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 50.828850][ T428] device veth1_macvtap entered promiscuous mode
[ 50.838914][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 50.849691][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
2025/07/19 02:49:32 executed programs: 0
[ 51.318790][ T459] bridge0: port 1(bridge_slave_0) entered blocking state
[ 51.326157][ T459] bridge0: port 1(bridge_slave_0) entered disabled state
[ 51.333973][ T459] device bridge_slave_0 entered promiscuous mode
[ 51.341460][ T459] bridge0: port 2(bridge_slave_1) entered blocking state
[ 51.348550][ T459] bridge0: port 2(bridge_slave_1) entered disabled state
[ 51.356125][ T459] device bridge_slave_1 entered promiscuous mode
[ 51.411149][ T459] bridge0: port 2(bridge_slave_1) entered blocking state
[ 51.418353][ T459] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 51.425709][ T459] bridge0: port 1(bridge_slave_0) entered blocking state
[ 51.432945][ T459] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 51.453884][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 51.461647][ T345] bridge0: port 1(bridge_slave_0) entered disabled state
[ 51.468914][ T345] bridge0: port 2(bridge_slave_1) entered disabled state
[ 51.478400][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 51.486861][ T345] bridge0: port 1(bridge_slave_0) entered blocking state
[ 51.493924][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 51.503131][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 51.511817][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 51.520017][ T345] bridge0: port 2(bridge_slave_1) entered blocking state
[ 51.527083][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 51.539668][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 51.547948][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 51.558616][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 51.566874][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 51.578903][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 51.587415][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 51.598546][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 51.606496][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 51.615188][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 51.622848][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 51.631104][ T459] device veth0_vlan entered promiscuous mode
[ 51.645829][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 51.654283][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 51.663884][ T459] device veth1_macvtap entered promiscuous mode
[ 51.676882][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 51.685155][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 51.693867][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 51.703748][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 51.712223][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 51.741435][ T470] loop2: detected capacity change from 0 to 512
[ 51.762541][ T470] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support!
[ 51.775855][ T470] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode
[ 51.788186][ T470] EXT4-fs warning (device loop2): ext4_expand_extra_isize_ea:2825: Unable to expand inode 15. Delete some EAs or run e2fsck.
[ 51.801755][ T470] EXT4-fs (loop2): 1 truncate cleaned up
[ 51.807406][ T470] EXT4-fs (loop2): mounted filesystem without journal. Opts: init_itable=0x0000000000000000,jqfmt=vfsold,debug_want_extra_isize=0x000000000000006a,user_xattr,errors=remount-ro,quota,. Quota mode: writeback.
[ 51.828070][ T30] audit: type=1400 audit(1752893372.639:107): avc: denied { mount } for pid=469 comm="syz.2.16" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[ 51.841472][ T470] ==================================================================
[ 51.850005][ T30] audit: type=1400 audit(1752893372.639:108): avc: denied { setattr } for pid=469 comm="syz.2.16" name="file1" dev="loop2" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[ 51.857988][ T470] BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0x13a3/0x37d0
[ 51.858039][ T470] Read of size 18446744073709551540 at addr ffff888118188870 by task syz.2.16/470
[ 51.858059][ T470]
[ 51.858071][ T470] CPU: 0 PID: 470 Comm: syz.2.16 Not tainted 5.15.188-syzkaller-1081189-g6b619c45dff5 #0
[ 51.880891][ T30] audit: type=1400 audit(1752893372.639:109): avc: denied { write } for pid=469 comm="syz.2.16" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1
[ 51.887962][ T470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 51.897258][ T30] audit: type=1400 audit(1752893372.639:110): avc: denied { add_name } for pid=469 comm="syz.2.16" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1
[ 51.899520][ T470] Call Trace:
[ 51.909496][ T30] audit: type=1400 audit(1752893372.639:111): avc: denied { create } for pid=469 comm="syz.2.16" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1
[ 51.930670][ T470]
[ 51.930682][ T470] __dump_stack+0x21/0x30
[ 51.930709][ T470] dump_stack_lvl+0xee/0x150
[ 51.930729][ T470] ? show_regs_print_info+0x20/0x20
[ 51.930749][ T470] ? load_image+0x3a0/0x3a0
[ 51.930773][ T470] ? unwind_get_return_address+0x4d/0x90
[ 51.941095][ T30] audit: type=1400 audit(1752893372.639:112): avc: denied { write } for pid=469 comm="syz.2.16" name="file2" dev="loop2" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[ 51.961264][ T470] print_address_description+0x7f/0x2c0
[ 51.961294][ T470] ? ext4_xattr_set_entry+0x13a3/0x37d0
[ 51.961320][ T470] kasan_report+0xf1/0x140
[ 51.964667][ T30] audit: type=1400 audit(1752893372.639:113): avc: denied { open } for pid=469 comm="syz.2.16" path="/0/file2/file2" dev="loop2" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[ 51.984582][ T470] ? ext4_xattr_set_entry+0x13a3/0x37d0
[ 51.984613][ T470] ? ext4_xattr_set_entry+0x13a3/0x37d0
[ 51.984636][ T470] kasan_check_range+0x280/0x290
[ 52.088834][ T470] memmove+0x2d/0x70
[ 52.092747][ T470] ext4_xattr_set_entry+0x13a3/0x37d0
[ 52.098408][ T470] ? __kasan_kmalloc+0xda/0x110
[ 52.103273][ T470] ? __kmalloc_track_caller+0x13c/0x2c0
[ 52.108822][ T470] ? kmemdup+0x26/0x60
[ 52.112894][ T470] ? setxattr+0x221/0x300
[ 52.117226][ T470] ? x64_sys_call+0x8cc/0x9a0
[ 52.121904][ T470] ? do_syscall_64+0x4c/0xa0
[ 52.126498][ T470] ? ext4_xattr_ibody_set+0x360/0x360
[ 52.131900][ T470] ? ext4_xattr_block_set+0x7e2/0x2cb0
[ 52.137468][ T470] ? ext4_xattr_block_set+0x7e2/0x2cb0
[ 52.142936][ T470] ? __kmalloc_track_caller+0x13c/0x2c0
[ 52.148490][ T470] ? memcpy+0x56/0x70
[ 52.152497][ T470] ext4_xattr_block_set+0x8cd/0x2cb0
[ 52.157804][ T470] ? errseq_check+0x41/0x80
[ 52.162513][ T470] ? ext4_xattr_block_find+0x4f0/0x4f0
[ 52.168075][ T470] ? __kasan_check_write+0x14/0x20
[ 52.173372][ T470] ext4_xattr_set_handle+0xba5/0x12b0
[ 52.178757][ T470] ? ext4_xattr_set_entry+0x37d0/0x37d0
[ 52.184309][ T470] ? ext4_xattr_set+0x1f6/0x320
[ 52.189177][ T470] ? __ext4_journal_start_sb+0x154/0x2b0
[ 52.194815][ T470] ext4_xattr_set+0x22a/0x320
[ 52.199498][ T470] ? ext4_xattr_set_credits+0x290/0x290
[ 52.205047][ T470] ? selinux_inode_setxattr+0x5b4/0xbb0
[ 52.210629][ T470] ext4_xattr_trusted_set+0x3c/0x50
[ 52.215833][ T470] ? ext4_xattr_trusted_get+0x40/0x40
[ 52.221209][ T470] __vfs_setxattr+0x3e1/0x430
[ 52.225904][ T470] __vfs_setxattr_noperm+0x12a/0x5e0
[ 52.231194][ T470] __vfs_setxattr_locked+0x212/0x230
[ 52.236504][ T470] vfs_setxattr+0x168/0x2f0
[ 52.241106][ T470] ? xattr_permission+0x550/0x550
[ 52.246151][ T470] ? _copy_from_user+0x95/0xd0
[ 52.250926][ T470] setxattr+0x2da/0x300
[ 52.255175][ T470] ? path_setxattr+0x280/0x280
[ 52.259946][ T470] ? debug_smp_processor_id+0x17/0x20
[ 52.265331][ T470] ? __mnt_want_write+0x1e6/0x260
[ 52.270493][ T470] ? mnt_want_write+0x20b/0x2e0
[ 52.275360][ T470] path_setxattr+0x142/0x280
[ 52.280321][ T470] ? simple_xattr_list_add+0x120/0x120
[ 52.285880][ T470] ? __kasan_check_write+0x14/0x20
[ 52.291010][ T470] __x64_sys_lsetxattr+0xc2/0xe0
[ 52.295954][ T470] x64_sys_call+0x8cc/0x9a0
[ 52.300508][ T470] do_syscall_64+0x4c/0xa0
[ 52.305016][ T470] ? clear_bhb_loop+0x50/0xa0
[ 52.309701][ T470] ? clear_bhb_loop+0x50/0xa0
[ 52.314510][ T470] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 52.320412][ T470] RIP: 0033:0x7fca058ce929
[ 52.324835][ T470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 52.344461][ T470] RSP: 002b:00007fca0533f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd
[ 52.352978][ T470] RAX: ffffffffffffffda RBX: 00007fca05af5fa0 RCX: 00007fca058ce929
[ 52.360961][ T470] RDX: 0000200000000040 RSI: 0000200000000300 RDI: 0000200000000100
[ 52.368952][ T470] RBP: 00007fca05950b39 R08: 0000000000000000 R09: 0000000000000000
[ 52.377036][ T470] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000
[ 52.385201][ T470] R13: 0000000000000000 R14: 00007fca05af5fa0 R15: 00007ffd38f52dc8
[ 52.393189][ T470]
[ 52.396217][ T470]
[ 52.398538][ T470] Allocated by task 470:
[ 52.402873][ T470] __kasan_kmalloc+0xda/0x110
[ 52.407555][ T470] __kmalloc_track_caller+0x13c/0x2c0
[ 52.412930][ T470] kmemdup+0x26/0x60
[ 52.416825][ T470] ext4_xattr_block_set+0x7e2/0x2cb0
[ 52.422141][ T470] ext4_xattr_set_handle+0xba5/0x12b0
[ 52.427613][ T470] ext4_xattr_set+0x22a/0x320
[ 52.432314][ T470] ext4_xattr_trusted_set+0x3c/0x50
[ 52.437514][ T470] __vfs_setxattr+0x3e1/0x430
[ 52.442284][ T470] __vfs_setxattr_noperm+0x12a/0x5e0
[ 52.447615][ T470] __vfs_setxattr_locked+0x212/0x230
[ 52.453095][ T470] vfs_setxattr+0x168/0x2f0
[ 52.457645][ T470] setxattr+0x2da/0x300
[ 52.461904][ T470] path_setxattr+0x142/0x280
[ 52.466503][ T470] __x64_sys_lsetxattr+0xc2/0xe0
[ 52.471442][ T470] x64_sys_call+0x8cc/0x9a0
[ 52.475945][ T470] do_syscall_64+0x4c/0xa0
[ 52.480362][ T470] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 52.486256][ T470]
[ 52.488596][ T470] The buggy address belongs to the object at ffff888118188800
[ 52.488596][ T470] which belongs to the cache kmalloc-1k of size 1024
[ 52.502863][ T470] The buggy address is located 112 bytes inside of
[ 52.502863][ T470] 1024-byte region [ffff888118188800, ffff888118188c00)
[ 52.516525][ T470] The buggy address belongs to the page:
[ 52.522306][ T470] page:ffffea0004606200 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88811818c800 pfn:0x118188
[ 52.533944][ T470] head:ffffea0004606200 order:3 compound_mapcount:0 compound_pincount:0
[ 52.543173][ T470] flags: 0x4000000000010200(slab|head|zone=1)
[ 52.549275][ T470] raw: 4000000000010200 ffffea00045f9400 0000000200000002 ffff888100043080
[ 52.557932][ T470] raw: ffff88811818c800 000000008010000a 00000001ffffffff 0000000000000000
[ 52.566513][ T470] page dumped because: kasan: bad access detected
[ 52.573023][ T470] page_owner tracks the page as allocated
[ 52.578736][ T470] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 107, ts 6673646284, free_ts 0
[ 52.596935][ T470] post_alloc_hook+0x192/0x1b0
[ 52.601805][ T470] prep_new_page+0x1c/0x110
[ 52.606313][ T470] get_page_from_freelist+0x2cc5/0x2d50
[ 52.611861][ T470] __alloc_pages+0x18f/0x440
[ 52.616485][ T470] new_slab+0xa1/0x4d0
[ 52.620584][ T470] ___slab_alloc+0x381/0x810
[ 52.625175][ T470] __slab_alloc+0x49/0x90
[ 52.629506][ T470] __kmalloc_track_caller+0x169/0x2c0
[ 52.634885][ T470] __alloc_skb+0x21a/0x740
[ 52.639305][ T470] netlink_sendmsg+0x602/0xb70
[ 52.644081][ T470] ____sys_sendmsg+0x5a2/0x8c0
[ 52.648902][ T470] ___sys_sendmsg+0x1f0/0x260
[ 52.653582][ T470] __x64_sys_sendmsg+0x1e2/0x2a0
[ 52.658524][ T470] x64_sys_call+0x4b/0x9a0
[ 52.662946][ T470] do_syscall_64+0x4c/0xa0
[ 52.667363][ T470] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 52.673257][ T470] page_owner free stack trace missing
[ 52.678620][ T470]
[ 52.680953][ T470] Memory state around the buggy address:
[ 52.686665][ T470] ffff888118188700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 52.694726][ T470] ffff888118188780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 52.702878][ T470] >ffff888118188800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 52.711462][ T470] ^
[ 52.719266][ T470] ffff888118188880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 52.727499][ T470] ffff888118188900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 52.735575][ T470] ==================================================================
[ 52.743642][ T470] Disabling lock debugging due to kernel taint
[ 52.764913][ T30] audit: type=1400 audit(1752893373.569:114): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[ 52.818591][ T474] loop2: detected capacity change from 0 to 512
[ 52.887660][ T474] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode
[ 52.899079][ T474] EXT4-fs (loop2): 1 truncate cleaned up
[ 52.904767][ T474] EXT4-fs (loop2): mounted filesystem without journal. Opts: init_itable=0x0000000000000000,jqfmt=vfsold,debug_want_extra_isize=0x000000000000006a,user_xattr,errors=remount-ro,quota,. Quota mode: writeback.
[ 52.929822][ T400] general protection fault, probably for non-canonical address 0xfdaffc1b6000000c: 0000 [#1] PREEMPT SMP KASAN
[ 52.942242][ T400] KASAN: maybe wild-memory-access in range [0xed8000db00000060-0xed8000db00000067]
[ 52.951650][ T400] CPU: 0 PID: 400 Comm: udevd Tainted: G B 5.15.188-syzkaller-1081189-g6b619c45dff5 #0
[ 52.962786][ T400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 52.972864][ T400] RIP: 0010:avc_has_perm_noaudit+0x14d/0x460
[ 52.979041][ T400] Code: 0f 94 c0 48 83 c3 d8 0f 94 c1 08 c1 44 89 74 24 2c 74 0a e8 75 6e 47 ff e9 44 01 00 00 44 0f b7 74 24 14 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 cd 00 00 00 44 8b 3b 44 89 e7 44 89 fe
[ 52.998729][ T400] RSP: 0018:ffffc90000a87560 EFLAGS: 00010a06
[ 53.004797][ T400] RAX: 1db0001b6000000c RBX: ed8000db00000061 RCX: ffff88810f63cf00
[ 53.012784][ T400] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000aa4000e5
[ 53.020998][ T400] RBP: ffffc90000a87668 R08: dffffc0000000000 R09: ffffc90000a875c0
[ 53.029148][ T400] R10: fffff52000150ebf R11: 1ffff92000150eb8 R12: 00000000aa4000e5
[ 53.037122][ T400] R13: dffffc0000000000 R14: 0000000000000008 R15: 0000000000000000
[ 53.045092][ T400] FS: 00007f63713a7880(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
[ 53.054036][ T400] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 53.060724][ T400] CR2: 00007f63711f6000 CR3: 000000011b3f9000 CR4: 00000000003506b0
[ 53.068719][ T400] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 53.076691][ T400] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 53.084666][ T400] Call Trace:
[ 53.087954][ T400]
[ 53.090896][ T400] ? avc_denied+0x1b0/0x1b0
[ 53.095407][ T400] selinux_inode_permission+0x3b1/0x5e0
[ 53.100949][ T400] ? selinux_inode_follow_link+0x360/0x360
[ 53.106884][ T400] ? set_root+0x400/0x400
[ 53.111324][ T400] security_inode_permission+0xa0/0x100
[ 53.116966][ T400] inode_permission+0xef/0x4a0
[ 53.122039][ T400] link_path_walk+0x277/0xd40
[ 53.126722][ T400] ? handle_lookup_down+0x130/0x130
[ 53.132272][ T400] path_lookupat+0x95/0x490
[ 53.136858][ T400] filename_lookup+0x1e2/0x4f0
[ 53.141617][ T400] ? hashlen_string+0x120/0x120
[ 53.146466][ T400] user_path_at_empty+0x47/0x1c0
[ 53.151396][ T400] vfs_statx+0xfb/0xa60
[ 53.155548][ T400] ? vfs_fstatat+0x40/0x40
[ 53.159977][ T400] __se_sys_newfstatat+0xc6/0x340
[ 53.165001][ T400] ? __x64_sys_newfstatat+0xb0/0xb0
[ 53.170195][ T400] ? rcu_gp_kthread_wake+0x90/0x90
[ 53.175333][ T400] ? percpu_counter_add_batch+0x13c/0x160
[ 53.181049][ T400] ? blkcg_maybe_throttle_current+0x1df/0x9e0
[ 53.187135][ T400] ? ____fput+0x15/0x20
[ 53.191376][ T400] __x64_sys_newfstatat+0x9b/0xb0
[ 53.196397][ T400] x64_sys_call+0x2c1/0x9a0
[ 53.200909][ T400] do_syscall_64+0x4c/0xa0
[ 53.205331][ T400] ? clear_bhb_loop+0x50/0xa0
[ 53.210017][ T400] ? clear_bhb_loop+0x50/0xa0
[ 53.214700][ T400] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 53.220590][ T400] RIP: 0033:0x7f63714ffb0a
[ 53.225012][ T400] Code: 48 8b 15 f1 f2 0d 00 f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 41 89 ca b8 06 01 00 00 0f 05 <3d> 00 f0 ff ff 77 07 31 c0 c3 0f 1f 40 00 48 8b 15 b9 f2 0d 00 f7
[ 53.244698][ T400] RSP: 002b:00007ffdbfd3ea58 EFLAGS: 00000246 ORIG_RAX: 0000000000000106
[ 53.253106][ T400] RAX: ffffffffffffffda RBX: 0000000000006180 RCX: 00007f63714ffb0a
[ 53.261076][ T400] RDX: 00007ffdbfd3ea80 RSI: 0000561cd9cf3c10 RDI: 00000000ffffff9c
[ 53.269040][ T400] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000561cd9ce8100
[ 53.277005][ T400] R10: 0000000000000100 R11: 0000000000000246 R12: 0000000000000000
[ 53.285153][ T400] R13: 0000000000000000 R14: 0000561cd9cf3c10 R15: 0000561cd9cf4870
[ 53.293382][ T400]
[ 53.296393][ T400] Modules linked in:
[ 53.300363][ T474] BUG: unable to handle page fault for address: ffff88811a733000
[ 53.300463][ T400] ---[ end trace db44070cabd5d78c ]---
[ 53.308186][ T474] #PF: supervisor write access in kernel mode
[ 53.308197][ T474] #PF: error_code(0x0003) - permissions violation
[ 53.308210][ T474] PGD 7201067
[ 53.313752][ T400] RIP: 0010:avc_has_perm_noaudit+0x14d/0x460
[ 53.319745][ T474] P4D 7201067 PUD 1087e3063 PMD 11a432063 PTE 800000011a737161
[ 53.326210][ T400] Code: 0f 94 c0 48 83 c3 d8 0f 94 c1 08 c1 44 89 74 24 2c 74 0a e8 75 6e 47 ff e9 44 01 00 00 44 0f b7 74 24 14 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 cd 00 00 00 44 8b 3b 44 89 e7 44 89 fe
[ 53.329545][ T474]
[ 53.329550][ T474] Oops: 0003 [#2] PREEMPT SMP KASAN
[ 53.329569][ T474] CPU: 1 PID: 474 Comm: syz.2.17 Tainted: G B D 5.15.188-syzkaller-1081189-g6b619c45dff5 #0
[ 53.335744][ T400] RSP: 0018:ffffc90000a87560 EFLAGS: 00010a06
[ 53.343248][ T474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 53.343261][ T474] RIP: 0010:__memmove+0x19c/0x1a0
[ 53.363791][ T400]
[ 53.365321][ T474] Code: fa 02 72 16 66 44 8b 1e 66 44 8b 54 16 fe 66 44 89 1f 66 44 89 54 17 fe eb 0c 48 83 fa 01 72 06 44 8a 1e 44 88 1f c3 48 89 d1 a4 c3 00 eb 2e 0f 1f 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03
[ 53.365340][ T474] RSP: 0018:ffffc90001087240 EFLAGS: 00010282
[ 53.370592][ T400] RAX: 1db0001b6000000c RBX: ed8000db00000061 RCX: ffff88810f63cf00
[ 53.381719][ T474]
[ 53.381725][ T474] RAX: ffff888118a10850 RBX: ffffffffffffffb4 RCX: fffffffffe2dd804
[ 53.381740][ T474] RDX: ffffffffffffffb4 RSI: ffff88811a733020 RDI: ffff88811a733000
[ 53.381756][ T474] RBP: ffffc90001087270 R08: ffff888118a10804 R09: ffffed1023142180
[ 53.387845][ T400] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000aa4000e5
[ 53.397880][ T474] R10: 0000000000000000 R11: 0000000000000080 R12: 0000000000000000
[ 53.397894][ T474] R13: ffffffff81e7b4d3 R14: ffff888118a10870 R15: ffff888118a10850
[ 53.397909][ T474] FS: 00007fca0533f6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[ 53.402964][ T400] RBP: ffffc90000a87668 R08: dffffc0000000000 R09: ffffc90000a875c0
[ 53.405255][ T474] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 53.405271][ T474] CR2: ffff88811a733000 CR3: 0000000110fa6000 CR4: 00000000003506a0
[ 53.425129][ T400] R10: fffff52000150ebf R11: 1ffff92000150eb8 R12: 00000000aa4000e5
[ 53.430948][ T474] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 53.430961][ T474] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 53.430975][ T474] Call Trace:
[ 53.430981][ T474]
[ 53.438967][ T400] R13: dffffc0000000000 R14: 0000000000000008 R15: 0000000000000000
[ 53.441266][ T474] ? memmove+0x56/0x70
[ 53.441293][ T474] ext4_xattr_set_entry+0x13a3/0x37d0
[ 53.449252][ T400] FS: 00007f63713a7880(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
[ 53.457327][ T474] ? __kasan_kmalloc+0xda/0x110
[ 53.457350][ T474] ? __kmalloc_track_caller+0x13c/0x2c0
[ 53.465471][ T400] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 53.473564][ T474] ? kmemdup+0x26/0x60
[ 53.473585][ T474] ? setxattr+0x221/0x300
[ 53.473606][ T474] ? x64_sys_call+0x8cc/0x9a0
[ 53.473626][ T474] ? do_syscall_64+0x4c/0xa0
[ 53.481972][ T400] CR2: 00007f63711f6000 CR3: 000000011b3f9000 CR4: 00000000003506b0
[ 53.489936][ T474] ? ext4_xattr_ibody_set+0x360/0x360
[ 53.498968][ T400] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 53.506881][ T474] ? __kmalloc_track_caller+0x13c/0x2c0
[ 53.506917][ T474] ? memcpy+0x56/0x70
[ 53.513607][ T400] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 53.521495][ T474] ext4_xattr_block_set+0x8cd/0x2cb0
[ 53.521532][ T474] ? errseq_check+0x41/0x80
[ 53.521562][ T474] ? ext4_xattr_block_find+0x4f0/0x4f0
[ 53.529591][ T400] Kernel panic - not syncing: Fatal exception
[ 53.537667][ T474] ? __kasan_check_write+0x14/0x20
[ 53.679008][ T474] ext4_xattr_set_handle+0xba5/0x12b0
[ 53.684403][ T474] ? ext4_xattr_set_entry+0x37d0/0x37d0
[ 53.689980][ T474] ? ext4_xattr_set+0x1f6/0x320
[ 53.694856][ T474] ? __ext4_journal_start_sb+0x154/0x2b0
[ 53.700503][ T474] ext4_xattr_set+0x22a/0x320
[ 53.705197][ T474] ? ext4_xattr_set_credits+0x290/0x290
[ 53.710812][ T474] ? selinux_inode_setxattr+0x5b4/0xbb0
[ 53.716463][ T474] ext4_xattr_trusted_set+0x3c/0x50
[ 53.721756][ T474] ? ext4_xattr_trusted_get+0x40/0x40
[ 53.727135][ T474] __vfs_setxattr+0x3e1/0x430
[ 53.731828][ T474] __vfs_setxattr_noperm+0x12a/0x5e0
[ 53.737129][ T474] __vfs_setxattr_locked+0x212/0x230
[ 53.742440][ T474] vfs_setxattr+0x168/0x2f0
[ 53.746952][ T474] ? xattr_permission+0x550/0x550
[ 53.751988][ T474] ? _copy_from_user+0x95/0xd0
[ 53.756773][ T474] setxattr+0x2da/0x300
[ 53.761205][ T474] ? path_setxattr+0x280/0x280
[ 53.766048][ T474] ? debug_smp_processor_id+0x17/0x20
[ 53.771456][ T474] ? __mnt_want_write+0x1e6/0x260
[ 53.776494][ T474] ? mnt_want_write+0x20b/0x2e0
[ 53.781354][ T474] path_setxattr+0x142/0x280
[ 53.785957][ T474] ? simple_xattr_list_add+0x120/0x120
[ 53.791451][ T474] ? __kasan_check_write+0x14/0x20
[ 53.796575][ T474] __x64_sys_lsetxattr+0xc2/0xe0
[ 53.801519][ T474] x64_sys_call+0x8cc/0x9a0
[ 53.806034][ T474] do_syscall_64+0x4c/0xa0
[ 53.810543][ T474] ? clear_bhb_loop+0x50/0xa0
[ 53.815226][ T474] ? clear_bhb_loop+0x50/0xa0
[ 53.820005][ T474] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 53.825922][ T474] RIP: 0033:0x7fca058ce929
[ 53.830352][ T474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 53.850064][ T474] RSP: 002b:00007fca0533f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd
[ 53.858576][ T474] RAX: ffffffffffffffda RBX: 00007fca05af5fa0 RCX: 00007fca058ce929
[ 53.866553][ T474] RDX: 0000200000000040 RSI: 0000200000000300 RDI: 0000200000000100
[ 53.874621][ T474] RBP: 00007fca05950b39 R08: 0000000000000000 R09: 0000000000000000
[ 53.882612][ T474] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000
[ 53.890591][ T474] R13: 0000000000000000 R14: 00007fca05af5fa0 R15: 00007ffd38f52dc8
[ 53.898685][ T474]
[ 53.901967][ T474] Modules linked in:
[ 53.905860][ T474] CR2: ffff88811a733000
[ 53.910024][ T474] ---[ end trace db44070cabd5d78d ]---
[ 53.915481][ T474] RIP: 0010:avc_has_perm_noaudit+0x14d/0x460
[ 53.921471][ T474] Code: 0f 94 c0 48 83 c3 d8 0f 94 c1 08 c1 44 89 74 24 2c 74 0a e8 75 6e 47 ff e9 44 01 00 00 44 0f b7 74 24 14 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 cd 00 00 00 44 8b 3b 44 89 e7 44 89 fe
[ 53.941299][ T474] RSP: 0018:ffffc90000a87560 EFLAGS: 00010a06
[ 53.947394][ T474] RAX: 1db0001b6000000c RBX: ed8000db00000061 RCX: ffff88810f63cf00
[ 53.955475][ T474] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000aa4000e5
[ 53.963473][ T474] RBP: ffffc90000a87668 R08: dffffc0000000000 R09: ffffc90000a875c0
[ 53.971452][ T474] R10: fffff52000150ebf R11: 1ffff92000150eb8 R12: 00000000aa4000e5
[ 53.979434][ T474] R13: dffffc0000000000 R14: 0000000000000008 R15: 0000000000000000
[ 53.987413][ T474] FS: 00007fca0533f6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[ 53.996349][ T474] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 54.002948][ T474] CR2: ffff88811a733000 CR3: 0000000110fa6000 CR4: 00000000003506a0
[ 54.011021][ T474] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 54.019000][ T474] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 54.757909][ T400] Shutting down cpus with NMI
[ 54.762896][ T400] Kernel Offset: disabled
[ 54.767224][ T400] Rebooting in 86400 seconds..