Warning: Permanently added '10.128.1.41' (ED25519) to the list of known hosts. 2025/09/10 09:47:17 parsed 1 programs [ 28.206809][ T28] audit: type=1400 audit(1757497637.107:64): avc: denied { node_bind } for pid=283 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 28.227610][ T28] audit: type=1400 audit(1757497637.107:65): avc: denied { module_request } for pid=283 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 29.353278][ T28] audit: type=1400 audit(1757497638.257:66): avc: denied { mounton } for pid=291 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 29.354648][ T291] cgroup: Unknown subsys name 'net' [ 29.376073][ T28] audit: type=1400 audit(1757497638.257:67): avc: denied { mount } for pid=291 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.403404][ T28] audit: type=1400 audit(1757497638.297:68): avc: denied { unmount } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.403641][ T291] cgroup: Unknown subsys name 'devices' [ 29.521426][ T291] cgroup: Unknown subsys name 'hugetlb' [ 29.527053][ T291] cgroup: Unknown subsys name 'rlimit' [ 29.669620][ T28] audit: type=1400 audit(1757497638.577:69): avc: denied { setattr } for pid=291 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 29.692826][ T28] audit: type=1400 audit(1757497638.577:70): avc: denied { create } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.713203][ T28] audit: type=1400 audit(1757497638.577:71): avc: denied { write } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.725258][ T293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 29.733522][ T28] audit: type=1400 audit(1757497638.577:72): avc: denied { read } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.762244][ T28] audit: type=1400 audit(1757497638.577:73): avc: denied { mounton } for pid=291 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 29.788901][ T291] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 30.524150][ T295] request_module fs-gadgetfs succeeded, but still no fs? [ 31.245613][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.252856][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.260387][ T345] device bridge_slave_0 entered promiscuous mode [ 31.267261][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.274354][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.281848][ T345] device bridge_slave_1 entered promiscuous mode [ 31.332479][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.339570][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.346841][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.353914][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.375320][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.383080][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.390381][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.400141][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.408390][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.415456][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.424199][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.432457][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.439504][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.452075][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.461641][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.476881][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.488613][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.496893][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.504684][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.513132][ T345] device veth0_vlan entered promiscuous mode [ 31.523819][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.533025][ T345] device veth1_macvtap entered promiscuous mode [ 31.543168][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.553451][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.583527][ T345] syz-executor (345) used greatest stack depth: 21248 bytes left 2025/09/10 09:47:20 executed programs: 0 [ 31.789566][ T363] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.796702][ T363] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.804595][ T363] device bridge_slave_0 entered promiscuous mode [ 31.817487][ T363] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.825125][ T363] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.832702][ T363] device bridge_slave_1 entered promiscuous mode [ 31.899513][ T363] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.906586][ T363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.913876][ T363] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.920926][ T363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.945970][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.953794][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.961292][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.976989][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 31.985497][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.993779][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.000849][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.009744][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 32.018184][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.026379][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.033422][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.052440][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 32.060522][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.069720][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 32.077792][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 32.094446][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 32.103255][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.116549][ T363] device veth0_vlan entered promiscuous mode [ 32.123259][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 32.131376][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.139809][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.147300][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.161270][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.169497][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.178698][ T363] device veth1_macvtap entered promiscuous mode [ 32.188328][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.196091][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.204673][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.214852][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.223225][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.252827][ T374] loop2: detected capacity change from 0 to 512 [ 32.263130][ T374] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 32.276414][ T374] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 32.288257][ T374] EXT4-fs warning (device loop2): ext4_expand_extra_isize_ea:2818: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 32.301548][ T374] EXT4-fs (loop2): 1 truncate cleaned up [ 32.307228][ T374] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 32.328178][ T374] ================================================================== [ 32.336259][ T374] BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0x979/0x21d0 [ 32.344003][ T374] Read of size 18446744073709551572 at addr ffff8881171e7050 by task syz.2.17/374 [ 32.353209][ T374] [ 32.355538][ T374] CPU: 1 PID: 374 Comm: syz.2.17 Not tainted syzkaller #0 [ 32.362641][ T374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 32.372791][ T374] Call Trace: [ 32.376067][ T374] [ 32.378994][ T374] __dump_stack+0x21/0x24 [ 32.383346][ T374] dump_stack_lvl+0xee/0x150 [ 32.387933][ T374] ? __cfi_dump_stack_lvl+0x8/0x8 [ 32.392949][ T374] ? ext4_xattr_block_set+0x9dc/0x3270 [ 32.398416][ T374] ? __ext4_unlink+0x673/0xb00 [ 32.403179][ T374] ? ext4_xattr_set_entry+0x979/0x21d0 [ 32.408645][ T374] print_address_description+0x71/0x1e0 [ 32.414199][ T374] print_report+0x4a/0x60 [ 32.418627][ T374] kasan_report+0x122/0x150 [ 32.423156][ T374] ? ext4_xattr_set_entry+0x979/0x21d0 [ 32.428620][ T374] ? ext4_xattr_set_entry+0x979/0x21d0 [ 32.434084][ T374] kasan_check_range+0x280/0x290 [ 32.439131][ T374] memmove+0x2d/0x70 [ 32.443047][ T374] ext4_xattr_set_entry+0x979/0x21d0 [ 32.448336][ T374] ext4_xattr_block_set+0xada/0x3270 [ 32.453630][ T374] ? __getblk_gfp+0x3b/0x7d0 [ 32.458227][ T374] ? xattr_find_entry+0x24c/0x300 [ 32.463261][ T374] ? ext4_xattr_block_find+0x310/0x310 [ 32.468724][ T374] ? ext4_xattr_block_find+0x295/0x310 [ 32.474185][ T374] ext4_expand_extra_isize_ea+0xf30/0x1990 [ 32.480000][ T374] __ext4_expand_extra_isize+0x2fe/0x3e0 [ 32.485637][ T374] __ext4_mark_inode_dirty+0x3cf/0x600 [ 32.491096][ T374] __ext4_unlink+0x673/0xb00 [ 32.495687][ T374] ? memcpy+0x56/0x70 [ 32.499666][ T374] ? __cfi___ext4_unlink+0x10/0x10 [ 32.504781][ T374] ? dquot_initialize+0x20/0x20 [ 32.509644][ T374] ? clear_nonspinnable+0x60/0x60 [ 32.514676][ T374] ext4_unlink+0x13a/0x3a0 [ 32.519095][ T374] vfs_unlink+0x39f/0x630 [ 32.523444][ T374] do_unlinkat+0x31f/0x6b0 [ 32.527854][ T374] ? __cfi_do_unlinkat+0x10/0x10 [ 32.532897][ T374] ? getname_flags+0x206/0x500 [ 32.537668][ T374] __x64_sys_unlink+0x49/0x50 [ 32.542343][ T374] x64_sys_call+0x958/0x9a0 [ 32.546846][ T374] do_syscall_64+0x4c/0xa0 [ 32.551277][ T374] ? clear_bhb_loop+0x30/0x80 [ 32.555983][ T374] ? clear_bhb_loop+0x30/0x80 [ 32.560658][ T374] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 32.566550][ T374] RIP: 0033:0x7f095778eba9 [ 32.570968][ T374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 32.590597][ T374] RSP: 002b:00007ffc3f6e81a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 32.599040][ T374] RAX: ffffffffffffffda RBX: 00007f09579d5fa0 RCX: 00007f095778eba9 [ 32.607013][ T374] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000180 [ 32.614984][ T374] RBP: 00007f0957811e19 R08: 0000000000000000 R09: 0000000000000000 [ 32.622959][ T374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 32.630928][ T374] R13: 00007f09579d5fa0 R14: 00007f09579d5fa0 R15: 0000000000000001 [ 32.638903][ T374] [ 32.641919][ T374] [ 32.644232][ T374] Allocated by task 374: [ 32.648463][ T374] kasan_set_track+0x4b/0x70 [ 32.653050][ T374] kasan_save_alloc_info+0x25/0x30 [ 32.658163][ T374] __kasan_kmalloc+0x95/0xb0 [ 32.662752][ T374] __kmalloc_node_track_caller+0xb1/0x1e0 [ 32.668475][ T374] kmemdup+0x2b/0x60 [ 32.672461][ T374] ext4_xattr_block_set+0x9dc/0x3270 [ 32.677749][ T374] ext4_expand_extra_isize_ea+0xf30/0x1990 [ 32.683575][ T374] __ext4_expand_extra_isize+0x2fe/0x3e0 [ 32.689209][ T374] __ext4_mark_inode_dirty+0x3cf/0x600 [ 32.694664][ T374] __ext4_unlink+0x673/0xb00 [ 32.699254][ T374] ext4_unlink+0x13a/0x3a0 [ 32.703738][ T374] vfs_unlink+0x39f/0x630 [ 32.708064][ T374] do_unlinkat+0x31f/0x6b0 [ 32.712477][ T374] __x64_sys_unlink+0x49/0x50 [ 32.717154][ T374] x64_sys_call+0x958/0x9a0 [ 32.721651][ T374] do_syscall_64+0x4c/0xa0 [ 32.726083][ T374] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 32.732013][ T374] [ 32.734334][ T374] The buggy address belongs to the object at ffff8881171e7000 [ 32.734334][ T374] which belongs to the cache kmalloc-1k of size 1024 [ 32.748380][ T374] The buggy address is located 80 bytes inside of [ 32.748380][ T374] 1024-byte region [ffff8881171e7000, ffff8881171e7400) [ 32.761651][ T374] [ 32.763973][ T374] The buggy address belongs to the physical page: [ 32.770470][ T374] page:ffffea00045c7800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1171e0 [ 32.780714][ T374] head:ffffea00045c7800 order:3 compound_mapcount:0 compound_pincount:0 [ 32.789032][ T374] flags: 0x4000000000010200(slab|head|zone=1) [ 32.795110][ T374] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888100043080 [ 32.803687][ T374] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 32.812267][ T374] page dumped because: kasan: bad access detected [ 32.818699][ T374] page_owner tracks the page as allocated [ 32.824407][ T374] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 103, tgid 103 (udevd), ts 32262227254, free_ts 32244639722 [ 32.846551][ T374] post_alloc_hook+0x1f5/0x210 [ 32.851334][ T374] prep_new_page+0x1c/0x110 [ 32.855839][ T374] get_page_from_freelist+0x2c7b/0x2cf0 [ 32.861410][ T374] __alloc_pages+0x1c3/0x450 [ 32.866000][ T374] alloc_slab_page+0x6e/0xf0 [ 32.870704][ T374] new_slab+0x98/0x3d0 [ 32.874774][ T374] ___slab_alloc+0x6f6/0xb50 [ 32.879384][ T374] __slab_alloc+0x5e/0xa0 [ 32.883711][ T374] __kmem_cache_alloc_node+0x203/0x2c0 [ 32.889182][ T374] __kmalloc_node_track_caller+0xa0/0x1e0 [ 32.894901][ T374] __alloc_skb+0x236/0x4b0 [ 32.899313][ T374] alloc_uevent_skb+0x85/0x240 [ 32.904072][ T374] kobject_uevent_net_broadcast+0x343/0x5b0 [ 32.909970][ T374] kobject_uevent_env+0x54f/0x730 [ 32.915019][ T374] kobject_synth_uevent+0x520/0xaf0 [ 32.920227][ T374] uevent_store+0x25/0x70 [ 32.924554][ T374] page last free stack trace: [ 32.929216][ T374] free_unref_page_prepare+0x742/0x750 [ 32.934670][ T374] free_unref_page+0x8f/0x530 [ 32.939344][ T374] __free_pages+0x67/0x100 [ 32.943751][ T374] __free_slab+0xca/0x1a0 [ 32.948077][ T374] __unfreeze_partials+0x160/0x190 [ 32.953191][ T374] put_cpu_partial+0xa9/0x100 [ 32.957867][ T374] __slab_free+0x1c4/0x280 [ 32.962278][ T374] ___cache_free+0xbf/0xd0 [ 32.966687][ T374] qlist_free_all+0xc6/0x140 [ 32.971264][ T374] kasan_quarantine_reduce+0x14a/0x170 [ 32.976714][ T374] __kasan_slab_alloc+0x24/0x80 [ 32.981564][ T374] slab_post_alloc_hook+0x4f/0x2d0 [ 32.986684][ T374] __kmem_cache_alloc_node+0x192/0x2c0 [ 32.992146][ T374] kmalloc_node_trace+0x26/0xb0 [ 32.997005][ T374] __get_vm_area_node+0x12c/0x360 [ 33.002116][ T374] __vmalloc_node_range+0x326/0x13d0 [ 33.007397][ T374] [ 33.009736][ T374] Memory state around the buggy address: [ 33.015378][ T374] ffff8881171e6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.023437][ T374] ffff8881171e6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.031490][ T374] >ffff8881171e7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.039554][ T374] ^ [ 33.046222][ T374] ffff8881171e7080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.054274][ T374] ffff8881171e7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.062322][ T374] ================================================================== [ 33.078100][ T374] Disabling lock debugging due to kernel taint [ 33.088055][ T363] EXT4-fs (loop2): unmounting filesystem.