program: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f0000000080), 0x1, 0x561, &(0x7f0000000f80)="$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") ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) socket(0x25, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0xffffffffffffff0e}, 0x68) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x10, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r2 = io_uring_setup(0x1b7b, &(0x7f0000000040)={0x0, 0x970, 0x1f480, 0x0, 0x399}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x18000000000002a0, 0x33, 0x3d, 0x0, 0x0, 0x500, 0x60000000, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xfffffffffffffdce) io_uring_enter(r2, 0x8ae, 0x6931, 0x17, 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280), &(0x7f00000002c0)="30573472b621739991c336124406e8a5c812ca847e3bf9b837c91d46ab", 0x1d, 0x1) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)={0x110, r3, 0xb9144b4ba5018d31, 0x70bd2a, 0x25dfdbfb, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7fff80}, {0x6, 0x16, 0x7fff}, {0x5, 0x12, 0x1}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0xb9}, {0x6}, {0x5, 0x12, 0x1}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x38b9}, {0x6, 0x16, 0xddf}, {0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x7}, {0x6, 0x16, 0x6faf}, {0x5}}]}, 0x110}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) lsetxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000180), &(0x7f0000000800)=ANY=[], 0x361, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000000)=ANY=[], 0xfe37, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000500), &(0x7f0000000540)=0x4) [ 74.544407][ T45] Bluetooth: hci0: command tx timeout [ 74.641735][ T5313] loop0: detected capacity change from 0 to 1024 [ 74.675666][ T5313] ======================================================= [ 74.675666][ T5313] WARNING: The mand mount option has been deprecated and [ 74.675666][ T5313] and is ignored by this kernel. Remove the mand [ 74.675666][ T5313] option from the mount to silence this warning. [ 74.675666][ T5313] ======================================================= [ 74.757996][ T5313] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 74.834283][ T5313] ================================================================== [ 74.837875][ T5313] BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0x179e/0x1e20 [ 74.841297][ T5313] Read of size 18446744073709550592 at addr ffff88804123d400 by task syz.0.0/5313 [ 74.845293][ T5313] [ 74.846281][ T5313] CPU: 0 UID: 0 PID: 5313 Comm: syz.0.0 Not tainted syzkaller #0 PREEMPT(full) [ 74.846296][ T5313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 74.846304][ T5313] Call Trace: [ 74.846312][ T5313] [ 74.846320][ T5313] dump_stack_lvl+0xe8/0x150 [ 74.846340][ T5313] print_report+0xba/0x230 [ 74.846359][ T5313] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 74.846373][ T5313] kasan_report+0x117/0x150 [ 74.846387][ T5313] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 74.846400][ T5313] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 74.846411][ T5313] kasan_check_range+0x264/0x2c0 [ 74.846423][ T5313] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 74.846435][ T5313] __asan_memmove+0x29/0x70 [ 74.846450][ T5313] ext4_xattr_set_entry+0x179e/0x1e20 [ 74.846468][ T5313] ext4_xattr_block_set+0x878/0x2ad0 [ 74.846479][ T5313] ? __pfx_ext4_free_in_core_inode+0x10/0x10 [ 74.846499][ T5313] ? __pfx_evict+0x10/0x10 [ 74.846517][ T5313] ? do_raw_spin_unlock+0x4d/0x210 [ 74.846530][ T5313] ? _raw_spin_unlock+0x28/0x50 [ 74.846590][ T5313] ? iput+0xb25/0xe80 [ 74.846607][ T5313] ? __pfx_ext4_xattr_block_set+0x10/0x10 [ 74.846619][ T5313] ? ext4_xattr_ibody_set+0x510/0x6a0 [ 74.846633][ T5313] ext4_xattr_set_handle+0xe34/0x14c0 [ 74.846652][ T5313] ? __pfx_ext4_xattr_set_handle+0x10/0x10 [ 74.846669][ T5313] ext4_xattr_set+0x255/0x340 [ 74.846684][ T5313] ? __pfx_ext4_xattr_set+0x10/0x10 [ 74.846697][ T5313] ? __pfx_evm_protect_xattr+0x10/0x10 [ 74.846748][ T5313] ? __pfx_ext4_xattr_trusted_set+0x10/0x10 [ 74.846762][ T5313] __vfs_setxattr+0x43c/0x480 [ 74.846781][ T5313] __vfs_setxattr_noperm+0x12d/0x660 [ 74.846798][ T5313] vfs_setxattr+0x163/0x360 [ 74.846815][ T5313] ? __pfx_vfs_setxattr+0x10/0x10 [ 74.846833][ T5313] filename_setxattr+0x296/0x630 [ 74.846852][ T5313] ? __pfx_filename_setxattr+0x10/0x10 [ 74.846869][ T5313] ? do_getname+0x151/0x250 [ 74.846888][ T5313] path_setxattrat+0x3eb/0x440 [ 74.846908][ T5313] ? __pfx_path_setxattrat+0x10/0x10 [ 74.846926][ T5313] ? do_futex+0x395/0x420 [ 74.846949][ T5313] ? rcu_is_watching+0x15/0xb0 [ 74.846966][ T5313] __x64_sys_lsetxattr+0xbf/0xe0 [ 74.846983][ T5313] do_syscall_64+0x14d/0xf80 [ 74.847000][ T5313] ? trace_irq_disable+0x3b/0x150 [ 74.847017][ T5313] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 74.847029][ T5313] ? clear_bhb_loop+0x40/0x90 [ 74.847043][ T5313] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 74.847055][ T5313] RIP: 0033:0x7fc47339c799 [ 74.847068][ T5313] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 74.847079][ T5313] RSP: 002b:00007fc4742da028 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 74.847093][ T5313] RAX: ffffffffffffffda RBX: 00007fc473615fa0 RCX: 00007fc47339c799 [ 74.847102][ T5313] RDX: 0000200000000000 RSI: 00002000000000c0 RDI: 0000200000000100 [ 74.847110][ T5313] RBP: 00007fc473432bd9 R08: 0000000000000000 R09: 0000000000000000 [ 74.847118][ T5313] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000 [ 74.847125][ T5313] R13: 00007fc473616038 R14: 00007fc473615fa0 R15: 00007fffa286a398 [ 74.847139][ T5313] [ 74.847143][ T5313] [ 74.981683][ T5313] Allocated by task 5313: [ 74.983655][ T5313] kasan_save_track+0x3e/0x80 [ 74.985764][ T5313] __kasan_kmalloc+0x93/0xb0 [ 74.987856][ T5313] __kmalloc_node_track_caller_noprof+0x4db/0x7b0 [ 74.990672][ T5313] kmemdup_noprof+0x2b/0x70 [ 74.992739][ T5313] ext4_xattr_block_set+0x787/0x2ad0 [ 74.995090][ T5313] ext4_xattr_set_handle+0xe34/0x14c0 [ 74.997497][ T5313] ext4_xattr_set+0x255/0x340 [ 74.999543][ T5313] __vfs_setxattr+0x43c/0x480 [ 75.001651][ T5313] __vfs_setxattr_noperm+0x12d/0x660 [ 75.004041][ T5313] vfs_setxattr+0x163/0x360 [ 75.006080][ T5313] filename_setxattr+0x296/0x630 [ 75.008339][ T5313] path_setxattrat+0x3eb/0x440 [ 75.010480][ T5313] __x64_sys_lsetxattr+0xbf/0xe0 [ 75.012478][ T5313] do_syscall_64+0x14d/0xf80 [ 75.014393][ T5313] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.016791][ T5313] [ 75.017901][ T5313] The buggy address belongs to the object at ffff88804123d000 [ 75.017901][ T5313] which belongs to the cache kmalloc-1k of size 1024 [ 75.024154][ T5313] The buggy address is located 0 bytes to the right of [ 75.024154][ T5313] 1024-byte region [ffff88804123d000, ffff88804123d400) [ 75.029961][ T5313] [ 75.031058][ T5313] The buggy address belongs to the physical page: [ 75.033847][ T5313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4123c [ 75.037338][ T5313] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 75.041013][ T5313] flags: 0x4fff00000000040(head|node=1|zone=1|lastcpupid=0x7ff) [ 75.044340][ T5313] page_type: f5(slab) [ 75.046096][ T5313] raw: 04fff00000000040 ffff88801ac41dc0 dead000000000100 dead000000000122 [ 75.049845][ T5313] raw: 0000000000000000 0000000800080008 00000000f5000000 0000000000000000 [ 75.053723][ T5313] head: 04fff00000000040 ffff88801ac41dc0 dead000000000100 dead000000000122 [ 75.057459][ T5313] head: 0000000000000000 0000000800080008 00000000f5000000 0000000000000000 [ 75.061175][ T5313] head: 04fff00000000002 ffffea0001048f01 00000000ffffffff 00000000ffffffff [ 75.064954][ T5313] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 75.068677][ T5313] page dumped because: kasan: bad access detected [ 75.071475][ T5313] page_owner tracks the page as allocated [ 75.073919][ T5313] page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1, tgid 1 (swapper/0), ts 26205889039, free_ts 0 [ 75.081822][ T5313] post_alloc_hook+0x231/0x280 [ 75.083935][ T5313] get_page_from_freelist+0x24dc/0x2580 [ 75.086303][ T5313] __alloc_frozen_pages_noprof+0x18d/0x380 [ 75.088810][ T5313] allocate_slab+0x77/0x660 [ 75.090768][ T5313] refill_objects+0x331/0x3c0 [ 75.092840][ T5313] __pcs_replace_empty_main+0x2b9/0x620 [ 75.095197][ T5313] __kmalloc_noprof+0x474/0x760 [ 75.097331][ T5313] ops_init+0x1eb/0x5c0 [ 75.099096][ T5313] register_pernet_operations+0x343/0x830 [ 75.101525][ T5313] register_pernet_subsys+0x28/0x40 [ 75.103834][ T5313] ip6table_nat_init+0x11/0x50 [ 75.105886][ T5313] do_one_initcall+0x250/0x8d0 [ 75.108016][ T5313] do_initcall_level+0x104/0x190 [ 75.110135][ T5313] do_initcalls+0x59/0xa0 [ 75.111969][ T5313] kernel_init_freeable+0x2a6/0x3e0 [ 75.114239][ T5313] kernel_init+0x1d/0x1d0 [ 75.116157][ T5313] page_owner free stack trace missing [ 75.118392][ T5313] [ 75.119455][ T5313] Memory state around the buggy address: [ 75.121934][ T5313] ffff88804123d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.125288][ T5313] ffff88804123d380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.128619][ T5313] >ffff88804123d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.131895][ T5313] ^ [ 75.133589][ T5313] ffff88804123d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.136927][ T5313] ffff88804123d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.140217][ T5313] ================================================================== [ 75.158849][ T5313] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 75.162166][ T5313] CPU: 0 UID: 0 PID: 5313 Comm: syz.0.0 Not tainted syzkaller #0 PREEMPT(full) [ 75.165929][ T5313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 75.170356][ T5313] Call Trace: [ 75.171822][ T5313] [ 75.173177][ T5313] vpanic+0x56c/0xa60 [ 75.174988][ T5313] ? __pfx_vpanic+0x10/0x10 [ 75.177080][ T5313] panic+0xc5/0xd0 [ 75.178744][ T5313] ? __pfx_panic+0x10/0x10 [ 75.180655][ T5313] ? preempt_schedule_thunk+0x16/0x30 [ 75.182956][ T5313] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 75.185312][ T5313] ? preempt_schedule_thunk+0x16/0x30 [ 75.187595][ T5313] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 75.189959][ T5313] check_panic_on_warn+0x89/0xb0 [ 75.192056][ T5313] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 75.194418][ T5313] end_report+0x73/0x180 [ 75.196339][ T5313] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 75.198768][ T5313] kasan_report+0x128/0x150 [ 75.200776][ T5313] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 75.203245][ T5313] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 75.205619][ T5313] kasan_check_range+0x264/0x2c0 [ 75.207764][ T5313] ? ext4_xattr_set_entry+0x179e/0x1e20 [ 75.210153][ T5313] __asan_memmove+0x29/0x70 [ 75.212231][ T5313] ext4_xattr_set_entry+0x179e/0x1e20 [ 75.214677][ T5313] ext4_xattr_block_set+0x878/0x2ad0 [ 75.217072][ T5313] ? __pfx_ext4_free_in_core_inode+0x10/0x10 [ 75.219573][ T5313] ? __pfx_evict+0x10/0x10 [ 75.221473][ T5313] ? do_raw_spin_unlock+0x4d/0x210 [ 75.223657][ T5313] ? _raw_spin_unlock+0x28/0x50 [ 75.225730][ T5313] ? iput+0xb25/0xe80 [ 75.227491][ T5313] ? __pfx_ext4_xattr_block_set+0x10/0x10 [ 75.230055][ T5313] ? ext4_xattr_ibody_set+0x510/0x6a0 [ 75.232446][ T5313] ext4_xattr_set_handle+0xe34/0x14c0 [ 75.234877][ T5313] ? __pfx_ext4_xattr_set_handle+0x10/0x10 [ 75.237499][ T5313] ext4_xattr_set+0x255/0x340 [ 75.239561][ T5313] ? __pfx_ext4_xattr_set+0x10/0x10 [ 75.241872][ T5313] ? __pfx_evm_protect_xattr+0x10/0x10 [ 75.244433][ T5313] ? __pfx_ext4_xattr_trusted_set+0x10/0x10 [ 75.247088][ T5313] __vfs_setxattr+0x43c/0x480 [ 75.249182][ T5313] __vfs_setxattr_noperm+0x12d/0x660 [ 75.251495][ T5313] vfs_setxattr+0x163/0x360 [ 75.253606][ T5313] ? __pfx_vfs_setxattr+0x10/0x10 [ 75.255925][ T5313] filename_setxattr+0x296/0x630 [ 75.258159][ T5313] ? __pfx_filename_setxattr+0x10/0x10 [ 75.260579][ T5313] ? do_getname+0x151/0x250 [ 75.262349][ T5313] path_setxattrat+0x3eb/0x440 [ 75.264527][ T5313] ? __pfx_path_setxattrat+0x10/0x10 [ 75.266953][ T5313] ? do_futex+0x395/0x420 [ 75.270885][ T5313] ? rcu_is_watching+0x15/0xb0 [ 75.273158][ T5313] __x64_sys_lsetxattr+0xbf/0xe0 [ 75.275450][ T5313] do_syscall_64+0x14d/0xf80 [ 75.277638][ T5313] ? trace_irq_disable+0x3b/0x150 [ 75.279897][ T5313] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.282642][ T5313] ? clear_bhb_loop+0x40/0x90 [ 75.284742][ T5313] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.287264][ T5313] RIP: 0033:0x7fc47339c799 [ 75.289444][ T5313] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 75.297977][ T5313] RSP: 002b:00007fc4742da028 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 75.301552][ T5313] RAX: ffffffffffffffda RBX: 00007fc473615fa0 RCX: 00007fc47339c799 [ 75.305142][ T5313] RDX: 0000200000000000 RSI: 00002000000000c0 RDI: 0000200000000100 [ 75.308600][ T5313] RBP: 00007fc473432bd9 R08: 0000000000000000 R09: 0000000000000000 [ 75.312224][ T5313] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000 [ 75.315818][ T5313] R13: 00007fc473616038 R14: 00007fc473615fa0 R15: 00007fffa286a398 [ 75.319164][ T5313] [ 75.321290][ T5313] Kernel Offset: disabled [ 75.323363][ T5313] Rebooting in 86400 seconds..