Warning: Permanently added '10.128.0.140' (ED25519) to the list of known hosts. 2026/01/08 15:01:52 parsed 1 programs [ 23.073510][ T24] audit: type=1400 audit(1767884512.920:64): avc: denied { node_bind } for pid=275 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 23.094845][ T24] audit: type=1400 audit(1767884512.920:65): avc: denied { create } for pid=275 comm="syz-execprog" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 23.114419][ T24] audit: type=1400 audit(1767884512.920:66): avc: denied { module_request } for pid=275 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 24.025322][ T24] audit: type=1400 audit(1767884513.870:67): avc: denied { mounton } for pid=283 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.028735][ T283] cgroup: Unknown subsys name 'net' [ 24.048200][ T24] audit: type=1400 audit(1767884513.870:68): avc: denied { mount } for pid=283 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.075292][ T24] audit: type=1400 audit(1767884513.900:69): avc: denied { unmount } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.076146][ T283] cgroup: Unknown subsys name 'devices' [ 24.248126][ T283] cgroup: Unknown subsys name 'hugetlb' [ 24.253751][ T283] cgroup: Unknown subsys name 'rlimit' [ 24.434262][ T24] audit: type=1400 audit(1767884514.280:70): avc: denied { setattr } for pid=283 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.457613][ T24] audit: type=1400 audit(1767884514.280:71): avc: denied { create } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 24.478282][ T24] audit: type=1400 audit(1767884514.290:72): avc: denied { write } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.497795][ T286] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.498778][ T24] audit: type=1400 audit(1767884514.290:73): avc: denied { read } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.527749][ T283] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.962648][ T288] request_module fs-gadgetfs succeeded, but still no fs? [ 24.973690][ T288] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 25.450810][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.458024][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.465378][ T321] device bridge_slave_0 entered promiscuous mode [ 25.472745][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.479823][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.487358][ T321] device bridge_slave_1 entered promiscuous mode [ 25.525004][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.532105][ T321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.539480][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.546534][ T321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.567147][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.575286][ T301] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.583848][ T301] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.592781][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.601077][ T301] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.608142][ T301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.617489][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.625654][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.632728][ T301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.644275][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.653537][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.668351][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.679360][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.687688][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.695057][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.703958][ T321] device veth0_vlan entered promiscuous mode [ 25.713781][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.723001][ T321] device veth1_macvtap entered promiscuous mode [ 25.732427][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.742251][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2026/01/08 15:01:55 executed programs: 0 [ 26.166820][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.173863][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.181439][ T354] device bridge_slave_0 entered promiscuous mode [ 26.188944][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.196025][ T354] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.203539][ T354] device bridge_slave_1 entered promiscuous mode [ 26.244223][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.251305][ T354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.258612][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.265644][ T354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.273795][ T301] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.281162][ T301] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.304278][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.311780][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.320996][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.329798][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.338245][ T301] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.345282][ T301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.353693][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.362196][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.370534][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.377603][ T301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.394265][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.402512][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.410835][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.419174][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.433627][ T354] device veth0_vlan entered promiscuous mode [ 26.441002][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.449633][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.458504][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.466524][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.474612][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.482111][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.495536][ T354] device veth1_macvtap entered promiscuous mode [ 26.505951][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.514167][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.522387][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.531001][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.539355][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.549923][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.558296][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.607794][ T379] ====================================================== [ 26.607794][ T379] WARNING: the mand mount option is being deprecated and [ 26.607794][ T379] will be removed in v5.15! [ 26.607794][ T379] ====================================================== [ 26.677980][ T379] EXT4-fs (loop2): mounted filesystem without journal. Opts: auto_da_alloc,minixdf,,errors=continue [ 26.692162][ T379] ================================================================== [ 26.700307][ T379] BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0x1d6d/0x36c0 [ 26.708145][ T379] Read of size 18446744073709550624 at addr ffff8881250267e0 by task syz.2.17/379 [ 26.717497][ T379] [ 26.719854][ T379] CPU: 0 PID: 379 Comm: syz.2.17 Not tainted syzkaller #0 [ 26.726951][ T379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 26.736995][ T379] Call Trace: [ 26.740278][ T379] __dump_stack+0x21/0x24 [ 26.744595][ T379] dump_stack_lvl+0x169/0x1d8 [ 26.749277][ T379] ? show_regs_print_info+0x18/0x18 [ 26.754463][ T379] ? thaw_kernel_threads+0x220/0x220 [ 26.759743][ T379] print_address_description+0x7f/0x2c0 [ 26.765285][ T379] ? ext4_xattr_set_entry+0x1d6d/0x36c0 [ 26.770823][ T379] kasan_report+0xe2/0x130 [ 26.775226][ T379] ? ext4_xattr_set_entry+0x1d6d/0x36c0 [ 26.780760][ T379] ? ext4_xattr_set_entry+0x1d6d/0x36c0 [ 26.786313][ T379] kasan_check_range+0x280/0x290 [ 26.791339][ T379] memmove+0x2d/0x70 [ 26.795223][ T379] ext4_xattr_set_entry+0x1d6d/0x36c0 [ 26.800604][ T379] ? ext4_xattr_ibody_set+0x360/0x360 [ 26.805971][ T379] ? kmem_cache_free+0x100/0x2d0 [ 26.810898][ T379] ? _raw_spin_lock+0x8e/0xe0 [ 26.815562][ T379] ? __mb_cache_entry_free+0x225/0x340 [ 26.821019][ T379] ? mb_cache_entry_delete_or_get+0x203/0x220 [ 26.827076][ T379] ext4_xattr_block_set+0x4d6/0x2a50 [ 26.832375][ T379] ? __kasan_check_read+0x11/0x20 [ 26.837396][ T379] ? __ext4_xattr_check_block+0x265/0x8e0 [ 26.843113][ T379] ? ext4_xattr_block_find+0x4f0/0x4f0 [ 26.848675][ T379] ext4_xattr_set_handle+0xbd5/0x12a0 [ 26.854060][ T379] ? ext4_xattr_set_entry+0x36c0/0x36c0 [ 26.859697][ T379] ? __kasan_check_read+0x11/0x20 [ 26.864707][ T379] ? __ext4_journal_start_sb+0x2e2/0x490 [ 26.870330][ T379] ext4_xattr_set+0x1ec/0x320 [ 26.874998][ T379] ? ext4_xattr_set_credits+0x290/0x290 [ 26.880710][ T379] ext4_xattr_trusted_set+0x3b/0x50 [ 26.885895][ T379] ? ext4_xattr_trusted_get+0x40/0x40 [ 26.891259][ T379] __vfs_setxattr+0x42a/0x480 [ 26.895924][ T379] __vfs_setxattr_noperm+0x11e/0x4e0 [ 26.901202][ T379] __vfs_setxattr_locked+0x203/0x220 [ 26.906508][ T379] vfs_setxattr+0x8d/0x1c0 [ 26.910927][ T379] setxattr+0x1a9/0x370 [ 26.915087][ T379] ? path_setxattr+0x210/0x210 [ 26.919848][ T379] ? __mnt_want_write+0x1e6/0x260 [ 26.924861][ T379] ? mnt_want_write+0x19d/0x270 [ 26.929702][ T379] path_setxattr+0x110/0x210 [ 26.934280][ T379] ? simple_xattr_list_add+0x120/0x120 [ 26.939728][ T379] __x64_sys_lsetxattr+0xc2/0xe0 [ 26.944660][ T379] do_syscall_64+0x31/0x40 [ 26.949073][ T379] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 26.954958][ T379] RIP: 0033:0x7fde66aa9749 [ 26.959374][ T379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 26.978972][ T379] RSP: 002b:00007ffd265c26e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 26.987381][ T379] RAX: ffffffffffffffda RBX: 00007fde66cfffa0 RCX: 00007fde66aa9749 [ 26.995349][ T379] RDX: 0000200000000440 RSI: 00002000000000c0 RDI: 0000200000000100 [ 27.003311][ T379] RBP: 00007fde66b2df91 R08: 0000000000000000 R09: 0000000000000000 [ 27.011276][ T379] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000 [ 27.019238][ T379] R13: 00007fde66cfffa0 R14: 00007fde66cfffa0 R15: 0000000000000005 [ 27.027200][ T379] [ 27.029516][ T379] The buggy address belongs to the page: [ 27.035145][ T379] page:ffffea0004940980 refcount:2 mapcount:0 mapping:ffff888109199c10 index:0x1c pfn:0x125026 [ 27.045464][ T379] aops:def_blk_aops ino:0 [ 27.049798][ T379] flags: 0x400000000000203a(referenced|dirty|lru|active|private) [ 27.057512][ T379] raw: 400000000000203a ffffea0004a0d988 ffffea00049409c8 ffff888109199c10 [ 27.066088][ T379] raw: 000000000000001c ffff888125962348 00000002ffffffff ffff88810d66c000 [ 27.074653][ T379] page dumped because: kasan: bad access detected [ 27.081052][ T379] page->mem_cgroup:ffff88810d66c000 [ 27.086235][ T379] page_owner tracks the page as allocated [ 27.091954][ T379] page last allocated via order 0, migratetype Movable, gfp_mask 0x108c48(GFP_NOFS|__GFP_NOFAIL|__GFP_HARDWALL|__GFP_MOVABLE), pid 379, ts 26690157655, free_ts 26582662541 [ 27.108969][ T379] prep_new_page+0x179/0x180 [ 27.113560][ T379] get_page_from_freelist+0x2235/0x23d0 [ 27.119104][ T379] __alloc_pages_nodemask+0x268/0x5f0 [ 27.124478][ T379] pagecache_get_page+0x642/0x930 [ 27.129500][ T379] __getblk_gfp+0x212/0x780 [ 27.134001][ T379] ext4_xattr_block_set+0x1c06/0x2a50 [ 27.139372][ T379] ext4_xattr_set_handle+0xbd5/0x12a0 [ 27.144744][ T379] ext4_xattr_set+0x1ec/0x320 [ 27.149426][ T379] ext4_xattr_user_set+0xc9/0xf0 [ 27.154364][ T379] __vfs_setxattr+0x42a/0x480 [ 27.159043][ T379] __vfs_setxattr_noperm+0x11e/0x4e0 [ 27.164325][ T379] __vfs_setxattr_locked+0x203/0x220 [ 27.169612][ T379] vfs_setxattr+0x8d/0x1c0 [ 27.174026][ T379] setxattr+0x1a9/0x370 [ 27.178178][ T379] path_setxattr+0x110/0x210 [ 27.182764][ T379] __x64_sys_setxattr+0xc5/0xe0 [ 27.187610][ T379] page last free stack trace: [ 27.192298][ T379] free_unref_page_prepare+0x2b7/0x2d0 [ 27.197755][ T379] free_unref_page_list+0x12e/0x9b0 [ 27.202951][ T379] release_pages+0xe38/0xe80 [ 27.207543][ T379] free_pages_and_swap_cache+0x86/0xa0 [ 27.212996][ T379] tlb_finish_mmu+0x175/0x300 [ 27.217670][ T379] unmap_region+0x32c/0x380 [ 27.222177][ T379] __do_munmap+0x63c/0x850 [ 27.226592][ T379] __se_sys_munmap+0x127/0x1b0 [ 27.231350][ T379] __x64_sys_munmap+0x5b/0x70 [ 27.236036][ T379] do_syscall_64+0x31/0x40 [ 27.240456][ T379] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 27.246340][ T379] [ 27.248675][ T379] Memory state around the buggy address: [ 27.254305][ T379] ffff888125026680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.262370][ T379] ffff888125026700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.270429][ T379] >ffff888125026780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.278496][ T379] ^ [ 27.285684][ T379] ffff888125026800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.293742][ T379] ffff888125026880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.301795][ T379] ================================================================== [ 27.309854][ T379] Disabling lock debugging due to kernel taint