Warning: Permanently added '10.128.10.20' (ED25519) to the list of known hosts. 2025/10/14 07:34:10 parsed 1 programs [ 27.126938][ T28] audit: type=1400 audit(1760427250.594:64): avc: denied { node_bind } for pid=282 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 27.147657][ T28] audit: type=1400 audit(1760427250.594:65): avc: denied { module_request } for pid=282 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 28.269329][ T28] audit: type=1400 audit(1760427251.734:66): avc: denied { mounton } for pid=291 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.270603][ T291] cgroup: Unknown subsys name 'net' [ 28.292089][ T28] audit: type=1400 audit(1760427251.734:67): avc: denied { mount } for pid=291 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.319388][ T28] audit: type=1400 audit(1760427251.764:68): avc: denied { unmount } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.319585][ T291] cgroup: Unknown subsys name 'devices' [ 28.458427][ T291] cgroup: Unknown subsys name 'hugetlb' [ 28.464066][ T291] cgroup: Unknown subsys name 'rlimit' [ 28.577958][ T28] audit: type=1400 audit(1760427252.044:69): avc: denied { setattr } for pid=291 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.601163][ T28] audit: type=1400 audit(1760427252.044:70): avc: denied { create } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.620986][ T293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.621849][ T28] audit: type=1400 audit(1760427252.044:71): avc: denied { write } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.650395][ T28] audit: type=1400 audit(1760427252.044:72): avc: denied { read } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.670608][ T28] audit: type=1400 audit(1760427252.044:73): avc: denied { mounton } for pid=291 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.694253][ T291] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.367986][ T295] request_module fs-gadgetfs succeeded, but still no fs? [ 29.782190][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.789304][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.797215][ T313] device bridge_slave_0 entered promiscuous mode [ 29.804791][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.811856][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.819304][ T313] device bridge_slave_1 entered promiscuous mode [ 29.870105][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.877182][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.884613][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.891675][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.913072][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.920787][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.928279][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.937945][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.946185][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.953241][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.968521][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.976710][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.983735][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.992430][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.002515][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.016792][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.028933][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.037141][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.044581][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.052990][ T313] device veth0_vlan entered promiscuous mode [ 30.063583][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.072810][ T313] device veth1_macvtap entered promiscuous mode [ 30.082394][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.092865][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.130113][ T313] syz-executor (313) used greatest stack depth: 22016 bytes left 2025/10/14 07:34:14 executed programs: 0 [ 30.747808][ T365] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.754945][ T365] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.762721][ T365] device bridge_slave_0 entered promiscuous mode [ 30.770091][ T365] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.777346][ T365] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.784736][ T365] device bridge_slave_1 entered promiscuous mode [ 30.845416][ T365] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.852490][ T365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.859792][ T365] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.866840][ T365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.893639][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.901349][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.908672][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.925119][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.933375][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.940439][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.949589][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.958000][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.965074][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.983014][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.992615][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.007646][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.019625][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.028580][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.036103][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.046409][ T365] device veth0_vlan entered promiscuous mode [ 31.056977][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.066220][ T365] device veth1_macvtap entered promiscuous mode [ 31.076081][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.091526][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.119774][ T375] loop2: detected capacity change from 0 to 512 [ 31.126577][ T375] EXT4-fs: Ignoring removed i_version option [ 31.133027][ T375] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 31.146190][ T375] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 31.158378][ T375] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a00ec01c, mo2=0002] [ 31.167884][ T375] System zones: 1-12 [ 31.173591][ T375] EXT4-fs (loop2): 1 truncate cleaned up [ 31.179345][ T375] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 31.195138][ T375] ================================================================== [ 31.203251][ T375] BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0x979/0x21d0 [ 31.210983][ T375] Read of size 18446744073709551572 at addr ffff8881148d4050 by task syz.2.17/375 [ 31.220175][ T375] [ 31.222496][ T375] CPU: 1 PID: 375 Comm: syz.2.17 Not tainted syzkaller #0 [ 31.229602][ T375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 31.239697][ T375] Call Trace: [ 31.242987][ T375] [ 31.245919][ T375] __dump_stack+0x21/0x24 [ 31.250281][ T375] dump_stack_lvl+0xee/0x150 [ 31.254890][ T375] ? __cfi_dump_stack_lvl+0x8/0x8 [ 31.259919][ T375] ? ext4_xattr_block_set+0x9dc/0x3270 [ 31.265398][ T375] ? __vfs_setxattr+0x3f2/0x440 [ 31.270249][ T375] ? ext4_xattr_set_entry+0x979/0x21d0 [ 31.275710][ T375] print_address_description+0x71/0x200 [ 31.281289][ T375] print_report+0x4a/0x60 [ 31.285622][ T375] kasan_report+0x122/0x150 [ 31.290131][ T375] ? ext4_xattr_set_entry+0x979/0x21d0 [ 31.295618][ T375] ? ext4_xattr_set_entry+0x979/0x21d0 [ 31.301113][ T375] kasan_check_range+0x280/0x290 [ 31.306058][ T375] memmove+0x2d/0x70 [ 31.309951][ T375] ext4_xattr_set_entry+0x979/0x21d0 [ 31.315244][ T375] ext4_xattr_block_set+0xada/0x3270 [ 31.320539][ T375] ? dquot_free_inode+0x75f/0x940 [ 31.325575][ T375] ? __kasan_check_write+0x14/0x20 [ 31.330682][ T375] ? iput+0x620/0x670 [ 31.334664][ T375] ? ext4_xattr_block_find+0x310/0x310 [ 31.340150][ T375] ext4_xattr_set_handle+0xbd5/0x12b0 [ 31.345544][ T375] ? __cfi_ext4_xattr_set_handle+0x10/0x10 [ 31.351455][ T375] ? __kasan_check_read+0x11/0x20 [ 31.356487][ T375] ? __ext4_journal_start_sb+0x2ed/0x4a0 [ 31.362141][ T375] ext4_xattr_set+0x22a/0x320 [ 31.366835][ T375] ? __cfi_ext4_xattr_set+0x10/0x10 [ 31.372035][ T375] ? selinux_inode_setxattr+0x5aa/0xba0 [ 31.377580][ T375] ext4_xattr_trusted_set+0x3c/0x50 [ 31.382783][ T375] ? __cfi_ext4_xattr_trusted_set+0x10/0x10 [ 31.388683][ T375] __vfs_setxattr+0x3f2/0x440 [ 31.393384][ T375] __vfs_setxattr_noperm+0x12a/0x5e0 [ 31.398677][ T375] __vfs_setxattr_locked+0x212/0x230 [ 31.403970][ T375] vfs_setxattr+0x168/0x2f0 [ 31.408474][ T375] ? __cfi_vfs_setxattr+0x10/0x10 [ 31.413527][ T375] ? copy_user_enhanced_fast_string+0xa/0x40 [ 31.419518][ T375] setxattr+0x2b2/0x2d0 [ 31.423682][ T375] ? path_setxattr+0x280/0x280 [ 31.428478][ T375] ? __mnt_want_write+0x1e6/0x260 [ 31.433516][ T375] ? mnt_want_write+0x220/0x300 [ 31.438376][ T375] path_setxattr+0x142/0x280 [ 31.442992][ T375] ? simple_xattr_list_add+0x120/0x120 [ 31.448470][ T375] ? do_user_addr_fault+0x9ac/0x1050 [ 31.453765][ T375] __x64_sys_lsetxattr+0xc2/0xe0 [ 31.458718][ T375] x64_sys_call+0x8b7/0x9a0 [ 31.463228][ T375] do_syscall_64+0x4c/0xa0 [ 31.467648][ T375] ? clear_bhb_loop+0x30/0x80 [ 31.472366][ T375] ? clear_bhb_loop+0x30/0x80 [ 31.477065][ T375] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 31.482976][ T375] RIP: 0033:0x7fbf78f8eec9 [ 31.487393][ T375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 31.507005][ T375] RSP: 002b:00007ffca199d128 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 31.515425][ T375] RAX: ffffffffffffffda RBX: 00007fbf791e5fa0 RCX: 00007fbf78f8eec9 [ 31.523404][ T375] RDX: 0000200000000040 RSI: 00002000000000c0 RDI: 0000200000000100 [ 31.531383][ T375] RBP: 00007fbf79011f91 R08: 0000000000000000 R09: 0000000000000000 [ 31.539362][ T375] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000 [ 31.547514][ T375] R13: 00007fbf791e5fa0 R14: 00007fbf791e5fa0 R15: 0000000000000005 [ 31.555492][ T375] [ 31.558512][ T375] [ 31.560833][ T375] Allocated by task 375: [ 31.565069][ T375] kasan_set_track+0x4b/0x70 [ 31.569667][ T375] kasan_save_alloc_info+0x25/0x30 [ 31.574785][ T375] __kasan_kmalloc+0x95/0xb0 [ 31.579384][ T375] __kmalloc_node_track_caller+0xb1/0x1e0 [ 31.585114][ T375] kmemdup+0x2b/0x60 [ 31.589106][ T375] ext4_xattr_block_set+0x9dc/0x3270 [ 31.594402][ T375] ext4_xattr_set_handle+0xbd5/0x12b0 [ 31.599781][ T375] ext4_xattr_set+0x22a/0x320 [ 31.604469][ T375] ext4_xattr_trusted_set+0x3c/0x50 [ 31.609680][ T375] __vfs_setxattr+0x3f2/0x440 [ 31.614367][ T375] __vfs_setxattr_noperm+0x12a/0x5e0 [ 31.619666][ T375] __vfs_setxattr_locked+0x212/0x230 [ 31.624982][ T375] vfs_setxattr+0x168/0x2f0 [ 31.629492][ T375] setxattr+0x2b2/0x2d0 [ 31.633655][ T375] path_setxattr+0x142/0x280 [ 31.638265][ T375] __x64_sys_lsetxattr+0xc2/0xe0 [ 31.643213][ T375] x64_sys_call+0x8b7/0x9a0 [ 31.647722][ T375] do_syscall_64+0x4c/0xa0 [ 31.652145][ T375] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 31.658048][ T375] [ 31.660405][ T375] The buggy address belongs to the object at ffff8881148d4000 [ 31.660405][ T375] which belongs to the cache kmalloc-1k of size 1024 [ 31.674451][ T375] The buggy address is located 80 bytes inside of [ 31.674451][ T375] 1024-byte region [ffff8881148d4000, ffff8881148d4400) [ 31.687726][ T375] [ 31.690050][ T375] The buggy address belongs to the physical page: [ 31.696455][ T375] page:ffffea0004523400 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff8881148d7800 pfn:0x1148d0 [ 31.708015][ T375] head:ffffea0004523400 order:3 compound_mapcount:0 compound_pincount:0 [ 31.716357][ T375] flags: 0x4000000000010200(slab|head|zone=1) [ 31.722447][ T375] raw: 4000000000010200 0000000000000000 dead000000000001 ffff888100043080 [ 31.731034][ T375] raw: ffff8881148d7800 000000008010000f 00000001ffffffff 0000000000000000 [ 31.739627][ T375] page dumped because: kasan: bad access detected [ 31.746048][ T375] page_owner tracks the page as allocated [ 31.751771][ T375] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 102, tgid 102 (udevd), ts 6287538147, free_ts 0 [ 31.771836][ T375] post_alloc_hook+0x1f5/0x210 [ 31.776626][ T375] prep_new_page+0x1c/0x110 [ 31.781140][ T375] get_page_from_freelist+0x2c7b/0x2cf0 [ 31.786696][ T375] __alloc_pages+0x1c3/0x450 [ 31.791296][ T375] alloc_slab_page+0x6e/0xf0 [ 31.795893][ T375] new_slab+0x98/0x3d0 [ 31.799977][ T375] ___slab_alloc+0x6bd/0xb20 [ 31.804599][ T375] __slab_alloc+0x5e/0xa0 [ 31.808942][ T375] __kmem_cache_alloc_node+0x203/0x2c0 [ 31.814407][ T375] __kmalloc_node_track_caller+0xa0/0x1e0 [ 31.820138][ T375] __alloc_skb+0x236/0x4b0 [ 31.824556][ T375] netlink_sendmsg+0x626/0xbc0 [ 31.829331][ T375] ____sys_sendmsg+0x5a9/0x990 [ 31.834114][ T375] ___sys_sendmsg+0x21c/0x290 [ 31.838830][ T375] __x64_sys_sendmsg+0x1f0/0x2c0 [ 31.843780][ T375] x64_sys_call+0x171/0x9a0 [ 31.848296][ T375] page_owner free stack trace missing [ 31.853698][ T375] [ 31.856031][ T375] Memory state around the buggy address: [ 31.861682][ T375] ffff8881148d3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.869785][ T375] ffff8881148d3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.877851][ T375] >ffff8881148d4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.885916][ T375] ^ [ 31.892587][ T375] ffff8881148d4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.900647][ T375] ffff8881148d4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.908711][ T375] ================================================================== [ 31.923478][ T375] Disabling lock debugging due to kernel taint [ 31.942297][ T365] EXT4-fs (loop2): unmounting filesystem.