Warning: Permanently added '10.128.1.54' (ED25519) to the list of known hosts. 2026/03/20 12:12:23 parsed 1 programs [ 23.948575][ T28] audit: type=1400 audit(1774008743.426:64): avc: denied { node_bind } for pid=283 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 23.969657][ T28] audit: type=1400 audit(1774008743.426:65): avc: denied { module_request } for pid=283 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 25.097218][ T28] audit: type=1400 audit(1774008744.566:66): avc: denied { mounton } for pid=289 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.100901][ T289] cgroup: Unknown subsys name 'net' [ 25.125266][ T28] audit: type=1400 audit(1774008744.576:67): avc: denied { mount } for pid=289 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.147675][ T289] cgroup: Unknown subsys name 'devices' [ 25.147759][ T28] audit: type=1400 audit(1774008744.596:68): avc: denied { unmount } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.259843][ T289] cgroup: Unknown subsys name 'hugetlb' [ 25.265697][ T289] cgroup: Unknown subsys name 'rlimit' [ 25.408714][ T28] audit: type=1400 audit(1774008744.886:69): avc: denied { setattr } for pid=289 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.432077][ T28] audit: type=1400 audit(1774008744.886:70): avc: denied { create } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.452530][ T28] audit: type=1400 audit(1774008744.886:71): avc: denied { write } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.472915][ T28] audit: type=1400 audit(1774008744.886:72): avc: denied { read } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 25.493320][ T28] audit: type=1400 audit(1774008744.886:73): avc: denied { mounton } for pid=289 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.501985][ T294] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.556709][ T289] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.237254][ T296] request_module fs-gadgetfs succeeded, but still no fs? [ 26.331336][ T301] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.338535][ T301] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.346133][ T301] device bridge_slave_0 entered promiscuous mode [ 26.355169][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.362532][ T301] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.370278][ T301] device bridge_slave_1 entered promiscuous mode [ 26.419599][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.426663][ T301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.434034][ T301] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.441094][ T301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.463304][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.470749][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.478756][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.486296][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.496767][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.505536][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.512639][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.522689][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.531030][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.538111][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.552971][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.562577][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.578059][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.591546][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.600120][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.608079][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.616352][ T301] device veth0_vlan entered promiscuous mode [ 26.627985][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.637278][ T301] device veth1_macvtap entered promiscuous mode [ 26.647823][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.659368][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.695615][ T301] syz-executor (301) used greatest stack depth: 22176 bytes left [ 27.281555][ T8] device bridge_slave_1 left promiscuous mode [ 27.287808][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.295466][ T8] device bridge_slave_0 left promiscuous mode [ 27.302101][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.310557][ T8] device veth1_macvtap left promiscuous mode [ 27.316645][ T8] device veth0_vlan left promiscuous mode 2026/03/20 12:12:27 executed programs: 0 [ 27.702079][ T364] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.709192][ T364] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.716773][ T364] device bridge_slave_0 entered promiscuous mode [ 27.723736][ T364] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.730836][ T364] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.738387][ T364] device bridge_slave_1 entered promiscuous mode [ 27.786790][ T364] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.793910][ T364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.802661][ T364] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.809763][ T364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.830017][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.837844][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.845042][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.854509][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.862804][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.869892][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.879042][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.887274][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.894428][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.907816][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.917275][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.931504][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.943587][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.951892][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.959500][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.967887][ T364] device veth0_vlan entered promiscuous mode [ 27.978946][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.988460][ T364] device veth1_macvtap entered promiscuous mode [ 27.998034][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.008214][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.035781][ T374] loop2: detected capacity change from 0 to 1024 [ 28.045726][ T374] ======================================================= [ 28.045726][ T374] WARNING: The mand mount option has been deprecated and [ 28.045726][ T374] and is ignored by this kernel. Remove the mand [ 28.045726][ T374] option from the mount to silence this warning. [ 28.045726][ T374] ======================================================= [ 28.081439][ T374] EXT4-fs: Ignoring removed bh option [ 28.099286][ T374] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 28.113769][ T374] ================================================================== [ 28.121881][ T374] BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0x1a71/0x21d0 [ 28.129734][ T374] Read of size 18446744073709550592 at addr ffff888114cf3400 by task syz.2.17/374 [ 28.139155][ T374] [ 28.141508][ T374] CPU: 1 PID: 374 Comm: syz.2.17 Not tainted syzkaller #0 [ 28.148629][ T374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 28.158709][ T374] Call Trace: [ 28.162088][ T374] [ 28.165039][ T374] __dump_stack+0x21/0x24 [ 28.169398][ T374] dump_stack_lvl+0x110/0x170 [ 28.174100][ T374] ? __cfi_dump_stack_lvl+0x8/0x8 [ 28.179160][ T374] ? kasan_save_alloc_info+0x25/0x30 [ 28.184741][ T374] ? ext4_xattr_block_set+0x9d5/0x3260 [ 28.190242][ T374] ? ext4_xattr_set+0x242/0x320 [ 28.195126][ T374] ? ext4_xattr_trusted_set+0x3c/0x50 [ 28.200614][ T374] ? ext4_xattr_set_entry+0x1a71/0x21d0 [ 28.206302][ T374] print_address_description+0x71/0x200 [ 28.211875][ T374] print_report+0x4a/0x60 [ 28.216676][ T374] kasan_report+0x122/0x150 [ 28.221238][ T374] ? ext4_xattr_set_entry+0x1a71/0x21d0 [ 28.226827][ T374] ? ext4_xattr_set_entry+0x1a71/0x21d0 [ 28.232404][ T374] kasan_check_range+0x249/0x2a0 [ 28.237367][ T374] ? ext4_xattr_set_entry+0x1a71/0x21d0 [ 28.242936][ T374] memmove+0x2d/0x70 [ 28.246854][ T374] ext4_xattr_set_entry+0x1a71/0x21d0 [ 28.252429][ T374] ext4_xattr_block_set+0xad3/0x3260 [ 28.257747][ T374] ? __kasan_check_write+0x14/0x20 [ 28.262880][ T374] ? iput+0x620/0x670 [ 28.266886][ T374] ? ext4_xattr_block_find+0x310/0x310 [ 28.272411][ T374] ext4_xattr_set_handle+0xe3b/0x1570 [ 28.277821][ T374] ? __cfi_ext4_xattr_set_handle+0x10/0x10 [ 28.283666][ T374] ? __kasan_check_read+0x11/0x20 [ 28.288712][ T374] ? __ext4_journal_start_sb+0x2ed/0x4a0 [ 28.294369][ T374] ext4_xattr_set+0x242/0x320 [ 28.299075][ T374] ? __cfi_ext4_xattr_set+0x10/0x10 [ 28.304297][ T374] ? selinux_inode_setxattr+0x5cf/0xbf0 [ 28.309870][ T374] ext4_xattr_trusted_set+0x3c/0x50 [ 28.315097][ T374] ? __cfi_ext4_xattr_trusted_set+0x10/0x10 [ 28.321013][ T374] __vfs_setxattr+0x3f2/0x440 [ 28.325725][ T374] __vfs_setxattr_noperm+0x12a/0x5e0 [ 28.331038][ T374] __vfs_setxattr_locked+0x212/0x230 [ 28.336351][ T374] vfs_setxattr+0x167/0x2e0 [ 28.340881][ T374] ? __cfi_vfs_setxattr+0x10/0x10 [ 28.345925][ T374] ? copy_user_enhanced_fast_string+0xa/0x40 [ 28.351936][ T374] setxattr+0x346/0x360 [ 28.356115][ T374] ? path_setxattr+0x290/0x290 [ 28.360910][ T374] ? __mnt_want_write+0x1e6/0x260 [ 28.365957][ T374] ? mnt_want_write+0x220/0x300 [ 28.370838][ T374] path_setxattr+0x147/0x290 [ 28.375462][ T374] ? simple_xattr_list_add+0x120/0x120 [ 28.380955][ T374] __x64_sys_lsetxattr+0xc2/0xe0 [ 28.386037][ T374] x64_sys_call+0x8b7/0x9a0 [ 28.390563][ T374] do_syscall_64+0x4c/0xa0 [ 28.395002][ T374] ? clear_bhb_loop+0x30/0x80 [ 28.399701][ T374] ? clear_bhb_loop+0x30/0x80 [ 28.404485][ T374] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 28.410395][ T374] RIP: 0033:0x7fbd4b99c799 [ 28.414847][ T374] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 28.434560][ T374] RSP: 002b:00007ffc939ee898 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 28.443188][ T374] RAX: ffffffffffffffda RBX: 00007fbd4bc15fa0 RCX: 00007fbd4b99c799 [ 28.451197][ T374] RDX: 0000200000000480 RSI: 00002000000000c0 RDI: 0000200000000100 [ 28.459447][ T374] RBP: 00007fbd4ba32c99 R08: 0000000000000000 R09: 0000000000000000 [ 28.467440][ T374] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000 [ 28.475518][ T374] R13: 00007fbd4bc15fac R14: 00007fbd4bc15fa0 R15: 00007fbd4bc15fa0 [ 28.483558][ T374] [ 28.486593][ T374] [ 28.488936][ T374] Allocated by task 374: [ 28.493194][ T374] kasan_set_track+0x4b/0x70 [ 28.497811][ T374] kasan_save_alloc_info+0x25/0x30 [ 28.503082][ T374] __kasan_kmalloc+0x95/0xb0 [ 28.507961][ T374] __kmalloc_node_track_caller+0xb1/0x1e0 [ 28.513698][ T374] kmemdup+0x2b/0x60 [ 28.517613][ T374] ext4_xattr_block_set+0x9d5/0x3260 [ 28.522924][ T374] ext4_xattr_set_handle+0xe3b/0x1570 [ 28.528350][ T374] ext4_xattr_set+0x242/0x320 [ 28.533055][ T374] ext4_xattr_trusted_set+0x3c/0x50 [ 28.538282][ T374] __vfs_setxattr+0x3f2/0x440 [ 28.542987][ T374] __vfs_setxattr_noperm+0x12a/0x5e0 [ 28.548302][ T374] __vfs_setxattr_locked+0x212/0x230 [ 28.553610][ T374] vfs_setxattr+0x167/0x2e0 [ 28.558133][ T374] setxattr+0x346/0x360 [ 28.562315][ T374] path_setxattr+0x147/0x290 [ 28.566928][ T374] __x64_sys_lsetxattr+0xc2/0xe0 [ 28.571925][ T374] x64_sys_call+0x8b7/0x9a0 [ 28.576447][ T374] do_syscall_64+0x4c/0xa0 [ 28.580974][ T374] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 28.586893][ T374] [ 28.589234][ T374] The buggy address belongs to the object at ffff888114cf3000 [ 28.589234][ T374] which belongs to the cache kmalloc-1k of size 1024 [ 28.603392][ T374] The buggy address is located 0 bytes to the right of [ 28.603392][ T374] 1024-byte region [ffff888114cf3000, ffff888114cf3400) [ 28.617289][ T374] [ 28.619634][ T374] The buggy address belongs to the physical page: [ 28.626061][ T374] page:ffffea0004533c00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114cf0 [ 28.636324][ T374] head:ffffea0004533c00 order:3 compound_mapcount:0 compound_pincount:0 [ 28.644662][ T374] flags: 0x4000000000010200(slab|head|zone=1) [ 28.650914][ T374] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888100043080 [ 28.659512][ T374] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 28.668200][ T374] page dumped because: kasan: bad access detected [ 28.674638][ T374] page_owner tracks the page as allocated [ 28.680367][ T374] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 364, tgid 364 (syz-executor), ts 28028183845, free_ts 27975945598 [ 28.703052][ T374] post_alloc_hook+0x1f5/0x210 [ 28.707965][ T374] prep_new_page+0x1c/0x110 [ 28.712497][ T374] get_page_from_freelist+0x2d12/0x2d80 [ 28.718073][ T374] __alloc_pages+0x1fa/0x610 [ 28.722772][ T374] alloc_slab_page+0x6e/0xf0 [ 28.727392][ T374] new_slab+0x98/0x3d0 [ 28.731487][ T374] ___slab_alloc+0x6bd/0xb20 [ 28.736100][ T374] __slab_alloc+0x5e/0xa0 [ 28.740458][ T374] __kmem_cache_alloc_node+0x203/0x2c0 [ 28.745936][ T374] __kmalloc+0xa1/0x1e0 [ 28.750104][ T374] ip6t_alloc_initial_table+0x6d/0x660 [ 28.755584][ T374] ip6table_raw_table_init+0x32/0x80 [ 28.760922][ T374] xt_find_table_lock+0x2b6/0x410 [ 28.766008][ T374] xt_request_find_table_lock+0x27/0x100 [ 28.771669][ T374] do_ip6t_get_ctl+0x5d7/0x1190 [ 28.776554][ T374] nf_getsockopt+0x27f/0x2a0 [ 28.781167][ T374] page last free stack trace: [ 28.785853][ T374] free_unref_page_prepare+0x742/0x750 [ 28.791337][ T374] free_unref_page+0x95/0x540 [ 28.796038][ T374] __free_pages+0x67/0x100 [ 28.800645][ T374] __free_slab+0xca/0x1a0 [ 28.805001][ T374] __unfreeze_partials+0x160/0x190 [ 28.810137][ T374] put_cpu_partial+0xa9/0x100 [ 28.814847][ T374] __slab_free+0x1c4/0x280 [ 28.819288][ T374] ___cache_free+0xbf/0xd0 [ 28.823746][ T374] qlist_free_all+0xc6/0x140 [ 28.828353][ T374] kasan_quarantine_reduce+0x14a/0x170 [ 28.833861][ T374] __kasan_slab_alloc+0x24/0x80 [ 28.838754][ T374] slab_post_alloc_hook+0x4f/0x2d0 [ 28.843972][ T374] kmem_cache_alloc_lru+0x104/0x280 [ 28.849203][ T374] sock_alloc_inode+0x28/0xc0 [ 28.853894][ T374] new_inode_pseudo+0x70/0x1f0 [ 28.858676][ T374] __sock_create+0x12c/0x7c0 [ 28.863296][ T374] [ 28.865639][ T374] Memory state around the buggy address: [ 28.871282][ T374] ffff888114cf3300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.879443][ T374] ffff888114cf3380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.887608][ T374] >ffff888114cf3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.895690][ T374] ^ [ 28.899859][ T374] ffff888114cf3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.907941][ T374] ffff888114cf3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.916021][ T374] ================================================================== [ 28.928746][ T374] Disabling lock debugging due to kernel taint [ 28.935046][ T374] EXT4-fs error (device loop2): ext4_xattr_inode_iget:401: inode #2: comm syz.2.17: missing EA_INODE flag [ 28.948222][ T374] EXT4-fs (loop2): Remounting filesystem read-only [ 28.954848][ T374] EXT4-fs error (device loop2): ext4_xattr_inode_iget:406: comm syz.2.17: error while reading EA inode 2 err=-117 [ 28.967638][ T374] EXT4-fs (loop2): Remounting filesystem read-only [ 28.977665][ T364] EXT4-fs (loop2): unmounting filesystem.