Warning: Permanently added '10.128.0.103' (ED25519) to the list of known hosts. 2026/02/04 23:32:12 parsed 1 programs [ 21.893077][ T28] audit: type=1400 audit(1770247932.917:64): avc: denied { node_bind } for pid=283 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 21.914082][ T28] audit: type=1400 audit(1770247932.917:65): avc: denied { module_request } for pid=283 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 22.709521][ T28] audit: type=1400 audit(1770247933.737:66): avc: denied { mounton } for pid=289 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.710476][ T289] cgroup: Unknown subsys name 'net' [ 22.732320][ T28] audit: type=1400 audit(1770247933.737:67): avc: denied { mount } for pid=289 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.759817][ T28] audit: type=1400 audit(1770247933.767:68): avc: denied { unmount } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.759967][ T289] cgroup: Unknown subsys name 'devices' [ 22.879680][ T289] cgroup: Unknown subsys name 'hugetlb' [ 22.885288][ T289] cgroup: Unknown subsys name 'rlimit' [ 22.993686][ T28] audit: type=1400 audit(1770247934.017:69): avc: denied { setattr } for pid=289 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.014825][ T293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 23.016901][ T28] audit: type=1400 audit(1770247934.017:70): avc: denied { create } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.045816][ T28] audit: type=1400 audit(1770247934.017:71): avc: denied { write } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.057146][ T289] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.066201][ T28] audit: type=1400 audit(1770247934.017:72): avc: denied { read } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.094956][ T28] audit: type=1400 audit(1770247934.017:73): avc: denied { mounton } for pid=289 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.870509][ T296] request_module fs-gadgetfs succeeded, but still no fs? [ 24.430734][ T330] syz-executor (330) used greatest stack depth: 22464 bytes left [ 24.474807][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.482330][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.490057][ T344] device bridge_slave_0 entered promiscuous mode [ 24.497106][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.504180][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.511965][ T344] device bridge_slave_1 entered promiscuous mode [ 24.551627][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.558704][ T344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.566054][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.573112][ T344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.591810][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.599616][ T331] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.606761][ T331] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.616775][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.625151][ T331] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.632199][ T331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.641289][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.649552][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.656570][ T331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.668890][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.678331][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.692607][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.703739][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.711961][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.719540][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.727519][ T344] device veth0_vlan entered promiscuous mode [ 24.737564][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.746994][ T344] device veth1_macvtap entered promiscuous mode [ 24.757027][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.767292][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.795855][ T344] syz-executor (344) used greatest stack depth: 22016 bytes left 2026/02/04 23:32:16 executed programs: 0 [ 25.056829][ T365] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.063932][ T365] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.071664][ T365] device bridge_slave_0 entered promiscuous mode [ 25.078809][ T365] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.085838][ T365] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.093436][ T365] device bridge_slave_1 entered promiscuous mode [ 25.136914][ T365] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.143979][ T365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.151264][ T365] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.158308][ T365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.185673][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.193575][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.200984][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.210179][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.218495][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.225532][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.238591][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.246885][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.253934][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.265624][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.287067][ T365] device veth0_vlan entered promiscuous mode [ 25.293634][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.302582][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.310791][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.318381][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.325811][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.344044][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.353154][ T365] device veth1_macvtap entered promiscuous mode [ 25.362532][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.372555][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.401693][ T375] loop2: detected capacity change from 0 to 512 [ 25.411168][ T375] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 25.424712][ T375] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 25.437735][ T375] EXT4-fs warning (device loop2): ext4_expand_extra_isize_ea:2823: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 25.451165][ T375] EXT4-fs (loop2): 1 truncate cleaned up [ 25.456837][ T375] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 25.471240][ T375] ================================================================== [ 25.479333][ T375] BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0xaf2/0x21d0 [ 25.487054][ T375] Read of size 18446744073709551540 at addr ffff888114434870 by task syz.2.17/375 [ 25.496325][ T375] [ 25.498645][ T375] CPU: 0 PID: 375 Comm: syz.2.17 Not tainted syzkaller #0 [ 25.505757][ T375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 25.515813][ T375] Call Trace: [ 25.519094][ T375] [ 25.522027][ T375] __dump_stack+0x21/0x24 [ 25.526411][ T375] dump_stack_lvl+0x110/0x170 [ 25.531100][ T375] ? __cfi_dump_stack_lvl+0x8/0x8 [ 25.536123][ T375] ? kasan_save_alloc_info+0x25/0x30 [ 25.541408][ T375] ? ext4_xattr_block_set+0x9d5/0x3260 [ 25.546858][ T375] ? ext4_xattr_set+0x242/0x320 [ 25.551717][ T375] ? ext4_xattr_trusted_set+0x3c/0x50 [ 25.557101][ T375] ? ext4_xattr_set_entry+0xaf2/0x21d0 [ 25.562726][ T375] print_address_description+0x71/0x200 [ 25.568263][ T375] print_report+0x4a/0x60 [ 25.572597][ T375] kasan_report+0x122/0x150 [ 25.577094][ T375] ? ext4_xattr_set_entry+0xaf2/0x21d0 [ 25.582556][ T375] ? ext4_xattr_set_entry+0xaf2/0x21d0 [ 25.588053][ T375] kasan_check_range+0x249/0x2a0 [ 25.592990][ T375] ? ext4_xattr_set_entry+0xaf2/0x21d0 [ 25.598442][ T375] memmove+0x2d/0x70 [ 25.602331][ T375] ext4_xattr_set_entry+0xaf2/0x21d0 [ 25.607608][ T375] ext4_xattr_block_set+0xad3/0x3260 [ 25.612887][ T375] ? fscrypt_drop_inode+0xad/0x110 [ 25.617992][ T375] ? _raw_spin_unlock+0x4c/0x70 [ 25.622857][ T375] ? iput+0x543/0x670 [ 25.626837][ T375] ? ext4_xattr_block_find+0x310/0x310 [ 25.632289][ T375] ext4_xattr_set_handle+0xba0/0x12c0 [ 25.637663][ T375] ? __cfi_ext4_xattr_set_handle+0x10/0x10 [ 25.643499][ T375] ? __kasan_check_read+0x11/0x20 [ 25.648518][ T375] ? __ext4_journal_start_sb+0x2ed/0x4a0 [ 25.654155][ T375] ext4_xattr_set+0x242/0x320 [ 25.658829][ T375] ? __cfi_ext4_xattr_set+0x10/0x10 [ 25.664017][ T375] ? selinux_inode_setxattr+0x5cf/0xbf0 [ 25.669552][ T375] ext4_xattr_trusted_set+0x3c/0x50 [ 25.674746][ T375] ? __cfi_ext4_xattr_trusted_set+0x10/0x10 [ 25.680634][ T375] __vfs_setxattr+0x3f2/0x440 [ 25.685303][ T375] __vfs_setxattr_noperm+0x12a/0x5e0 [ 25.690578][ T375] __vfs_setxattr_locked+0x212/0x230 [ 25.695857][ T375] vfs_setxattr+0x167/0x2e0 [ 25.700351][ T375] ? __cfi_vfs_setxattr+0x10/0x10 [ 25.705364][ T375] ? copy_user_enhanced_fast_string+0xa/0x40 [ 25.711332][ T375] setxattr+0x346/0x360 [ 25.715484][ T375] ? path_setxattr+0x290/0x290 [ 25.720328][ T375] ? __mnt_want_write+0x1e6/0x260 [ 25.725345][ T375] ? mnt_want_write+0x220/0x300 [ 25.730181][ T375] path_setxattr+0x147/0x290 [ 25.734767][ T375] ? simple_xattr_list_add+0x120/0x120 [ 25.740306][ T375] __x64_sys_lsetxattr+0xc2/0xe0 [ 25.745233][ T375] x64_sys_call+0x8b7/0x9a0 [ 25.749723][ T375] do_syscall_64+0x4c/0xa0 [ 25.754129][ T375] ? clear_bhb_loop+0x30/0x80 [ 25.758801][ T375] ? clear_bhb_loop+0x30/0x80 [ 25.763581][ T375] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 25.769746][ T375] RIP: 0033:0x7f185f39aeb9 [ 25.774177][ T375] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 25.793784][ T375] RSP: 002b:00007ffe99d3e778 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 25.802208][ T375] RAX: ffffffffffffffda RBX: 00007f185f615fa0 RCX: 00007f185f39aeb9 [ 25.810178][ T375] RDX: 0000200000000040 RSI: 0000200000000300 RDI: 0000200000000100 [ 25.818146][ T375] RBP: 00007f185f408c1f R08: 0000000000000000 R09: 0000000000000000 [ 25.826114][ T375] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000 [ 25.834088][ T375] R13: 00007f185f615fac R14: 00007f185f615fa0 R15: 00007f185f615fa0 [ 25.842060][ T375] [ 25.845075][ T375] [ 25.847407][ T375] Allocated by task 375: [ 25.851638][ T375] kasan_set_track+0x4b/0x70 [ 25.856237][ T375] kasan_save_alloc_info+0x25/0x30 [ 25.861350][ T375] __kasan_kmalloc+0x95/0xb0 [ 25.865937][ T375] __kmalloc_node_track_caller+0xb1/0x1e0 [ 25.871650][ T375] kmemdup+0x2b/0x60 [ 25.875554][ T375] ext4_xattr_block_set+0x9d5/0x3260 [ 25.880850][ T375] ext4_xattr_set_handle+0xba0/0x12c0 [ 25.886242][ T375] ext4_xattr_set+0x242/0x320 [ 25.890927][ T375] ext4_xattr_trusted_set+0x3c/0x50 [ 25.896128][ T375] __vfs_setxattr+0x3f2/0x440 [ 25.900816][ T375] __vfs_setxattr_noperm+0x12a/0x5e0 [ 25.906100][ T375] __vfs_setxattr_locked+0x212/0x230 [ 25.911391][ T375] vfs_setxattr+0x167/0x2e0 [ 25.915894][ T375] setxattr+0x346/0x360 [ 25.920057][ T375] path_setxattr+0x147/0x290 [ 25.924738][ T375] __x64_sys_lsetxattr+0xc2/0xe0 [ 25.929674][ T375] x64_sys_call+0x8b7/0x9a0 [ 25.934186][ T375] do_syscall_64+0x4c/0xa0 [ 25.938623][ T375] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 25.944519][ T375] [ 25.946848][ T375] The buggy address belongs to the object at ffff888114434800 [ 25.946848][ T375] which belongs to the cache kmalloc-1k of size 1024 [ 25.960892][ T375] The buggy address is located 112 bytes inside of [ 25.960892][ T375] 1024-byte region [ffff888114434800, ffff888114434c00) [ 25.974369][ T375] [ 25.976778][ T375] The buggy address belongs to the physical page: [ 25.983183][ T375] page:ffffea0004510c00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114430 [ 25.993416][ T375] head:ffffea0004510c00 order:3 compound_mapcount:0 compound_pincount:0 [ 26.001744][ T375] flags: 0x4000000000010200(slab|head|zone=1) [ 26.007922][ T375] raw: 4000000000010200 dead000000000100 dead000000000122 ffff888100043080 [ 26.016514][ T375] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 26.025092][ T375] page dumped because: kasan: bad access detected [ 26.031501][ T375] page_owner tracks the page as allocated [ 26.037209][ T375] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 103, tgid 103 (udevd), ts 5110877429, free_ts 0 [ 26.057012][ T375] post_alloc_hook+0x1f5/0x210 [ 26.061802][ T375] prep_new_page+0x1c/0x110 [ 26.066308][ T375] get_page_from_freelist+0x2d12/0x2d80 [ 26.071864][ T375] __alloc_pages+0x1d9/0x480 [ 26.076457][ T375] alloc_slab_page+0x6e/0xf0 [ 26.081055][ T375] new_slab+0x98/0x3d0 [ 26.085123][ T375] ___slab_alloc+0x6bd/0xb20 [ 26.089725][ T375] __slab_alloc+0x5e/0xa0 [ 26.094056][ T375] __kmem_cache_alloc_node+0x203/0x2c0 [ 26.099526][ T375] __kmalloc_node_track_caller+0xa0/0x1e0 [ 26.105240][ T375] __alloc_skb+0x236/0x4b0 [ 26.109652][ T375] netlink_sendmsg+0x635/0xbd0 [ 26.114420][ T375] ____sys_sendmsg+0x5cc/0x990 [ 26.119191][ T375] ___sys_sendmsg+0x2a2/0x360 [ 26.123869][ T375] __x64_sys_sendmsg+0x205/0x2d0 [ 26.128808][ T375] x64_sys_call+0x171/0x9a0 [ 26.133309][ T375] page_owner free stack trace missing [ 26.138678][ T375] [ 26.140995][ T375] Memory state around the buggy address: [ 26.146619][ T375] ffff888114434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.154674][ T375] ffff888114434780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.162817][ T375] >ffff888114434800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.170879][ T375] ^ [ 26.178588][ T375] ffff888114434880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.186644][ T375] ffff888114434900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.194694][ T375] ================================================================== [ 26.206943][ T375] Disabling lock debugging due to kernel taint [ 26.227196][ T365] EXT4-fs (loop2): unmounting filesystem.