Warning: Permanently added '10.128.1.225' (ED25519) to the list of known hosts. 2026/01/30 13:43:59 parsed 1 programs [ 23.315371][ T30] audit: type=1400 audit(1769780639.956:64): avc: denied { node_bind } for pid=281 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 23.337404][ T30] audit: type=1400 audit(1769780639.956:65): avc: denied { module_request } for pid=281 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 24.300509][ T30] audit: type=1400 audit(1769780640.936:66): avc: denied { mounton } for pid=287 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.304396][ T287] cgroup: Unknown subsys name 'net' [ 24.323595][ T30] audit: type=1400 audit(1769780640.936:67): avc: denied { mount } for pid=287 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.351940][ T30] audit: type=1400 audit(1769780640.966:68): avc: denied { unmount } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.352882][ T287] cgroup: Unknown subsys name 'devices' [ 24.524869][ T287] cgroup: Unknown subsys name 'hugetlb' [ 24.530860][ T287] cgroup: Unknown subsys name 'rlimit' [ 24.828274][ T30] audit: type=1400 audit(1769780641.466:69): avc: denied { setattr } for pid=287 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.852909][ T30] audit: type=1400 audit(1769780641.466:70): avc: denied { create } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 24.874785][ T30] audit: type=1400 audit(1769780641.466:71): avc: denied { write } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.891688][ T292] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.897215][ T30] audit: type=1400 audit(1769780641.466:72): avc: denied { read } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.926094][ T30] audit: type=1400 audit(1769780641.476:73): avc: denied { mounton } for pid=287 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.936542][ T287] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.393009][ T294] request_module fs-gadgetfs succeeded, but still no fs? [ 25.862672][ T320] syz-executor (320) used greatest stack depth: 21888 bytes left [ 26.156231][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.163953][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.171855][ T343] device bridge_slave_0 entered promiscuous mode [ 26.178913][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.186101][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.194010][ T343] device bridge_slave_1 entered promiscuous mode [ 26.240515][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.247697][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.255091][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.262353][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.283598][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.291726][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.299240][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.308597][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.317046][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.324271][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.338301][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.346640][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.353926][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.373546][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.383231][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.397851][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.416565][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.424869][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.432909][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.446633][ T343] device veth0_vlan entered promiscuous mode [ 26.456898][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.466585][ T343] device veth1_macvtap entered promiscuous mode [ 26.476189][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.490453][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.526376][ T343] syz-executor (343) used greatest stack depth: 20832 bytes left 2026/01/30 13:44:03 executed programs: 0 [ 26.738057][ T362] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.745430][ T362] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.753387][ T362] device bridge_slave_0 entered promiscuous mode [ 26.761051][ T362] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.768824][ T362] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.776795][ T362] device bridge_slave_1 entered promiscuous mode [ 26.841379][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.849024][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.859160][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.867761][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.876181][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.883235][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.891194][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.901210][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.910272][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.919917][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.927252][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.939186][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.947382][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.957063][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.965635][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.985280][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.994154][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.006135][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.014529][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.024388][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.032858][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.046465][ T362] device veth0_vlan entered promiscuous mode [ 27.057166][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.067104][ T362] device veth1_macvtap entered promiscuous mode [ 27.077050][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.085841][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.099733][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.108776][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.140635][ T373] loop2: detected capacity change from 0 to 512 [ 27.191433][ T373] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 27.205085][ T373] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 27.217777][ T373] EXT4-fs warning (device loop2): ext4_expand_extra_isize_ea:2830: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 27.231248][ T373] EXT4-fs (loop2): 1 truncate cleaned up [ 27.237091][ T373] EXT4-fs (loop2): mounted filesystem without journal. Opts: init_itable=0x0000000000000000,jqfmt=vfsold,debug_want_extra_isize=0x000000000000006a,user_xattr,errors=remount-ro,quota,. Quota mode: writeback. [ 27.263301][ T373] ================================================================== [ 27.271451][ T373] BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0x13ba/0x3940 [ 27.279564][ T373] Read of size 18446744073709551540 at addr ffff888110bb0070 by task syz.2.17/373 [ 27.289043][ T373] [ 27.291419][ T373] CPU: 1 PID: 373 Comm: syz.2.17 Not tainted syzkaller #0 [ 27.298740][ T373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 27.309010][ T373] Call Trace: [ 27.312565][ T373] [ 27.315543][ T373] __dump_stack+0x21/0x30 [ 27.319894][ T373] dump_stack_lvl+0x110/0x170 [ 27.324853][ T373] ? show_regs_print_info+0x20/0x20 [ 27.330078][ T373] ? load_image+0x3e0/0x3e0 [ 27.334608][ T373] print_address_description+0x7f/0x2c0 [ 27.340198][ T373] ? ext4_xattr_set_entry+0x13ba/0x3940 [ 27.345917][ T373] kasan_report+0xf1/0x140 [ 27.350641][ T373] ? ext4_xattr_set_entry+0x13ba/0x3940 [ 27.356400][ T373] ? ext4_xattr_set_entry+0x13ba/0x3940 [ 27.362518][ T373] kasan_check_range+0x249/0x2a0 [ 27.367997][ T373] ? ext4_xattr_set_entry+0x13ba/0x3940 [ 27.373664][ T373] memmove+0x2d/0x70 [ 27.378004][ T373] ext4_xattr_set_entry+0x13ba/0x3940 [ 27.383617][ T373] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 27.389893][ T373] ? ext4_xattr_ibody_set+0x360/0x360 [ 27.395490][ T373] ? kmemdup+0x41/0x60 [ 27.399605][ T373] ? memcpy+0x56/0x70 [ 27.403642][ T373] ext4_xattr_block_set+0x977/0x2d10 [ 27.409128][ T373] ? ext4_xattr_block_find+0x4f0/0x4f0 [ 27.414713][ T373] ? __kasan_check_write+0x14/0x20 [ 27.420197][ T373] ext4_xattr_set_handle+0xba0/0x12b0 [ 27.425595][ T373] ? ext4_xattr_set_entry+0x3940/0x3940 [ 27.431254][ T373] ? ext4_xattr_set+0x20c/0x320 [ 27.436138][ T373] ? __ext4_journal_start_sb+0x154/0x2b0 [ 27.441795][ T373] ext4_xattr_set+0x242/0x320 [ 27.446495][ T373] ? ext4_xattr_set_credits+0x290/0x290 [ 27.452155][ T373] ? selinux_inode_setxattr+0x5d9/0xc00 [ 27.457756][ T373] ext4_xattr_trusted_set+0x3c/0x50 [ 27.462971][ T373] ? ext4_xattr_trusted_get+0x40/0x40 [ 27.468616][ T373] __vfs_setxattr+0x3e1/0x430 [ 27.473448][ T373] __vfs_setxattr_noperm+0x12a/0x5e0 [ 27.478784][ T373] __vfs_setxattr_locked+0x212/0x230 [ 27.484190][ T373] vfs_setxattr+0x167/0x2e0 [ 27.488732][ T373] ? xattr_permission+0x550/0x550 [ 27.493775][ T373] ? _copy_from_user+0x95/0xd0 [ 27.498641][ T373] setxattr+0x36c/0x390 [ 27.502818][ T373] ? path_setxattr+0x290/0x290 [ 27.507709][ T373] ? debug_smp_processor_id+0x17/0x20 [ 27.513119][ T373] ? __mnt_want_write+0x1e6/0x260 [ 27.518166][ T373] ? mnt_want_write+0x20b/0x2e0 [ 27.523032][ T373] path_setxattr+0x147/0x290 [ 27.527943][ T373] ? simple_xattr_list_add+0x120/0x120 [ 27.533427][ T373] __x64_sys_lsetxattr+0xc2/0xe0 [ 27.538557][ T373] x64_sys_call+0x8cc/0x9a0 [ 27.543091][ T373] do_syscall_64+0x4c/0xa0 [ 27.547572][ T373] ? clear_bhb_loop+0x50/0xa0 [ 27.552320][ T373] ? clear_bhb_loop+0x50/0xa0 [ 27.557324][ T373] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 27.563238][ T373] RIP: 0033:0x7f8ce721deb9 [ 27.567668][ T373] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 27.587724][ T373] RSP: 002b:00007ffc589b9438 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 27.596336][ T373] RAX: ffffffffffffffda RBX: 00007f8ce7498fa0 RCX: 00007f8ce721deb9 [ 27.604744][ T373] RDX: 0000200000000040 RSI: 0000200000000300 RDI: 0000200000000100 [ 27.612869][ T373] RBP: 00007f8ce728bc1f R08: 0000000000000000 R09: 0000000000000000 [ 27.620880][ T373] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000 [ 27.628879][ T373] R13: 00007f8ce7498fac R14: 00007f8ce7498fa0 R15: 00007f8ce7498fa0 [ 27.637144][ T373] [ 27.640188][ T373] [ 27.642610][ T373] Allocated by task 373: [ 27.646946][ T373] __kasan_kmalloc+0xda/0x110 [ 27.651642][ T373] __kmalloc_track_caller+0x13c/0x2c0 [ 27.657029][ T373] kmemdup+0x26/0x60 [ 27.660940][ T373] ext4_xattr_block_set+0x886/0x2d10 [ 27.666239][ T373] ext4_xattr_set_handle+0xba0/0x12b0 [ 27.671642][ T373] ext4_xattr_set+0x242/0x320 [ 27.676599][ T373] ext4_xattr_trusted_set+0x3c/0x50 [ 27.681833][ T373] __vfs_setxattr+0x3e1/0x430 [ 27.686557][ T373] __vfs_setxattr_noperm+0x12a/0x5e0 [ 27.692053][ T373] __vfs_setxattr_locked+0x212/0x230 [ 27.697565][ T373] vfs_setxattr+0x167/0x2e0 [ 27.702782][ T373] setxattr+0x36c/0x390 [ 27.707039][ T373] path_setxattr+0x147/0x290 [ 27.711998][ T373] __x64_sys_lsetxattr+0xc2/0xe0 [ 27.717208][ T373] x64_sys_call+0x8cc/0x9a0 [ 27.721815][ T373] do_syscall_64+0x4c/0xa0 [ 27.726330][ T373] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 27.732264][ T373] [ 27.734595][ T373] The buggy address belongs to the object at ffff888110bb0000 [ 27.734595][ T373] which belongs to the cache kmalloc-1k of size 1024 [ 27.748748][ T373] The buggy address is located 112 bytes inside of [ 27.748748][ T373] 1024-byte region [ffff888110bb0000, ffff888110bb0400) [ 27.762519][ T373] The buggy address belongs to the page: [ 27.768195][ T373] page:ffffea000442ec00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x110bb0 [ 27.778550][ T373] head:ffffea000442ec00 order:3 compound_mapcount:0 compound_pincount:0 [ 27.787176][ T373] flags: 0x4000000000010200(slab|head|zone=1) [ 27.793748][ T373] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888100043080 [ 27.802385][ T373] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 27.811069][ T373] page dumped because: kasan: bad access detected [ 27.817666][ T373] page_owner tracks the page as allocated [ 27.823691][ T373] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 362, ts 27132757325, free_ts 27066442048 [ 27.844845][ T373] post_alloc_hook+0x192/0x1b0 [ 27.849632][ T373] prep_new_page+0x1c/0x110 [ 27.854241][ T373] get_page_from_freelist+0x2d3a/0x2dc0 [ 27.859803][ T373] __alloc_pages+0x1a2/0x460 [ 27.864426][ T373] new_slab+0xa1/0x4d0 [ 27.868695][ T373] ___slab_alloc+0x381/0x810 [ 27.873741][ T373] __slab_alloc+0x49/0x90 [ 27.878309][ T373] __kmalloc+0x16a/0x2c0 [ 27.882820][ T373] kvmalloc_node+0x211/0x320 [ 27.887447][ T373] xt_alloc_table_info+0x3b/0xa0 [ 27.892442][ T373] ip6t_register_table+0xce/0x810 [ 27.898033][ T373] ip6table_raw_table_init+0x54/0x80 [ 27.903448][ T373] xt_find_table_lock+0x2a5/0x400 [ 27.908590][ T373] xt_request_find_table_lock+0x27/0x100 [ 27.914352][ T373] do_ip6t_get_ctl+0x5d7/0x1110 [ 27.919276][ T373] nf_getsockopt+0x26d/0x290 [ 27.923973][ T373] page last free stack trace: [ 27.928851][ T373] free_unref_page_prepare+0x542/0x550 [ 27.934534][ T373] free_unref_page+0xae/0x540 [ 27.939283][ T373] __free_pages+0x6c/0x100 [ 27.943904][ T373] __free_slab+0xe8/0x1e0 [ 27.948448][ T373] __unfreeze_partials+0x160/0x190 [ 27.953726][ T373] put_cpu_partial+0xc6/0x120 [ 27.958594][ T373] __slab_free+0x1d4/0x290 [ 27.963155][ T373] ___cache_free+0x104/0x120 [ 27.967767][ T373] qlink_free+0x4d/0x90 [ 27.972374][ T373] qlist_free_all+0x5f/0xb0 [ 27.977096][ T373] kasan_quarantine_reduce+0x14a/0x170 [ 27.983021][ T373] __kasan_slab_alloc+0x2f/0xf0 [ 27.987891][ T373] slab_post_alloc_hook+0x4f/0x2b0 [ 27.993026][ T373] kmem_cache_alloc+0xf7/0x260 [ 27.998185][ T373] __alloc_skb+0xe0/0x740 [ 28.002657][ T373] netlink_ack+0x372/0xb50 [ 28.007088][ T373] [ 28.009437][ T373] Memory state around the buggy address: [ 28.015173][ T373] ffff888110baff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.023426][ T373] ffff888110baff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.031590][ T373] >ffff888110bb0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.039859][ T373] ^ [ 28.047764][ T373] ffff888110bb0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.055840][ T373] ffff888110bb0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.064254][ T373] ================================================================== [ 28.072411][ T373] Disabling lock debugging due to kernel taint