Warning: Permanently added '10.128.1.82' (ED25519) to the list of known hosts.
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 76.136631][ T5067] loop0: detected capacity change from 0 to 1024
[ 76.159404][ T5068] loop1: detected capacity change from 0 to 1024
[ 76.162473][ T5069] loop2: detected capacity change from 0 to 1024
executing program
[ 76.211933][ T11] ==================================================================
[ 76.220036][ T11] BUG: KASAN: slab-out-of-bounds in _copy_to_iter+0x7d4/0x1cf0
[ 76.227647][ T11] Write of size 2048 at addr ffff888060207800 by task kworker/u8:1/11
[ 76.235809][ T11]
[ 76.238148][ T11] CPU: 0 PID: 11 Comm: kworker/u8:1 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0
[ 76.243144][ T5075] loop4: detected capacity change from 0 to 1024
[ 76.247772][ T11] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
[ 76.247790][ T11] Workqueue: loop0 loop_rootcg_workfn
[ 76.247828][ T11] Call Trace:
[ 76.256627][ T5072] loop3: detected capacity change from 0 to 1024
[ 76.264162][ T11]
[ 76.264174][ T11] dump_stack_lvl+0x241/0x360
[ 76.286777][ T11] ? __pfx_dump_stack_lvl+0x10/0x10
[ 76.292011][ T11] ? __pfx__printk+0x10/0x10
[ 76.296641][ T11] ? srso_return_thunk+0x5/0x5f
[ 76.302041][ T11] ? _printk+0xd5/0x120
[ 76.306232][ T11] ? __virt_addr_valid+0x183/0x520
[ 76.311377][ T11] ? srso_return_thunk+0x5/0x5f
[ 76.316255][ T11] print_report+0x169/0x550
[ 76.320793][ T11] ? __virt_addr_valid+0x183/0x520
[ 76.325940][ T11] ? srso_return_thunk+0x5/0x5f
[ 76.330814][ T11] ? __virt_addr_valid+0x44e/0x520
[ 76.335957][ T11] ? srso_return_thunk+0x5/0x5f
[ 76.340833][ T11] ? __phys_addr+0xba/0x170
[ 76.345368][ T11] ? _copy_to_iter+0x7d4/0x1cf0
[ 76.350253][ T11] kasan_report+0x143/0x180
[ 76.354789][ T11] ? _copy_to_iter+0x7d4/0x1cf0
[ 76.359684][ T11] kasan_check_range+0x282/0x290
[ 76.364650][ T11] ? _copy_to_iter+0x7d4/0x1cf0
[ 76.369535][ T11] __asan_memcpy+0x40/0x70
[ 76.373975][ T11] _copy_to_iter+0x7d4/0x1cf0
[ 76.378694][ T11] ? lockdep_hardirqs_on+0x99/0x150
[ 76.383921][ T11] ? __pfx__copy_to_iter+0x10/0x10
[ 76.389055][ T11] ? page_copy_sane+0x26/0x260
[ 76.393852][ T11] ? __pfx___sanitizer_cov_trace_const_cmp8+0x10/0x10
[ 76.400645][ T11] ? srso_return_thunk+0x5/0x5f
[ 76.405519][ T11] ? page_copy_sane+0x46/0x260
[ 76.410305][ T11] copy_page_to_iter+0xb1/0x160
[ 76.415175][ T11] shmem_file_read_iter+0x4cb/0xa50
[ 76.420398][ T11] ? __pfx_shmem_file_read_iter+0x10/0x10
[ 76.426144][ T11] do_iter_readv_writev+0x5a6/0x800
[ 76.431365][ T11] ? __pfx_do_iter_readv_writev+0x10/0x10
[ 76.437105][ T11] ? srso_return_thunk+0x5/0x5f
[ 76.441969][ T11] ? rw_verify_area+0x405/0x580
[ 76.446834][ T11] vfs_iter_read+0x152/0x420
[ 76.451440][ T11] loop_process_work+0xcfb/0x1e60
[ 76.456472][ T11] ? mark_lock+0x9a/0x350
[ 76.460822][ T11] ? __pfx_loop_process_work+0x10/0x10
[ 76.466287][ T11] ? srso_return_thunk+0x5/0x5f
[ 76.471148][ T11] ? __pfx_lock_acquire+0x10/0x10
[ 76.476178][ T11] ? srso_return_thunk+0x5/0x5f
[ 76.481034][ T11] ? lockdep_hardirqs_on_prepare+0x43d/0x780
[ 76.487025][ T11] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
[ 76.493397][ T11] ? process_scheduled_works+0x91b/0x1770
[ 76.499120][ T11] process_scheduled_works+0xa02/0x1770
[ 76.504685][ T11] ? __pfx_process_scheduled_works+0x10/0x10
[ 76.510669][ T11] ? assign_work+0x364/0x3d0
[ 76.515268][ T11] worker_thread+0x86d/0xd70
[ 76.519877][ T11] ? __kthread_parkme+0x169/0x1d0
[ 76.524930][ T11] ? __pfx_worker_thread+0x10/0x10
[ 76.530054][ T11] kthread+0x2f2/0x390
[ 76.534132][ T11] ? __pfx_worker_thread+0x10/0x10
[ 76.539257][ T11] ? __pfx_kthread+0x10/0x10
[ 76.543859][ T11] ret_from_fork+0x4d/0x80
[ 76.548290][ T11] ? __pfx_kthread+0x10/0x10
[ 76.552889][ T11] ret_from_fork_asm+0x1a/0x30
[ 76.557677][ T11]
[ 76.560691][ T11]
[ 76.563006][ T11] Allocated by task 5067:
[ 76.567340][ T11] kasan_save_track+0x3f/0x80
[ 76.572032][ T11] __kasan_kmalloc+0x98/0xb0
[ 76.576635][ T11] __kmalloc+0x233/0x4a0
[ 76.580876][ T11] hfsplus_read_wrapper+0x613/0x1340
[ 76.586173][ T11] hfsplus_fill_super+0x38e/0x1ca0
[ 76.591294][ T11] mount_bdev+0x20c/0x2d0
[ 76.595633][ T11] legacy_get_tree+0xf0/0x190
[ 76.600315][ T11] vfs_get_tree+0x92/0x2a0
[ 76.604825][ T11] do_new_mount+0x2be/0xb40
[ 76.609337][ T11] __se_sys_mount+0x2d9/0x3c0
[ 76.614020][ T11] do_syscall_64+0xfd/0x240
[ 76.618524][ T11] entry_SYSCALL_64_after_hwframe+0x6d/0x75
[ 76.624423][ T11]
[ 76.626764][ T11] The buggy address belongs to the object at ffff888060207800
[ 76.626764][ T11] which belongs to the cache kmalloc-512 of size 512
[ 76.640836][ T11] The buggy address is located 0 bytes inside of
[ 76.640836][ T11] allocated 512-byte region [ffff888060207800, ffff888060207a00)
[ 76.654819][ T11]
[ 76.657143][ T11] The buggy address belongs to the physical page:
[ 76.663548][ T11] page:ffffea0001808100 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x60204
[ 76.673699][ T11] head:ffffea0001808100 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 76.682631][ T11] ksm flags: 0xfff00000000840(slab|head|node=0|zone=1|lastcpupid=0x7ff)
[ 76.690954][ T11] page_type: 0xffffffff()
[ 76.695283][ T11] raw: 00fff00000000840 ffff888014c41c80 ffffea0000bb4000 0000000000000003
[ 76.703866][ T11] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
[ 76.712442][ T11] page dumped because: kasan: bad access detected
[ 76.718851][ T11] page_owner tracks the page as allocated
[ 76.724565][ T11] page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 4727, tgid 4727 (sh), ts 41876666087, free_ts 38937231432
[ 76.744282][ T11] post_alloc_hook+0x1ea/0x210
[ 76.749067][ T11] get_page_from_freelist+0x33ea/0x3580
[ 76.754616][ T11] __alloc_pages+0x256/0x680
[ 76.759207][ T11] alloc_slab_page+0x5f/0x160
[ 76.763889][ T11] new_slab+0x84/0x2f0
[ 76.767961][ T11] ___slab_alloc+0xc73/0x1260
[ 76.772643][ T11] kmalloc_trace+0x269/0x360
[ 76.777234][ T11] tomoyo_find_next_domain+0x11c/0x1cf0
[ 76.782790][ T11] tomoyo_bprm_check_security+0x115/0x180
[ 76.788510][ T11] security_bprm_check+0x67/0x90
[ 76.793447][ T11] bprm_execve+0xa56/0x1790
[ 76.797954][ T11] do_execveat_common+0x553/0x700
[ 76.802984][ T11] __x64_sys_execve+0x92/0xb0
[ 76.807668][ T11] do_syscall_64+0xfd/0x240
[ 76.812170][ T11] entry_SYSCALL_64_after_hwframe+0x6d/0x75
[ 76.818076][ T11] page last free pid 4527 tgid 4527 stack trace:
[ 76.824400][ T11] free_unref_page_prepare+0x968/0xa90
[ 76.829872][ T11] free_unref_page+0x37/0x3f0
[ 76.834561][ T11] __put_partials+0xeb/0x130
[ 76.839153][ T11] put_cpu_partial+0x17c/0x250
[ 76.843924][ T11] __slab_free+0x2ea/0x3d0
[ 76.848348][ T11] qlist_free_all+0x5e/0xc0
[ 76.852853][ T11] kasan_quarantine_reduce+0x14f/0x170
[ 76.858314][ T11] __kasan_slab_alloc+0x23/0x80
[ 76.863171][ T11] kmem_cache_alloc+0x174/0x340
[ 76.868019][ T11] getname_flags+0xbd/0x4f0
[ 76.872521][ T11] do_sys_openat2+0xd2/0x1d0
[ 76.877112][ T11] __x64_sys_openat+0x247/0x2a0
[ 76.881960][ T11] do_syscall_64+0xfd/0x240
[ 76.886459][ T11] entry_SYSCALL_64_after_hwframe+0x6d/0x75
[ 76.892357][ T11]
[ 76.894676][ T11] Memory state around the buggy address:
[ 76.900299][ T11] ffff888060207900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 76.908376][ T11] ffff888060207980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 76.916435][ T11] >ffff888060207a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 76.924497][ T11] ^
[ 76.928560][ T11] ffff888060207a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 76.936619][ T11] ffff888060207b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 76.944674][ T11] ==================================================================
executing program
[ 76.963141][ T5074] loop5: detected capacity change from 0 to 1024
executing program
[ 76.988186][ T11] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 76.995423][ T11] CPU: 1 PID: 11 Comm: kworker/u8:1 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0
[ 77.005072][ T11] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
[ 77.015148][ T11] Workqueue: loop0 loop_rootcg_workfn
[ 77.020565][ T11] Call Trace:
[ 77.023860][ T11]
[ 77.026806][ T11] dump_stack_lvl+0x241/0x360
[ 77.031526][ T11] ? __pfx_dump_stack_lvl+0x10/0x10
[ 77.036770][ T11] ? __pfx__printk+0x10/0x10
[ 77.041410][ T11] ? preempt_schedule+0xe1/0xf0
[ 77.046285][ T11] ? srso_return_thunk+0x5/0x5f
[ 77.051166][ T11] ? vscnprintf+0x5d/0x90
[ 77.055528][ T11] panic+0x349/0x860
[ 77.059475][ T11] ? check_panic_on_warn+0x21/0xb0
[ 77.064628][ T11] ? __pfx_panic+0x10/0x10
[ 77.069079][ T11] ? srso_return_thunk+0x5/0x5f
[ 77.073961][ T11] ? srso_return_thunk+0x5/0x5f
[ 77.078840][ T11] ? _raw_spin_unlock_irqrestore+0x130/0x140
[ 77.084856][ T11] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10
[ 77.091219][ T11] ? print_report+0x502/0x550
[ 77.095936][ T11] check_panic_on_warn+0x86/0xb0
[ 77.100905][ T11] ? _copy_to_iter+0x7d4/0x1cf0
[ 77.105793][ T11] end_report+0x6e/0x140
[ 77.110068][ T11] kasan_report+0x154/0x180
[ 77.114610][ T11] ? _copy_to_iter+0x7d4/0x1cf0
[ 77.119504][ T11] kasan_check_range+0x282/0x290
[ 77.124484][ T11] ? _copy_to_iter+0x7d4/0x1cf0
[ 77.129378][ T11] __asan_memcpy+0x40/0x70
[ 77.133821][ T11] _copy_to_iter+0x7d4/0x1cf0
[ 77.138538][ T11] ? lockdep_hardirqs_on+0x99/0x150
[ 77.143779][ T11] ? __pfx__copy_to_iter+0x10/0x10
[ 77.148928][ T11] ? page_copy_sane+0x26/0x260
[ 77.153730][ T11] ? __pfx___sanitizer_cov_trace_const_cmp8+0x10/0x10
[ 77.160529][ T11] ? srso_return_thunk+0x5/0x5f
[ 77.165409][ T11] ? page_copy_sane+0x46/0x260
[ 77.170208][ T11] copy_page_to_iter+0xb1/0x160
[ 77.175100][ T11] shmem_file_read_iter+0x4cb/0xa50
[ 77.180353][ T11] ? __pfx_shmem_file_read_iter+0x10/0x10
[ 77.186124][ T11] do_iter_readv_writev+0x5a6/0x800
[ 77.191363][ T11] ? __pfx_do_iter_readv_writev+0x10/0x10
[ 77.197120][ T11] ? srso_return_thunk+0x5/0x5f
[ 77.202001][ T11] ? rw_verify_area+0x405/0x580
[ 77.206882][ T11] vfs_iter_read+0x152/0x420
[ 77.211506][ T11] loop_process_work+0xcfb/0x1e60
[ 77.216569][ T11] ? mark_lock+0x9a/0x350
[ 77.220939][ T11] ? __pfx_loop_process_work+0x10/0x10
[ 77.226430][ T11] ? srso_return_thunk+0x5/0x5f
[ 77.231312][ T11] ? __pfx_lock_acquire+0x10/0x10
[ 77.236362][ T11] ? srso_return_thunk+0x5/0x5f
[ 77.241239][ T11] ? lockdep_hardirqs_on_prepare+0x43d/0x780
[ 77.247230][ T11] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
[ 77.253574][ T11] ? process_scheduled_works+0x91b/0x1770
[ 77.259300][ T11] process_scheduled_works+0xa02/0x1770
[ 77.264867][ T11] ? __pfx_process_scheduled_works+0x10/0x10
[ 77.270854][ T11] ? assign_work+0x364/0x3d0
[ 77.275452][ T11] worker_thread+0x86d/0xd70
[ 77.280055][ T11] ? __kthread_parkme+0x169/0x1d0
[ 77.285089][ T11] ? __pfx_worker_thread+0x10/0x10
[ 77.290204][ T11] kthread+0x2f2/0x390
[ 77.294280][ T11] ? __pfx_worker_thread+0x10/0x10
[ 77.299394][ T11] ? __pfx_kthread+0x10/0x10
[ 77.303994][ T11] ret_from_fork+0x4d/0x80
[ 77.308423][ T11] ? __pfx_kthread+0x10/0x10
[ 77.313027][ T11] ret_from_fork_asm+0x1a/0x30
[ 77.317815][ T11]
[ 77.321058][ T11] Kernel Offset: disabled
[ 77.325377][ T11] Rebooting in 86400 seconds..