Warning: Permanently added '10.128.1.82' (ED25519) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program [ 76.136631][ T5067] loop0: detected capacity change from 0 to 1024 [ 76.159404][ T5068] loop1: detected capacity change from 0 to 1024 [ 76.162473][ T5069] loop2: detected capacity change from 0 to 1024 executing program [ 76.211933][ T11] ================================================================== [ 76.220036][ T11] BUG: KASAN: slab-out-of-bounds in _copy_to_iter+0x7d4/0x1cf0 [ 76.227647][ T11] Write of size 2048 at addr ffff888060207800 by task kworker/u8:1/11 [ 76.235809][ T11] [ 76.238148][ T11] CPU: 0 PID: 11 Comm: kworker/u8:1 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0 [ 76.243144][ T5075] loop4: detected capacity change from 0 to 1024 [ 76.247772][ T11] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 76.247790][ T11] Workqueue: loop0 loop_rootcg_workfn [ 76.247828][ T11] Call Trace: [ 76.256627][ T5072] loop3: detected capacity change from 0 to 1024 [ 76.264162][ T11] [ 76.264174][ T11] dump_stack_lvl+0x241/0x360 [ 76.286777][ T11] ? __pfx_dump_stack_lvl+0x10/0x10 [ 76.292011][ T11] ? __pfx__printk+0x10/0x10 [ 76.296641][ T11] ? srso_return_thunk+0x5/0x5f [ 76.302041][ T11] ? _printk+0xd5/0x120 [ 76.306232][ T11] ? __virt_addr_valid+0x183/0x520 [ 76.311377][ T11] ? srso_return_thunk+0x5/0x5f [ 76.316255][ T11] print_report+0x169/0x550 [ 76.320793][ T11] ? __virt_addr_valid+0x183/0x520 [ 76.325940][ T11] ? srso_return_thunk+0x5/0x5f [ 76.330814][ T11] ? __virt_addr_valid+0x44e/0x520 [ 76.335957][ T11] ? srso_return_thunk+0x5/0x5f [ 76.340833][ T11] ? __phys_addr+0xba/0x170 [ 76.345368][ T11] ? _copy_to_iter+0x7d4/0x1cf0 [ 76.350253][ T11] kasan_report+0x143/0x180 [ 76.354789][ T11] ? _copy_to_iter+0x7d4/0x1cf0 [ 76.359684][ T11] kasan_check_range+0x282/0x290 [ 76.364650][ T11] ? _copy_to_iter+0x7d4/0x1cf0 [ 76.369535][ T11] __asan_memcpy+0x40/0x70 [ 76.373975][ T11] _copy_to_iter+0x7d4/0x1cf0 [ 76.378694][ T11] ? lockdep_hardirqs_on+0x99/0x150 [ 76.383921][ T11] ? __pfx__copy_to_iter+0x10/0x10 [ 76.389055][ T11] ? page_copy_sane+0x26/0x260 [ 76.393852][ T11] ? __pfx___sanitizer_cov_trace_const_cmp8+0x10/0x10 [ 76.400645][ T11] ? srso_return_thunk+0x5/0x5f [ 76.405519][ T11] ? page_copy_sane+0x46/0x260 [ 76.410305][ T11] copy_page_to_iter+0xb1/0x160 [ 76.415175][ T11] shmem_file_read_iter+0x4cb/0xa50 [ 76.420398][ T11] ? __pfx_shmem_file_read_iter+0x10/0x10 [ 76.426144][ T11] do_iter_readv_writev+0x5a6/0x800 [ 76.431365][ T11] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 76.437105][ T11] ? srso_return_thunk+0x5/0x5f [ 76.441969][ T11] ? rw_verify_area+0x405/0x580 [ 76.446834][ T11] vfs_iter_read+0x152/0x420 [ 76.451440][ T11] loop_process_work+0xcfb/0x1e60 [ 76.456472][ T11] ? mark_lock+0x9a/0x350 [ 76.460822][ T11] ? __pfx_loop_process_work+0x10/0x10 [ 76.466287][ T11] ? srso_return_thunk+0x5/0x5f [ 76.471148][ T11] ? __pfx_lock_acquire+0x10/0x10 [ 76.476178][ T11] ? srso_return_thunk+0x5/0x5f [ 76.481034][ T11] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 76.487025][ T11] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 76.493397][ T11] ? process_scheduled_works+0x91b/0x1770 [ 76.499120][ T11] process_scheduled_works+0xa02/0x1770 [ 76.504685][ T11] ? __pfx_process_scheduled_works+0x10/0x10 [ 76.510669][ T11] ? assign_work+0x364/0x3d0 [ 76.515268][ T11] worker_thread+0x86d/0xd70 [ 76.519877][ T11] ? __kthread_parkme+0x169/0x1d0 [ 76.524930][ T11] ? __pfx_worker_thread+0x10/0x10 [ 76.530054][ T11] kthread+0x2f2/0x390 [ 76.534132][ T11] ? __pfx_worker_thread+0x10/0x10 [ 76.539257][ T11] ? __pfx_kthread+0x10/0x10 [ 76.543859][ T11] ret_from_fork+0x4d/0x80 [ 76.548290][ T11] ? __pfx_kthread+0x10/0x10 [ 76.552889][ T11] ret_from_fork_asm+0x1a/0x30 [ 76.557677][ T11] [ 76.560691][ T11] [ 76.563006][ T11] Allocated by task 5067: [ 76.567340][ T11] kasan_save_track+0x3f/0x80 [ 76.572032][ T11] __kasan_kmalloc+0x98/0xb0 [ 76.576635][ T11] __kmalloc+0x233/0x4a0 [ 76.580876][ T11] hfsplus_read_wrapper+0x613/0x1340 [ 76.586173][ T11] hfsplus_fill_super+0x38e/0x1ca0 [ 76.591294][ T11] mount_bdev+0x20c/0x2d0 [ 76.595633][ T11] legacy_get_tree+0xf0/0x190 [ 76.600315][ T11] vfs_get_tree+0x92/0x2a0 [ 76.604825][ T11] do_new_mount+0x2be/0xb40 [ 76.609337][ T11] __se_sys_mount+0x2d9/0x3c0 [ 76.614020][ T11] do_syscall_64+0xfd/0x240 [ 76.618524][ T11] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 76.624423][ T11] [ 76.626764][ T11] The buggy address belongs to the object at ffff888060207800 [ 76.626764][ T11] which belongs to the cache kmalloc-512 of size 512 [ 76.640836][ T11] The buggy address is located 0 bytes inside of [ 76.640836][ T11] allocated 512-byte region [ffff888060207800, ffff888060207a00) [ 76.654819][ T11] [ 76.657143][ T11] The buggy address belongs to the physical page: [ 76.663548][ T11] page:ffffea0001808100 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x60204 [ 76.673699][ T11] head:ffffea0001808100 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 76.682631][ T11] ksm flags: 0xfff00000000840(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 76.690954][ T11] page_type: 0xffffffff() [ 76.695283][ T11] raw: 00fff00000000840 ffff888014c41c80 ffffea0000bb4000 0000000000000003 [ 76.703866][ T11] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 76.712442][ T11] page dumped because: kasan: bad access detected [ 76.718851][ T11] page_owner tracks the page as allocated [ 76.724565][ T11] page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 4727, tgid 4727 (sh), ts 41876666087, free_ts 38937231432 [ 76.744282][ T11] post_alloc_hook+0x1ea/0x210 [ 76.749067][ T11] get_page_from_freelist+0x33ea/0x3580 [ 76.754616][ T11] __alloc_pages+0x256/0x680 [ 76.759207][ T11] alloc_slab_page+0x5f/0x160 [ 76.763889][ T11] new_slab+0x84/0x2f0 [ 76.767961][ T11] ___slab_alloc+0xc73/0x1260 [ 76.772643][ T11] kmalloc_trace+0x269/0x360 [ 76.777234][ T11] tomoyo_find_next_domain+0x11c/0x1cf0 [ 76.782790][ T11] tomoyo_bprm_check_security+0x115/0x180 [ 76.788510][ T11] security_bprm_check+0x67/0x90 [ 76.793447][ T11] bprm_execve+0xa56/0x1790 [ 76.797954][ T11] do_execveat_common+0x553/0x700 [ 76.802984][ T11] __x64_sys_execve+0x92/0xb0 [ 76.807668][ T11] do_syscall_64+0xfd/0x240 [ 76.812170][ T11] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 76.818076][ T11] page last free pid 4527 tgid 4527 stack trace: [ 76.824400][ T11] free_unref_page_prepare+0x968/0xa90 [ 76.829872][ T11] free_unref_page+0x37/0x3f0 [ 76.834561][ T11] __put_partials+0xeb/0x130 [ 76.839153][ T11] put_cpu_partial+0x17c/0x250 [ 76.843924][ T11] __slab_free+0x2ea/0x3d0 [ 76.848348][ T11] qlist_free_all+0x5e/0xc0 [ 76.852853][ T11] kasan_quarantine_reduce+0x14f/0x170 [ 76.858314][ T11] __kasan_slab_alloc+0x23/0x80 [ 76.863171][ T11] kmem_cache_alloc+0x174/0x340 [ 76.868019][ T11] getname_flags+0xbd/0x4f0 [ 76.872521][ T11] do_sys_openat2+0xd2/0x1d0 [ 76.877112][ T11] __x64_sys_openat+0x247/0x2a0 [ 76.881960][ T11] do_syscall_64+0xfd/0x240 [ 76.886459][ T11] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 76.892357][ T11] [ 76.894676][ T11] Memory state around the buggy address: [ 76.900299][ T11] ffff888060207900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.908376][ T11] ffff888060207980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.916435][ T11] >ffff888060207a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.924497][ T11] ^ [ 76.928560][ T11] ffff888060207a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.936619][ T11] ffff888060207b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.944674][ T11] ================================================================== executing program [ 76.963141][ T5074] loop5: detected capacity change from 0 to 1024 executing program [ 76.988186][ T11] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 76.995423][ T11] CPU: 1 PID: 11 Comm: kworker/u8:1 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0 [ 77.005072][ T11] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 77.015148][ T11] Workqueue: loop0 loop_rootcg_workfn [ 77.020565][ T11] Call Trace: [ 77.023860][ T11] [ 77.026806][ T11] dump_stack_lvl+0x241/0x360 [ 77.031526][ T11] ? __pfx_dump_stack_lvl+0x10/0x10 [ 77.036770][ T11] ? __pfx__printk+0x10/0x10 [ 77.041410][ T11] ? preempt_schedule+0xe1/0xf0 [ 77.046285][ T11] ? srso_return_thunk+0x5/0x5f [ 77.051166][ T11] ? vscnprintf+0x5d/0x90 [ 77.055528][ T11] panic+0x349/0x860 [ 77.059475][ T11] ? check_panic_on_warn+0x21/0xb0 [ 77.064628][ T11] ? __pfx_panic+0x10/0x10 [ 77.069079][ T11] ? srso_return_thunk+0x5/0x5f [ 77.073961][ T11] ? srso_return_thunk+0x5/0x5f [ 77.078840][ T11] ? _raw_spin_unlock_irqrestore+0x130/0x140 [ 77.084856][ T11] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 77.091219][ T11] ? print_report+0x502/0x550 [ 77.095936][ T11] check_panic_on_warn+0x86/0xb0 [ 77.100905][ T11] ? _copy_to_iter+0x7d4/0x1cf0 [ 77.105793][ T11] end_report+0x6e/0x140 [ 77.110068][ T11] kasan_report+0x154/0x180 [ 77.114610][ T11] ? _copy_to_iter+0x7d4/0x1cf0 [ 77.119504][ T11] kasan_check_range+0x282/0x290 [ 77.124484][ T11] ? _copy_to_iter+0x7d4/0x1cf0 [ 77.129378][ T11] __asan_memcpy+0x40/0x70 [ 77.133821][ T11] _copy_to_iter+0x7d4/0x1cf0 [ 77.138538][ T11] ? lockdep_hardirqs_on+0x99/0x150 [ 77.143779][ T11] ? __pfx__copy_to_iter+0x10/0x10 [ 77.148928][ T11] ? page_copy_sane+0x26/0x260 [ 77.153730][ T11] ? __pfx___sanitizer_cov_trace_const_cmp8+0x10/0x10 [ 77.160529][ T11] ? srso_return_thunk+0x5/0x5f [ 77.165409][ T11] ? page_copy_sane+0x46/0x260 [ 77.170208][ T11] copy_page_to_iter+0xb1/0x160 [ 77.175100][ T11] shmem_file_read_iter+0x4cb/0xa50 [ 77.180353][ T11] ? __pfx_shmem_file_read_iter+0x10/0x10 [ 77.186124][ T11] do_iter_readv_writev+0x5a6/0x800 [ 77.191363][ T11] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 77.197120][ T11] ? srso_return_thunk+0x5/0x5f [ 77.202001][ T11] ? rw_verify_area+0x405/0x580 [ 77.206882][ T11] vfs_iter_read+0x152/0x420 [ 77.211506][ T11] loop_process_work+0xcfb/0x1e60 [ 77.216569][ T11] ? mark_lock+0x9a/0x350 [ 77.220939][ T11] ? __pfx_loop_process_work+0x10/0x10 [ 77.226430][ T11] ? srso_return_thunk+0x5/0x5f [ 77.231312][ T11] ? __pfx_lock_acquire+0x10/0x10 [ 77.236362][ T11] ? srso_return_thunk+0x5/0x5f [ 77.241239][ T11] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 77.247230][ T11] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 77.253574][ T11] ? process_scheduled_works+0x91b/0x1770 [ 77.259300][ T11] process_scheduled_works+0xa02/0x1770 [ 77.264867][ T11] ? __pfx_process_scheduled_works+0x10/0x10 [ 77.270854][ T11] ? assign_work+0x364/0x3d0 [ 77.275452][ T11] worker_thread+0x86d/0xd70 [ 77.280055][ T11] ? __kthread_parkme+0x169/0x1d0 [ 77.285089][ T11] ? __pfx_worker_thread+0x10/0x10 [ 77.290204][ T11] kthread+0x2f2/0x390 [ 77.294280][ T11] ? __pfx_worker_thread+0x10/0x10 [ 77.299394][ T11] ? __pfx_kthread+0x10/0x10 [ 77.303994][ T11] ret_from_fork+0x4d/0x80 [ 77.308423][ T11] ? __pfx_kthread+0x10/0x10 [ 77.313027][ T11] ret_from_fork_asm+0x1a/0x30 [ 77.317815][ T11] [ 77.321058][ T11] Kernel Offset: disabled [ 77.325377][ T11] Rebooting in 86400 seconds..