Warning: Permanently added '10.128.1.54' (ECDSA) to the list of known hosts. executing program [ 64.702218][ T22] audit: type=1400 audit(1673853803.320:73): avc: denied { execmem } for pid=298 comm="syz-executor765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 64.721900][ T22] audit: type=1400 audit(1673853803.330:74): avc: denied { read write } for pid=298 comm="syz-executor765" name="loop0" dev="devtmpfs" ino=1152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 64.746290][ T22] audit: type=1400 audit(1673853803.330:75): avc: denied { open } for pid=298 comm="syz-executor765" path="/dev/loop0" dev="devtmpfs" ino=1152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 64.765389][ T301] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 64.770466][ T22] audit: type=1400 audit(1673853803.330:76): avc: denied { ioctl } for pid=298 comm="syz-executor765" path="/dev/loop0" dev="devtmpfs" ino=1152 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 64.804842][ T22] audit: type=1400 audit(1673853803.350:77): avc: denied { mounton } for pid=299 comm="syz-executor765" path="/root/file0" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 64.827597][ T22] audit: type=1400 audit(1673853803.400:78): avc: denied { mount } for pid=299 comm="syz-executor765" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 64.849388][ T22] audit: type=1400 audit(1673853803.420:79): avc: denied { write } for pid=299 comm="syz-executor765" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 64.871185][ T22] audit: type=1400 audit(1673853803.420:80): avc: denied { add_name } for pid=299 comm="syz-executor765" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory [ 64.891859][ T22] audit: type=1400 audit(1673853803.420:81): avc: denied { create } for pid=299 comm="syz-executor765" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 64.912094][ T22] audit: type=1400 audit(1673853803.420:82): avc: denied { write open } for pid=299 comm="syz-executor765" path="/root/file0/bus" dev="loop0" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 64.956745][ T118] ================================================================== [ 64.964814][ T118] BUG: KASAN: use-after-free in get_max_inline_xattr_value_size+0x373/0x510 [ 64.973451][ T118] Read of size 4 at addr ffff8881ddd0c084 by task kworker/0:2/118 [ 64.981212][ T118] [ 64.983514][ T118] CPU: 0 PID: 118 Comm: kworker/0:2 Not tainted 5.4.219-syzkaller-00002-ga0eae55f26a0 #0 [ 64.994141][ T118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 65.004169][ T118] Workqueue: events p9_write_work [ 65.009254][ T118] Call Trace: [ 65.012528][ T118] dump_stack+0x1d8/0x241 [ 65.016823][ T118] ? nf_ct_l4proto_log_invalid+0x26c/0x26c [ 65.022595][ T118] ? printk+0xcf/0x10f [ 65.026631][ T118] ? get_max_inline_xattr_value_size+0x373/0x510 [ 65.033010][ T118] ? vprintk_emit+0x437/0x4a0 [ 65.037657][ T118] ? get_max_inline_xattr_value_size+0x373/0x510 [ 65.043953][ T118] print_address_description+0x8c/0x630 [ 65.049463][ T118] ? panic+0x73e/0x73e [ 65.053865][ T118] ? get_max_inline_xattr_value_size+0x373/0x510 [ 65.060165][ T118] __kasan_report+0xf6/0x130 [ 65.064726][ T118] ? get_max_inline_xattr_value_size+0x373/0x510 [ 65.071025][ T118] kasan_report+0x30/0x60 [ 65.075324][ T118] get_max_inline_xattr_value_size+0x373/0x510 [ 65.081447][ T118] ext4_get_max_inline_size+0x139/0x1f0 [ 65.086960][ T118] ? asan.module_dtor+0x20/0x20 [ 65.091776][ T118] ext4_try_to_write_inline_data+0xd9/0x1750 [ 65.097734][ T118] ? xas_load+0x4d1/0x530 [ 65.102037][ T118] ? find_get_entry+0x54a/0x5e0 [ 65.106879][ T118] ? mark_page_accessed+0x295/0x620 [ 65.112074][ T118] ? PageUptodate+0xc0/0xc0 [ 65.116547][ T118] ? ext4_writepage_trans_blocks+0x506/0x620 [ 65.122505][ T118] ext4_write_begin+0x247/0x1d50 [ 65.127409][ T118] ? write_boundary_block+0x150/0x150 [ 65.132747][ T118] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 65.138176][ T118] ? ext4_readpages+0x110/0x110 [ 65.142993][ T118] ? from_kprojid+0x1b0/0x740 [ 65.147635][ T118] ? __getblk_gfp+0x3a/0x740 [ 65.152190][ T118] ? lock_page_memcg+0x6a/0x130 [ 65.157006][ T118] ? mark_buffer_dirty+0x1fb/0x360 [ 65.162087][ T118] ? __ext4_handle_dirty_metadata+0x27d/0x620 [ 65.168118][ T118] ? ext4_mark_iloc_dirty+0x24af/0x3440 [ 65.173630][ T118] ext4_da_write_begin+0x4a8/0xf80 [ 65.178712][ T118] ? ext4_chunk_trans_blocks+0x2a0/0x2a0 [ 65.184394][ T118] ? ext4_set_page_dirty+0x1a0/0x1a0 [ 65.189642][ T118] ? ext4_reserve_inode_write+0x19c/0x220 [ 65.195329][ T118] ? ext4_mark_inode_dirty+0x4ca/0x780 [ 65.200754][ T118] ? ext4_blocks_for_truncate+0x220/0x220 [ 65.206444][ T118] ? find_next_and_bit+0x15c/0x1a0 [ 65.211518][ T118] ? cpumask_next_and+0x11/0x30 [ 65.216333][ T118] ? iov_iter_fault_in_readable+0x256/0x4d0 [ 65.222192][ T118] ? asan.module_dtor+0x20/0x20 [ 65.227020][ T118] ? __ext4_journal_start_sb+0x290/0x440 [ 65.232616][ T118] generic_perform_write+0x2f9/0x5a0 [ 65.237866][ T118] ? __mark_inode_dirty+0x126/0x9f0 [ 65.243031][ T118] ? grab_cache_page_write_begin+0x90/0x90 [ 65.248803][ T118] ? file_remove_privs+0x640/0x640 [ 65.253879][ T118] ? down_write_trylock+0xd8/0x130 [ 65.258960][ T118] __generic_file_write_iter+0x239/0x490 [ 65.264560][ T118] ext4_file_write_iter+0x495/0x10e0 [ 65.269812][ T118] ? ext4_file_read_iter+0x140/0x140 [ 65.275063][ T118] ? avc_has_perm+0x16d/0x260 [ 65.279703][ T118] ? avc_has_perm_noaudit+0x400/0x400 [ 65.285044][ T118] ? iov_iter_init+0x83/0x160 [ 65.289691][ T118] __vfs_write+0x5e3/0x780 [ 65.294075][ T118] ? __kernel_write+0x340/0x340 [ 65.298896][ T118] ? check_preemption_disabled+0x9e/0x330 [ 65.304588][ T118] ? debug_smp_processor_id+0x20/0x20 [ 65.309939][ T118] ? selinux_file_permission+0x3f2/0x530 [ 65.315538][ T118] vfs_write+0x210/0x4f0 [ 65.319748][ T118] kernel_write+0xa3/0xf0 [ 65.324047][ T118] p9_write_work+0x598/0xce0 [ 65.328616][ T118] process_one_work+0x6ca/0xc40 [ 65.333438][ T118] worker_thread+0xae0/0x1440 [ 65.338081][ T118] ? _raw_spin_lock+0x1b0/0x1b0 [ 65.342895][ T118] ? is_mmconf_reserved+0x420/0x420 [ 65.348060][ T118] ? __wake_up_locked+0xc2/0x120 [ 65.352961][ T118] kthread+0x2d8/0x360 [ 65.357001][ T118] ? worker_clr_flags+0x170/0x170 [ 65.361995][ T118] ? kthread_destroy_worker+0x280/0x280 [ 65.367512][ T118] ret_from_fork+0x1f/0x30 [ 65.371891][ T118] [ 65.374187][ T118] Allocated by task 300: [ 65.378395][ T118] __kasan_kmalloc+0x131/0x1e0 [ 65.383122][ T118] kmem_cache_alloc+0xd0/0x210 [ 65.387848][ T118] mempool_alloc+0x135/0x530 [ 65.392404][ T118] bio_alloc_bioset+0x1db/0x640 [ 65.397217][ T118] do_mpage_readpage+0x1459/0x1ad0 [ 65.402299][ T118] mpage_readpages+0x39b/0x510 [ 65.407027][ T118] read_pages+0x117/0x410 [ 65.411320][ T118] __do_page_cache_readahead+0x4c1/0x570 [ 65.416914][ T118] page_cache_sync_readahead+0x339/0x3b0 [ 65.422509][ T118] generic_file_read_iter+0x5e1/0x2180 [ 65.427930][ T118] blkdev_read_iter+0x12a/0x180 [ 65.432753][ T118] __vfs_read+0x5e0/0x760 [ 65.437052][ T118] vfs_read+0x166/0x370 [ 65.441174][ T118] ksys_read+0x198/0x2c0 [ 65.445382][ T118] do_syscall_64+0xcb/0x1c0 [ 65.449849][ T118] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 65.455702][ T118] [ 65.458007][ T118] Freed by task 9: [ 65.461719][ T118] __kasan_slab_free+0x178/0x240 [ 65.466629][ T118] slab_free_freelist_hook+0x80/0x150 [ 65.471967][ T118] kmem_cache_free+0xa9/0x1d0 [ 65.476634][ T118] blk_update_request+0x327/0xd90 [ 65.481628][ T118] blk_mq_end_request+0x39/0x70 [ 65.486443][ T118] blk_done_softirq+0x2f2/0x370 [ 65.491258][ T118] __do_softirq+0x23e/0x643 [ 65.495721][ T118] [ 65.498032][ T118] The buggy address belongs to the object at ffff8881ddd0c000 [ 65.498032][ T118] which belongs to the cache bio-0 of size 200 [ 65.511623][ T118] The buggy address is located 132 bytes inside of [ 65.511623][ T118] 200-byte region [ffff8881ddd0c000, ffff8881ddd0c0c8) [ 65.524862][ T118] The buggy address belongs to the page: [ 65.530468][ T118] page:ffffea0007774300 refcount:1 mapcount:0 mapping:ffff8881f33e6f00 index:0x0 [ 65.539538][ T118] flags: 0x8000000000000200(slab) [ 65.544535][ T118] raw: 8000000000000200 dead000000000100 dead000000000122 ffff8881f33e6f00 [ 65.553093][ T118] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000 [ 65.561646][ T118] page dumped because: kasan: bad access detected [ 65.568021][ T118] page_owner tracks the page as allocated [ 65.573710][ T118] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x92880(GFP_NOWAIT|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_NOMEMALLOC) [ 65.587905][ T118] prep_new_page+0x194/0x380 [ 65.592466][ T118] get_page_from_freelist+0x524/0x560 [ 65.597817][ T118] __alloc_pages_nodemask+0x372/0x860 [ 65.603339][ T118] alloc_slab_page+0x39/0x3e0 [ 65.607987][ T118] new_slab+0x97/0x450 [ 65.612022][ T118] ___slab_alloc+0x320/0x4a0 [ 65.616577][ T118] __slab_alloc+0x5a/0x90 [ 65.620871][ T118] kmem_cache_alloc+0x100/0x210 [ 65.625685][ T118] mempool_alloc+0x135/0x530 [ 65.630242][ T118] bio_alloc_bioset+0x1db/0x640 [ 65.635058][ T118] do_mpage_readpage+0x1459/0x1ad0 [ 65.640131][ T118] mpage_readpages+0x39b/0x510 [ 65.644858][ T118] read_pages+0x117/0x410 [ 65.649153][ T118] __do_page_cache_readahead+0x4c1/0x570 [ 65.654925][ T118] page_cache_sync_readahead+0x339/0x3b0 [ 65.660522][ T118] generic_file_read_iter+0x5e1/0x2180 [ 65.665941][ T118] page_owner free stack trace missing [ 65.671279][ T118] [ 65.673627][ T118] Memory state around the buggy address: [ 65.679232][ T118] ffff8881ddd0bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.687264][ T118] ffff8881ddd0c000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.695400][ T118] >ffff8881ddd0c080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 65.703433][ T118] ^ executing program [ 65.707479][ T118] ffff8881ddd0c100: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 65.715514][ T118] ffff8881ddd0c180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.723540][ T118] ================================================================== [ 65.731565][ T118] Disabling lock debugging due to kernel taint [ 65.737774][ T118] EXT4-fs error (device loop0): ext4_xattr_ibody_find:2196: inode #18: comm kworker/0:2: corrupted in-inode xattr write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory [ 66.593592][ T12] cfg80211: failed to load regulatory.db