Warning: Permanently added '10.128.1.64' (ED25519) to the list of known hosts. executing program [ 33.313687][ T6171] loop0: detected capacity change from 0 to 1024 [ 33.369040][ T651] ================================================================== [ 33.371202][ T651] BUG: KASAN: slab-out-of-bounds in copy_page_from_iter_atomic+0xa68/0x17c0 [ 33.373551][ T651] Read of size 2048 at addr ffff0000ce437800 by task kworker/u4:11/651 [ 33.375835][ T651] [ 33.376417][ T651] CPU: 1 PID: 651 Comm: kworker/u4:11 Not tainted 6.8.0-rc6-syzkaller-g9910665503b3 #0 [ 33.378984][ T651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 33.381710][ T651] Workqueue: loop0 loop_rootcg_workfn [ 33.383167][ T651] Call trace: [ 33.384064][ T651] dump_backtrace+0x1b8/0x1e4 [ 33.385292][ T651] show_stack+0x2c/0x3c [ 33.386394][ T651] dump_stack_lvl+0xd0/0x124 [ 33.387645][ T651] print_report+0x178/0x518 [ 33.388853][ T651] kasan_report+0xd8/0x138 [ 33.390012][ T651] kasan_check_range+0x254/0x294 [ 33.391336][ T651] __asan_memcpy+0x3c/0x84 [ 33.392518][ T651] copy_page_from_iter_atomic+0xa68/0x17c0 [ 33.394085][ T651] generic_perform_write+0x310/0x588 [ 33.395512][ T651] shmem_file_write_iter+0x110/0x138 [ 33.396920][ T651] do_iter_readv_writev+0x38c/0x540 [ 33.398308][ T651] vfs_iter_write+0x31c/0x6b8 [ 33.399610][ T651] loop_process_work+0x1128/0x1d80 [ 33.401016][ T651] loop_rootcg_workfn+0x28/0x38 [ 33.402312][ T651] process_one_work+0x694/0x1204 [ 33.403705][ T651] worker_thread+0x938/0xef4 [ 33.404963][ T651] kthread+0x288/0x310 [ 33.406056][ T651] ret_from_fork+0x10/0x20 [ 33.407261][ T651] [ 33.407855][ T651] Allocated by task 6171: [ 33.409029][ T651] kasan_save_track+0x40/0x78 [ 33.410326][ T651] kasan_save_alloc_info+0x70/0x84 [ 33.411682][ T651] __kasan_kmalloc+0xac/0xc4 [ 33.412890][ T651] __kmalloc+0x2bc/0x5d4 [ 33.414034][ T651] hfsplus_read_wrapper+0x3ac/0xfcc [ 33.415446][ T651] hfsplus_fill_super+0x2f0/0x166c [ 33.416840][ T651] mount_bdev+0x1d4/0x2a0 [ 33.418006][ T651] hfsplus_mount+0x44/0x58 [ 33.419192][ T651] legacy_get_tree+0xd4/0x16c [ 33.420505][ T651] vfs_get_tree+0x90/0x288 [ 33.421727][ T651] do_new_mount+0x278/0x900 [ 33.422954][ T651] path_mount+0x590/0xe04 [ 33.424098][ T651] __arm64_sys_mount+0x45c/0x594 [ 33.425440][ T651] invoke_syscall+0x98/0x2b8 [ 33.426650][ T651] el0_svc_common+0x130/0x23c [ 33.427955][ T651] do_el0_svc+0x48/0x58 [ 33.429106][ T651] el0_svc+0x54/0x168 [ 33.430152][ T651] el0t_64_sync_handler+0x84/0xfc [ 33.431479][ T651] el0t_64_sync+0x190/0x194 [ 33.432672][ T651] [ 33.433275][ T651] The buggy address belongs to the object at ffff0000ce437800 [ 33.433275][ T651] which belongs to the cache kmalloc-512 of size 512 [ 33.437121][ T651] The buggy address is located 0 bytes inside of [ 33.437121][ T651] allocated 512-byte region [ffff0000ce437800, ffff0000ce437a00) [ 33.440869][ T651] [ 33.441509][ T651] The buggy address belongs to the physical page: [ 33.443294][ T651] page:0000000082faeb67 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10e434 [ 33.446066][ T651] head:0000000082faeb67 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.448494][ T651] flags: 0x5ffc00000000840(slab|head|node=0|zone=2|lastcpupid=0x7ff) [ 33.450802][ T651] page_type: 0xffffffff() [ 33.451995][ T651] raw: 05ffc00000000840 ffff0000c0001c80 fffffdffc3378400 dead000000000002 [ 33.454300][ T651] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 33.456641][ T651] page dumped because: kasan: bad access detected [ 33.458387][ T651] [ 33.459037][ T651] Memory state around the buggy address: [ 33.460567][ T651] ffff0000ce437900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.462793][ T651] ffff0000ce437980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.465050][ T651] >ffff0000ce437a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.467166][ T651] ^ [ 33.468246][ T651] ffff0000ce437a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.470434][ T651] ffff0000ce437b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.472595][ T651] ================================================================== [ 33.474956][ T651] Disabling lock debugging due to kernel taint