Warning: Permanently added '10.128.0.91' (ED25519) to the list of known hosts. 2024/06/23 19:54:42 ignoring optional flag "sandboxArg"="0" 2024/06/23 19:54:42 parsed 1 programs 2024/06/23 19:54:44 executed programs: 0 [ 51.216161][ T2084] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 65.390149][ T4143] loop4: detected capacity change from 0 to 1024 [ 65.415481][ T4143] ======================================================= [ 65.415481][ T4143] WARNING: The mand mount option has been deprecated and [ 65.415481][ T4143] and is ignored by this kernel. Remove the mand [ 65.415481][ T4143] option from the mount to silence this warning. [ 65.415481][ T4143] ======================================================= [ 65.489152][ T4143] hfsplus: xattr search failed [ 65.511029][ T4157] loop0: detected capacity change from 0 to 1024 [ 65.541954][ T4157] hfsplus: xattr search failed 2024/06/23 19:54:58 executed programs: 5 [ 65.638508][ T4169] loop4: detected capacity change from 0 to 1024 [ 65.672104][ T4169] hfsplus: xattr search failed [ 65.685782][ T4174] loop1: detected capacity change from 0 to 1024 [ 65.689866][ T4175] loop0: detected capacity change from 0 to 1024 [ 65.726098][ T4180] loop3: detected capacity change from 0 to 1024 [ 65.741565][ T4175] hfsplus: xattr search failed [ 65.748817][ T4174] hfsplus: xattr search failed [ 65.750554][ T4180] hfsplus: xattr search failed [ 65.788254][ T4142] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 65.788291][ T4167] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 65.814506][ T4184] loop2: detected capacity change from 0 to 1024 [ 65.825446][ T4184] hfsplus: xattr search failed [ 65.854987][ T4188] loop4: detected capacity change from 0 to 1024 [ 65.881384][ T4189] loop3: detected capacity change from 0 to 1024 [ 65.909578][ T4192] loop0: detected capacity change from 0 to 1024 [ 65.925531][ T4193] loop1: detected capacity change from 0 to 1024 [ 65.927462][ T4195] loop2: detected capacity change from 0 to 1024 [ 65.938568][ T4192] hfsplus: xattr search failed [ 65.946658][ T4193] hfsplus: xattr search failed [ 65.948143][ T4188] hfsplus: xattr search failed [ 65.958232][ T4189] hfsplus: xattr search failed [ 65.974962][ T4179] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 66.002836][ T4195] hfsplus: xattr search failed [ 66.043797][ T4200] loop0: detected capacity change from 0 to 1024 [ 66.063282][ T4203] loop1: detected capacity change from 0 to 1024 [ 66.070036][ T4202] loop4: detected capacity change from 0 to 1024 [ 66.089056][ T4202] hfsplus: xattr search failed [ 66.094988][ T1322] ================================================================== [ 66.103166][ T1322] BUG: KASAN: slab-out-of-bounds in _copy_to_iter+0x6cd/0x12e0 [ 66.111168][ T1322] Write of size 2048 at addr ffff888113249000 by task kworker/u8:15/1322 [ 66.119696][ T1322] [ 66.121205][ T4207] loop2: detected capacity change from 0 to 1024 [ 66.122195][ T1322] CPU: 0 PID: 1322 Comm: kworker/u8:15 Not tainted 6.10.0-rc4-syzkaller #0 [ 66.137230][ T1322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 66.141128][ T4205] loop3: detected capacity change from 0 to 1024 [ 66.147271][ T1322] Workqueue: loop0 loop_workfn [ 66.147301][ T1322] Call Trace: [ 66.147306][ T1322] [ 66.147310][ T1322] dump_stack_lvl+0x108/0x280 [ 66.169737][ T1322] ? __pfx_dump_stack_lvl+0x10/0x10 [ 66.175026][ T1322] ? __pfx__printk+0x10/0x10 [ 66.179615][ T1322] ? lock_acquire+0xc2/0x3a0 [ 66.184294][ T1322] ? __pfx_lock_acquire+0x10/0x10 [ 66.189322][ T1322] ? __virt_addr_valid+0x141/0x260 [ 66.194521][ T1322] ? __virt_addr_valid+0x219/0x260 [ 66.199719][ T1322] print_report+0x169/0x550 [ 66.204269][ T1322] ? __virt_addr_valid+0x141/0x260 [ 66.209556][ T1322] ? __virt_addr_valid+0x219/0x260 [ 66.214686][ T1322] ? _copy_to_iter+0x6cd/0x12e0 [ 66.219548][ T1322] kasan_report+0x143/0x180 [ 66.222676][ T4203] hfsplus: xattr search failed [ 66.224045][ T1322] ? _copy_to_iter+0x6cd/0x12e0 [ 66.224064][ T1322] kasan_check_range+0x282/0x290 [ 66.224072][ T1322] ? _copy_to_iter+0x6cd/0x12e0 [ 66.224079][ T1322] __asan_memcpy+0x40/0x70 [ 66.224088][ T1322] _copy_to_iter+0x6cd/0x12e0 [ 66.224096][ T1322] ? __pfx__copy_to_iter+0x10/0x10 [ 66.224104][ T1322] ? __pfx_shmem_get_folio_gfp+0x10/0x10 [ 66.224113][ T1322] copy_page_to_iter+0xa4/0x250 [ 66.224120][ T1322] shmem_file_read_iter+0x4b4/0x8a0 [ 66.241998][ T4207] hfsplus: xattr search failed [ 66.243487][ T1322] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 66.243506][ T1322] ? __pfx_shmem_file_read_iter+0x10/0x10 [ 66.243517][ T1322] do_iter_readv_writev+0x46c/0x6a0 [ 66.243527][ T1322] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 66.249716][ T4205] hfsplus: xattr search failed [ 66.252611][ T1322] ? rw_verify_area+0x12b/0x4a0 [ 66.252628][ T1322] vfs_iter_read+0x11a/0x350 [ 66.252636][ T1322] loop_process_work+0xc0e/0x1f40 [ 66.252644][ T1322] ? __lock_acquire+0x5cd/0xc10 [ 66.326093][ T1322] ? __pfx_loop_process_work+0x10/0x10 [ 66.331555][ T1322] ? register_lock_class+0xfe/0x880 [ 66.336759][ T1322] ? __pfx_register_lock_class+0x10/0x10 [ 66.342435][ T1322] ? __lock_acquire+0x5cd/0xc10 [ 66.347289][ T1322] ? __pfx_lock_acquire+0x10/0x10 [ 66.352665][ T1322] ? do_raw_spin_unlock+0x13c/0x8b0 [ 66.357872][ T1322] ? kick_pool+0x70/0x590 [ 66.362235][ T1322] ? process_scheduled_works+0x855/0x1320 [ 66.367966][ T1322] process_scheduled_works+0x8cf/0x1320 [ 66.369733][ T4211] loop3: detected capacity change from 0 to 1024 [ 66.373716][ T1322] ? __pfx_process_scheduled_works+0x10/0x10 [ 66.373733][ T1322] ? assign_work+0x23f/0x350 [ 66.373741][ T1322] worker_thread+0x869/0xca0 [ 66.373754][ T1322] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 66.401917][ T1322] ? _raw_spin_unlock_irqrestore+0xcf/0x130 [ 66.408165][ T1322] ? __pfx_worker_thread+0x10/0x10 [ 66.413288][ T1322] kthread+0x268/0x2c0 [ 66.414664][ T4211] hfsplus: xattr search failed [ 66.417433][ T1322] ? __pfx_worker_thread+0x10/0x10 [ 66.417448][ T1322] ? __pfx_kthread+0x10/0x10 [ 66.417456][ T1322] ret_from_fork+0x32/0x60 [ 66.417463][ T1322] ? __pfx_kthread+0x10/0x10 [ 66.417469][ T1322] ret_from_fork_asm+0x1a/0x30 [ 66.417478][ T1322] [ 66.444235][ T4212] loop4: detected capacity change from 0 to 1024 [ 66.446104][ T1322] [ 66.446108][ T1322] Allocated by task 4200: [ 66.446113][ T1322] kasan_save_track+0x3f/0x80 [ 66.446124][ T1322] __kasan_kmalloc+0x98/0xb0 [ 66.446131][ T1322] __kmalloc_noprof+0x1d5/0x440 [ 66.446137][ T1322] hfsplus_read_wrapper+0x4b8/0x1110 [ 66.460550][ T4212] hfsplus: xattr search failed [ 66.462486][ T1322] hfsplus_fill_super+0x372/0x1970 [ 66.462500][ T1322] mount_bdev+0x1b4/0x280 [ 66.462508][ T1322] legacy_get_tree+0xe9/0x180 [ 66.462516][ T1322] vfs_get_tree+0x82/0x190 [ 66.462521][ T1322] do_new_mount+0x21e/0x9b0 [ 66.462528][ T1322] __se_sys_mount+0x242/0x2e0 [ 66.505365][ T4214] loop4: detected capacity change from 0 to 1024 [ 66.505601][ T1322] do_syscall_64+0x8d/0x170 [ 66.523722][ T4214] hfsplus: xattr search failed [ 66.525605][ T1322] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 66.525624][ T1322] [ 66.525627][ T1322] The buggy address belongs to the object at ffff888113249000 [ 66.525627][ T1322] which belongs to the cache kmalloc-512 of size 512 [ 66.525634][ T1322] The buggy address is located 0 bytes inside of [ 66.525634][ T1322] allocated 512-byte region [ffff888113249000, ffff888113249200) [ 66.525641][ T1322] [ 66.525643][ T1322] The buggy address belongs to the physical page: [ 66.525661][ T1322] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113248 [ 66.525672][ T1322] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.525678][ T1322] flags: 0x100000000000040(head|node=0|zone=2) [ 66.525688][ T1322] page_type: 0xffffefff(slab) [ 66.576738][ T4215] loop2: detected capacity change from 0 to 1024 [ 66.584798][ T1322] raw: 0100000000000040 ffff888100041c80 dead000000000100 dead000000000122 [ 66.584806][ T1322] raw: 0000000000000000 0000000000100010 00000001ffffefff 0000000000000000 [ 66.584812][ T1322] head: 0100000000000040 ffff888100041c80 dead000000000100 dead000000000122 [ 66.584817][ T1322] head: 0000000000000000 0000000000100010 00000001ffffefff 0000000000000000 [ 66.584823][ T1322] head: 0100000000000002 ffffea00044c9201 ffffffffffffffff 0000000000000000 [ 66.584829][ T1322] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 66.584833][ T1322] page dumped because: kasan: bad access detected [ 66.584849][ T1322] page_owner tracks the page as allocated [ 66.584852][ T1322] page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1, tgid 1 (swapper/0), ts 5920412120, free_ts 5914619785 [ 66.584866][ T1322] post_alloc_hook+0x10f/0x130 [ 66.584876][ T1322] get_page_from_freelist+0x3713/0x3820 [ 66.603234][ T4215] hfsplus: xattr search failed [ 66.604293][ T1322] __alloc_pages_noprof+0x256/0x670 [ 66.604308][ T1322] alloc_slab_page+0x5f/0x120 [ 66.604316][ T1322] allocate_slab+0x5d/0x290 [ 66.604321][ T1322] ___slab_alloc+0xa7f/0x11d0 [ 66.604326][ T1322] __kmalloc_noprof+0x25a/0x440 [ 66.604331][ T1322] tomoyo_init_log+0x19d0/0x1fe0 [ 66.604339][ T1322] tomoyo_write_log2+0x268/0x7b0 [ 66.604345][ T1322] tomoyo_supervisor+0x16c/0xfb0 [ 66.604350][ T1322] tomoyo_mount_permission+0x5f2/0x990 [ 66.604357][ T1322] security_sb_mount+0x4f/0xb0 [ 66.760086][ T1322] path_mount+0x7f/0xba0 [ 66.764412][ T1322] init_mount+0xbd/0x110 [ 66.768626][ T1322] do_mount_root+0xa3/0x210 [ 66.773119][ T1322] mount_root_generic+0x159/0x310 [ 66.778206][ T1322] page last free pid 1 tgid 1 stack trace: [ 66.784076][ T1322] free_unref_page+0xb58/0xc90 [ 66.788823][ T1322] stack_depot_save_flags+0x63b/0x6c0 [ 66.794290][ T1322] kasan_save_track+0x51/0x80 [ 66.798943][ T1322] __kasan_kmalloc+0x98/0xb0 [ 66.803500][ T1322] kmalloc_trace_noprof+0x19e/0x360 [ 66.808867][ T1322] alloc_super+0x54/0x8d0 [ 66.813175][ T1322] sget_fc+0x211/0x770 [ 66.817319][ T1322] get_tree_bdev+0x247/0x590 [ 66.821888][ T1322] vfs_get_tree+0x82/0x190 [ 66.826293][ T1322] do_new_mount+0x21e/0x9b0 [ 66.830778][ T1322] init_mount+0xbd/0x110 [ 66.835006][ T1322] do_mount_root+0xa3/0x210 [ 66.839602][ T1322] mount_root_generic+0x159/0x310 [ 66.844878][ T1322] prepare_namespace+0x61/0x90 [ 66.849627][ T1322] kernel_init_freeable+0x38f/0x4c0 [ 66.855100][ T1322] kernel_init+0x18/0x1b0 [ 66.859401][ T1322] [ 66.861711][ T1322] Memory state around the buggy address: [ 66.867341][ T1322] ffff888113249100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.875398][ T1322] ffff888113249180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.883520][ T1322] >ffff888113249200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.891602][ T1322] ^ [ 66.895677][ T1322] ffff888113249280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.903733][ T1322] ffff888113249300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.911782][ T1322] ================================================================== [ 66.920133][ T1322] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 66.927828][ T1322] Kernel Offset: disabled [ 66.932159][ T1322] Rebooting in 86400 seconds..