Warning: Permanently added '10.128.1.54' (ECDSA) to the list of known hosts.
executing program
[   64.702218][   T22] audit: type=1400 audit(1673853803.320:73): avc:  denied  { execmem } for  pid=298 comm="syz-executor765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   64.721900][   T22] audit: type=1400 audit(1673853803.330:74): avc:  denied  { read write } for  pid=298 comm="syz-executor765" name="loop0" dev="devtmpfs" ino=1152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[   64.746290][   T22] audit: type=1400 audit(1673853803.330:75): avc:  denied  { open } for  pid=298 comm="syz-executor765" path="/dev/loop0" dev="devtmpfs" ino=1152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[   64.765389][  T301] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue
[   64.770466][   T22] audit: type=1400 audit(1673853803.330:76): avc:  denied  { ioctl } for  pid=298 comm="syz-executor765" path="/dev/loop0" dev="devtmpfs" ino=1152 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[   64.804842][   T22] audit: type=1400 audit(1673853803.350:77): avc:  denied  { mounton } for  pid=299 comm="syz-executor765" path="/root/file0" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1
[   64.827597][   T22] audit: type=1400 audit(1673853803.400:78): avc:  denied  { mount } for  pid=299 comm="syz-executor765" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[   64.849388][   T22] audit: type=1400 audit(1673853803.420:79): avc:  denied  { write } for  pid=299 comm="syz-executor765" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1
[   64.871185][   T22] audit: type=1400 audit(1673853803.420:80): avc:  denied  { add_name } for  pid=299 comm="syz-executor765" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1
write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory
[   64.891859][   T22] audit: type=1400 audit(1673853803.420:81): avc:  denied  { create } for  pid=299 comm="syz-executor765" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1
[   64.912094][   T22] audit: type=1400 audit(1673853803.420:82): avc:  denied  { write open } for  pid=299 comm="syz-executor765" path="/root/file0/bus" dev="loop0" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1
[   64.956745][  T118] ==================================================================
[   64.964814][  T118] BUG: KASAN: use-after-free in get_max_inline_xattr_value_size+0x373/0x510
[   64.973451][  T118] Read of size 4 at addr ffff8881ddd0c084 by task kworker/0:2/118
[   64.981212][  T118] 
[   64.983514][  T118] CPU: 0 PID: 118 Comm: kworker/0:2 Not tainted 5.4.219-syzkaller-00002-ga0eae55f26a0 #0
[   64.994141][  T118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
[   65.004169][  T118] Workqueue: events p9_write_work
[   65.009254][  T118] Call Trace:
[   65.012528][  T118]  dump_stack+0x1d8/0x241
[   65.016823][  T118]  ? nf_ct_l4proto_log_invalid+0x26c/0x26c
[   65.022595][  T118]  ? printk+0xcf/0x10f
[   65.026631][  T118]  ? get_max_inline_xattr_value_size+0x373/0x510
[   65.033010][  T118]  ? vprintk_emit+0x437/0x4a0
[   65.037657][  T118]  ? get_max_inline_xattr_value_size+0x373/0x510
[   65.043953][  T118]  print_address_description+0x8c/0x630
[   65.049463][  T118]  ? panic+0x73e/0x73e
[   65.053865][  T118]  ? get_max_inline_xattr_value_size+0x373/0x510
[   65.060165][  T118]  __kasan_report+0xf6/0x130
[   65.064726][  T118]  ? get_max_inline_xattr_value_size+0x373/0x510
[   65.071025][  T118]  kasan_report+0x30/0x60
[   65.075324][  T118]  get_max_inline_xattr_value_size+0x373/0x510
[   65.081447][  T118]  ext4_get_max_inline_size+0x139/0x1f0
[   65.086960][  T118]  ? asan.module_dtor+0x20/0x20
[   65.091776][  T118]  ext4_try_to_write_inline_data+0xd9/0x1750
[   65.097734][  T118]  ? xas_load+0x4d1/0x530
[   65.102037][  T118]  ? find_get_entry+0x54a/0x5e0
[   65.106879][  T118]  ? mark_page_accessed+0x295/0x620
[   65.112074][  T118]  ? PageUptodate+0xc0/0xc0
[   65.116547][  T118]  ? ext4_writepage_trans_blocks+0x506/0x620
[   65.122505][  T118]  ext4_write_begin+0x247/0x1d50
[   65.127409][  T118]  ? write_boundary_block+0x150/0x150
[   65.132747][  T118]  ? _raw_spin_lock_irqsave+0xf8/0x210
[   65.138176][  T118]  ? ext4_readpages+0x110/0x110
[   65.142993][  T118]  ? from_kprojid+0x1b0/0x740
[   65.147635][  T118]  ? __getblk_gfp+0x3a/0x740
[   65.152190][  T118]  ? lock_page_memcg+0x6a/0x130
[   65.157006][  T118]  ? mark_buffer_dirty+0x1fb/0x360
[   65.162087][  T118]  ? __ext4_handle_dirty_metadata+0x27d/0x620
[   65.168118][  T118]  ? ext4_mark_iloc_dirty+0x24af/0x3440
[   65.173630][  T118]  ext4_da_write_begin+0x4a8/0xf80
[   65.178712][  T118]  ? ext4_chunk_trans_blocks+0x2a0/0x2a0
[   65.184394][  T118]  ? ext4_set_page_dirty+0x1a0/0x1a0
[   65.189642][  T118]  ? ext4_reserve_inode_write+0x19c/0x220
[   65.195329][  T118]  ? ext4_mark_inode_dirty+0x4ca/0x780
[   65.200754][  T118]  ? ext4_blocks_for_truncate+0x220/0x220
[   65.206444][  T118]  ? find_next_and_bit+0x15c/0x1a0
[   65.211518][  T118]  ? cpumask_next_and+0x11/0x30
[   65.216333][  T118]  ? iov_iter_fault_in_readable+0x256/0x4d0
[   65.222192][  T118]  ? asan.module_dtor+0x20/0x20
[   65.227020][  T118]  ? __ext4_journal_start_sb+0x290/0x440
[   65.232616][  T118]  generic_perform_write+0x2f9/0x5a0
[   65.237866][  T118]  ? __mark_inode_dirty+0x126/0x9f0
[   65.243031][  T118]  ? grab_cache_page_write_begin+0x90/0x90
[   65.248803][  T118]  ? file_remove_privs+0x640/0x640
[   65.253879][  T118]  ? down_write_trylock+0xd8/0x130
[   65.258960][  T118]  __generic_file_write_iter+0x239/0x490
[   65.264560][  T118]  ext4_file_write_iter+0x495/0x10e0
[   65.269812][  T118]  ? ext4_file_read_iter+0x140/0x140
[   65.275063][  T118]  ? avc_has_perm+0x16d/0x260
[   65.279703][  T118]  ? avc_has_perm_noaudit+0x400/0x400
[   65.285044][  T118]  ? iov_iter_init+0x83/0x160
[   65.289691][  T118]  __vfs_write+0x5e3/0x780
[   65.294075][  T118]  ? __kernel_write+0x340/0x340
[   65.298896][  T118]  ? check_preemption_disabled+0x9e/0x330
[   65.304588][  T118]  ? debug_smp_processor_id+0x20/0x20
[   65.309939][  T118]  ? selinux_file_permission+0x3f2/0x530
[   65.315538][  T118]  vfs_write+0x210/0x4f0
[   65.319748][  T118]  kernel_write+0xa3/0xf0
[   65.324047][  T118]  p9_write_work+0x598/0xce0
[   65.328616][  T118]  process_one_work+0x6ca/0xc40
[   65.333438][  T118]  worker_thread+0xae0/0x1440
[   65.338081][  T118]  ? _raw_spin_lock+0x1b0/0x1b0
[   65.342895][  T118]  ? is_mmconf_reserved+0x420/0x420
[   65.348060][  T118]  ? __wake_up_locked+0xc2/0x120
[   65.352961][  T118]  kthread+0x2d8/0x360
[   65.357001][  T118]  ? worker_clr_flags+0x170/0x170
[   65.361995][  T118]  ? kthread_destroy_worker+0x280/0x280
[   65.367512][  T118]  ret_from_fork+0x1f/0x30
[   65.371891][  T118] 
[   65.374187][  T118] Allocated by task 300:
[   65.378395][  T118]  __kasan_kmalloc+0x131/0x1e0
[   65.383122][  T118]  kmem_cache_alloc+0xd0/0x210
[   65.387848][  T118]  mempool_alloc+0x135/0x530
[   65.392404][  T118]  bio_alloc_bioset+0x1db/0x640
[   65.397217][  T118]  do_mpage_readpage+0x1459/0x1ad0
[   65.402299][  T118]  mpage_readpages+0x39b/0x510
[   65.407027][  T118]  read_pages+0x117/0x410
[   65.411320][  T118]  __do_page_cache_readahead+0x4c1/0x570
[   65.416914][  T118]  page_cache_sync_readahead+0x339/0x3b0
[   65.422509][  T118]  generic_file_read_iter+0x5e1/0x2180
[   65.427930][  T118]  blkdev_read_iter+0x12a/0x180
[   65.432753][  T118]  __vfs_read+0x5e0/0x760
[   65.437052][  T118]  vfs_read+0x166/0x370
[   65.441174][  T118]  ksys_read+0x198/0x2c0
[   65.445382][  T118]  do_syscall_64+0xcb/0x1c0
[   65.449849][  T118]  entry_SYSCALL_64_after_hwframe+0x5c/0xc1
[   65.455702][  T118] 
[   65.458007][  T118] Freed by task 9:
[   65.461719][  T118]  __kasan_slab_free+0x178/0x240
[   65.466629][  T118]  slab_free_freelist_hook+0x80/0x150
[   65.471967][  T118]  kmem_cache_free+0xa9/0x1d0
[   65.476634][  T118]  blk_update_request+0x327/0xd90
[   65.481628][  T118]  blk_mq_end_request+0x39/0x70
[   65.486443][  T118]  blk_done_softirq+0x2f2/0x370
[   65.491258][  T118]  __do_softirq+0x23e/0x643
[   65.495721][  T118] 
[   65.498032][  T118] The buggy address belongs to the object at ffff8881ddd0c000
[   65.498032][  T118]  which belongs to the cache bio-0 of size 200
[   65.511623][  T118] The buggy address is located 132 bytes inside of
[   65.511623][  T118]  200-byte region [ffff8881ddd0c000, ffff8881ddd0c0c8)
[   65.524862][  T118] The buggy address belongs to the page:
[   65.530468][  T118] page:ffffea0007774300 refcount:1 mapcount:0 mapping:ffff8881f33e6f00 index:0x0
[   65.539538][  T118] flags: 0x8000000000000200(slab)
[   65.544535][  T118] raw: 8000000000000200 dead000000000100 dead000000000122 ffff8881f33e6f00
[   65.553093][  T118] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000
[   65.561646][  T118] page dumped because: kasan: bad access detected
[   65.568021][  T118] page_owner tracks the page as allocated
[   65.573710][  T118] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x92880(GFP_NOWAIT|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_NOMEMALLOC)
[   65.587905][  T118]  prep_new_page+0x194/0x380
[   65.592466][  T118]  get_page_from_freelist+0x524/0x560
[   65.597817][  T118]  __alloc_pages_nodemask+0x372/0x860
[   65.603339][  T118]  alloc_slab_page+0x39/0x3e0
[   65.607987][  T118]  new_slab+0x97/0x450
[   65.612022][  T118]  ___slab_alloc+0x320/0x4a0
[   65.616577][  T118]  __slab_alloc+0x5a/0x90
[   65.620871][  T118]  kmem_cache_alloc+0x100/0x210
[   65.625685][  T118]  mempool_alloc+0x135/0x530
[   65.630242][  T118]  bio_alloc_bioset+0x1db/0x640
[   65.635058][  T118]  do_mpage_readpage+0x1459/0x1ad0
[   65.640131][  T118]  mpage_readpages+0x39b/0x510
[   65.644858][  T118]  read_pages+0x117/0x410
[   65.649153][  T118]  __do_page_cache_readahead+0x4c1/0x570
[   65.654925][  T118]  page_cache_sync_readahead+0x339/0x3b0
[   65.660522][  T118]  generic_file_read_iter+0x5e1/0x2180
[   65.665941][  T118] page_owner free stack trace missing
[   65.671279][  T118] 
[   65.673627][  T118] Memory state around the buggy address:
[   65.679232][  T118]  ffff8881ddd0bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.687264][  T118]  ffff8881ddd0c000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.695400][  T118] >ffff8881ddd0c080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   65.703433][  T118]                    ^
executing program
[   65.707479][  T118]  ffff8881ddd0c100: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb
[   65.715514][  T118]  ffff8881ddd0c180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.723540][  T118] ==================================================================
[   65.731565][  T118] Disabling lock debugging due to kernel taint
[   65.737774][  T118] EXT4-fs error (device loop0): ext4_xattr_ibody_find:2196: inode #18: comm kworker/0:2: corrupted in-inode xattr
write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory
[   66.593592][   T12] cfg80211: failed to load regulatory.db