./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor948371931 <...> Warning: Permanently added '10.128.10.6' (ED25519) to the list of known hosts. execve("./syz-executor948371931", ["./syz-executor948371931"], 0x7ffd8492eb80 /* 10 vars */) = 0 brk(NULL) = 0x555555c28000 brk(0x555555c28d00) = 0x555555c28d00 arch_prctl(ARCH_SET_FS, 0x555555c28380) = 0 set_tid_address(0x555555c28650) = 5065 set_robust_list(0x555555c28660, 24) = 0 rseq(0x555555c28ca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor948371931", 4096) = 27 getrandom("\x74\x45\x8c\x88\x41\x6f\x6f\xd3", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555555c28d00 brk(0x555555c49d00) = 0x555555c49d00 brk(0x555555c4a000) = 0x555555c4a000 mprotect(0x7f4a41af5000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 unshare(CLONE_NEWPID) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 5066 attached , child_tidptr=0x555555c28650) = 5066 [pid 5066] set_robust_list(0x555555c28660, 24) = 0 [pid 5066] mount(NULL, "/sys/fs/fuse/connections", "fusectl", 0, NULL) = -1 EBUSY (Device or resource busy) [pid 5066] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 5066] setsid() = 1 [pid 5066] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0 [pid 5066] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0 [pid 5066] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0 [pid 5066] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0 [pid 5066] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0 [pid 5066] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0 [pid 5066] unshare(CLONE_NEWNS) = 0 [pid 5066] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0 [pid 5066] unshare(CLONE_NEWIPC) = 0 [pid 5066] unshare(CLONE_NEWCGROUP) = 0 [pid 5066] unshare(CLONE_NEWUTS) = 0 [pid 5066] unshare(CLONE_SYSVSEM) = 0 [pid 5066] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = 3 [pid 5066] write(3, "16777216", 8) = 8 [pid 5066] close(3) = 0 [pid 5066] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = 3 [pid 5066] write(3, "536870912", 9) = 9 [pid 5066] close(3) = 0 [pid 5066] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = 3 [pid 5066] write(3, "1024", 4) = 4 [pid 5066] close(3) = 0 [pid 5066] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = 3 [pid 5066] write(3, "8192", 4) = 4 [pid 5066] close(3) = 0 [pid 5066] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = 3 [pid 5066] write(3, "1024", 4) = 4 [pid 5066] close(3) = 0 [pid 5066] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = 3 [pid 5066] write(3, "1024", 4) = 4 [pid 5066] close(3) = 0 [pid 5066] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = 3 [pid 5066] write(3, "1024 1048576 500 1024", 21) = 21 [pid 5066] close(3) = 0 [pid 5066] getpid() = 1 [pid 5066] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1< [ 55.149302][ T1084] dump_stack_lvl+0x241/0x360 [ 55.153998][ T1084] ? __pfx_dump_stack_lvl+0x10/0x10 [ 55.159195][ T1084] ? __pfx__printk+0x10/0x10 [ 55.163791][ T1084] ? _printk+0xd5/0x120 [ 55.167944][ T1084] ? __virt_addr_valid+0x183/0x520 [ 55.173056][ T1084] ? __virt_addr_valid+0x183/0x520 [ 55.178162][ T1084] print_report+0x169/0x550 [ 55.182651][ T1084] ? __virt_addr_valid+0x183/0x520 [ 55.187749][ T1084] ? __virt_addr_valid+0x183/0x520 [ 55.192850][ T1084] ? __virt_addr_valid+0x44e/0x520 [ 55.197949][ T1084] ? __phys_addr+0xba/0x170 [ 55.202437][ T1084] ? copy_page_from_iter_atomic+0x9b9/0x1e80 [ 55.208402][ T1084] kasan_report+0x143/0x180 [ 55.212890][ T1084] ? copy_page_from_iter_atomic+0x9b9/0x1e80 [ 55.218859][ T1084] kasan_check_range+0x282/0x290 [ 55.223807][ T1084] ? copy_page_from_iter_atomic+0x9b9/0x1e80 [ 55.229810][ T1084] __asan_memcpy+0x29/0x70 [ 55.234254][ T1084] copy_page_from_iter_atomic+0x9b9/0x1e80 [ 55.240081][ T1084] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 55.246321][ T1084] ? shmem_write_begin+0x23f/0x4d0 [ 55.251444][ T1084] ? __pfx_shmem_write_begin+0x10/0x10 [ 55.256911][ T1084] ? fault_in_iov_iter_readable+0x236/0x280 [ 55.262825][ T1084] generic_perform_write+0x39b/0x640 [ 55.268191][ T1084] ? __pfx_generic_perform_write+0x10/0x10 [ 55.273977][ T1084] ? __pfx_generic_write_checks+0x10/0x10 [ 55.279689][ T1084] ? file_update_time+0x2a3/0x3e0 [ 55.284693][ T1084] shmem_file_write_iter+0xfc/0x120 [ 55.289879][ T1084] do_iter_readv_writev+0x5a4/0x800 [ 55.295064][ T1084] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 55.300876][ T1084] ? rcu_read_lock_any_held+0xb7/0x160 [ 55.306363][ T1084] vfs_iter_write+0x244/0x5d0 [ 55.311076][ T1084] loop_process_work+0x13a3/0x1e60 [ 55.316184][ T1084] ? mark_lock+0x9a/0x350 [ 55.320523][ T1084] ? __pfx_loop_process_work+0x10/0x10 [ 55.326098][ T1084] ? __pfx_lock_acquire+0x10/0x10 [ 55.331228][ T1084] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 55.337562][ T1084] ? process_scheduled_works+0x8e1/0x1730 [ 55.343283][ T1084] process_scheduled_works+0x9d7/0x1730 [ 55.348843][ T1084] ? __pfx_process_scheduled_works+0x10/0x10 [ 55.354817][ T1084] ? assign_work+0x364/0x3d0 [ 55.359427][ T1084] worker_thread+0x86d/0xd70 [ 55.364029][ T1084] ? __kthread_parkme+0x169/0x1d0 [ 55.369066][ T1084] ? __pfx_worker_thread+0x10/0x10 [ 55.374170][ T1084] kthread+0x2f0/0x390 [ 55.378233][ T1084] ? __pfx_worker_thread+0x10/0x10 [ 55.383330][ T1084] ? __pfx_kthread+0x10/0x10 [ 55.387919][ T1084] ret_from_fork+0x4b/0x80 [ 55.392331][ T1084] ? __pfx_kthread+0x10/0x10 [ 55.396918][ T1084] ret_from_fork_asm+0x1a/0x30 [ 55.401781][ T1084] [ 55.404791][ T1084] [ 55.407096][ T1084] Allocated by task 5066: [ 55.411424][ T1084] kasan_save_track+0x3f/0x80 [ 55.416092][ T1084] __kasan_kmalloc+0x98/0xb0 [ 55.420667][ T1084] __kmalloc+0x231/0x4a0 [ 55.425076][ T1084] hfsplus_read_wrapper+0x545/0x1340 [ 55.430355][ T1084] hfsplus_fill_super+0x38e/0x1ca0 [ 55.435471][ T1084] mount_bdev+0x20a/0x2d0 [ 55.439809][ T1084] legacy_get_tree+0xee/0x190 [ 55.444487][ T1084] vfs_get_tree+0x90/0x2a0 [ 55.448930][ T1084] do_new_mount+0x2be/0xb40 [ 55.453456][ T1084] __se_sys_mount+0x2d9/0x3c0 [ 55.458142][ T1084] do_syscall_64+0xfb/0x240 [ 55.462646][ T1084] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 55.468537][ T1084] [ 55.471543][ T1084] The buggy address belongs to the object at ffff888017f55c00 [ 55.471543][ T1084] which belongs to the cache kmalloc-512 of size 512 [ 55.485581][ T1084] The buggy address is located 0 bytes inside of [ 55.485581][ T1084] allocated 512-byte region [ffff888017f55c00, ffff888017f55e00) [ 55.499543][ T1084] [ 55.501850][ T1084] The buggy address belongs to the physical page: [ 55.508236][ T1084] page:ffffea00005fd500 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x17f54 [ 55.518374][ T1084] head:ffffea00005fd500 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 55.527299][ T1084] flags: 0xfff80000000840(slab|head|node=0|zone=1|lastcpupid=0xfff) [ 55.535263][ T1084] page_type: 0xffffffff() [ 55.539578][ T1084] raw: 00fff80000000840 ffff888014c41c80 dead000000000100 dead000000000122 [ 55.548230][ T1084] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 55.556804][ T1084] page dumped because: kasan: bad access detected [ 55.563201][ T1084] page_owner tracks the page as allocated [ 55.568897][ T1084] page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 4521, tgid 4521 (udevd), ts 22926487811, free_ts 20512257182 [ 55.589631][ T1084] post_alloc_hook+0x1ea/0x210 [ 55.594382][ T1084] get_page_from_freelist+0x33ea/0x3580 [ 55.599908][ T1084] __alloc_pages+0x256/0x6a0 [ 55.604477][ T1084] alloc_slab_page+0x5f/0x160 [ 55.609145][ T1084] new_slab+0x84/0x2f0 [ 55.613192][ T1084] ___slab_alloc+0xc73/0x1260 [ 55.617849][ T1084] kmalloc_trace+0x267/0x360 [ 55.622422][ T1084] kernfs_fop_open+0x3e4/0xcd0 [ 55.627168][ T1084] do_dentry_open+0x907/0x15a0 [ 55.631912][ T1084] path_openat+0x2860/0x3240 [ 55.636664][ T1084] do_filp_open+0x235/0x490 [ 55.641152][ T1084] do_sys_openat2+0x13e/0x1d0 [ 55.645834][ T1084] __x64_sys_openat+0x247/0x2a0 [ 55.650683][ T1084] do_syscall_64+0xfb/0x240 [ 55.655173][ T1084] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 55.661048][ T1084] page last free pid 4535 tgid 4535 stack trace: [ 55.667352][ T1084] free_unref_page_prepare+0x968/0xa90 [ 55.672799][ T1084] free_unref_page+0x37/0x3f0 [ 55.677460][ T1084] __put_partials+0xeb/0x130 [ 55.682031][ T1084] put_cpu_partial+0x17c/0x250 [ 55.686776][ T1084] __slab_free+0x2e8/0x3d0 [ 55.691179][ T1084] qlist_free_all+0x5e/0xc0 [ 55.695664][ T1084] kasan_quarantine_reduce+0x14f/0x170 [ 55.701107][ T1084] __kasan_slab_alloc+0x23/0x80 [ 55.706030][ T1084] __kmalloc+0x1e0/0x4a0 [ 55.710284][ T1084] kernfs_fop_write_iter+0x15b/0x500 [ 55.715562][ T1084] vfs_write+0xa84/0xcb0 [ 55.719791][ T1084] ksys_write+0x1a0/0x2c0 [ 55.724121][ T1084] do_syscall_64+0xfb/0x240 [ 55.728633][ T1084] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 55.734526][ T1084] [ 55.736841][ T1084] Memory state around the buggy address: [ 55.742460][ T1084] ffff888017f55d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.750508][ T1084] ffff888017f55d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.758554][ T1084] >ffff888017f55e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.766597][ T1084] ^ [ 55.770642][ T1084] ffff888017f55e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.778681][ T1084] ffff888017f55f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.786721][ T1084] ================================================================== [ 55.794943][ T1084] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 55.802138][ T1084] CPU: 0 PID: 1084 Comm: kworker/u8:6 Not tainted 6.8.0-rc4-next-20240214-syzkaller #0 [ 55.811758][ T1084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 55.821828][ T1084] Workqueue: loop0 loop_rootcg_workfn [ 55.827219][ T1084] Call Trace: [ 55.830601][ T1084] [ 55.833532][ T1084] dump_stack_lvl+0x241/0x360 [ 55.838215][ T1084] ? __pfx_dump_stack_lvl+0x10/0x10 [ 55.843415][ T1084] ? __pfx__printk+0x10/0x10 [ 55.848002][ T1084] ? vscnprintf+0x5d/0x90 [ 55.852333][ T1084] panic+0x349/0x860 [ 55.856228][ T1084] ? check_panic_on_warn+0x21/0xb0 [ 55.861424][ T1084] ? __pfx_panic+0x10/0x10 [ 55.865829][ T1084] ? mark_lock+0x9a/0x350 [ 55.870152][ T1084] ? _raw_spin_unlock_irqrestore+0xd8/0x140 [ 55.876041][ T1084] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 55.882018][ T1084] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 55.888354][ T1084] ? print_report+0x502/0x550 [ 55.893047][ T1084] check_panic_on_warn+0x86/0xb0 [ 55.897979][ T1084] ? copy_page_from_iter_atomic+0x9b9/0x1e80 [ 55.903955][ T1084] end_report+0x6e/0x140 [ 55.908193][ T1084] kasan_report+0x154/0x180 [ 55.912697][ T1084] ? copy_page_from_iter_atomic+0x9b9/0x1e80 [ 55.918677][ T1084] kasan_check_range+0x282/0x290 [ 55.923606][ T1084] ? copy_page_from_iter_atomic+0x9b9/0x1e80 [ 55.929580][ T1084] __asan_memcpy+0x29/0x70 [ 55.934076][ T1084] copy_page_from_iter_atomic+0x9b9/0x1e80 [ 55.939885][ T1084] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 55.946132][ T1084] ? shmem_write_begin+0x23f/0x4d0 [ 55.951267][ T1084] ? __pfx_shmem_write_begin+0x10/0x10 [ 55.956995][ T1084] ? fault_in_iov_iter_readable+0x236/0x280 [ 55.962899][ T1084] generic_perform_write+0x39b/0x640 [ 55.968385][ T1084] ? __pfx_generic_perform_write+0x10/0x10 [ 55.974196][ T1084] ? __pfx_generic_write_checks+0x10/0x10 [ 55.979914][ T1084] ? file_update_time+0x2a3/0x3e0 [ 55.984926][ T1084] shmem_file_write_iter+0xfc/0x120 [ 55.990147][ T1084] do_iter_readv_writev+0x5a4/0x800 [ 55.995377][ T1084] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 56.001101][ T1084] ? rcu_read_lock_any_held+0xb7/0x160 [ 56.006567][ T1084] vfs_iter_write+0x244/0x5d0 [ 56.011261][ T1084] loop_process_work+0x13a3/0x1e60 [ 56.016398][ T1084] ? mark_lock+0x9a/0x350 [ 56.020779][ T1084] ? __pfx_loop_process_work+0x10/0x10 [ 56.026508][ T1084] ? __pfx_lock_acquire+0x10/0x10 [ 56.031528][ T1084] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 56.037943][ T1084] ? process_scheduled_works+0x8e1/0x1730 [ 56.043678][ T1084] process_scheduled_works+0x9d7/0x1730 [ 56.049517][ T1084] ? __pfx_process_scheduled_works+0x10/0x10 [ 56.055507][ T1084] ? assign_work+0x364/0x3d0 [ 56.060097][ T1084] worker_thread+0x86d/0xd70 [ 56.064730][ T1084] ? __kthread_parkme+0x169/0x1d0 [ 56.069793][ T1084] ? __pfx_worker_thread+0x10/0x10 [ 56.074912][ T1084] kthread+0x2f0/0x390 [ 56.078993][ T1084] ? __pfx_worker_thread+0x10/0x10 [ 56.084272][ T1084] ? __pfx_kthread+0x10/0x10 [ 56.088857][ T1084] ret_from_fork+0x4b/0x80 [ 56.093265][ T1084] ? __pfx_kthread+0x10/0x10 [ 56.097849][ T1084] ret_from_fork_asm+0x1a/0x30 [ 56.102710][ T1084] [ 56.105925][ T1084] Kernel Offset: disabled [ 56.110235][ T1084] Rebooting in 86400 seconds..