program: syz_mount_image$nilfs2(&(0x7f0000000ec0), &(0x7f0000000f00)='./file0\x00', 0x3210052, &(0x7f0000000840)={[{}, {@nodiscard}, {@norecovery}, {@order_strict}, {@nobarrier}, {@order_strict}, {@nodiscard}, {@order_relaxed}], [], 0x2c}, 0x3, 0xee9, &(0x7f0000000f40)="$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") r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$unix(0x1, 0x5, 0x0) r2 = dup2(r1, r0) close_range(r2, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r5 = syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000000, &(0x7f0000000200)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x10}}, {@max_read={'max_read', 0x3d, 0x81ce}}, {@max_read={'max_read', 0x3d, 0x80}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions}, {@default_permissions}], [{@appraise_type}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@dont_appraise}, {@obj_role={'obj_role', 0x3d, 'barrier'}}, {@fsname={'fsname', 0x3d, '@-:]'}}]}}, 0x1, 0x0, &(0x7f0000000380)="87da355ec79c3e5efac4bc04c314e0d96fec18dab80dbd3d2d66") mknodat(r5, &(0x7f00000003c0)='./file0\x00', 0x200, 0x40) write$binfmt_script(r4, &(0x7f0000000180), 0xfea7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x7fff, 0xa, 0x1f, 0x0, "330b6c03d420f15151cef6b232771609d9a4e1b0e03231d53d1ec48c530f963dac56a61f4f6e8370c95f6d8753ea588d7e88ce9fa7ba2723772523b072d87fbd", "2f4c71a83bb556356f0abe4877e4f2ba004d091b444d18fb604de0bae0b87689", [0xbb41, 0xb6f]}) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r7, r6, 0x0, 0x100000002) [ 68.707831][ T5308] Bluetooth: hci0: command tx timeout [ 68.940953][ T5323] loop0: detected capacity change from 0 to 4096 [ 68.947822][ T5323] ======================================================= [ 68.947822][ T5323] WARNING: The mand mount option has been deprecated and [ 68.947822][ T5323] and is ignored by this kernel. Remove the mand [ 68.947822][ T5323] option from the mount to silence this warning. [ 68.947822][ T5323] ======================================================= [ 69.013301][ T5325] NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds [ 69.040989][ T5323] ================================================================== [ 69.054383][ T5323] BUG: KASAN: use-after-free in nilfs_find_entry+0x29c/0x660 [ 69.059174][ T5323] Read of size 2 at addr ffff88804c6e5008 by task syz.0.0/5323 [ 69.062259][ T5323] [ 69.063320][ T5323] CPU: 0 UID: 0 PID: 5323 Comm: syz.0.0 Not tainted 6.12.0-rc6-syzkaller-00169-g906bd684e4b1 #0 [ 69.069241][ T5323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 [ 69.074198][ T5323] Call Trace: [ 69.076108][ T5323] [ 69.077439][ T5323] dump_stack_lvl+0x241/0x360 [ 69.081237][ T5323] ? __pfx_dump_stack_lvl+0x10/0x10 [ 69.085359][ T5323] ? __pfx__printk+0x10/0x10 [ 69.089170][ T5323] ? _printk+0xd5/0x120 [ 69.091798][ T5323] ? __virt_addr_valid+0x183/0x530 [ 69.096826][ T5323] ? __virt_addr_valid+0x183/0x530 [ 69.100514][ T5323] print_report+0x169/0x550 [ 69.102544][ T5323] ? __virt_addr_valid+0x183/0x530 [ 69.104768][ T5323] ? __virt_addr_valid+0x183/0x530 [ 69.106570][ T5323] ? __virt_addr_valid+0x45f/0x530 [ 69.108360][ T5323] ? __phys_addr+0xba/0x170 [ 69.109975][ T5323] ? nilfs_find_entry+0x29c/0x660 [ 69.111835][ T5323] kasan_report+0x143/0x180 [ 69.113443][ T5323] ? nilfs_find_entry+0x29c/0x660 [ 69.115253][ T5323] nilfs_find_entry+0x29c/0x660 [ 69.117287][ T5323] nilfs_inode_by_name+0xad/0x240 [ 69.119588][ T5323] ? common_perm+0x18d/0x1f0 [ 69.123862][ T5323] ? __pfx_nilfs_inode_by_name+0x10/0x10 [ 69.130902][ T5323] ? apparmor_path_mknod+0x228/0x2e0 [ 69.160885][ T5323] nilfs_lookup+0xed/0x210 [ 69.162607][ T5323] ? generic_permission+0x1e0/0x550 [ 69.164705][ T5323] ? __pfx_nilfs_lookup+0x10/0x10 [ 69.166731][ T5323] ? inode_permission+0xff/0x460 [ 69.168653][ T5323] ? __pfx_nilfs_permission+0x10/0x10 [ 69.170749][ T5323] ? bpf_lsm_inode_create+0x9/0x10 [ 69.192829][ T5323] ? security_inode_create+0xbe/0x340 [ 69.194637][ T5323] ? __pfx_nilfs_lookup+0x10/0x10 [ 69.212613][ T5323] path_openat+0x11a7/0x3590 [ 69.214196][ T5323] ? __pfx_path_openat+0x10/0x10 [ 69.215908][ T5323] do_filp_open+0x235/0x490 [ 69.217453][ T5323] ? __pfx_do_filp_open+0x10/0x10 [ 69.219445][ T5323] ? _raw_spin_unlock+0x28/0x50 [ 69.221806][ T5323] ? alloc_fd+0x5a1/0x640 [ 69.224908][ T5323] do_sys_openat2+0x13e/0x1d0 [ 69.226894][ T5323] ? __might_fault+0xaa/0x120 [ 69.228495][ T5323] ? __pfx_do_sys_openat2+0x10/0x10 [ 69.244352][ T5323] ? rcu_is_watching+0x15/0xb0 [ 69.246015][ T5323] ? __rseq_handle_notify_resume+0x34d/0x14d0 [ 69.248092][ T5323] __x64_sys_openat+0x247/0x2a0 [ 69.249756][ T5323] ? __pfx___x64_sys_openat+0x10/0x10 [ 69.251572][ T5323] ? __secure_computing+0x125/0x370 [ 69.253311][ T5323] do_syscall_64+0xf3/0x230 [ 69.254870][ T5323] ? clear_bhb_loop+0x35/0x90 [ 69.256692][ T5323] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.274994][ T5323] RIP: 0033:0x7f6d4417e719 [ 69.277166][ T5323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.287073][ T5323] RSP: 002b:00007f6d45037038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 69.302334][ T5323] RAX: ffffffffffffffda RBX: 00007f6d44335f80 RCX: 00007f6d4417e719 [ 69.309246][ T5323] RDX: 000000000000275a RSI: 0000000020000080 RDI: ffffffffffffff9c [ 69.313140][ T5323] RBP: 00007f6d441f139e R08: 0000000000000000 R09: 0000000000000000 [ 69.316607][ T5323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 69.319726][ T5323] R13: 0000000000000000 R14: 00007f6d44335f80 R15: 00007fffd5ae3698 [ 69.322846][ T5323] [ 69.324091][ T5323] [ 69.325043][ T5323] The buggy address belongs to the physical page: [ 69.327546][ T5323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4c6e5 [ 69.347116][ T5323] flags: 0x4fff00000000000(node=1|zone=1|lastcpupid=0x7ff) [ 69.350488][ T5323] raw: 04fff00000000000 ffffea000131b988 ffff88801fc44cb0 0000000000000000 [ 69.368626][ T5323] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 69.372248][ T5323] page dumped because: kasan: bad access detected [ 69.374492][ T5323] page_owner info is not present (never set?) [ 69.376534][ T5323] [ 69.377358][ T5323] Memory state around the buggy address: [ 69.379339][ T5323] ffff88804c6e4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 69.390949][ T5323] ffff88804c6e4f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 69.396094][ T5323] >ffff88804c6e5000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.409553][ T5323] ^ [ 69.411279][ T5323] ffff88804c6e5080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.414344][ T5323] ffff88804c6e5100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.441412][ T5323] ================================================================== [ 69.479605][ T5323] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 69.492847][ T5323] CPU: 0 UID: 0 PID: 5323 Comm: syz.0.0 Not tainted 6.12.0-rc6-syzkaller-00169-g906bd684e4b1 #0 [ 69.496905][ T5323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 [ 69.507060][ T5323] Call Trace: [ 69.508567][ T5323] [ 69.509843][ T5323] dump_stack_lvl+0x241/0x360 [ 69.531597][ T5323] ? __pfx_dump_stack_lvl+0x10/0x10 [ 69.533723][ T5323] ? __pfx__printk+0x10/0x10 [ 69.535663][ T5323] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 69.538152][ T5323] ? vscnprintf+0x5d/0x90 [ 69.539971][ T5323] panic+0x349/0x880 [ 69.541662][ T5323] ? check_panic_on_warn+0x21/0xb0 [ 69.560127][ T5323] ? __pfx_panic+0x10/0x10 [ 69.562378][ T5323] ? _raw_spin_unlock_irqrestore+0x130/0x140 [ 69.564561][ T5323] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 69.566893][ T5323] check_panic_on_warn+0x86/0xb0 [ 69.568707][ T5323] ? nilfs_find_entry+0x29c/0x660 [ 69.570543][ T5323] end_report+0x77/0x160 [ 69.572133][ T5323] kasan_report+0x154/0x180 [ 69.573584][ T5323] ? nilfs_find_entry+0x29c/0x660 [ 69.575443][ T5323] nilfs_find_entry+0x29c/0x660 [ 69.577265][ T5323] nilfs_inode_by_name+0xad/0x240 [ 69.579116][ T5323] ? common_perm+0x18d/0x1f0 [ 69.580794][ T5323] ? __pfx_nilfs_inode_by_name+0x10/0x10 [ 69.582808][ T5323] ? apparmor_path_mknod+0x228/0x2e0 [ 69.584795][ T5323] nilfs_lookup+0xed/0x210 [ 69.586430][ T5323] ? generic_permission+0x1e0/0x550 [ 69.589098][ T5323] ? __pfx_nilfs_lookup+0x10/0x10 [ 69.592305][ T5323] ? inode_permission+0xff/0x460 [ 69.597106][ T5323] ? __pfx_nilfs_permission+0x10/0x10 [ 69.600683][ T5323] ? bpf_lsm_inode_create+0x9/0x10 [ 69.603306][ T5323] ? security_inode_create+0xbe/0x340 [ 69.606028][ T5323] ? __pfx_nilfs_lookup+0x10/0x10 [ 69.608565][ T5323] path_openat+0x11a7/0x3590 [ 69.612183][ T5323] ? __pfx_path_openat+0x10/0x10 [ 69.616499][ T5323] do_filp_open+0x235/0x490 [ 69.618482][ T5323] ? __pfx_do_filp_open+0x10/0x10 [ 69.620632][ T5323] ? _raw_spin_unlock+0x28/0x50 [ 69.622659][ T5323] ? alloc_fd+0x5a1/0x640 [ 69.624514][ T5323] do_sys_openat2+0x13e/0x1d0 [ 69.628862][ T5323] ? __might_fault+0xaa/0x120 [ 69.631989][ T5323] ? __pfx_do_sys_openat2+0x10/0x10 [ 69.634595][ T5323] ? rcu_is_watching+0x15/0xb0 [ 69.637021][ T5323] ? __rseq_handle_notify_resume+0x34d/0x14d0 [ 69.653993][ T5323] __x64_sys_openat+0x247/0x2a0 [ 69.655780][ T5323] ? __pfx___x64_sys_openat+0x10/0x10 [ 69.657684][ T5323] ? __secure_computing+0x125/0x370 [ 69.659750][ T5323] do_syscall_64+0xf3/0x230 [ 69.661909][ T5323] ? clear_bhb_loop+0x35/0x90 [ 69.664274][ T5323] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.667277][ T5323] RIP: 0033:0x7f6d4417e719 [ 69.669525][ T5323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.678719][ T5323] RSP: 002b:00007f6d45037038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 69.681643][ T5323] RAX: ffffffffffffffda RBX: 00007f6d44335f80 RCX: 00007f6d4417e719 [ 69.685855][ T5323] RDX: 000000000000275a RSI: 0000000020000080 RDI: ffffffffffffff9c [ 69.691370][ T5323] RBP: 00007f6d441f139e R08: 0000000000000000 R09: 0000000000000000 [ 69.695439][ T5323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 69.700212][ T5323] R13: 0000000000000000 R14: 00007f6d44335f80 R15: 00007fffd5ae3698 [ 69.706193][ T5323] [ 69.707968][ T5323] Kernel Offset: disabled [ 69.709936][ T5323] Rebooting in 86400 seconds..