./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1428208178 <...> Warning: Permanently added '10.128.0.240' (ED25519) to the list of known hosts. execve("./syz-executor1428208178", ["./syz-executor1428208178"], 0x7fff5f2c52a0 /* 10 vars */) = 0 brk(NULL) = 0x555573105000 brk(0x555573105d40) = 0x555573105d40 arch_prctl(ARCH_SET_FS, 0x5555731053c0) = 0 set_tid_address(0x555573105690) = 341 set_robust_list(0x5555731056a0, 24) = 0 rseq(0x555573105ce0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1428208178", 4096) = 28 getrandom("\x37\xcd\xfa\x47\x17\xf8\xd5\xa7", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555573105d40 brk(0x555573126d40) = 0x555573126d40 brk(0x555573127000) = 0x555573127000 mprotect(0x7f3e4c738000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18executing program ) = 18 futex(0x7f3e4c73e6cc, FUTEX_WAKE_PRIVATE, 1000000) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f3e4c6dd3c0, sa_mask=[], sa_flags=SA_RESTORER|SA_ONSTACK|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f3e4c6cea70}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f3e4c655000 mprotect(0x7f3e4c656000, 131072, PROT_READ|PROT_WRITE) = 0 rt_sigprocmask(SIG_BLOCK, ~[], [], 8) = 0 clone3({flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, child_tid=0x7f3e4c675990, parent_tid=0x7f3e4c675990, exit_signal=0, stack=0x7f3e4c655000, stack_size=0x20300, tls=0x7f3e4c6756c0}./strace-static-x86_64: Process 342 attached => {parent_tid=[342]}, 88) = 342 [pid 342] set_robust_list(0x7f3e4c6759a0, 24) = 0 [pid 342] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 342] futex(0x7f3e4c73e6c8, FUTEX_WAIT_PRIVATE, 0, NULL [pid 341] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 341] futex(0x7f3e4c73e6c8, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 342] <... futex resumed>) = 0 [pid 342] getrandom( [ 25.220412][ T23] audit: type=1400 audit(1747948855.320:81): avc: denied { execmem } for pid=341 comm="syz-executor142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [pid 341] futex(0x7f3e4c73e6cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}) = -1 ETIMEDOUT (Connection timed out) [pid 341] futex(0x7f3e4c73e6cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=0}) = -1 ETIMEDOUT (Connection timed out) [pid 341] futex(0x7f3e4c73e6dc, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 341] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f3e4c634000 [pid 341] mprotect(0x7f3e4c635000, 131072, PROT_READ|PROT_WRITE) = 0 [pid 341] rt_sigprocmask(SIG_BLOCK, ~[], [], 8) = 0 [pid 341] clone3({flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, child_tid=0x7f3e4c654990, parent_tid=0x7f3e4c654990, exit_signal=0, stack=0x7f3e4c634000, stack_size=0x20300, tls=0x7f3e4c6546c0}./strace-static-x86_64: Process 343 attached => {parent_tid=[343]}, 88) = 343 [pid 343] set_robust_list(0x7f3e4c6549a0, 24 [pid 341] rt_sigprocmask(SIG_SETMASK, [], [pid 343] <... set_robust_list resumed>) = 0 [pid 341] <... rt_sigprocmask resumed>NULL, 8) = 0 [pid 343] rt_sigprocmask(SIG_SETMASK, [], [pid 341] futex(0x7f3e4c73e6d8, FUTEX_WAKE_PRIVATE, 1000000 [pid 343] <... rt_sigprocmask resumed>NULL, 8) = 0 [pid 341] <... futex resumed>) = 0 [pid 341] futex(0x7f3e4c73e6dc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=4, tv_nsec=50000000} [pid 343] memfd_create("syzkaller", 0) = 3 [pid 343] mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3e44234000 [pid 343] write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 262144) = 262144 [pid 343] munmap(0x7f3e44234000, 138412032) = 0 [pid 343] openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 [ 25.304544][ T23] audit: type=1400 audit(1747948855.400:82): avc: denied { read write } for pid=341 comm="syz-executor142" name="loop0" dev="devtmpfs" ino=1176 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 25.328953][ T23] audit: type=1400 audit(1747948855.400:83): avc: denied { open } for pid=341 comm="syz-executor142" path="/dev/loop0" dev="devtmpfs" ino=1176 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [pid 343] ioctl(4, LOOP_SET_FD, 3) = 0 [pid 343] close(3) = 0 [ 25.353589][ T23] audit: type=1400 audit(1747948855.450:84): avc: denied { ioctl } for pid=341 comm="syz-executor142" path="/dev/loop0" dev="devtmpfs" ino=1176 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [pid 343] close(4) = 0 [pid 343] mkdir("./file1", 0777 [pid 342] <... getrandom resumed>"\x18\xc7\x3a\xa3\x9a\xee\x9e\x31\x86\xf7\xbd\x9b\xb7\xf4\x43\x33\x96\x15\xaf\x62\x81\xb6\x92\xb1\x0c\xb3\x6a\xf9\xc9\x97\x55\xb4\xfd\x06\xf9\xf2\x77\xa2\x17\xff\x68\x1e\xa8\x4a\x40\xa1\x3d\xfe\x95\x40\x11\x60\x5f\xf4\x44\xf5\x50\x50\xeb\x06\x70\x1f\x74\x83\x98\x7c\x74\x32\xa1\x24\x31\x05\x1b\x18\x8b\x32\x7f\xc7\x73\xb4\xac\x90\x50\xdc\xc3\x67\xe9\x2b\xf1\x21\x83\x5b\x1c\x17\x47\x2d\x3c\x4a\x1f\x94"..., 4294967194, 0) = 16776640 [pid 342] futex(0x7f3e4c73e6cc, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 342] futex(0x7f3e4c73e6c8, FUTEX_WAIT_PRIVATE, 0, NULL [pid 343] <... mkdir resumed>) = 0 [ 25.480617][ T343] ====================================================== [ 25.480617][ T343] WARNING: the mand mount option is being deprecated and [ 25.480617][ T343] will be removed in v5.15! [ 25.480617][ T343] ====================================================== [ 25.480646][ T23] audit: type=1400 audit(1747948855.580:85): avc: denied { mounton } for pid=341 comm="syz-executor142" path="/root/file1" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 25.548430][ T343] [EXT4 FS bs=4096, gc=1, bpg=71, ipg=32, mo=e80ec028, mo2=0000] [ 25.556201][ T343] System zones: 0-2, 18-18, 34-34 [ 25.562757][ T343] EXT4-fs (loop0): 1 orphan inode deleted [ 25.568535][ T343] EXT4-fs (loop0): mounted filesystem without journal. Opts: errors=remount-ro,dioread_lock,noquota,init_itable,debug,resgid=0x0000000000000000,sysvgroups,discard,usrquota, [pid 343] mount("/dev/loop0", "./file1", "ext4", MS_MANDLOCK|MS_REC|MS_LAZYTIME, "errors=remount-ro,dioread_lock,noquota,init_itable,debug,resgid=0x0000000000000000,sysvgroups,discar"...) = 0 [pid 343] openat(AT_FDCWD, "./file1", O_RDONLY|O_DIRECTORY) = 3 [pid 343] chdir("./file1") = 0 [pid 343] openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 [pid 343] ioctl(4, LOOP_CLR_FD) = 0 [pid 343] close(4) = 0 [pid 343] futex(0x7f3e4c73e6dc, FUTEX_WAKE_PRIVATE, 1000000 [pid 341] <... futex resumed>) = 0 [pid 343] <... futex resumed>) = 1 [pid 341] futex(0x7f3e4c73e6c8, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 342] <... futex resumed>) = 0 [pid 341] futex(0x7f3e4c73e6cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 342] openat(AT_FDCWD, "hugetlb.2MB.usage_in_bytes", O_RDWR|O_CREAT|O_NOCTTY|O_TRUNC|O_APPEND|FASYNC|0x18, 000 [pid 343] futex(0x7f3e4c73e6d8, FUTEX_WAIT_PRIVATE, 0, NULL [pid 342] <... openat resumed>) = 4 [pid 342] futex(0x7f3e4c73e6cc, FUTEX_WAKE_PRIVATE, 1000000 [pid 341] <... futex resumed>) = 0 [pid 342] <... futex resumed>) = 1 [pid 341] futex(0x7f3e4c73e6c8, FUTEX_WAKE_PRIVATE, 1000000 [pid 342] write(4, "\x23\x21\x20\x0a\x9a\xee\x9e\x31\x86\xf7\xbd\x9b\xb7\xf4\x43\x33\x96\x15\xaf\x62\x81\xb6\x92\xb1\x0c\xb3\x6a\xf9\xc9\x97\x55\xb4\xfd\x06\xf9\xf2\x77\xa2\x17\xff\x68\x1e\xa8\x4a\x40\xa1\x3d\xfe\x95\x40\x11\x60\x5f\xf4\x44\xf5\x50\x50\xeb\x06\x70\x1f\x74\x83\x98\x7c\x74\x32\xa1\x24\x31\x05\x1b\x18\x8b\x32\x7f\xc7\x73\xb4\xac\x90\x50\xdc\xc3\x67\xe9\x2b\xf1\x21\x83\x5b\x1c\x17\x47\x2d\x3c\x4a\x1f\x94"..., 34136651 [pid 341] <... futex resumed>) = 0 [pid 342] <... write resumed>) = 167936 [pid 341] futex(0x7f3e4c73e6cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 342] futex(0x7f3e4c73e6cc, FUTEX_WAKE_PRIVATE, 1000000 [pid 341] <... futex resumed>) = 0 [pid 341] futex(0x7f3e4c73e6c8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 341] futex(0x7f3e4c73e6cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 342] <... futex resumed>) = 1 [pid 342] creat("./bus", 000) = 5 [pid 342] futex(0x7f3e4c73e6cc, FUTEX_WAKE_PRIVATE, 1000000 [pid 341] <... futex resumed>) = 0 [pid 341] futex(0x7f3e4c73e6c8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 341] futex(0x7f3e4c73e6cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 342] <... futex resumed>) = 1 [pid 342] mount("/dev/loop0", "./bus", NULL, MS_BIND, NULL) = 0 [pid 342] futex(0x7f3e4c73e6cc, FUTEX_WAKE_PRIVATE, 1000000 [pid 341] <... futex resumed>) = 0 [pid 341] futex(0x7f3e4c73e6c8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 341] futex(0x7f3e4c73e6cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 342] <... futex resumed>) = 1 [pid 342] open("./bus", O_RDWR|O_NOCTTY|O_SYNC|O_NOATIME|0x3c) = 6 [pid 342] futex(0x7f3e4c73e6cc, FUTEX_WAKE_PRIVATE, 1000000 [pid 341] <... futex resumed>) = 0 [pid 341] futex(0x7f3e4c73e6c8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 341] futex(0x7f3e4c73e6cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 342] <... futex resumed>) = 1 [pid 342] write(6, "\x23\x21\x20\x0a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x65\x72\x72\x6f\x72\x73\x3d\x72\x65\x6d\x6f\x75\x6e\x74\x2d\x72\x6f\x2c\x64\x69\x6f\x72\x65\x61\x64\x5f\x6c\x6f\x63\x6b\x2c\x6e\x6f\x71\x75\x6f"..., 34136651) = 262144 [pid 342] futex(0x7f3e4c73e6cc, FUTEX_WAKE_PRIVATE, 1000000 [pid 341] <... futex resumed>) = 0 [pid 341] futex(0x7f3e4c73e6c8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 341] futex(0x7f3e4c73e6cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 342] <... futex resumed>) = 1 [ 25.585971][ T23] audit: type=1400 audit(1747948855.680:86): avc: denied { mount } for pid=341 comm="syz-executor142" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 25.585995][ T343] ext4 filesystem being mounted at /root/file1 supports timestamps until (%ptR?) (0x7fffffff) [ 25.626029][ T23] audit: type=1400 audit(1747948855.720:87): avc: denied { write } for pid=341 comm="syz-executor142" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [pid 342] mmap(0x200000000000, 11755520, PROT_READ|PROT_WRITE|PROT_SEM|PROT_GROWSUP|0x800000, MAP_SHARED|MAP_FIXED|MAP_POPULATE|MAP_STACK, 4, 0) = 0x200000000000 [pid 342] futex(0x7f3e4c73e6cc, FUTEX_WAKE_PRIVATE, 1000000 [pid 341] <... futex resumed>) = 0 [pid 341] futex(0x7f3e4c73e6c8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 341] futex(0x7f3e4c73e6cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 342] <... futex resumed>) = 1 [ 25.648497][ T23] audit: type=1400 audit(1747948855.720:88): avc: denied { add_name } for pid=341 comm="syz-executor142" name="hugetlb.2MB.usage_in_bytes" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 25.669196][ T342] ================================================================== [ 25.671512][ T23] audit: type=1400 audit(1747948855.720:89): avc: denied { create } for pid=341 comm="syz-executor142" name="hugetlb.2MB.usage_in_bytes" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 25.679320][ T342] BUG: KASAN: use-after-free in ext4_find_extent+0xc0e/0xe00 [ 25.679337][ T342] Read of size 4 at addr ffff8881d8cbedf0 by task syz-executor142/342 [ 25.701564][ T23] audit: type=1400 audit(1747948855.720:90): avc: denied { read append open } for pid=341 comm="syz-executor142" path="/root/file1/hugetlb.2MB.usage_in_bytes" dev="loop0" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 25.708868][ T342] [ 25.708899][ T342] CPU: 1 PID: 342 Comm: syz-executor142 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 25.755425][ T342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 25.765470][ T342] Call Trace: [ 25.768745][ T342] __dump_stack+0x1e/0x20 [ 25.773068][ T342] dump_stack+0x15b/0x1b8 [ 25.777387][ T342] ? show_regs_print_info+0x18/0x18 [ 25.782647][ T342] ? vprintk_func+0x19a/0x1e0 [ 25.787302][ T342] ? printk+0xcc/0x110 [ 25.791352][ T342] ? ext4_find_extent+0xc0e/0xe00 [ 25.796361][ T342] print_address_description+0x8d/0x4c0 [ 25.801905][ T342] ? thaw_kernel_threads+0x220/0x220 [ 25.807168][ T342] ? ext4_find_extent+0xc0e/0xe00 [ 25.812170][ T342] __kasan_report+0xef/0x120 [ 25.816733][ T342] ? ext4_find_extent+0xc0e/0xe00 [ 25.821743][ T342] kasan_report+0x30/0x60 [ 25.826070][ T342] __asan_report_load4_noabort+0x14/0x20 [ 25.831686][ T342] ext4_find_extent+0xc0e/0xe00 [ 25.836532][ T342] ext4_ext_remove_space+0x2de/0x5850 [ 25.841897][ T342] ? slab_free_freelist_hook+0xb7/0x180 [ 25.847426][ T342] ? ext4_es_free_extent+0x3cd/0x4b0 [ 25.852692][ T342] ? kmem_cache_free+0x10c/0x2c0 [ 25.857630][ T342] ? ext4_ext_index_trans_blocks+0x120/0x120 [ 25.863586][ T342] ? ext4_es_remove_extent+0x147/0x2c0 [ 25.869026][ T342] ext4_punch_hole+0x6b4/0xae0 [ 25.873771][ T342] ext4_fallocate+0x25d/0x540 [ 25.878447][ T342] vfs_fallocate+0x587/0x700 [ 25.883033][ T342] do_madvise+0xd44/0x1ea0 [ 25.887559][ T342] ? _raw_spin_unlock_irq+0x4e/0x70 [ 25.892775][ T342] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 25.898570][ T342] ? asan.module_dtor+0x20/0x20 [ 25.903417][ T342] ? _raw_spin_lock_irq+0x8f/0xe0 [ 25.908430][ T342] ? __kasan_check_write+0x14/0x20 [ 25.913525][ T342] ? _raw_spin_lock_irq+0x8f/0xe0 [ 25.918540][ T342] ? _raw_spin_lock_irqsave+0x110/0x110 [ 25.924066][ T342] ? _raw_spin_unlock_irq+0x4e/0x70 [ 25.929366][ T342] ? cgroup_leave_frozen+0x160/0x2a0 [ 25.934649][ T342] ? ptrace_stop+0x52c/0x9d0 [ 25.939239][ T342] ? ptrace_stop+0x6a7/0x9d0 [ 25.943821][ T342] ? _raw_spin_unlock_irq+0x4e/0x70 [ 25.949001][ T342] ? ptrace_notify+0x1c4/0x250 [ 25.953751][ T342] ? ptrace_stop+0x52c/0x9d0 [ 25.958326][ T342] ? do_notify_parent+0x7e0/0x7e0 [ 25.963433][ T342] ? check_preemption_disabled+0x118/0x300 [ 25.969243][ T342] ? debug_smp_processor_id+0x20/0x20 [ 25.974601][ T342] ? __kasan_check_read+0x11/0x20 [ 25.979614][ T342] ? syscall_trace_enter+0x56f/0x7d0 [ 25.984885][ T342] ? fput+0x1a/0x20 [ 25.988678][ T342] ? __kasan_check_read+0x11/0x20 [ 25.993686][ T342] __x64_sys_madvise+0xa9/0xc0 [ 25.998433][ T342] do_syscall_64+0xcf/0x170 [ 26.002923][ T342] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 26.008810][ T342] RIP: 0033:0x7f3e4c6b7569 [ 26.013212][ T342] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 26.032802][ T342] RSP: 002b:00007f3e4c675218 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 26.041199][ T342] RAX: ffffffffffffffda RBX: 00007f3e4c73e6c8 RCX: 00007f3e4c6b7569 [ 26.049162][ T342] RDX: 0000000000000009 RSI: 0000000000600002 RDI: 0000200000000000 [ 26.057120][ T342] RBP: 00007f3e4c73e6c0 R08: 0000000000000000 R09: 0000000000000000 [ 26.065161][ T342] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3e4c70b554 [ 26.073119][ T342] R13: 0000200000000000 R14: 0000200000000180 R15: 0000200000000080 [ 26.081074][ T342] [ 26.083385][ T342] The buggy address belongs to the page: [ 26.089016][ T342] page:ffffea0007632f80 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 26.098141][ T342] flags: 0x8000000000000000() [ 26.102807][ T342] raw: 8000000000000000 ffffea0007632f88 ffffea0007632f88 0000000000000000 [ 26.111406][ T342] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 26.119971][ T342] page dumped because: kasan: bad access detected [ 26.126387][ T342] page_owner info is not present (never set?) [ 26.132430][ T342] [ 26.134747][ T342] Memory state around the buggy address: [ 26.140363][ T342] ffff8881d8cbec80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.148408][ T342] ffff8881d8cbed00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.156454][ T342] >ffff8881d8cbed80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.164496][ T342] ^ [ 26.172217][ T342] ffff8881d8cbee00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.180262][ T342] ffff8881d8cbee80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.188302][ T342] ================================================================== [pid 342] madvise(0x200000000000, 6291458, MADV_REMOVE [pid 341] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [ 26.196444][ T342] Disabling lock debugging due to kernel taint [ 26.203254][ T342] ------------[ cut here ]------------ [ 26.208711][ T342] kernel BUG at fs/ext4/extents.c:3390! [ 26.214479][ T342] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 26.220547][ T342] CPU: 1 PID: 342 Comm: syz-executor142 Tainted: G B 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 26.232072][ T342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 26.242118][ T342] RIP: 0010:ext4_split_extent_at+0xe85/0xea0 [ 26.248078][ T342] Code: 76 fb ff ff 48 89 df 49 89 f7 e8 46 a2 d4 ff 4c 89 fe e9 63 fb ff ff e8 49 a8 a6 ff 0f 0b e8 42 a8 a6 ff 0f 0b e8 3b a8 a6 ff <0f> 0b e8 34 a8 a6 ff 0f 0b e8 2d a8 a6 ff 0f 0b e8 26 a8 a6 ff 0f [ 26.267673][ T342] RSP: 0018:ffff8881ee54f520 EFLAGS: 00010293 [ 26.273725][ T342] RAX: ffffffff81b8d6a5 RBX: 000000000000002a RCX: ffff8881f30cbf00 [ 26.282026][ T342] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000002a [ 26.289979][ T342] RBP: ffff8881ee54f690 R08: 0000000000000000 R09: 0000000050000028 [ 26.297935][ T342] R10: fffffbfff0ca7a5c R11: 1ffffffff0ca7a5c R12: 0000000000000000 [ 26.305973][ T342] R13: 0000000000000030 R14: 0000000000000030 R15: 0000000000000000 [ 26.313929][ T342] FS: 00007f3e4c6756c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 26.322840][ T342] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.329416][ T342] CR2: 000055e95b32a00e CR3: 00000001ef623000 CR4: 00000000003406a0 [ 26.337473][ T342] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 26.345431][ T342] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 26.353410][ T342] Call Trace: [ 26.356716][ T342] ? end_report+0x63/0xd0 [ 26.361032][ T342] ? __asan_report_load2_noabort+0x14/0x20 [ 26.367081][ T342] ? ext4_ext_shift_extents+0x1250/0x1250 [ 26.372789][ T342] ext4_ext_remove_space+0x614/0x5850 [ 26.378163][ T342] ? slab_free_freelist_hook+0xb7/0x180 [ 26.383696][ T342] ? ext4_es_free_extent+0x3cd/0x4b0 [ 26.389138][ T342] ? kmem_cache_free+0x10c/0x2c0 [ 26.394068][ T342] ? ext4_ext_index_trans_blocks+0x120/0x120 [ 26.400148][ T342] ? ext4_es_remove_extent+0x147/0x2c0 [ 26.405594][ T342] ext4_punch_hole+0x6b4/0xae0 [ 26.410348][ T342] ext4_fallocate+0x25d/0x540 [ 26.415009][ T342] vfs_fallocate+0x587/0x700 [ 26.419583][ T342] do_madvise+0xd44/0x1ea0 [ 26.423981][ T342] ? _raw_spin_unlock_irq+0x4e/0x70 [ 26.429252][ T342] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 26.435041][ T342] ? asan.module_dtor+0x20/0x20 [ 26.439872][ T342] ? _raw_spin_lock_irq+0x8f/0xe0 [ 26.444884][ T342] ? __kasan_check_write+0x14/0x20 [ 26.449978][ T342] ? _raw_spin_lock_irq+0x8f/0xe0 [ 26.454984][ T342] ? _raw_spin_lock_irqsave+0x110/0x110 [ 26.460514][ T342] ? _raw_spin_unlock_irq+0x4e/0x70 [ 26.465696][ T342] ? cgroup_leave_frozen+0x160/0x2a0 [ 26.470964][ T342] ? ptrace_stop+0x52c/0x9d0 [ 26.475538][ T342] ? ptrace_stop+0x6a7/0x9d0 [ 26.480121][ T342] ? _raw_spin_unlock_irq+0x4e/0x70 [ 26.485307][ T342] ? ptrace_notify+0x1c4/0x250 [ 26.490055][ T342] ? ptrace_stop+0x52c/0x9d0 [ 26.494628][ T342] ? do_notify_parent+0x7e0/0x7e0 [ 26.499638][ T342] ? check_preemption_disabled+0x118/0x300 [ 26.505444][ T342] ? debug_smp_processor_id+0x20/0x20 [ 26.510812][ T342] ? __kasan_check_read+0x11/0x20 [ 26.515835][ T342] ? syscall_trace_enter+0x56f/0x7d0 [ 26.521122][ T342] ? fput+0x1a/0x20 [ 26.524914][ T342] ? __kasan_check_read+0x11/0x20 [ 26.529920][ T342] __x64_sys_madvise+0xa9/0xc0 [ 26.534763][ T342] do_syscall_64+0xcf/0x170 [ 26.539258][ T342] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 26.545137][ T342] RIP: 0033:0x7f3e4c6b7569 [ 26.549545][ T342] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 26.569345][ T342] RSP: 002b:00007f3e4c675218 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 26.577752][ T342] RAX: ffffffffffffffda RBX: 00007f3e4c73e6c8 RCX: 00007f3e4c6b7569 [ 26.585773][ T342] RDX: 0000000000000009 RSI: 0000000000600002 RDI: 0000200000000000 [ 26.593743][ T342] RBP: 00007f3e4c73e6c0 R08: 0000000000000000 R09: 0000000000000000 [ 26.601794][ T342] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3e4c70b554 [ 26.609752][ T342] R13: 0000200000000000 R14: 0000200000000180 R15: 0000200000000080 [ 26.617825][ T342] Modules linked in: [ 26.621867][ T342] ---[ end trace cc2a6e4b0b553253 ]--- [ 26.627395][ T342] RIP: 0010:ext4_split_extent_at+0xe85/0xea0 [ 26.633375][ T342] Code: 76 fb ff ff 48 89 df 49 89 f7 e8 46 a2 d4 ff 4c 89 fe e9 63 fb ff ff e8 49 a8 a6 ff 0f 0b e8 42 a8 a6 ff 0f 0b e8 3b a8 a6 ff <0f> 0b e8 34 a8 a6 ff 0f 0b e8 2d a8 a6 ff 0f 0b e8 26 a8 a6 ff 0f [ 26.653115][ T342] RSP: 0018:ffff8881ee54f520 EFLAGS: 00010293 [ 26.659294][ T342] RAX: ffffffff81b8d6a5 RBX: 000000000000002a RCX: ffff8881f30cbf00 [ 26.667296][ T342] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000002a [ 26.675282][ T342] RBP: ffff8881ee54f690 R08: 0000000000000000 R09: 0000000050000028 [ 26.683269][ T342] R10: fffffbfff0ca7a5c R11: 1ffffffff0ca7a5c R12: 0000000000000000 [ 26.691280][ T342] R13: 0000000000000030 R14: 0000000000000030 R15: 0000000000000000 [pid 341] exit_group(0) = ? [pid 343] <... futex resumed>) = ? [pid 343] +++ exited with 0 +++ [ 26.699283][ T342] FS: 00007f3e4c6756c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 26.708499][ T342] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.715173][ T342] CR2: 000055e95b32a00e CR3: 00000001ef623000 CR4: 00000000003406a0 [ 26.723166][ T342] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 26.731162][ T342] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 26.739175][ T342] Kernel panic - not syncing: Fatal exception [ 26.745325][ T342] Kernel Offset: disabled [ 26.749637][ T342] Rebooting in 86400 seconds..