./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1403913083 <...> [ 3.923543][ T84] acpid (84) used greatest stack depth: 23344 bytes left [ 4.125873][ T99] udevd[99]: starting version 3.2.11 [ 4.259780][ T100] udevd[100]: starting eudev-3.2.11 [ 5.173550][ T125] iptables-restor (125) used greatest stack depth: 22288 bytes left [ 12.316067][ T30] kauditd_printk_skb: 50 callbacks suppressed [ 12.316079][ T30] audit: type=1400 audit(1684537764.686:61): avc: denied { transition } for pid=223 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.325982][ T30] audit: type=1400 audit(1684537764.696:62): avc: denied { noatsecure } for pid=223 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.333517][ T30] audit: type=1400 audit(1684537764.696:63): avc: denied { write } for pid=223 comm="sh" path="pipe:[970]" dev="pipefs" ino=970 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 12.341353][ T30] audit: type=1400 audit(1684537764.696:64): avc: denied { rlimitinh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.345137][ T30] audit: type=1400 audit(1684537764.696:65): avc: denied { siginh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.10.40' (ECDSA) to the list of known hosts. execve("./syz-executor1403913083", ["./syz-executor1403913083"], 0x7fff3db8a970 /* 10 vars */) = 0 brk(NULL) = 0x555555c9e000 brk(0x555555c9ec40) = 0x555555c9ec40 arch_prctl(ARCH_SET_FS, 0x555555c9e300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor1403913083", 4096) = 28 brk(0x555555cbfc40) = 0x555555cbfc40 brk(0x555555cc0000) = 0x555555cc0000 mprotect(0x7fe6fa5cc000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fe6f2113000 write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 262144) = 262144 munmap(0x7fe6f2113000, 262144) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 mkdir("./file1", 0777) = 0 [ 21.556472][ T30] audit: type=1400 audit(1684537773.926:66): avc: denied { execmem } for pid=292 comm="syz-executor140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.562917][ T292] loop0: detected capacity change from 0 to 512 [ 21.563209][ T30] audit: type=1400 audit(1684537773.926:67): avc: denied { read write } for pid=292 comm="syz-executor140" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 21.568480][ T292] EXT4-fs (loop0): Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 21.572191][ T30] audit: type=1400 audit(1684537773.926:68): avc: denied { open } for pid=292 comm="syz-executor140" path="/dev/loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 21.578684][ T292] EXT4-fs (loop0): 1 truncate cleaned up [ 21.599777][ T30] audit: type=1400 audit(1684537773.926:69): avc: denied { ioctl } for pid=292 comm="syz-executor140" path="/dev/loop0" dev="devtmpfs" ino=112 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 mount("/dev/loop0", "./file1", "ext4", 0, "inode_readahead_blks=0x0000000000000000,errors=continue,debug_want_extra_isize=0x0000000000000040,di"...) = 0 openat(AT_FDCWD, "./file1", O_RDONLY|O_DIRECTORY) = 3 ioctl(4, LOOP_CLR_FD) = 0 close(4) = 0 setxattr("./file1", "trusted.overlay.opaque", NULL, 0, 0) = 0 setxattr("./file1", "trusted.overlay.upper", "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 4117, 0) = 0 [ 21.605313][ T292] EXT4-fs (loop0): mounted filesystem without journal. Opts: inode_readahead_blks=0x0000000000000000,errors=continue,debug_want_extra_isize=0x0000000000000040,dioread_nolock,max_batch_time=0x0000000000000008,nombcache,,errors=continue. Quota mode: writeback. [ 21.633240][ T30] audit: type=1400 audit(1684537773.936:70): avc: denied { mounton } for pid=292 comm="syz-executor140" path="/root/file1" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 21.668162][ T292] ================================================================== [ 21.688022][ T30] audit: type=1400 audit(1684537774.026:71): avc: denied { mount } for pid=292 comm="syz-executor140" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 21.688613][ T292] BUG: KASAN: double-free or invalid-free in kfree+0x19e/0x220 [ 21.711665][ T30] audit: type=1400 audit(1684537774.036:72): avc: denied { setattr } for pid=292 comm="syz-executor140" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 21.718700][ T292] [ 21.718715][ T292] CPU: 0 PID: 292 Comm: syz-executor140 Not tainted 5.15.106-syzkaller-00249-g19c0ed55a470 #0 [ 21.718740][ T292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 21.743036][ T30] audit: type=1400 audit(1684537774.036:73): avc: denied { write } for pid=292 comm="syz-executor140" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 21.745030][ T292] Call Trace: [ 21.745041][ T292] [ 21.745048][ T292] dump_stack_lvl+0x151/0x1b7 [ 21.745074][ T292] ? io_uring_drop_tctx_refs+0x190/0x190 [ 21.756196][ T30] audit: type=1400 audit(1684537774.036:74): avc: denied { remove_name } for pid=292 comm="syz-executor140" name="file1" dev="loop0" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 21.766242][ T292] ? panic+0x751/0x751 [ 21.766269][ T292] print_address_description+0x87/0x3b0 [ 21.794889][ T30] audit: type=1400 audit(1684537774.036:75): avc: denied { unlink } for pid=292 comm="syz-executor140" name="file1" dev="loop0" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 21.798057][ T292] ? kfree+0x19e/0x220 [ 21.871628][ T292] kasan_report_invalid_free+0x6b/0xa0 [ 21.877003][ T292] ? kfree+0x19e/0x220 [ 21.880913][ T292] __kasan_kfree_large+0x82/0x90 [ 21.885767][ T292] ? kvfree+0x35/0x40 [ 21.889672][ T292] free_nonslab_page+0x3c/0xc0 [ 21.894590][ T292] ? kvfree+0x35/0x40 [ 21.898786][ T292] kfree+0x19e/0x220 [ 21.902815][ T292] ? kfree+0xc8/0x220 [ 21.906719][ T292] kvfree+0x35/0x40 [ 21.910464][ T292] ext4_expand_extra_isize_ea+0x1063/0x1bc0 [ 21.916191][ T292] ? __kasan_check_read+0x11/0x20 [ 21.921172][ T292] ? ext4_xattr_set+0x3d0/0x3d0 [ 21.925852][ T292] ? rwsem_write_trylock+0x15b/0x290 [ 21.931060][ T292] ? dquot_initialize_needed+0x13d/0x370 [ 21.936526][ T292] __ext4_expand_extra_isize+0x303/0x3f0 [ 21.941994][ T292] __ext4_mark_inode_dirty+0x4af/0x7a0 [ 21.947377][ T292] ? sb_end_intwrite+0x120/0x120 [ 21.952272][ T292] ? current_time+0x1af/0x2f0 [ 21.956866][ T292] ? atime_needs_update+0x810/0x810 [ 21.961986][ T292] ? __ext4_unlink+0x70f/0xae0 [ 21.966688][ T292] ? memcpy+0x56/0x70 [ 21.970491][ T292] __ext4_unlink+0x8cd/0xae0 [ 21.974915][ T292] ? __ext4_read_dirblock+0x8f0/0x8f0 [ 21.980231][ T292] ? rwsem_mark_wake+0x6b0/0x6b0 [ 21.984999][ T292] ext4_unlink+0x142/0x3f0 [ 21.989252][ T292] vfs_unlink+0x38c/0x630 [ 21.993514][ T292] do_unlinkat+0x47d/0x910 [ 21.997803][ T292] ? fsnotify_link_count+0x100/0x100 [ 22.002886][ T292] __x64_sys_unlinkat+0xcd/0xf0 [ 22.007872][ T292] do_syscall_64+0x3d/0xb0 [ 22.012118][ T292] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 22.017941][ T292] RIP: 0033:0x7fe6fa55fc19 [ 22.022203][ T292] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 22.043170][ T292] RSP: 002b:00007fffe4dc7598 EFLAGS: 00000246 ORIG_RAX: 0000000000000107 [ 22.051457][ T292] RAX: ffffffffffffffda RBX: 0031656c69662f2e RCX: 00007fe6fa55fc19 [ 22.064474][ T292] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 22.072287][ T292] RBP: 00007fe6fa51f250 R08: 0000000000000000 R09: 0000000000000000 [ 22.080096][ T292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe6fa51f2e0 [ 22.088027][ T292] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 22.095949][ T292] [ 22.098800][ T292] [ 22.100988][ T292] The buggy address belongs to the page: [ 22.106593][ T292] page:ffffea0004742bc0 refcount:2 mapcount:0 mapping:ffff888109197258 index:0x1 pfn:0x11d0af [ 22.117743][ T292] memcg:ffff8881001f8000 [ 22.124429][ T292] aops:def_blk_aops ino:700000 [ 22.130715][ T292] flags: 0x400000000002203e(referenced|uptodate|dirty|lru|active|private|mappedtodisk|zone=1) [ 22.142097][ T292] raw: 400000000002203e ffffea0004654108 ffffea00046f8dc8 ffff888109197258 [ 22.150758][ T292] raw: 0000000000000001 ffff88811c542498 00000002ffffffff ffff8881001f8000 [ 22.159205][ T292] page dumped because: kasan: bad access detected [ 22.165474][ T292] page_owner tracks the page as allocated [ 22.171278][ T292] page last allocated via order 0, migratetype Movable, gfp_mask 0x108c48(GFP_NOFS|__GFP_NOFAIL|__GFP_HARDWALL|__GFP_MOVABLE), pid 292, ts 21576650678, free_ts 21561150688 [ 22.188801][ T292] post_alloc_hook+0x1a3/0x1b0 [ 22.193378][ T292] get_page_from_freelist+0x2c14/0x2cf0 [ 22.198843][ T292] __alloc_pages+0x386/0x7b0 [ 22.203390][ T292] pagecache_get_page+0xb18/0xeb0 [ 22.208361][ T292] __getblk_gfp+0x21e/0x7c0 [ 22.212864][ T292] __ext4_get_inode_loc+0x4ce/0xcd0 [ 22.218062][ T292] __ext4_iget+0x467/0x3e40 [ 22.222528][ T292] ext4_fill_super+0x7570/0x9680 [ 22.227504][ T292] mount_bdev+0x281/0x3b0 [ 22.232318][ T292] ext4_mount+0x34/0x40 [ 22.236315][ T292] legacy_get_tree+0xf1/0x190 [ 22.240904][ T292] vfs_get_tree+0x88/0x290 [ 22.245160][ T292] do_new_mount+0x28b/0xac0 [ 22.249507][ T292] path_mount+0x671/0x1070 [ 22.253925][ T292] __se_sys_mount+0x2c4/0x3b0 [ 22.258467][ T292] __x64_sys_mount+0xbf/0xd0 [ 22.262862][ T292] page last free stack trace: [ 22.267654][ T292] free_unref_page_prepare+0x7c8/0x7d0 [ 22.273321][ T292] free_unref_page_list+0x15d/0x980 [ 22.278363][ T292] release_pages+0x1310/0x1370 [ 22.282997][ T292] free_pages_and_swap_cache+0x8a/0xa0 [ 22.288714][ T292] tlb_finish_mmu+0x177/0x320 [ 22.293386][ T292] unmap_region+0x304/0x350 [ 22.298008][ T292] __do_munmap+0x1421/0x1a90 [ 22.302625][ T292] __vm_munmap+0x166/0x2a0 [ 22.307478][ T292] __x64_sys_munmap+0x6b/0x80 [ 22.312005][ T292] do_syscall_64+0x3d/0xb0 [ 22.316369][ T292] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 22.322170][ T292] [ 22.324397][ T292] Memory state around the buggy address: [ 22.330071][ T292] ffff88811d0af480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.338638][ T292] ffff88811d0af500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.346643][ T292] >ffff88811d0af580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.354623][ T292] ^ unlinkat(3, "./file1", 0) = 0 exit_group(0) = ? +++ exited with 0 +++ [ 22.359671][ T292] ffff88811d0af600: 00 00 00