./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor751885628 <...> Warning: Permanently added '10.128.15.199' (ED25519) to the list of known hosts. execve("./syz-executor751885628", ["./syz-executor751885628"], 0x7ffca1487060 /* 10 vars */) = 0 brk(NULL) = 0x5555567cc000 brk(0x5555567ccd00) = 0x5555567ccd00 arch_prctl(ARCH_SET_FS, 0x5555567cc380) = 0 set_tid_address(0x5555567cc650) = 5068 set_robust_list(0x5555567cc660, 24) = 0 rseq(0x5555567ccca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor751885628", 4096) = 27 getrandom("\xc3\x84\xf2\x85\x56\x21\xea\x77", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x5555567ccd00 brk(0x5555567edd00) = 0x5555567edd00 brk(0x5555567ee000) = 0x5555567ee000 mprotect(0x7f442fc7b000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 unshare(CLONE_NEWPID) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 5069 attached , child_tidptr=0x5555567cc650) = 5069 [pid 5069] set_robust_list(0x5555567cc660, 24) = 0 [pid 5069] mount(NULL, "/sys/fs/fuse/connections", "fusectl", 0, NULL) = -1 EBUSY (Device or resource busy) [pid 5069] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 5069] setsid() = 1 [pid 5069] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0 [pid 5069] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0 [pid 5069] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0 [pid 5069] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0 [pid 5069] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0 [pid 5069] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0 [pid 5069] unshare(CLONE_NEWNS) = 0 [pid 5069] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0 [pid 5069] unshare(CLONE_NEWIPC) = 0 [pid 5069] unshare(CLONE_NEWCGROUP) = 0 [pid 5069] unshare(CLONE_NEWUTS) = 0 [pid 5069] unshare(CLONE_SYSVSEM) = 0 [pid 5069] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = 3 [pid 5069] write(3, "16777216", 8) = 8 [pid 5069] close(3) = 0 [pid 5069] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = 3 [pid 5069] write(3, "536870912", 9) = 9 [pid 5069] close(3) = 0 [pid 5069] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = 3 [pid 5069] write(3, "1024", 4) = 4 [pid 5069] close(3) = 0 [pid 5069] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = 3 [pid 5069] write(3, "8192", 4) = 4 [pid 5069] close(3) = 0 [pid 5069] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = 3 [pid 5069] write(3, "1024", 4) = 4 [pid 5069] close(3) = 0 [pid 5069] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = 3 [pid 5069] write(3, "1024", 4) = 4 [pid 5069] close(3) = 0 [pid 5069] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = 3 [pid 5069] write(3, "1024 1048576 500 1024", 21) = 21 [pid 5069] close(3) = 0 [pid 5069] getpid() = 1 [pid 5069] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1< [ 56.830327][ T5069] dump_stack_lvl+0xd9/0x1b0 [ 56.834898][ T5069] print_report+0xc4/0x620 [ 56.839299][ T5069] ? __virt_addr_valid+0x5e/0x2d0 [ 56.844318][ T5069] ? __phys_addr+0xc6/0x140 [ 56.848802][ T5069] kasan_report+0xda/0x110 [ 56.853200][ T5069] ? udf_close_lvid+0x508/0x5c0 [ 56.858025][ T5069] ? udf_close_lvid+0x508/0x5c0 [ 56.862854][ T5069] udf_close_lvid+0x508/0x5c0 [ 56.867525][ T5069] ? fscrypt_destroy_keyring+0x1e/0x3d0 [ 56.873050][ T5069] udf_put_super+0x19c/0x200 [ 56.877616][ T5069] ? udf_close_lvid+0x5c0/0x5c0 [ 56.882441][ T5069] generic_shutdown_super+0x161/0x3d0 [ 56.887793][ T5069] kill_block_super+0x3b/0x90 [ 56.892461][ T5069] deactivate_locked_super+0xbc/0x1a0 [ 56.897824][ T5069] deactivate_super+0xde/0x100 [ 56.902580][ T5069] cleanup_mnt+0x222/0x450 [ 56.906988][ T5069] task_work_run+0x14d/0x240 [ 56.911564][ T5069] ? task_work_cancel+0x30/0x30 [ 56.916407][ T5069] do_exit+0xa92/0x2ae0 [ 56.920547][ T5069] ? do_group_exit+0x1c5/0x2a0 [ 56.925295][ T5069] ? reacquire_held_locks+0x4c0/0x4c0 [ 56.930659][ T5069] ? do_raw_spin_lock+0x12e/0x2b0 [ 56.935672][ T5069] ? mm_update_next_owner+0x840/0x840 [ 56.941037][ T5069] ? spin_bug+0x1d0/0x1d0 [ 56.945356][ T5069] do_group_exit+0xd4/0x2a0 [ 56.949864][ T5069] __x64_sys_exit_group+0x3e/0x50 [ 56.954876][ T5069] do_syscall_64+0x40/0x110 [ 56.959370][ T5069] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 56.965259][ T5069] RIP: 0033:0x7f442fbe5d49 [ 56.969687][ T5069] Code: Unable to access opcode bytes at 0x7f442fbe5d1f. [ 56.976692][ T5069] RSP: 002b:00007ffdd5040d28 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 56.985088][ T5069] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f442fbe5d49 [ 56.993044][ T5069] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 57.001002][ T5069] RBP: 00007f442fc81390 R08: ffffffffffffffb8 R09: 000000000001f22c [ 57.008960][ T5069] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f442fc81390 [ 57.016914][ T5069] R13: 0000000000000000 R14: 00007f442fc82100 R15: 00007f442fbb4030 [ 57.024873][ T5069] [ 57.027876][ T5069] [ 57.030186][ T5069] The buggy address belongs to the physical page: [ 57.036575][ T5069] page:ffffea0000b2a280 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2ca8a [ 57.046706][ T5069] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 57.053797][ T5069] page_type: 0xffffffff() [ 57.058113][ T5069] raw: 00fff00000000000 ffffea0000b2a288 ffffea0000b2a288 0000000000000000 [ 57.066680][ T5069] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 57.075246][ T5069] page dumped because: kasan: bad access detected [ 57.081658][ T5069] page_owner info is not present (never set?) [ 57.087701][ T5069] [ 57.090007][ T5069] Memory state around the buggy address: [ 57.095615][ T5069] ffff88802ca89f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 57.103661][ T5069] ffff88802ca89f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 57.111707][ T5069] >ffff88802ca8a000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 57.119748][ T5069] ^ [ 57.127182][ T5069] ffff88802ca8a080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 57.135224][ T5069] ffff88802ca8a100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 57.143266][ T5069] ================================================================== [ 57.151643][ T5069] Kernel panic - not syncing: kasan.fault=panic_on_write set ... [ 57.159369][ T5069] CPU: 0 PID: 5069 Comm: syz-executor751 Not tainted 6.7.0-rc2-syzkaller #0 [ 57.168026][ T5069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 57.178064][ T5069] Call Trace: [ 57.181331][ T5069] [ 57.184247][ T5069] dump_stack_lvl+0xd9/0x1b0 [ 57.188833][ T5069] panic+0x6dc/0x790 [ 57.192720][ T5069] ? panic_smp_self_stop+0xa0/0xa0 [ 57.197820][ T5069] ? lockdep_hardirqs_on+0x7d/0x110 [ 57.203018][ T5069] ? preempt_schedule_common+0x45/0xc0 [ 57.208476][ T5069] ? preempt_schedule_thunk+0x1a/0x30 [ 57.213847][ T5069] end_report+0x12f/0x150 [ 57.218169][ T5069] kasan_report+0xea/0x110 [ 57.222583][ T5069] ? udf_close_lvid+0x508/0x5c0 [ 57.227420][ T5069] ? udf_close_lvid+0x508/0x5c0 [ 57.232257][ T5069] udf_close_lvid+0x508/0x5c0 [ 57.236919][ T5069] ? fscrypt_destroy_keyring+0x1e/0x3d0 [ 57.242455][ T5069] udf_put_super+0x19c/0x200 [ 57.247031][ T5069] ? udf_close_lvid+0x5c0/0x5c0 [ 57.251866][ T5069] generic_shutdown_super+0x161/0x3d0 [ 57.257228][ T5069] kill_block_super+0x3b/0x90 [ 57.261898][ T5069] deactivate_locked_super+0xbc/0x1a0 [ 57.267260][ T5069] deactivate_super+0xde/0x100 [ 57.272014][ T5069] cleanup_mnt+0x222/0x450 [ 57.276430][ T5069] task_work_run+0x14d/0x240 [ 57.281008][ T5069] ? task_work_cancel+0x30/0x30 [ 57.285845][ T5069] do_exit+0xa92/0x2ae0 [ 57.289985][ T5069] ? do_group_exit+0x1c5/0x2a0 [ 57.294734][ T5069] ? reacquire_held_locks+0x4c0/0x4c0 [ 57.300097][ T5069] ? do_raw_spin_lock+0x12e/0x2b0 [ 57.305108][ T5069] ? mm_update_next_owner+0x840/0x840 [ 57.310467][ T5069] ? spin_bug+0x1d0/0x1d0 [ 57.314784][ T5069] do_group_exit+0xd4/0x2a0 [ 57.319273][ T5069] __x64_sys_exit_group+0x3e/0x50 [ 57.324282][ T5069] do_syscall_64+0x40/0x110 [ 57.328775][ T5069] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 57.334662][ T5069] RIP: 0033:0x7f442fbe5d49 [ 57.339062][ T5069] Code: Unable to access opcode bytes at 0x7f442fbe5d1f. [ 57.346059][ T5069] RSP: 002b:00007ffdd5040d28 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 57.354457][ T5069] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f442fbe5d49 [ 57.362416][ T5069] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 57.370372][ T5069] RBP: 00007f442fc81390 R08: ffffffffffffffb8 R09: 000000000001f22c [ 57.378327][ T5069] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f442fc81390 [ 57.386283][ T5069] R13: 0000000000000000 R14: 00007f442fc82100 R15: 00007f442fbb4030 [ 57.394242][ T5069] [ 57.397481][ T5069] Kernel Offset: disabled [ 57.401802][ T5069] Rebooting in 86400 seconds..