./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor201014366 <...> Warning: Permanently added '10.128.0.181' (ECDSA) to the list of known hosts. execve("./syz-executor201014366", ["./syz-executor201014366"], 0x7ffe4b3b0950 /* 10 vars */) = 0 brk(NULL) = 0x555556298000 brk(0x555556298c40) = 0x555556298c40 arch_prctl(ARCH_SET_FS, 0x555556298300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor201014366", 4096) = 27 brk(0x5555562b9c40) = 0x5555562b9c40 brk(0x5555562ba000) = 0x5555562ba000 mprotect(0x7fc57f0a9000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) = 3 socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) = 4 sendto(4, [{nlmsg_len=36, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x03\x00\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=784, nlmsg_type=nlctrl, nlmsg_flags=0, nlmsg_seq=0, nlmsg_pid=5003}, "\x01\x02\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00\x06\x00\x01\x00\x1d\x00\x00\x00\x08\x00\x03\x00\x01\x00\x00\x00\x08\x00\x04\x00\x00\x00\x00\x00\x08\x00\x05\x00\x2e\x00\x00\x00\x98\x02\x06\x00\x14\x00\x01\x00\x08\x00\x01\x00\x01\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x02\x00\x08\x00\x01\x00\x05\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x03\x00"...], 4096, 0, NULL, NULL) = 784 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5003}, {error=0, msg={nlmsg_len=36, nlmsg_type=nlctrl, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 access("/proc/net", R_OK) = 0 access("/proc/net/unix", R_OK) = 0 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0 close(5) = 0 sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0b\x00\x00\x00\x06\x00\x0a\x00\xa0\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5003}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0 close(5) = 0 sendto(3, [{nlmsg_len=44, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x00\x00\x00\x00\x0b\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x0c\x00\x01\x00\x02\x00\xaa\xaa\xaa\xaa\xaa\xaa"], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5003}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 sendto(3, [{nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=0, ifi_flags=0, ifi_change=0}, [[{nla_len=11, nla_type=IFLA_IFNAME}, "lowpan0"...], [{nla_len=16, nla_type=IFLA_LINKINFO}, [{nla_len=10, nla_type=IFLA_INFO_KIND}, "lowpan"...]], [{nla_len=8, nla_type=IFLA_LINK}, 11]]], 68, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 68 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5003}, {error=0, msg={nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0 close(5) = 0 sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0c\x00\x00\x00\x06\x00\x0a\x00\xa1\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5003}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0 close(5) = 0 sendto(3, [{nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=if_nametoindex("wpan1"), ifi_flags=IFF_UP, ifi_change=0x1}, [{nla_len=12, nla_type=IFLA_ADDRESS}, 02:01:aa:aa:aa:aa:aa]], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5003}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 close(3) = 0 close(4) = 0 getpid() = 5003 mkdir("./syzkaller.APX3lv", 0700) = 0 chmod("./syzkaller.APX3lv", 0777) = 0 chdir("./syzkaller.APX3lv") = 0 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fc576bcd000 write(3, "\xeb\x52\x90\x4e\x54\x46\x53\x20\x20\x20\x20\x00\x10\x01\x00\x00\x00\x00\x00\x00\x00\xf8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x80\x00\x00\x00\x00\x00\x01\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\xff\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x78\x5f\xaa\x3b\xd7\x0e\xce\x68\x00\x00\x00\x00\x0e\x1f\xbe\x71\x7c\xac\x22\xc0\x74\x0b\x56\xb4\x0e\xbb\x07\x00"..., 2097152) = 2097152 munmap(0x7fc576bcd000, 2097152) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 mkdir("./file0", 0777) = 0 syzkaller login: [ 58.167275][ T5003] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=5003 'syz-executor201' [ 58.204604][ T5003] loop0: detected capacity change from 0 to 4096 [ 58.215569][ T5003] ntfs3: loop0: Different NTFS sector size (4096) and media sector size (512). [ 58.224661][ T5003] ntfs3: loop0: RAW NTFS volume: Filesystem size 16384.00 Gb > volume size 0.00 Gb. Mount in read-only. [ 58.236077][ T5003] ntfs3: loop0: NTFS 16384.00 Gb is too big to use 32 bits per cluster. [ 58.245408][ T5003] ================================================================== [ 58.253488][ T5003] BUG: KASAN: use-after-free in memcmp+0x173/0x1c0 [ 58.260024][ T5003] Read of size 8 at addr ffff888072dad002 by task syz-executor201/5003 [ 58.268243][ T5003] [ 58.270570][ T5003] CPU: 1 PID: 5003 Comm: syz-executor201 Not tainted 6.4.0-rc2-next-20230515-syzkaller #0 [ 58.280446][ T5003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 58.290501][ T5003] Call Trace: [ 58.293767][ T5003] [ 58.296695][ T5003] dump_stack_lvl+0xd9/0x150 [ 58.301283][ T5003] print_address_description.constprop.0+0x2c/0x3c0 [ 58.308652][ T5003] ? memcmp+0x173/0x1c0 [ 58.312806][ T5003] kasan_report+0x11c/0x130 [ 58.317305][ T5003] ? memcmp+0x173/0x1c0 [ 58.321463][ T5003] memcmp+0x173/0x1c0 [ 58.325433][ T5003] ? __bread_gfp+0x81/0x330 [ 58.329924][ T5003] ntfs_fill_super+0x7fc/0x4240 [ 58.334768][ T5003] ? put_ntfs+0x330/0x330 [ 58.339084][ T5003] ? vsprintf+0x30/0x30 [ 58.343228][ T5003] ? wait_for_completion_io_timeout+0x20/0x20 [ 58.349287][ T5003] ? set_blocksize+0x2d8/0x370 [ 58.354043][ T5003] get_tree_bdev+0x44a/0x770 [ 58.358624][ T5003] ? put_ntfs+0x330/0x330 [ 58.362943][ T5003] vfs_get_tree+0x8d/0x350 [ 58.367349][ T5003] path_mount+0x134b/0x1e40 [ 58.371852][ T5003] ? kmem_cache_free+0xe9/0x480 [ 58.376695][ T5003] ? finish_automount+0x9b0/0x9b0 [ 58.381721][ T5003] ? putname+0x102/0x140 [ 58.385955][ T5003] __x64_sys_mount+0x283/0x300 [ 58.390713][ T5003] ? copy_mnt_ns+0xb30/0xb30 [ 58.395336][ T5003] ? lockdep_hardirqs_on+0x7d/0x100 [ 58.400527][ T5003] ? _raw_spin_unlock_irq+0x2e/0x50 [ 58.405715][ T5003] ? ptrace_notify+0xfe/0x140 [ 58.410382][ T5003] do_syscall_64+0x39/0xb0 [ 58.414796][ T5003] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 58.420696][ T5003] RIP: 0033:0x7fc57f01b65a [ 58.425095][ T5003] Code: 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 58.444688][ T5003] RSP: 002b:00007fff896baae8 EFLAGS: 00000286 ORIG_RAX: 00000000000000a5 [ 58.453088][ T5003] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fc57f01b65a [ 58.461042][ T5003] RDX: 0000000020000080 RSI: 000000002001f1c0 RDI: 00007fff896bab00 [ 58.468996][ T5003] RBP: 00007fff896bab00 R08: 00007fff896bab40 R09: 00007fff896bab50 [ 58.476953][ T5003] R10: 0000000000000000 R11: 0000000000000286 R12: 0000000000000004 [ 58.484910][ T5003] R13: 00005555562982c0 R14: 0000000000000000 R15: 00007fff896bab40 [ 58.492871][ T5003] [ 58.495875][ T5003] [ 58.498179][ T5003] The buggy address belongs to the physical page: [ 58.504572][ T5003] page:ffffea0001cb6b40 refcount:0 mapcount:0 mapping:0000000000000000 index:0x1 pfn:0x72dad [ 58.514717][ T5003] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 58.521906][ T5003] page_type: 0xffffffff() [ 58.526227][ T5003] raw: 00fff00000000000 ffffea0001cb6b88 ffff8880b9943660 0000000000000000 [ 58.534799][ T5003] raw: 0000000000000001 0000000000000000 00000000ffffffff 0000000000000000 [ 58.543360][ T5003] page dumped because: kasan: bad access detected [ 58.549750][ T5003] page_owner tracks the page as freed [ 58.555097][ T5003] page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_COMP|__GFP_ZERO), pid 4995, tgid 4995 (sshd), ts 52494388741, free_ts 52519047373 [ 58.573052][ T5003] post_alloc_hook+0x2db/0x350 [ 58.577804][ T5003] get_page_from_freelist+0xf67/0x2a80 [ 58.583269][ T5003] __alloc_pages+0x1cb/0x4a0 [ 58.587844][ T5003] __folio_alloc+0x16/0x40 [ 58.592244][ T5003] vma_alloc_folio+0x155/0x850 [ 58.597011][ T5003] __handle_mm_fault+0x2263/0x4170 [ 58.602109][ T5003] handle_mm_fault+0x2af/0x9f0 [ 58.606869][ T5003] do_user_addr_fault+0x2ca/0x1210 [ 58.611967][ T5003] exc_page_fault+0x98/0x170 [ 58.616555][ T5003] asm_exc_page_fault+0x26/0x30 [ 58.621398][ T5003] page last free stack trace: [ 58.626059][ T5003] free_unref_page_prepare+0x4dd/0xb90 [ 58.631502][ T5003] free_unref_page_list+0xe3/0xa70 [ 58.636598][ T5003] release_pages+0xcd8/0x1380 [ 58.641264][ T5003] tlb_batch_pages_flush+0xa8/0x1a0 [ 58.646447][ T5003] tlb_finish_mmu+0x14b/0x7e0 [ 58.651106][ T5003] unmap_region+0x23d/0x2d0 [ 58.655609][ T5003] do_vmi_align_munmap+0xe6c/0x1600 [ 58.660799][ T5003] do_vmi_munmap+0x26e/0x2c0 [ 58.665392][ T5003] __vm_munmap+0x133/0x3b0 [ 58.669810][ T5003] __x64_sys_munmap+0x62/0x80 [ 58.674478][ T5003] do_syscall_64+0x39/0xb0 [ 58.678885][ T5003] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 58.684771][ T5003] [ 58.687076][ T5003] Memory state around the buggy address: [ 58.692686][ T5003] ffff888072dacf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 58.700727][ T5003] ffff888072dacf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 58.708767][ T5003] >ffff888072dad000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 58.716826][ T5003] ^ [ 58.720873][ T5003] ffff888072dad080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 58.728913][ T5003] ffff888072dad100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 58.737202][ T5003] ================================================================== [ 58.745643][ T5003] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 58.752874][ T5003] CPU: 1 PID: 5003 Comm: syz-executor201 Not tainted 6.4.0-rc2-next-20230515-syzkaller #0 [ 58.762761][ T5003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 58.772813][ T5003] Call Trace: [ 58.776097][ T5003] [ 58.779023][ T5003] dump_stack_lvl+0xd9/0x150 [ 58.783631][ T5003] panic+0x686/0x730 [ 58.787535][ T5003] ? panic_smp_self_stop+0xa0/0xa0 [ 58.792657][ T5003] ? preempt_schedule_thunk+0x1a/0x20 [ 58.798037][ T5003] ? preempt_schedule_common+0x45/0xb0 [ 58.803505][ T5003] check_panic_on_warn+0xb1/0xc0 [ 58.808456][ T5003] end_report+0xe9/0x120 [ 58.812700][ T5003] ? memcmp+0x173/0x1c0 [ 58.816854][ T5003] kasan_report+0xf9/0x130 [ 58.821271][ T5003] ? memcmp+0x173/0x1c0 [ 58.825426][ T5003] memcmp+0x173/0x1c0 [ 58.829405][ T5003] ? __bread_gfp+0x81/0x330 [ 58.833913][ T5003] ntfs_fill_super+0x7fc/0x4240 [ 58.838778][ T5003] ? put_ntfs+0x330/0x330 [ 58.843109][ T5003] ? vsprintf+0x30/0x30 [ 58.847267][ T5003] ? wait_for_completion_io_timeout+0x20/0x20 [ 58.853354][ T5003] ? set_blocksize+0x2d8/0x370 [ 58.858137][ T5003] get_tree_bdev+0x44a/0x770 [ 58.862760][ T5003] ? put_ntfs+0x330/0x330 [ 58.867120][ T5003] vfs_get_tree+0x8d/0x350 [ 58.871575][ T5003] path_mount+0x134b/0x1e40 [ 58.876098][ T5003] ? kmem_cache_free+0xe9/0x480 [ 58.880950][ T5003] ? finish_automount+0x9b0/0x9b0 [ 58.885999][ T5003] ? putname+0x102/0x140 [ 58.890257][ T5003] __x64_sys_mount+0x283/0x300 [ 58.895040][ T5003] ? copy_mnt_ns+0xb30/0xb30 [ 58.899641][ T5003] ? lockdep_hardirqs_on+0x7d/0x100 [ 58.904846][ T5003] ? _raw_spin_unlock_irq+0x2e/0x50 [ 58.910053][ T5003] ? ptrace_notify+0xfe/0x140 [ 58.914738][ T5003] do_syscall_64+0x39/0xb0 [ 58.919169][ T5003] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 58.925079][ T5003] RIP: 0033:0x7fc57f01b65a [ 58.929507][ T5003] Code: 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 58.949137][ T5003] RSP: 002b:00007fff896baae8 EFLAGS: 00000286 ORIG_RAX: 00000000000000a5 [ 58.957555][ T5003] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fc57f01b65a [ 58.965529][ T5003] RDX: 0000000020000080 RSI: 000000002001f1c0 RDI: 00007fff896bab00 [ 58.973501][ T5003] RBP: 00007fff896bab00 R08: 00007fff896bab40 R09: 00007fff896bab50 [ 58.981476][ T5003] R10: 0000000000000000 R11: 0000000000000286 R12: 0000000000000004 [ 58.989442][ T5003] R13: 00005555562982c0 R14: 0000000000000000 R15: 00007fff896bab40 [ 58.997419][ T5003] [ 59.000575][ T5003] Kernel Offset: disabled [ 59.004892][ T5003] Rebooting in 86400 seconds..