./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2005100263
<...>
Warning: Permanently added '10.128.0.123' (ECDSA) to the list of known hosts.
execve("./syz-executor2005100263", ["./syz-executor2005100263"], 0x7ffeb2f056e0 /* 10 vars */) = 0
brk(NULL) = 0x555556d78000
brk(0x555556d78c40) = 0x555556d78c40
arch_prctl(ARCH_SET_FS, 0x555556d78300) = 0
uname({sysname="Linux", nodename="syzkaller", ...}) = 0
readlink("/proc/self/exe", "/root/syz-executor2005100263", 4096) = 28
brk(0x555556d99c40) = 0x555556d99c40
brk(0x555556d9a000) = 0x555556d9a000
mprotect(0x7fbe5b7a6000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
memfd_create("syzkaller", 0) = 3
mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fbe532ce000
write(3, "\xeb\x52\x90\x4e\x54\x46\x53\x20\x20\x20\x20\x00\x10\x01\x00\x00\x00\x00\x00\x00\x00\xf8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x80\x00\xff\x01\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\xff\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x20\x00\x00\x00\xf7\x9a\x81\x47\x2b\x73\xcf\x43\x00\x00\x00\x00\x0e\x1f\xbe\x71\x7c\xac\x22\xc0\x74\x0b\x56\xb4\x0e\xbb\x07\x00"..., 2097152) = 2097152
munmap(0x7fbe532ce000, 2097152) = 0
openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4
ioctl(4, LOOP_SET_FD, 3) = 0
close(3) = 0
mkdir("./file0", 0777) = 0
syzkaller login: [ 59.937023][ T4997] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=4997 'syz-executor200'
[ 59.976081][ T4997] loop0: detected capacity change from 0 to 4096
[ 59.988732][ T4997] ntfs: (device loop0): ntfs_is_extended_system_file(): Corrupt file name attribute. You should run chkdsk.
[ 60.000257][ T4997] ntfs: (device loop0): ntfs_read_locked_inode(): $DATA attribute is missing.
[ 60.009516][ T4997] ntfs: (device loop0): ntfs_read_locked_inode(): Failed with error code -2. Marking corrupt inode 0x1 as bad. Run chkdsk.
[ 60.022585][ T4997] ntfs: (device loop0): load_system_files(): Failed to load $MFTMirr. Mounting read-only. Run ntfsfix and/or chkdsk.
mount("/dev/loop0", "./file0", "ntfs", MS_NOSUID, "") = 0
openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3
chdir("./file0") = 0
ioctl(4, LOOP_CLR_FD) = 0
close(4) = 0
openat(AT_FDCWD, ".", O_RDONLY) = 4
[ 60.039085][ T4997] ntfs: volume version 3.1.
[ 60.044675][ T4997] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Corrupt directory. Aborting lookup.
[ 60.054631][ T4997] ntfs: (device loop0): check_windows_hibernation_status(): Failed to find inode number for hiberfil.sys.
[ 60.065983][ T4997] ntfs: (device loop0): load_system_files(): Failed to determine if Windows is hibernated. Will not be able to remount read-write. Run chkdsk.
[ 60.093860][ T4997] ==================================================================
[ 60.101938][ T4997] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xea1/0x2b70
[ 60.109483][ T4997] Read of size 1 at addr ffff88801e4b9671 by task syz-executor200/4997
[ 60.117786][ T4997]
[ 60.120121][ T4997] CPU: 1 PID: 4997 Comm: syz-executor200 Not tainted 6.4.0-rc5-syzkaller-00016-ga4d7d7011219 #0
[ 60.130549][ T4997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023
[ 60.140594][ T4997] Call Trace:
[ 60.143858][ T4997]
[ 60.146779][ T4997] dump_stack_lvl+0x1e7/0x2d0
[ 60.151451][ T4997] ? irq_work_queue+0xca/0x150
[ 60.156207][ T4997] ? nf_tcp_handle_invalid+0x650/0x650
[ 60.161661][ T4997] ? panic+0x770/0x770
[ 60.165715][ T4997] ? _printk+0xd5/0x120
[ 60.169866][ T4997] print_report+0x163/0x540
[ 60.174361][ T4997] ? mutex_unlock+0x10/0x10
[ 60.178860][ T4997] ? __virt_addr_valid+0x22f/0x2e0
[ 60.183967][ T4997] ? __phys_addr+0xba/0x170
[ 60.188464][ T4997] ? ntfs_readdir+0xea1/0x2b70
[ 60.193223][ T4997] kasan_report+0x176/0x1b0
[ 60.197716][ T4997] ? ntfs_readdir+0xea1/0x2b70
[ 60.202474][ T4997] ntfs_readdir+0xea1/0x2b70
[ 60.207061][ T4997] ? read_lock_is_recursive+0x20/0x20
[ 60.212426][ T4997] ? __down_write_common+0x161/0x200
[ 60.217702][ T4997] ? clear_nonspinnable+0x60/0x60
[ 60.222728][ T4997] ? ntfs_unmap_page+0x260/0x260
[ 60.227656][ T4997] ? iterate_dir+0x135/0x570
[ 60.232249][ T4997] iterate_dir+0x228/0x570
[ 60.236679][ T4997] __se_sys_getdents64+0x20d/0x4f0
[ 60.241782][ T4997] ? _raw_spin_unlock_irq+0x2e/0x50
[ 60.246969][ T4997] ? __x64_sys_getdents64+0x80/0x80
[ 60.252162][ T4997] ? filldir+0x6a0/0x6a0
[ 60.256402][ T4997] ? syscall_enter_from_user_mode+0x8c/0x230
[ 60.262369][ T4997] do_syscall_64+0x41/0xc0
[ 60.266780][ T4997] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 60.272670][ T4997] RIP: 0033:0x7fbe5b71a7a9
[ 60.277072][ T4997] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[ 60.296663][ T4997] RSP: 002b:00007fffa6105398 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9
[ 60.305058][ T4997] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbe5b71a7a9
[ 60.313015][ T4997] RDX: 00000000000000ab RSI: 0000000020000080 RDI: 0000000000000004
[ 60.320967][ T4997] RBP: 00007fbe5b6da040 R08: 0000000000000000 R09: 0000000000000000
[ 60.328925][ T4997] R10: 000000000001f1b8 R11: 0000000000000246 R12: 00007fbe5b6da0d0
[ 60.336884][ T4997] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 60.344857][ T4997]
[ 60.347861][ T4997]
[ 60.350168][ T4997] Allocated by task 4997:
[ 60.354473][ T4997] kasan_set_track+0x4f/0x70
[ 60.359054][ T4997] __kasan_kmalloc+0x98/0xb0
[ 60.363634][ T4997] __kmalloc+0xb9/0x230
[ 60.367779][ T4997] ntfs_readdir+0x829/0x2b70
[ 60.372356][ T4997] iterate_dir+0x228/0x570
[ 60.376767][ T4997] __se_sys_getdents64+0x20d/0x4f0
[ 60.381873][ T4997] do_syscall_64+0x41/0xc0
[ 60.386285][ T4997] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 60.392163][ T4997]
[ 60.394471][ T4997] The buggy address belongs to the object at ffff88801e4b9600
[ 60.394471][ T4997] which belongs to the cache kmalloc-64 of size 64
[ 60.408336][ T4997] The buggy address is located 57 bytes to the right of
[ 60.408336][ T4997] allocated 56-byte region [ffff88801e4b9600, ffff88801e4b9638)
[ 60.422819][ T4997]
[ 60.425128][ T4997] The buggy address belongs to the physical page:
[ 60.431519][ T4997] page:ffffea0000792e40 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1e4b9
[ 60.441668][ T4997] ksm flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff)
[ 60.449550][ T4997] page_type: 0xffffffff()
[ 60.453869][ T4997] raw: 00fff00000000200 ffff888012441640 ffffea0000aa58c0 dead000000000003
[ 60.462435][ T4997] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 60.470996][ T4997] page dumped because: kasan: bad access detected
[ 60.477393][ T4997] page_owner tracks the page as allocated
[ 60.483089][ T4997] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 10, tgid 10 (kworker/u4:0), ts 7379939316, free_ts 0
[ 60.500083][ T4997] post_alloc_hook+0x1e6/0x210
[ 60.504834][ T4997] get_page_from_freelist+0x321c/0x33a0
[ 60.510369][ T4997] __alloc_pages+0x255/0x670
[ 60.514947][ T4997] alloc_slab_page+0x6a/0x160
[ 60.519610][ T4997] new_slab+0x84/0x2f0
[ 60.523665][ T4997] ___slab_alloc+0xa85/0x10a0
[ 60.528328][ T4997] __kmem_cache_alloc_node+0x1b8/0x290
[ 60.533775][ T4997] __kmalloc_node+0xa7/0x230
[ 60.538361][ T4997] __vmalloc_node_range+0x5fc/0x14e0
[ 60.543654][ T4997] dup_task_struct+0x3e5/0x7d0
[ 60.548408][ T4997] copy_process+0x5c8/0x4290
[ 60.553016][ T4997] kernel_clone+0x222/0x800
[ 60.557504][ T4997] user_mode_thread+0x132/0x190
[ 60.562341][ T4997] call_usermodehelper_exec_work+0x5c/0x220
[ 60.568221][ T4997] process_one_work+0x8a0/0x10e0
[ 60.573149][ T4997] worker_thread+0xa63/0x1210
[ 60.577814][ T4997] page_owner free stack trace missing
[ 60.583161][ T4997]
[ 60.585470][ T4997] Memory state around the buggy address:
[ 60.591097][ T4997] ffff88801e4b9500: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[ 60.599146][ T4997] ffff88801e4b9580: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 60.607191][ T4997] >ffff88801e4b9600: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc
[ 60.615233][ T4997] ^
[ 60.622929][ T4997] ffff88801e4b9680: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[ 60.630972][ T4997] ffff88801e4b9700: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[ 60.639019][ T4997] ==================================================================
[ 60.647249][ T4997] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 60.654445][ T4997] CPU: 1 PID: 4997 Comm: syz-executor200 Not tainted 6.4.0-rc5-syzkaller-00016-ga4d7d7011219 #0
[ 60.664850][ T4997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023
[ 60.674898][ T4997] Call Trace:
[ 60.678166][ T4997]
[ 60.681103][ T4997] dump_stack_lvl+0x1e7/0x2d0
[ 60.685803][ T4997] ? nf_tcp_handle_invalid+0x650/0x650
[ 60.691263][ T4997] ? panic+0x770/0x770
[ 60.695325][ T4997] ? preempt_schedule_common+0x83/0xc0
[ 60.700803][ T4997] ? vscnprintf+0x5d/0x80
[ 60.705130][ T4997] panic+0x30f/0x770
[ 60.709022][ T4997] ? check_panic_on_warn+0x21/0xa0
[ 60.714138][ T4997] ? __memcpy_flushcache+0x2b0/0x2b0
[ 60.719425][ T4997] ? _raw_spin_unlock_irqrestore+0x12c/0x140
[ 60.725405][ T4997] ? _raw_spin_unlock+0x40/0x40
[ 60.730249][ T4997] ? print_report+0x4fb/0x540
[ 60.734926][ T4997] check_panic_on_warn+0x82/0xa0
[ 60.739863][ T4997] ? ntfs_readdir+0xea1/0x2b70
[ 60.744620][ T4997] end_report+0x63/0x110
[ 60.748859][ T4997] kasan_report+0x183/0x1b0
[ 60.753365][ T4997] ? ntfs_readdir+0xea1/0x2b70
[ 60.758134][ T4997] ntfs_readdir+0xea1/0x2b70
[ 60.762737][ T4997] ? read_lock_is_recursive+0x20/0x20
[ 60.768111][ T4997] ? __down_write_common+0x161/0x200
[ 60.773396][ T4997] ? clear_nonspinnable+0x60/0x60
[ 60.778434][ T4997] ? ntfs_unmap_page+0x260/0x260
[ 60.783380][ T4997] ? iterate_dir+0x135/0x570
[ 60.787980][ T4997] iterate_dir+0x228/0x570
[ 60.792422][ T4997] __se_sys_getdents64+0x20d/0x4f0
[ 60.797550][ T4997] ? _raw_spin_unlock_irq+0x2e/0x50
[ 60.802757][ T4997] ? __x64_sys_getdents64+0x80/0x80
[ 60.807968][ T4997] ? filldir+0x6a0/0x6a0
[ 60.812223][ T4997] ? syscall_enter_from_user_mode+0x8c/0x230
[ 60.818269][ T4997] do_syscall_64+0x41/0xc0
[ 60.822701][ T4997] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 60.828600][ T4997] RIP: 0033:0x7fbe5b71a7a9
[ 60.833016][ T4997] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[ 60.852629][ T4997] RSP: 002b:00007fffa6105398 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9
[ 60.861054][ T4997] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbe5b71a7a9
[ 60.869030][ T4997] RDX: 00000000000000ab RSI: 0000000020000080 RDI: 0000000000000004
[ 60.877008][ T4997] RBP: 00007fbe5b6da040 R08: 0000000000000000 R09: 0000000000000000
[ 60.884975][ T4997] R10: 000000000001f1b8 R11: 0000000000000246 R12: 00007fbe5b6da0d0
[ 60.892941][ T4997] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 60.900919][ T4997]
[ 60.904200][ T4997] Kernel Offset: disabled
[ 60.908530][ T4997] Rebooting in 86400 seconds..