./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2005100263 <...> Warning: Permanently added '10.128.0.123' (ECDSA) to the list of known hosts. execve("./syz-executor2005100263", ["./syz-executor2005100263"], 0x7ffeb2f056e0 /* 10 vars */) = 0 brk(NULL) = 0x555556d78000 brk(0x555556d78c40) = 0x555556d78c40 arch_prctl(ARCH_SET_FS, 0x555556d78300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor2005100263", 4096) = 28 brk(0x555556d99c40) = 0x555556d99c40 brk(0x555556d9a000) = 0x555556d9a000 mprotect(0x7fbe5b7a6000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fbe532ce000 write(3, "\xeb\x52\x90\x4e\x54\x46\x53\x20\x20\x20\x20\x00\x10\x01\x00\x00\x00\x00\x00\x00\x00\xf8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x80\x00\xff\x01\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\xff\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x20\x00\x00\x00\xf7\x9a\x81\x47\x2b\x73\xcf\x43\x00\x00\x00\x00\x0e\x1f\xbe\x71\x7c\xac\x22\xc0\x74\x0b\x56\xb4\x0e\xbb\x07\x00"..., 2097152) = 2097152 munmap(0x7fbe532ce000, 2097152) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 mkdir("./file0", 0777) = 0 syzkaller login: [ 59.937023][ T4997] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=4997 'syz-executor200' [ 59.976081][ T4997] loop0: detected capacity change from 0 to 4096 [ 59.988732][ T4997] ntfs: (device loop0): ntfs_is_extended_system_file(): Corrupt file name attribute. You should run chkdsk. [ 60.000257][ T4997] ntfs: (device loop0): ntfs_read_locked_inode(): $DATA attribute is missing. [ 60.009516][ T4997] ntfs: (device loop0): ntfs_read_locked_inode(): Failed with error code -2. Marking corrupt inode 0x1 as bad. Run chkdsk. [ 60.022585][ T4997] ntfs: (device loop0): load_system_files(): Failed to load $MFTMirr. Mounting read-only. Run ntfsfix and/or chkdsk. mount("/dev/loop0", "./file0", "ntfs", MS_NOSUID, "") = 0 openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3 chdir("./file0") = 0 ioctl(4, LOOP_CLR_FD) = 0 close(4) = 0 openat(AT_FDCWD, ".", O_RDONLY) = 4 [ 60.039085][ T4997] ntfs: volume version 3.1. [ 60.044675][ T4997] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Corrupt directory. Aborting lookup. [ 60.054631][ T4997] ntfs: (device loop0): check_windows_hibernation_status(): Failed to find inode number for hiberfil.sys. [ 60.065983][ T4997] ntfs: (device loop0): load_system_files(): Failed to determine if Windows is hibernated. Will not be able to remount read-write. Run chkdsk. [ 60.093860][ T4997] ================================================================== [ 60.101938][ T4997] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xea1/0x2b70 [ 60.109483][ T4997] Read of size 1 at addr ffff88801e4b9671 by task syz-executor200/4997 [ 60.117786][ T4997] [ 60.120121][ T4997] CPU: 1 PID: 4997 Comm: syz-executor200 Not tainted 6.4.0-rc5-syzkaller-00016-ga4d7d7011219 #0 [ 60.130549][ T4997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 [ 60.140594][ T4997] Call Trace: [ 60.143858][ T4997] [ 60.146779][ T4997] dump_stack_lvl+0x1e7/0x2d0 [ 60.151451][ T4997] ? irq_work_queue+0xca/0x150 [ 60.156207][ T4997] ? nf_tcp_handle_invalid+0x650/0x650 [ 60.161661][ T4997] ? panic+0x770/0x770 [ 60.165715][ T4997] ? _printk+0xd5/0x120 [ 60.169866][ T4997] print_report+0x163/0x540 [ 60.174361][ T4997] ? mutex_unlock+0x10/0x10 [ 60.178860][ T4997] ? __virt_addr_valid+0x22f/0x2e0 [ 60.183967][ T4997] ? __phys_addr+0xba/0x170 [ 60.188464][ T4997] ? ntfs_readdir+0xea1/0x2b70 [ 60.193223][ T4997] kasan_report+0x176/0x1b0 [ 60.197716][ T4997] ? ntfs_readdir+0xea1/0x2b70 [ 60.202474][ T4997] ntfs_readdir+0xea1/0x2b70 [ 60.207061][ T4997] ? read_lock_is_recursive+0x20/0x20 [ 60.212426][ T4997] ? __down_write_common+0x161/0x200 [ 60.217702][ T4997] ? clear_nonspinnable+0x60/0x60 [ 60.222728][ T4997] ? ntfs_unmap_page+0x260/0x260 [ 60.227656][ T4997] ? iterate_dir+0x135/0x570 [ 60.232249][ T4997] iterate_dir+0x228/0x570 [ 60.236679][ T4997] __se_sys_getdents64+0x20d/0x4f0 [ 60.241782][ T4997] ? _raw_spin_unlock_irq+0x2e/0x50 [ 60.246969][ T4997] ? __x64_sys_getdents64+0x80/0x80 [ 60.252162][ T4997] ? filldir+0x6a0/0x6a0 [ 60.256402][ T4997] ? syscall_enter_from_user_mode+0x8c/0x230 [ 60.262369][ T4997] do_syscall_64+0x41/0xc0 [ 60.266780][ T4997] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 60.272670][ T4997] RIP: 0033:0x7fbe5b71a7a9 [ 60.277072][ T4997] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 60.296663][ T4997] RSP: 002b:00007fffa6105398 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 60.305058][ T4997] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbe5b71a7a9 [ 60.313015][ T4997] RDX: 00000000000000ab RSI: 0000000020000080 RDI: 0000000000000004 [ 60.320967][ T4997] RBP: 00007fbe5b6da040 R08: 0000000000000000 R09: 0000000000000000 [ 60.328925][ T4997] R10: 000000000001f1b8 R11: 0000000000000246 R12: 00007fbe5b6da0d0 [ 60.336884][ T4997] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 60.344857][ T4997] [ 60.347861][ T4997] [ 60.350168][ T4997] Allocated by task 4997: [ 60.354473][ T4997] kasan_set_track+0x4f/0x70 [ 60.359054][ T4997] __kasan_kmalloc+0x98/0xb0 [ 60.363634][ T4997] __kmalloc+0xb9/0x230 [ 60.367779][ T4997] ntfs_readdir+0x829/0x2b70 [ 60.372356][ T4997] iterate_dir+0x228/0x570 [ 60.376767][ T4997] __se_sys_getdents64+0x20d/0x4f0 [ 60.381873][ T4997] do_syscall_64+0x41/0xc0 [ 60.386285][ T4997] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 60.392163][ T4997] [ 60.394471][ T4997] The buggy address belongs to the object at ffff88801e4b9600 [ 60.394471][ T4997] which belongs to the cache kmalloc-64 of size 64 [ 60.408336][ T4997] The buggy address is located 57 bytes to the right of [ 60.408336][ T4997] allocated 56-byte region [ffff88801e4b9600, ffff88801e4b9638) [ 60.422819][ T4997] [ 60.425128][ T4997] The buggy address belongs to the physical page: [ 60.431519][ T4997] page:ffffea0000792e40 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1e4b9 [ 60.441668][ T4997] ksm flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 60.449550][ T4997] page_type: 0xffffffff() [ 60.453869][ T4997] raw: 00fff00000000200 ffff888012441640 ffffea0000aa58c0 dead000000000003 [ 60.462435][ T4997] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 60.470996][ T4997] page dumped because: kasan: bad access detected [ 60.477393][ T4997] page_owner tracks the page as allocated [ 60.483089][ T4997] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 10, tgid 10 (kworker/u4:0), ts 7379939316, free_ts 0 [ 60.500083][ T4997] post_alloc_hook+0x1e6/0x210 [ 60.504834][ T4997] get_page_from_freelist+0x321c/0x33a0 [ 60.510369][ T4997] __alloc_pages+0x255/0x670 [ 60.514947][ T4997] alloc_slab_page+0x6a/0x160 [ 60.519610][ T4997] new_slab+0x84/0x2f0 [ 60.523665][ T4997] ___slab_alloc+0xa85/0x10a0 [ 60.528328][ T4997] __kmem_cache_alloc_node+0x1b8/0x290 [ 60.533775][ T4997] __kmalloc_node+0xa7/0x230 [ 60.538361][ T4997] __vmalloc_node_range+0x5fc/0x14e0 [ 60.543654][ T4997] dup_task_struct+0x3e5/0x7d0 [ 60.548408][ T4997] copy_process+0x5c8/0x4290 [ 60.553016][ T4997] kernel_clone+0x222/0x800 [ 60.557504][ T4997] user_mode_thread+0x132/0x190 [ 60.562341][ T4997] call_usermodehelper_exec_work+0x5c/0x220 [ 60.568221][ T4997] process_one_work+0x8a0/0x10e0 [ 60.573149][ T4997] worker_thread+0xa63/0x1210 [ 60.577814][ T4997] page_owner free stack trace missing [ 60.583161][ T4997] [ 60.585470][ T4997] Memory state around the buggy address: [ 60.591097][ T4997] ffff88801e4b9500: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 60.599146][ T4997] ffff88801e4b9580: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.607191][ T4997] >ffff88801e4b9600: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 60.615233][ T4997] ^ [ 60.622929][ T4997] ffff88801e4b9680: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 60.630972][ T4997] ffff88801e4b9700: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 60.639019][ T4997] ================================================================== [ 60.647249][ T4997] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 60.654445][ T4997] CPU: 1 PID: 4997 Comm: syz-executor200 Not tainted 6.4.0-rc5-syzkaller-00016-ga4d7d7011219 #0 [ 60.664850][ T4997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 [ 60.674898][ T4997] Call Trace: [ 60.678166][ T4997] [ 60.681103][ T4997] dump_stack_lvl+0x1e7/0x2d0 [ 60.685803][ T4997] ? nf_tcp_handle_invalid+0x650/0x650 [ 60.691263][ T4997] ? panic+0x770/0x770 [ 60.695325][ T4997] ? preempt_schedule_common+0x83/0xc0 [ 60.700803][ T4997] ? vscnprintf+0x5d/0x80 [ 60.705130][ T4997] panic+0x30f/0x770 [ 60.709022][ T4997] ? check_panic_on_warn+0x21/0xa0 [ 60.714138][ T4997] ? __memcpy_flushcache+0x2b0/0x2b0 [ 60.719425][ T4997] ? _raw_spin_unlock_irqrestore+0x12c/0x140 [ 60.725405][ T4997] ? _raw_spin_unlock+0x40/0x40 [ 60.730249][ T4997] ? print_report+0x4fb/0x540 [ 60.734926][ T4997] check_panic_on_warn+0x82/0xa0 [ 60.739863][ T4997] ? ntfs_readdir+0xea1/0x2b70 [ 60.744620][ T4997] end_report+0x63/0x110 [ 60.748859][ T4997] kasan_report+0x183/0x1b0 [ 60.753365][ T4997] ? ntfs_readdir+0xea1/0x2b70 [ 60.758134][ T4997] ntfs_readdir+0xea1/0x2b70 [ 60.762737][ T4997] ? read_lock_is_recursive+0x20/0x20 [ 60.768111][ T4997] ? __down_write_common+0x161/0x200 [ 60.773396][ T4997] ? clear_nonspinnable+0x60/0x60 [ 60.778434][ T4997] ? ntfs_unmap_page+0x260/0x260 [ 60.783380][ T4997] ? iterate_dir+0x135/0x570 [ 60.787980][ T4997] iterate_dir+0x228/0x570 [ 60.792422][ T4997] __se_sys_getdents64+0x20d/0x4f0 [ 60.797550][ T4997] ? _raw_spin_unlock_irq+0x2e/0x50 [ 60.802757][ T4997] ? __x64_sys_getdents64+0x80/0x80 [ 60.807968][ T4997] ? filldir+0x6a0/0x6a0 [ 60.812223][ T4997] ? syscall_enter_from_user_mode+0x8c/0x230 [ 60.818269][ T4997] do_syscall_64+0x41/0xc0 [ 60.822701][ T4997] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 60.828600][ T4997] RIP: 0033:0x7fbe5b71a7a9 [ 60.833016][ T4997] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 60.852629][ T4997] RSP: 002b:00007fffa6105398 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 60.861054][ T4997] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbe5b71a7a9 [ 60.869030][ T4997] RDX: 00000000000000ab RSI: 0000000020000080 RDI: 0000000000000004 [ 60.877008][ T4997] RBP: 00007fbe5b6da040 R08: 0000000000000000 R09: 0000000000000000 [ 60.884975][ T4997] R10: 000000000001f1b8 R11: 0000000000000246 R12: 00007fbe5b6da0d0 [ 60.892941][ T4997] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 60.900919][ T4997] [ 60.904200][ T4997] Kernel Offset: disabled [ 60.908530][ T4997] Rebooting in 86400 seconds..