./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor399420329 <...> Warning: Permanently added '10.128.10.28' (ECDSA) to the list of known hosts. execve("./syz-executor399420329", ["./syz-executor399420329"], 0x7ffd7c8d76d0 /* 10 vars */) = 0 brk(NULL) = 0x5555562a1000 brk(0x5555562a1c40) = 0x5555562a1c40 arch_prctl(ARCH_SET_FS, 0x5555562a1300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor399420329", 4096) = 27 brk(0x5555562c2c40) = 0x5555562c2c40 brk(0x5555562c3000) = 0x5555562c3000 mprotect(0x7f080b2ee000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 unshare(CLONE_NEWPID) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 3607 attached , child_tidptr=0x5555562a15d0) = 3607 [pid 3607] mount(NULL, "/sys/fs/fuse/connections", "fusectl", 0, NULL) = -1 EBUSY (Device or resource busy) [pid 3607] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 3607] setsid() = 1 [pid 3607] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0 [pid 3607] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0 [pid 3607] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0 [pid 3607] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0 [pid 3607] prlimit64(0, RLIMIT_CORE, {rlim_cur=0, rlim_max=0}, NULL) = 0 [pid 3607] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0 [pid 3607] unshare(CLONE_NEWNS) = 0 [pid 3607] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0 [pid 3607] unshare(CLONE_NEWIPC) = 0 [pid 3607] unshare(CLONE_NEWCGROUP) = 0 [pid 3607] unshare(CLONE_NEWUTS) = 0 [pid 3607] unshare(CLONE_SYSVSEM) = 0 [pid 3607] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = 3 [pid 3607] write(3, "16777216", 8) = 8 [pid 3607] close(3) = 0 [pid 3607] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = 3 [pid 3607] write(3, "536870912", 9) = 9 [pid 3607] close(3) = 0 [pid 3607] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = 3 [pid 3607] write(3, "1024", 4) = 4 [pid 3607] close(3) = 0 [pid 3607] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = 3 [pid 3607] write(3, "8192", 4) = 4 [pid 3607] close(3) = 0 [pid 3607] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = 3 [pid 3607] write(3, "1024", 4) = 4 [pid 3607] close(3) = 0 [pid 3607] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = 3 [pid 3607] write(3, "1024", 4) = 4 [pid 3607] close(3) = 0 [pid 3607] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = 3 [pid 3607] write(3, "1024 1048576 500 1024", 21) = 21 [pid 3607] close(3) = 0 [pid 3607] getpid() = 1 [pid 3607] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1< [ 42.840353][ T3607] dump_stack_lvl+0x1b1/0x28e [ 42.845055][ T3607] ? fortify_panic+0x13/0x13 [ 42.849663][ T3607] ? _printk+0xc0/0x100 [ 42.853834][ T3607] ? __wake_up_klogd+0xd6/0x100 [ 42.858711][ T3607] ? __wake_up_klogd+0xcd/0x100 [ 42.863570][ T3607] ? panic+0x715/0x715 [ 42.867678][ T3607] ? _printk+0xc0/0x100 [ 42.872478][ T3607] print_address_description+0x65/0x4b0 [ 42.878048][ T3607] print_report+0x108/0x1f0 [ 42.882552][ T3607] ? stack_trace_snprint+0xf0/0xf0 [ 42.887664][ T3607] ? ntfs_attr_find+0x91a/0xd80 [ 42.892503][ T3607] kasan_report+0xc3/0xf0 [ 42.896820][ T3607] ? ntfs_attr_find+0x91a/0xd80 [ 42.901655][ T3607] ntfs_attr_find+0x91a/0xd80 [ 42.906328][ T3607] ? vfs_get_tree+0x88/0x270 [ 42.910903][ T3607] ? do_syscall_64+0x3d/0xb0 [ 42.915483][ T3607] ntfs_attr_lookup+0x4c3/0x2370 [ 42.920548][ T3607] ? print_irqtrace_events+0x220/0x220 [ 42.926013][ T3607] ? ___slab_alloc+0xb02/0xc40 [ 42.930766][ T3607] ? lockdep_hardirqs_on+0x8d/0x130 [ 42.935951][ T3607] ? rcu_read_lock_sched_held+0x5d/0x110 [ 42.941594][ T3607] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 42.947568][ T3607] ? ntfs_attr_reinit_search_ctx+0x2e0/0x2e0 [ 42.953534][ T3607] ? trace_kmem_cache_alloc+0x2d/0xe0 [ 42.958891][ T3607] ? kmem_cache_alloc+0x202/0x310 [ 42.963906][ T3607] ? memset+0x1f/0x40 [ 42.967874][ T3607] ntfs_read_inode_mount+0x8c9/0x2680 [ 42.973236][ T3607] ntfs_fill_super+0x187a/0x2bf0 [ 42.978162][ T3607] mount_bdev+0x26c/0x3a0 [ 42.982502][ T3607] ? ntfs_mount+0x40/0x40 [ 42.986833][ T3607] legacy_get_tree+0xea/0x180 [ 42.991505][ T3607] ? ntfs_rl_punch_nolock+0x1160/0x1160 [ 42.997154][ T3607] vfs_get_tree+0x88/0x270 [ 43.001578][ T3607] do_new_mount+0x289/0xad0 [ 43.006079][ T3607] ? do_move_mount_old+0x150/0x150 [ 43.011273][ T3607] ? user_path_at_empty+0x149/0x1a0 [ 43.016452][ T3607] __se_sys_mount+0x2d3/0x3c0 [ 43.021131][ T3607] ? __x64_sys_mount+0xc0/0xc0 [ 43.025909][ T3607] ? syscall_enter_from_user_mode+0x2e/0x1d0 [ 43.031880][ T3607] ? __x64_sys_mount+0x1c/0xc0 [ 43.036626][ T3607] do_syscall_64+0x3d/0xb0 [ 43.041039][ T3607] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 43.046916][ T3607] RIP: 0033:0x7f080b27f4ca [ 43.051752][ T3607] Code: 48 c7 c2 c0 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 08 01 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 43.071341][ T3607] RSP: 002b:00007ffcce528958 EFLAGS: 00000286 ORIG_RAX: 00000000000000a5 [ 43.079738][ T3607] RAX: ffffffffffffffda RBX: 00007ffcce5289b0 RCX: 00007f080b27f4ca [ 43.087694][ T3607] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ffcce528970 [ 43.095647][ T3607] RBP: 00007ffcce528970 R08: 00007ffcce5289b0 R09: 0000000000000000 [ 43.104218][ T3607] R10: 0000000000000000 R11: 0000000000000286 R12: 0000000020000260 [ 43.112172][ T3607] R13: 0000000000000003 R14: 0000000000000004 R15: 0000000000000004 [ 43.120132][ T3607] [ 43.123165][ T3607] [ 43.125473][ T3607] Allocated by task 3607: [ 43.129827][ T3607] ____kasan_kmalloc+0xcd/0x100 [ 43.134682][ T3607] kmem_cache_alloc_trace+0x97/0x310 [ 43.140039][ T3607] tomoyo_init_log+0x16a/0x1f80 [ 43.144967][ T3607] tomoyo_supervisor+0x3b9/0x1470 [ 43.149971][ T3607] tomoyo_path_number_perm+0x530/0x790 [ 43.155760][ T3607] tomoyo_path_mkdir+0xe3/0x120 [ 43.160591][ T3607] security_path_mkdir+0xd5/0x160 [ 43.165598][ T3607] do_mkdirat+0x1aa/0x550 [ 43.169912][ T3607] __x64_sys_mkdir+0x6a/0x80 [ 43.174495][ T3607] do_syscall_64+0x3d/0xb0 [ 43.178897][ T3607] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 43.184951][ T3607] [ 43.187255][ T3607] Freed by task 3607: [ 43.191228][ T3607] kasan_set_track+0x3d/0x60 [ 43.195796][ T3607] kasan_set_free_info+0x1f/0x40 [ 43.200715][ T3607] ____kasan_slab_free+0xd8/0x120 [ 43.205720][ T3607] slab_free_freelist_hook+0x12e/0x1a0 [ 43.211162][ T3607] kfree+0xda/0x210 [ 43.214961][ T3607] tomoyo_init_log+0x1be7/0x1f80 [ 43.219881][ T3607] tomoyo_supervisor+0x3b9/0x1470 [ 43.224890][ T3607] tomoyo_path_number_perm+0x530/0x790 [ 43.230330][ T3607] tomoyo_path_mkdir+0xe3/0x120 [ 43.235167][ T3607] security_path_mkdir+0xd5/0x160 [ 43.240172][ T3607] do_mkdirat+0x1aa/0x550 [ 43.244514][ T3607] __x64_sys_mkdir+0x6a/0x80 [ 43.249110][ T3607] do_syscall_64+0x3d/0xb0 [ 43.253521][ T3607] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 43.259401][ T3607] [ 43.261705][ T3607] The buggy address belongs to the object at ffff88807660c000 [ 43.261705][ T3607] which belongs to the cache kmalloc-4k of size 4096 [ 43.275823][ T3607] The buggy address is located 4034 bytes to the right of [ 43.275823][ T3607] 4096-byte region [ffff88807660c000, ffff88807660d000) [ 43.289776][ T3607] [ 43.292091][ T3607] The buggy address belongs to the physical page: [ 43.298490][ T3607] page:ffffea0001d98200 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x76608 [ 43.308818][ T3607] head:ffffea0001d98200 order:3 compound_mapcount:0 compound_pincount:0 [ 43.317245][ T3607] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 43.325237][ T3607] raw: 00fff00000010200 ffffea000087ac00 dead000000000002 ffff888012042140 [ 43.333820][ T3607] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000 [ 43.342410][ T3607] page dumped because: kasan: bad access detected [ 43.348843][ T3607] page_owner tracks the page as allocated [ 43.354560][ T3607] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 2984, tgid 2984 (udevd), ts 14493525012, free_ts 11146345813 [ 43.374537][ T3607] get_page_from_freelist+0x742/0x7c0 [ 43.379910][ T3607] __alloc_pages+0x259/0x560 [ 43.384484][ T3607] alloc_slab_page+0x70/0xf0 [ 43.389057][ T3607] allocate_slab+0x5e/0x520 [ 43.393542][ T3607] ___slab_alloc+0x3ee/0xc40 [ 43.398128][ T3607] __kmalloc+0x2bd/0x370 [ 43.402354][ T3607] tomoyo_realpath_from_path+0xd8/0x5f0 [ 43.407881][ T3607] tomoyo_check_open_permission+0x1f0/0x460 [ 43.413754][ T3607] security_file_open+0x50/0x560 [ 43.418675][ T3607] do_dentry_open+0x34c/0x1180 [ 43.423428][ T3607] path_openat+0x25fc/0x2df0 [ 43.428014][ T3607] do_filp_open+0x264/0x4f0 [ 43.432515][ T3607] do_sys_openat2+0x124/0x4e0 [ 43.437188][ T3607] __x64_sys_openat+0x243/0x290 [ 43.442025][ T3607] do_syscall_64+0x3d/0xb0 [ 43.446446][ T3607] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 43.452333][ T3607] page last free stack trace: [ 43.457019][ T3607] free_pcp_prepare+0x812/0x900 [ 43.461884][ T3607] free_unref_page+0x7d/0x5f0 [ 43.466554][ T3607] free_contig_range+0xa3/0x160 [ 43.471400][ T3607] destroy_args+0xfe/0x91d [ 43.475833][ T3607] debug_vm_pgtable+0x43e/0x497 [ 43.480684][ T3607] do_one_initcall+0x1b9/0x3e0 [ 43.485442][ T3607] do_initcall_level+0x168/0x218 [ 43.490380][ T3607] do_initcalls+0x4b/0x8c [ 43.494696][ T3607] kernel_init_freeable+0x3f1/0x57b [ 43.499884][ T3607] kernel_init+0x19/0x2b0 [ 43.504223][ T3607] ret_from_fork+0x1f/0x30 [ 43.508623][ T3607] [ 43.510928][ T3607] Memory state around the buggy address: [ 43.516539][ T3607] ffff88807660de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.524583][ T3607] ffff88807660df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.532623][ T3607] >ffff88807660df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.540663][ T3607] ^ [ 43.547405][ T3607] ffff88807660e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.555467][ T3607] ffff88807660e080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.563506][ T3607] ================================================================== [ 43.586106][ T3607] Kernel panic - not syncing: panic_on_warn set ... [ 43.592736][ T3607] CPU: 1 PID: 3607 Comm: syz-executor399 Not tainted 6.0.0-rc6-syzkaller #0 [ 43.601395][ T3607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 [ 43.611437][ T3607] Call Trace: [ 43.614701][ T3607] [ 43.617615][ T3607] dump_stack_lvl+0x1b1/0x28e [ 43.622284][ T3607] ? fortify_panic+0x13/0x13 [ 43.626854][ T3607] ? panic+0x715/0x715 [ 43.630939][ T3607] ? preempt_schedule_common+0xb7/0xe0 [ 43.636379][ T3607] ? vscnprintf+0x59/0x80 [ 43.640688][ T3607] panic+0x2d6/0x715 [ 43.644576][ T3607] ? fb_is_primary_device+0xcc/0xcc [ 43.649757][ T3607] ? _raw_spin_unlock_irqrestore+0x110/0x120 [ 43.655737][ T3607] ? print_report+0x1b4/0x1f0 [ 43.660434][ T3607] ? ntfs_attr_find+0x91a/0xd80 [ 43.665298][ T3607] end_report+0x91/0xa0 [ 43.669452][ T3607] kasan_report+0xd0/0xf0 [ 43.673775][ T3607] ? ntfs_attr_find+0x91a/0xd80 [ 43.678612][ T3607] ntfs_attr_find+0x91a/0xd80 [ 43.683285][ T3607] ? vfs_get_tree+0x88/0x270 [ 43.687855][ T3607] ? do_syscall_64+0x3d/0xb0 [ 43.692428][ T3607] ntfs_attr_lookup+0x4c3/0x2370 [ 43.697347][ T3607] ? print_irqtrace_events+0x220/0x220 [ 43.702811][ T3607] ? ___slab_alloc+0xb02/0xc40 [ 43.707574][ T3607] ? lockdep_hardirqs_on+0x8d/0x130 [ 43.712772][ T3607] ? rcu_read_lock_sched_held+0x5d/0x110 [ 43.718401][ T3607] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 43.724372][ T3607] ? ntfs_attr_reinit_search_ctx+0x2e0/0x2e0 [ 43.730353][ T3607] ? trace_kmem_cache_alloc+0x2d/0xe0 [ 43.735711][ T3607] ? kmem_cache_alloc+0x202/0x310 [ 43.740728][ T3607] ? memset+0x1f/0x40 [ 43.744708][ T3607] ntfs_read_inode_mount+0x8c9/0x2680 [ 43.750098][ T3607] ntfs_fill_super+0x187a/0x2bf0 [ 43.755060][ T3607] mount_bdev+0x26c/0x3a0 [ 43.759383][ T3607] ? ntfs_mount+0x40/0x40 [ 43.763713][ T3607] legacy_get_tree+0xea/0x180 [ 43.768374][ T3607] ? ntfs_rl_punch_nolock+0x1160/0x1160 [ 43.773899][ T3607] vfs_get_tree+0x88/0x270 [ 43.778293][ T3607] do_new_mount+0x289/0xad0 [ 43.782794][ T3607] ? do_move_mount_old+0x150/0x150 [ 43.787892][ T3607] ? user_path_at_empty+0x149/0x1a0 [ 43.793072][ T3607] __se_sys_mount+0x2d3/0x3c0 [ 43.797734][ T3607] ? __x64_sys_mount+0xc0/0xc0 [ 43.802822][ T3607] ? syscall_enter_from_user_mode+0x2e/0x1d0 [ 43.808782][ T3607] ? __x64_sys_mount+0x1c/0xc0 [ 43.813535][ T3607] do_syscall_64+0x3d/0xb0 [ 43.817936][ T3607] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 43.823816][ T3607] RIP: 0033:0x7f080b27f4ca [ 43.828211][ T3607] Code: 48 c7 c2 c0 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 08 01 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 43.847795][ T3607] RSP: 002b:00007ffcce528958 EFLAGS: 00000286 ORIG_RAX: 00000000000000a5 [ 43.856190][ T3607] RAX: ffffffffffffffda RBX: 00007ffcce5289b0 RCX: 00007f080b27f4ca [ 43.864141][ T3607] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ffcce528970 [ 43.872108][ T3607] RBP: 00007ffcce528970 R08: 00007ffcce5289b0 R09: 0000000000000000 [ 43.880057][ T3607] R10: 0000000000000000 R11: 0000000000000286 R12: 0000000020000260 [ 43.888006][ T3607] R13: 0000000000000003 R14: 0000000000000004 R15: 0000000000000004 [ 43.895962][ T3607] [ 43.899320][ T3607] Kernel Offset: disabled [ 43.903638][ T3607] Rebooting in 86400 seconds..