./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor253610092 <...> Warning: Permanently added '10.128.10.2' (ED25519) to the list of known hosts. execve("./syz-executor253610092", ["./syz-executor253610092"], 0x7ffdb891d590 /* 10 vars */) = 0 brk(NULL) = 0x5555565d4000 brk(0x5555565d4e00) = 0x5555565d4e00 arch_prctl(ARCH_SET_FS, 0x5555565d4480) = 0 set_tid_address(0x5555565d4750) = 5018 set_robust_list(0x5555565d4760, 24) = 0 rseq(0x5555565d4da0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor253610092", 4096) = 27 getrandom("\xcf\xd3\x18\xab\x92\x4b\x4d\x1d", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x5555565d4e00 brk(0x5555565f5e00) = 0x5555565f5e00 brk(0x5555565f6000) = 0x5555565f6000 mprotect(0x7fc861c75000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 getpid() = 5018 openat(AT_FDCWD, "/sys/kernel/debug/x86/nmi_longest_ns", O_WRONLY|O_CLOEXEC) = 3 write(3, "10000000000", 11) = 11 close(3) = 0 openat(AT_FDCWD, "/proc/sys/kernel/hung_task_check_interval_secs", O_WRONLY|O_CLOEXEC) = 3 write(3, "20", 2) = 2 close(3) = 0 openat(AT_FDCWD, "/proc/sys/net/core/bpf_jit_kallsyms", O_WRONLY|O_CLOEXEC) = 3 write(3, "1", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/proc/sys/net/core/bpf_jit_harden", O_WRONLY|O_CLOEXEC) = 3 write(3, "0", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/proc/sys/kernel/kptr_restrict", O_WRONLY|O_CLOEXEC) = 3 write(3, "0", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/proc/sys/kernel/softlockup_all_cpu_backtrace", O_WRONLY|O_CLOEXEC) = 3 write(3, "1", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/proc/sys/fs/mount-max", O_WRONLY|O_CLOEXEC) = 3 write(3, "100", 3) = 3 close(3) = 0 openat(AT_FDCWD, "/proc/sys/vm/oom_dump_tasks", O_WRONLY|O_CLOEXEC) = 3 write(3, "0", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/proc/sys/debug/exception-trace", O_WRONLY|O_CLOEXEC) = 3 write(3, "0", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/proc/sys/kernel/printk", O_WRONLY|O_CLOEXEC) = 3 write(3, "7 4 1 3", 7) = 7 close(3) = 0 openat(AT_FDCWD, "/proc/sys/kernel/keys/gc_delay", O_WRONLY|O_CLOEXEC) = 3 write(3, "1", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/proc/sys/vm/oom_kill_allocating_task", O_WRONLY|O_CLOEXEC) = 3 write(3, "1", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/proc/sys/kernel/ctrl-alt-del", O_WRONLY|O_CLOEXEC) = 3 write(3, "0", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/proc/sys/kernel/cad_pid", O_WRONLY|O_CLOEXEC) = 3 write(3, "5018", 4) = 4 close(3) = 0 socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) = 3 socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) = 4 sendto(4, [{nlmsg_len=36, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x03\x00\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=784, nlmsg_type=nlctrl, nlmsg_flags=0, nlmsg_seq=0, nlmsg_pid=5018}, "\x01\x02\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00\x06\x00\x01\x00\x1d\x00\x00\x00\x08\x00\x03\x00\x01\x00\x00\x00\x08\x00\x04\x00\x00\x00\x00\x00\x08\x00\x05\x00\x2e\x00\x00\x00\x98\x02\x06\x00\x14\x00\x01\x00\x08\x00\x01\x00\x01\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x02\x00\x08\x00\x01\x00\x05\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x03\x00"...], 4096, 0, NULL, NULL) = 784 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5018}, {error=0, msg={nlmsg_len=36, nlmsg_type=nlctrl, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0 close(5) = 0 sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0b\x00\x00\x00\x06\x00\x0a\x00\xa0\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5018}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0 close(5) = 0 sendto(3, [{nlmsg_len=44, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x00\x00\x00\x00\x0b\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x0c\x00\x01\x00\x02\x00\xaa\xaa\xaa\xaa\xaa\xaa"], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5018}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 sendto(3, [{nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=0, ifi_flags=0, ifi_change=0}, [[{nla_len=11, nla_type=IFLA_IFNAME}, "lowpan0"...], [{nla_len=16, nla_type=IFLA_LINKINFO}, [{nla_len=10, nla_type=IFLA_INFO_KIND}, "lowpan"...]], [{nla_len=8, nla_type=IFLA_LINK}, 11]]], 68, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 68 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5018}, {error=0, msg={nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0 close(5) = 0 sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0c\x00\x00\x00\x06\x00\x0a\x00\xa1\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5018}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0 close(5) = 0 sendto(3, [{nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=if_nametoindex("wpan1"), ifi_flags=IFF_UP, ifi_change=0x1}, [{nla_len=12, nla_type=IFLA_ADDRESS}, 02:01:aa:aa:aa:aa:aa]], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5018}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 close(3) = 0 close(4) = 0 rt_sigaction(SIGRTMIN, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0 rt_sigaction(SIGSEGV, {sa_handler=0x7fc861bac8f0, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7fc861bb49e0}, NULL, 8) = 0 rt_sigaction(SIGBUS, {sa_handler=0x7fc861bac8f0, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7fc861bb49e0}, NULL, 8) = 0 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fc8597a2000 write(3, "\xeb\x52\x90\x4e\x54\x46\x53\x20\x20\x20\x20\x00\x10\x01\x00\x00\x00\x00\x00\x00\x00\xf8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x80\x00\x00\x00\x00\x00\x01\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\xff\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x78\x5f\xaa\x3b\xd7\x0e\xce\x68\x00\x00\x00\x00\x0e\x1f\xbe\x71\x7c\xac\x22\xc0\x74\x0b\x56\xb4\x0e\xbb\x07\x00"..., 2097152) = 2097152 munmap(0x7fc8597a2000, 2097152) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 mkdir("./bus", 0777) = 0 [ 38.638847][ T5018] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=5018 'syz-executor253' [ 38.670803][ T5018] loop0: detected capacity change from 0 to 4096 [ 38.680826][ T5018] ntfs3: loop0: Different NTFS sector size (4096) and media sector size (512). [ 38.689881][ T5018] ntfs3: loop0: RAW NTFS volume: Filesystem size 16384.00 Gb > volume size 0.00 Gb. Mount in read-only. [ 38.701014][ T5018] ntfs3: loop0: NTFS 16384.00 Gb is too big to use 32 bits per cluster. [ 38.709895][ T5018] ================================================================== [ 38.717950][ T5018] BUG: KASAN: use-after-free in memcmp+0x173/0x1c0 [ 38.724492][ T5018] Read of size 8 at addr ffff888073716002 by task syz-executor253/5018 [ 38.732809][ T5018] [ 38.735112][ T5018] CPU: 0 PID: 5018 Comm: syz-executor253 Not tainted 6.5.0-rc1-syzkaller-00006-g3f01e9fed845 #0 [ 38.745496][ T5018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 38.755617][ T5018] Call Trace: [ 38.758903][ T5018] [ 38.761814][ T5018] dump_stack_lvl+0xd9/0x150 [ 38.766390][ T5018] print_address_description.constprop.0+0x2c/0x3c0 [ 38.772990][ T5018] kasan_report+0x11d/0x130 [ 38.777483][ T5018] ? memcmp+0x173/0x1c0 [ 38.781617][ T5018] memcmp+0x173/0x1c0 [ 38.785658][ T5018] ? __bread_gfp+0x81/0x330 [ 38.790219][ T5018] ntfs_fill_super+0x7fc/0x4240 [ 38.795399][ T5018] ? put_ntfs+0x330/0x330 [ 38.799702][ T5018] ? vsprintf+0x30/0x30 [ 38.803830][ T5018] ? wait_for_completion_io_timeout+0x20/0x20 [ 38.810044][ T5018] ? set_blocksize+0x2d8/0x370 [ 38.814785][ T5018] get_tree_bdev+0x43e/0x7d0 [ 38.819344][ T5018] ? put_ntfs+0x330/0x330 [ 38.823646][ T5018] vfs_get_tree+0x8d/0x350 [ 38.828119][ T5018] path_mount+0x136e/0x1e70 [ 38.832592][ T5018] ? putname+0x102/0x140 [ 38.836803][ T5018] ? kmem_cache_free+0xf0/0x490 [ 38.841652][ T5018] ? finish_automount+0xa30/0xa30 [ 38.846652][ T5018] ? putname+0x102/0x140 [ 38.850863][ T5018] __x64_sys_mount+0x283/0x300 [ 38.855597][ T5018] ? copy_mnt_ns+0xb30/0xb30 [ 38.860161][ T5018] ? lockdep_hardirqs_on+0x7d/0x100 [ 38.865420][ T5018] ? _raw_spin_unlock_irq+0x2e/0x50 [ 38.870615][ T5018] ? ptrace_notify+0xfe/0x140 [ 38.875284][ T5018] do_syscall_64+0x39/0xb0 [ 38.879688][ T5018] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 38.885573][ T5018] RIP: 0033:0x7fc861be99aa [ 38.890052][ T5018] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 ee 08 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 38.909739][ T5018] RSP: 002b:00007ffc94a24cd8 EFLAGS: 00000286 ORIG_RAX: 00000000000000a5 [ 38.918130][ T5018] RAX: ffffffffffffffda RBX: 00007ffc94a24cf0 RCX: 00007fc861be99aa [ 38.926076][ T5018] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 00007ffc94a24cf0 [ 38.934021][ T5018] RBP: 0000000000000004 R08: 00007ffc94a24d30 R09: 000000000001f1a1 [ 38.941999][ T5018] R10: 0000000000800000 R11: 0000000000000286 R12: 0000000000800000 [ 38.949950][ T5018] R13: 00007ffc94a24d30 R14: 0000000000000003 R15: 0000000000200000 [ 38.957898][ T5018] [ 38.960892][ T5018] [ 38.963192][ T5018] The buggy address belongs to the physical page: [ 38.969569][ T5018] page:ffffea0001cdc580 refcount:0 mapcount:0 mapping:0000000000000000 index:0x1 pfn:0x73716 [ 38.979682][ T5018] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 38.986768][ T5018] page_type: 0xffffffff() [ 38.991080][ T5018] raw: 00fff00000000000 ffffea0001cdc5c8 ffff8880b9843460 0000000000000000 [ 38.999647][ T5018] raw: 0000000000000001 0000000000000000 00000000ffffffff 0000000000000000 [ 39.008288][ T5018] page dumped because: kasan: bad access detected [ 39.014679][ T5018] page_owner tracks the page as freed [ 39.020028][ T5018] page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_COMP|__GFP_ZERO), pid 5018, tgid 5018 (syz-executor253), ts 38649626285, free_ts 38668668843 [ 39.039125][ T5018] post_alloc_hook+0x2db/0x350 [ 39.043868][ T5018] get_page_from_freelist+0xfed/0x2d30 [ 39.049302][ T5018] __alloc_pages+0x1cb/0x4a0 [ 39.053878][ T5018] __folio_alloc+0x16/0x40 [ 39.058270][ T5018] vma_alloc_folio+0x155/0x890 [ 39.063026][ T5018] __handle_mm_fault+0x2072/0x3c50 [ 39.068111][ T5018] handle_mm_fault+0x2a7/0x9e0 [ 39.072849][ T5018] do_user_addr_fault+0x2dc/0x1360 [ 39.077930][ T5018] exc_page_fault+0x98/0x170 [ 39.082494][ T5018] asm_exc_page_fault+0x26/0x30 [ 39.087386][ T5018] page last free stack trace: [ 39.092023][ T5018] free_unref_page_prepare+0x62e/0xcb0 [ 39.097463][ T5018] free_unref_page_list+0xe3/0xa70 [ 39.102546][ T5018] release_pages+0xcd8/0x1380 [ 39.107191][ T5018] tlb_batch_pages_flush+0xa8/0x1a0 [ 39.112447][ T5018] tlb_finish_mmu+0x14b/0x7e0 [ 39.117093][ T5018] unmap_region+0x23d/0x2d0 [ 39.121563][ T5018] do_vmi_align_munmap+0xdf9/0x1690 [ 39.126731][ T5018] do_vmi_munmap+0x266/0x430 [ 39.131380][ T5018] __vm_munmap+0x137/0x380 [ 39.135772][ T5018] __x64_sys_munmap+0x62/0x80 [ 39.140422][ T5018] do_syscall_64+0x39/0xb0 [ 39.144830][ T5018] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 39.150873][ T5018] [ 39.153184][ T5018] Memory state around the buggy address: [ 39.158784][ T5018] ffff888073715f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.166814][ T5018] ffff888073715f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.174843][ T5018] >ffff888073716000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.182870][ T5018] ^ [ 39.186910][ T5018] ffff888073716080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.195030][ T5018] ffff888073716100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.203078][ T5018] ================================================================== [ 39.211545][ T5018] Disabling lock debugging due to kernel taint [ 39.217710][ T5018] ================================================================== [ 39.225758][ T5018] BUG: KASAN: use-after-free in memcmp+0x1a4/0x1c0 [ 39.232247][ T5018] Read of size 1 at addr ffff888073716002 by task syz-executor253/5018 [ 39.240461][ T5018] [ 39.242894][ T5018] CPU: 0 PID: 5018 Comm: syz-executor253 Tainted: G B 6.5.0-rc1-syzkaller-00006-g3f01e9fed845 #0 [ 39.255651][ T5018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 39.265686][ T5018] Call Trace: [ 39.268949][ T5018] [ 39.271885][ T5018] dump_stack_lvl+0xd9/0x150 [ 39.276475][ T5018] print_address_description.constprop.0+0x2c/0x3c0 [ 39.283235][ T5018] kasan_report+0x11d/0x130 [ 39.287813][ T5018] ? memcmp+0x1a4/0x1c0 [ 39.291972][ T5018] memcmp+0x1a4/0x1c0 [ 39.295938][ T5018] ? __bread_gfp+0x81/0x330 [ 39.300425][ T5018] ntfs_fill_super+0x7fc/0x4240 [ 39.305268][ T5018] ? put_ntfs+0x330/0x330 [ 39.309671][ T5018] ? vsprintf+0x30/0x30 [ 39.313810][ T5018] ? wait_for_completion_io_timeout+0x20/0x20 [ 39.319886][ T5018] ? set_blocksize+0x2d8/0x370 [ 39.324638][ T5018] get_tree_bdev+0x43e/0x7d0 [ 39.329225][ T5018] ? put_ntfs+0x330/0x330 [ 39.333544][ T5018] vfs_get_tree+0x8d/0x350 [ 39.337941][ T5018] path_mount+0x136e/0x1e70 [ 39.342430][ T5018] ? putname+0x102/0x140 [ 39.346653][ T5018] ? kmem_cache_free+0xf0/0x490 [ 39.351665][ T5018] ? finish_automount+0xa30/0xa30 [ 39.356672][ T5018] ? putname+0x102/0x140 [ 39.360895][ T5018] __x64_sys_mount+0x283/0x300 [ 39.365643][ T5018] ? copy_mnt_ns+0xb30/0xb30 [ 39.370214][ T5018] ? lockdep_hardirqs_on+0x7d/0x100 [ 39.375490][ T5018] ? _raw_spin_unlock_irq+0x2e/0x50 [ 39.380672][ T5018] ? ptrace_notify+0xfe/0x140 [ 39.385336][ T5018] do_syscall_64+0x39/0xb0 [ 39.389831][ T5018] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 39.395715][ T5018] RIP: 0033:0x7fc861be99aa [ 39.400133][ T5018] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 ee 08 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 39.419728][ T5018] RSP: 002b:00007ffc94a24cd8 EFLAGS: 00000286 ORIG_RAX: 00000000000000a5 [ 39.428255][ T5018] RAX: ffffffffffffffda RBX: 00007ffc94a24cf0 RCX: 00007fc861be99aa [ 39.436236][ T5018] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 00007ffc94a24cf0 [ 39.444220][ T5018] RBP: 0000000000000004 R08: 00007ffc94a24d30 R09: 000000000001f1a1 [ 39.452266][ T5018] R10: 0000000000800000 R11: 0000000000000286 R12: 0000000000800000 [ 39.460226][ T5018] R13: 00007ffc94a24d30 R14: 0000000000000003 R15: 0000000000200000 [ 39.468187][ T5018] [ 39.471191][ T5018] [ 39.473494][ T5018] The buggy address belongs to the physical page: [ 39.479880][ T5018] page:ffffea0001cdc580 refcount:0 mapcount:0 mapping:0000000000000000 index:0x1 pfn:0x73716 [ 39.490024][ T5018] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 39.497159][ T5018] page_type: 0xffffffff() [ 39.501471][ T5018] raw: 00fff00000000000 ffffea0001cdc5c8 ffff8880b9843460 0000000000000000 [ 39.510037][ T5018] raw: 0000000000000001 0000000000000000 00000000ffffffff 0000000000000000 [ 39.518596][ T5018] page dumped because: kasan: bad access detected [ 39.524983][ T5018] page_owner tracks the page as freed [ 39.530417][ T5018] page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_COMP|__GFP_ZERO), pid 5018, tgid 5018 (syz-executor253), ts 38649626285, free_ts 38668668843 [ 39.549429][ T5018] post_alloc_hook+0x2db/0x350 [ 39.554191][ T5018] get_page_from_freelist+0xfed/0x2d30 [ 39.559725][ T5018] __alloc_pages+0x1cb/0x4a0 [ 39.564328][ T5018] __folio_alloc+0x16/0x40 [ 39.568731][ T5018] vma_alloc_folio+0x155/0x890 [ 39.573479][ T5018] __handle_mm_fault+0x2072/0x3c50 [ 39.578579][ T5018] handle_mm_fault+0x2a7/0x9e0 [ 39.583350][ T5018] do_user_addr_fault+0x2dc/0x1360 [ 39.588528][ T5018] exc_page_fault+0x98/0x170 [ 39.593100][ T5018] asm_exc_page_fault+0x26/0x30 [ 39.597935][ T5018] page last free stack trace: [ 39.602587][ T5018] free_unref_page_prepare+0x62e/0xcb0 [ 39.608030][ T5018] free_unref_page_list+0xe3/0xa70 [ 39.613266][ T5018] release_pages+0xcd8/0x1380 [ 39.617937][ T5018] tlb_batch_pages_flush+0xa8/0x1a0 [ 39.623126][ T5018] tlb_finish_mmu+0x14b/0x7e0 [ 39.627878][ T5018] unmap_region+0x23d/0x2d0 [ 39.632364][ T5018] do_vmi_align_munmap+0xdf9/0x1690 [ 39.637546][ T5018] do_vmi_munmap+0x266/0x430 [ 39.642139][ T5018] __vm_munmap+0x137/0x380 [ 39.646539][ T5018] __x64_sys_munmap+0x62/0x80 [ 39.651299][ T5018] do_syscall_64+0x39/0xb0 [ 39.655703][ T5018] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 39.661590][ T5018] [ 39.664032][ T5018] Memory state around the buggy address: [ 39.669641][ T5018] ffff888073715f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.677681][ T5018] ffff888073715f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.685724][ T5018] >ffff888073716000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff mount("/dev/loop0", "./bus", "ntfs3", MS_I_VERSION, "force,umask=00000000000000000000000,iocharset=cp1250,iocharset=ascii,discard,nohidden,acl,nohidden,p"...) = -1 EINVAL (Invalid argument) [ 39.693850][ T5018] ^ [ 39.697895][ T5018] ffff888073716080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.705935][ T5018] ffff888073716100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.714082][ T5018] ================================================================== [ 39.722295][ T5018] ntfs3: loop0: Alternative boot signature is not NTFS. ioctl(4, LOOP_CLR_FD) = 0 close(4) = 0 exit_group(0) = ? +++ exited with 0 +++