./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1492668467 <...> Warning: Permanently added '10.128.1.87' (ECDSA) to the list of known hosts. execve("./syz-executor1492668467", ["./syz-executor1492668467"], 0x7ffe109add80 /* 10 vars */) = 0 brk(NULL) = 0x555557275000 brk(0x555557275c40) = 0x555557275c40 arch_prctl(ARCH_SET_FS, 0x555557275300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor1492668467", 4096) = 28 brk(0x555557296c40) = 0x555557296c40 brk(0x555557297000) = 0x555557297000 mprotect(0x7fb86d07d000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fb864a00000 write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 262144) = 262144 munmap(0x7fb864a00000, 262144) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 mkdir("./file0", 0777) = 0 syzkaller login: [ 52.037916][ T3632] loop0: detected capacity change from 0 to 512 [ 52.050102][ T3632] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 52.057712][ T3632] UDF-fs: Scanning with blocksize 512 failed [ 52.064367][ T3632] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 52.071740][ T3632] UDF-fs: Scanning with blocksize 1024 failed [ 52.078341][ T3632] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found mount("/dev/loop0", "./file0", "udf", 0, "longad,gid=ignore,noadinicb,iocharset=macceltic,longad,gid=ignore,longad,") = 0 openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3 chdir("./file0") = 0 ioctl(4, LOOP_CLR_FD) = 0 close(4) = 0 open(".", O_RDONLY) = 4 [ 52.085758][ T3632] UDF-fs: Scanning with blocksize 2048 failed [ 52.092393][ T3632] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 52.102905][ T3632] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 52.125348][ T3632] ================================================================== [ 52.133449][ T3632] BUG: KASAN: slab-out-of-bounds in udf_write_aext+0x62d/0x7e0 [ 52.141024][ T3632] Write of size 4 at addr ffff888025bcdff0 by task syz-executor149/3632 [ 52.149349][ T3632] [ 52.151654][ T3632] CPU: 1 PID: 3632 Comm: syz-executor149 Not tainted 6.1.0-rc7-syzkaller-00103-gef4d3ea40565 #0 [ 52.162037][ T3632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 52.172078][ T3632] Call Trace: [ 52.175345][ T3632] [ 52.178258][ T3632] dump_stack_lvl+0x1b1/0x28e [ 52.182933][ T3632] ? nf_tcp_handle_invalid+0x62e/0x62e [ 52.188368][ T3632] ? __wake_up_klogd+0xcd/0x100 [ 52.193195][ T3632] ? panic+0x710/0x710 [ 52.197240][ T3632] ? _printk+0xc0/0x100 [ 52.201373][ T3632] print_address_description+0x74/0x340 [ 52.206896][ T3632] print_report+0x107/0x1f0 [ 52.211374][ T3632] ? _raw_spin_lock+0x40/0x40 [ 52.216032][ T3632] ? udf_current_aext+0x5d0/0xa80 [ 52.221032][ T3632] ? __virt_addr_valid+0x21b/0x2d0 [ 52.226125][ T3632] ? __phys_addr+0xb5/0x160 [ 52.230656][ T3632] ? udf_write_aext+0x62d/0x7e0 [ 52.235486][ T3632] kasan_report+0xcd/0x100 [ 52.239881][ T3632] ? udf_write_aext+0x62d/0x7e0 [ 52.244709][ T3632] udf_write_aext+0x62d/0x7e0 [ 52.249363][ T3632] udf_add_entry+0x1712/0x3300 [ 52.254123][ T3632] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 52.260082][ T3632] ? __mark_inode_dirty+0x593/0x600 [ 52.265272][ T3632] ? udf_add_nondir+0x580/0x580 [ 52.270272][ T3632] ? udf_new_inode+0xb04/0xf30 [ 52.275017][ T3632] ? d_alloc+0x193/0x1d0 [ 52.279238][ T3632] udf_mkdir+0x13c/0x980 [ 52.283463][ T3632] ? udf_symlink+0x1680/0x1680 [ 52.288204][ T3632] ? from_kgid+0x193/0x6b0 [ 52.292598][ T3632] ? make_kgid+0x710/0x710 [ 52.297000][ T3632] ? __lookup_hash+0x123/0x240 [ 52.301738][ T3632] ? apparmor_path_mkdir+0x461/0x520 [ 52.307015][ T3632] ? generic_permission+0x214/0x4e0 [ 52.312195][ T3632] ? inode_permission+0xf5/0x450 [ 52.317134][ T3632] ? bpf_lsm_inode_mkdir+0x5/0x10 [ 52.322136][ T3632] ? security_inode_mkdir+0xdd/0x120 [ 52.327401][ T3632] vfs_mkdir+0x3b3/0x590 [ 52.331623][ T3632] do_mkdirat+0x279/0x550 [ 52.335925][ T3632] ? __check_object_size+0x15a/0x210 [ 52.341189][ T3632] ? vfs_mkdir+0x590/0x590 [ 52.345587][ T3632] ? getname_flags+0x1ea/0x4e0 [ 52.350328][ T3632] __x64_sys_mkdirat+0x85/0x90 [ 52.355072][ T3632] do_syscall_64+0x3d/0xb0 [ 52.359467][ T3632] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 52.365339][ T3632] RIP: 0033:0x7fb86d0108f9 [ 52.369732][ T3632] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 52.389314][ T3632] RSP: 002b:00007ffd576c9978 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 52.397704][ T3632] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb86d0108f9 [ 52.405653][ T3632] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000004 [ 52.413599][ T3632] RBP: 00007fb86cfd0190 R08: 0000000000000000 R09: 0000000000000000 [ 52.421550][ T3632] R10: 000000000000002e R11: 0000000000000246 R12: 00007fb86cfd0220 [ 52.429517][ T3632] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 52.437474][ T3632] [ 52.440473][ T3632] [ 52.442771][ T3632] Allocated by task 3347: [ 52.447071][ T3632] kasan_set_track+0x3d/0x60 [ 52.451637][ T3632] __kasan_kmalloc+0x97/0xb0 [ 52.456201][ T3632] __kmalloc+0xaf/0x1a0 [ 52.460333][ T3632] tomoyo_realpath_from_path+0xcd/0x5f0 [ 52.465857][ T3632] tomoyo_check_open_permission+0x1f0/0x460 [ 52.471727][ T3632] security_file_open+0x50/0x560 [ 52.476642][ T3632] do_dentry_open+0x306/0x11b0 [ 52.481381][ T3632] path_openat+0x25fc/0x2df0 [ 52.485947][ T3632] do_filp_open+0x264/0x4f0 [ 52.490423][ T3632] do_sys_openat2+0x124/0x4e0 [ 52.495082][ T3632] __x64_sys_openat+0x243/0x290 [ 52.499911][ T3632] do_syscall_64+0x3d/0xb0 [ 52.504302][ T3632] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 52.510172][ T3632] [ 52.512473][ T3632] The buggy address belongs to the object at ffff888025bcc000 [ 52.512473][ T3632] which belongs to the cache kmalloc-4k of size 4096 [ 52.526499][ T3632] The buggy address is located 4080 bytes to the right of [ 52.526499][ T3632] 4096-byte region [ffff888025bcc000, ffff888025bcd000) [ 52.540442][ T3632] [ 52.542741][ T3632] The buggy address belongs to the physical page: [ 52.549128][ T3632] page:ffffea000096f200 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x25bc8 [ 52.559251][ T3632] head:ffffea000096f200 order:3 compound_mapcount:0 compound_pincount:0 [ 52.567550][ T3632] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 52.575515][ T3632] raw: 00fff00000010200 ffffea00051dd800 dead000000000003 ffff888012842140 [ 52.584077][ T3632] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000 [ 52.592630][ T3632] page dumped because: kasan: bad access detected [ 52.599013][ T3632] page_owner tracks the page as allocated [ 52.604699][ T3632] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 3347, tgid 3347 (cmp), ts 30052793250, free_ts 29999441110 [ 52.624478][ T3632] get_page_from_freelist+0x742/0x7c0 [ 52.629860][ T3632] __alloc_pages+0x259/0x560 [ 52.634468][ T3632] alloc_slab_page+0x70/0xf0 [ 52.639086][ T3632] allocate_slab+0x5e/0x4b0 [ 52.643575][ T3632] ___slab_alloc+0x782/0xe20 [ 52.648153][ T3632] __kmem_cache_alloc_node+0x252/0x310 [ 52.653596][ T3632] __kmalloc+0x9e/0x1a0 [ 52.657734][ T3632] tomoyo_realpath_from_path+0xcd/0x5f0 [ 52.663259][ T3632] tomoyo_check_open_permission+0x1f0/0x460 [ 52.669129][ T3632] security_file_open+0x50/0x560 [ 52.674048][ T3632] do_dentry_open+0x306/0x11b0 [ 52.678789][ T3632] path_openat+0x25fc/0x2df0 [ 52.683351][ T3632] do_filp_open+0x264/0x4f0 [ 52.687826][ T3632] do_sys_openat2+0x124/0x4e0 [ 52.692475][ T3632] __x64_sys_openat+0x243/0x290 [ 52.697300][ T3632] do_syscall_64+0x3d/0xb0 [ 52.701689][ T3632] page last free stack trace: [ 52.706346][ T3632] free_pcp_prepare+0x80c/0x8f0 [ 52.711194][ T3632] free_unref_page+0x7d/0x5f0 [ 52.715863][ T3632] __unfreeze_partials+0x1ab/0x200 [ 52.720956][ T3632] put_cpu_partial+0x106/0x170 [ 52.725702][ T3632] qlist_free_all+0x2b/0x70 [ 52.730184][ T3632] kasan_quarantine_reduce+0x169/0x180 [ 52.735620][ T3632] __kasan_slab_alloc+0x1f/0x70 [ 52.740445][ T3632] kmem_cache_alloc_lru+0x180/0x2e0 [ 52.745620][ T3632] __d_alloc+0x31/0x750 [ 52.749750][ T3632] d_alloc_cursor+0x40/0xd0 [ 52.754226][ T3632] dcache_dir_open+0x37/0x70 [ 52.758794][ T3632] do_dentry_open+0x85f/0x11b0 [ 52.763530][ T3632] path_openat+0x25fc/0x2df0 [ 52.768104][ T3632] do_filp_open+0x264/0x4f0 [ 52.772585][ T3632] do_sys_openat2+0x124/0x4e0 [ 52.777241][ T3632] __x64_sys_openat+0x243/0x290 [ 52.782075][ T3632] [ 52.784374][ T3632] Memory state around the buggy address: [ 52.789980][ T3632] ffff888025bcde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.798016][ T3632] ffff888025bcdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.806061][ T3632] >ffff888025bcdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.814095][ T3632] ^ [ 52.821817][ T3632] ffff888025bce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.829864][ T3632] ffff888025bce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.837910][ T3632] ================================================================== [ 52.846317][ T3632] Kernel panic - not syncing: panic_on_warn set ... [ 52.852915][ T3632] CPU: 1 PID: 3632 Comm: syz-executor149 Not tainted 6.1.0-rc7-syzkaller-00103-gef4d3ea40565 #0 [ 52.863318][ T3632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 52.873365][ T3632] Call Trace: [ 52.876736][ T3632] [ 52.879657][ T3632] dump_stack_lvl+0x1b1/0x28e [ 52.884331][ T3632] ? nf_tcp_handle_invalid+0x62e/0x62e [ 52.889800][ T3632] ? panic+0x710/0x710 [ 52.893869][ T3632] ? preempt_schedule_common+0xb7/0xe0 [ 52.899314][ T3632] ? vscnprintf+0x59/0x80 [ 52.903633][ T3632] panic+0x2d6/0x710 [ 52.907515][ T3632] ? memcpy_page_flushcache+0xfc/0xfc [ 52.912875][ T3632] ? _raw_spin_unlock_irqrestore+0x110/0x120 [ 52.918849][ T3632] ? print_report+0x1b4/0x1f0 [ 52.923511][ T3632] ? udf_write_aext+0x62d/0x7e0 [ 52.928354][ T3632] end_report+0x91/0xa0 [ 52.932494][ T3632] kasan_report+0xda/0x100 [ 52.936901][ T3632] ? udf_write_aext+0x62d/0x7e0 [ 52.941742][ T3632] udf_write_aext+0x62d/0x7e0 [ 52.946407][ T3632] udf_add_entry+0x1712/0x3300 [ 52.951161][ T3632] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 52.957130][ T3632] ? __mark_inode_dirty+0x593/0x600 [ 52.962322][ T3632] ? udf_add_nondir+0x580/0x580 [ 52.967159][ T3632] ? udf_new_inode+0xb04/0xf30 [ 52.971913][ T3632] ? d_alloc+0x193/0x1d0 [ 52.976147][ T3632] udf_mkdir+0x13c/0x980 [ 52.980382][ T3632] ? udf_symlink+0x1680/0x1680 [ 52.985129][ T3632] ? from_kgid+0x193/0x6b0 [ 52.989532][ T3632] ? make_kgid+0x710/0x710 [ 52.993938][ T3632] ? __lookup_hash+0x123/0x240 [ 52.998685][ T3632] ? apparmor_path_mkdir+0x461/0x520 [ 53.003959][ T3632] ? generic_permission+0x214/0x4e0 [ 53.009148][ T3632] ? inode_permission+0xf5/0x450 [ 53.014074][ T3632] ? bpf_lsm_inode_mkdir+0x5/0x10 [ 53.019092][ T3632] ? security_inode_mkdir+0xdd/0x120 [ 53.024385][ T3632] vfs_mkdir+0x3b3/0x590 [ 53.028822][ T3632] do_mkdirat+0x279/0x550 [ 53.033155][ T3632] ? __check_object_size+0x15a/0x210 [ 53.038456][ T3632] ? vfs_mkdir+0x590/0x590 [ 53.042870][ T3632] ? getname_flags+0x1ea/0x4e0 [ 53.047632][ T3632] __x64_sys_mkdirat+0x85/0x90 [ 53.052386][ T3632] do_syscall_64+0x3d/0xb0 [ 53.056793][ T3632] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 53.062676][ T3632] RIP: 0033:0x7fb86d0108f9 [ 53.067077][ T3632] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 53.086684][ T3632] RSP: 002b:00007ffd576c9978 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 53.095085][ T3632] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb86d0108f9 [ 53.103043][ T3632] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000004 [ 53.110998][ T3632] RBP: 00007fb86cfd0190 R08: 0000000000000000 R09: 0000000000000000 [ 53.118954][ T3632] R10: 000000000000002e R11: 0000000000000246 R12: 00007fb86cfd0220 [ 53.126912][ T3632] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 53.134874][ T3632] [ 53.138019][ T3632] Kernel Offset: disabled [ 53.142330][ T3632] Rebooting in 86400 seconds..