./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor975322899 <...> Warning: Permanently added '10.128.1.81' (ED25519) to the list of known hosts. execve("./syz-executor975322899", ["./syz-executor975322899"], 0x7fff36f5d300 /* 10 vars */) = 0 brk(NULL) = 0x555556fa3000 brk(0x555556fa3d00) = 0x555556fa3d00 arch_prctl(ARCH_SET_FS, 0x555556fa3380) = 0 set_tid_address(0x555556fa3650) = 5005 set_robust_list(0x555556fa3660, 24) = 0 rseq(0x555556fa3ca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor975322899", 4096) = 27 getrandom("\x8f\x67\x96\xec\x4a\x80\x1e\xb9", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555556fa3d00 brk(0x555556fc4d00) = 0x555556fc4d00 brk(0x555556fc5000) = 0x555556fc5000 mprotect(0x7f54f013a000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 3 ioctl(3, LOOP_CLR_FD) = -1 ENXIO (No such device or address) close(3) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555556fa3650) = 5006 ./strace-static-x86_64: Process 5006 attached [pid 5006] set_robust_list(0x555556fa3660, 24) = 0 [pid 5006] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 5006] setpgid(0, 0) = 0 [pid 5006] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 5006] write(3, "1000", 4) = 4 [pid 5006] close(3) = 0 [pid 5006] memfd_create("syzkaller", 0) = 3 [pid 5006] mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f54e7c88000 [pid 5006] write(3, "\x60\x1c\x6d\x6b\x64\x6f\x73\x66\xe4\x17\x98\x00\x08\x08\x01\x00\x02\x40\x00\x40\x00\xf8\x01\x00\x10\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 131072) = 131072 [pid 5006] munmap(0x7f54e7c88000, 138412032) = 0 [pid 5006] openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 [pid 5006] ioctl(4, LOOP_SET_FD, 3) = 0 [pid 5006] close(3) = 0 [pid 5006] mkdir("./file1", 0777) = 0 [ 144.078283][ T5006] loop0: detected capacity change from 0 to 256 [ 144.100150][ T5006] ======================================================= [ 144.100150][ T5006] WARNING: The mand mount option has been deprecated and [ 144.100150][ T5006] and is ignored by this kernel. Remove the mand [pid 5006] mount("/dev/loop0", "./file1", "msdos", MS_NOSUID|MS_MANDLOCK|MS_RELATIME, "nfs=nostale_ro,sys_immutable,nodots,sys_immutable,nodots,dots,dots") = 0 [pid 5006] openat(AT_FDCWD, "./file1", O_RDONLY|O_DIRECTORY) = 3 [pid 5006] chdir("./file1") = 0 [pid 5006] ioctl(4, LOOP_CLR_FD) = 0 [pid 5006] close(4) = 0 [ 144.100150][ T5006] option from the mount to silence this warning. [ 144.100150][ T5006] ======================================================= [ 144.161624][ T5006] ===================================================== [ 144.169056][ T5006] BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x100 [pid 5006] openat(AT_FDCWD, ".", O_RDONLY) = 4 [ 144.177317][ T5006] _copy_to_user+0xbc/0x100 [ 144.182562][ T5006] __se_sys_name_to_handle_at+0x949/0xb10 [ 144.189732][ T5006] __x64_sys_name_to_handle_at+0xe4/0x140 [ 144.196144][ T5006] do_syscall_64+0x44/0x110 [ 144.200978][ T5006] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 144.208329][ T5006] [ 144.210775][ T5006] Uninit was created at: [ 144.215556][ T5006] slab_post_alloc_hook+0x129/0xa70 [ 144.221468][ T5006] __kmem_cache_alloc_node+0x5c9/0x970 [ 144.227279][ T5006] __kmalloc+0x121/0x3c0 [ 144.231761][ T5006] __se_sys_name_to_handle_at+0x441/0xb10 [ 144.237891][ T5006] __x64_sys_name_to_handle_at+0xe4/0x140 [ 144.243789][ T5006] do_syscall_64+0x44/0x110 [ 144.248702][ T5006] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 144.254897][ T5006] [ 144.257391][ T5006] Bytes 18-19 of 20 are uninitialized [ 144.263004][ T5006] Memory access of size 20 starts at ffff888128a46380 [ 144.270413][ T5006] Data copied to user address 0000000020000240 [ 144.276870][ T5006] [ 144.279384][ T5006] CPU: 0 PID: 5006 Comm: syz-executor975 Not tainted 6.7.0-rc7-syzkaller #0 [ 144.290099][ T5006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 144.300622][ T5006] ===================================================== [ 144.308208][ T5006] Disabling lock debugging due to kernel taint [ 144.314763][ T5006] Kernel panic - not syncing: kmsan.panic set ... [ 144.321816][ T5006] CPU: 0 PID: 5006 Comm: syz-executor975 Tainted: G B 6.7.0-rc7-syzkaller #0 [ 144.332451][ T5006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 144.342879][ T5006] Call Trace: [ 144.346539][ T5006] [ 144.349925][ T5006] dump_stack_lvl+0x1bf/0x240 [ 144.354996][ T5006] dump_stack+0x1e/0x20 [ 144.359486][ T5006] panic+0x4de/0xc90 [ 144.363568][ T5006] ? add_taint+0x108/0x1a0 [ 144.368261][ T5006] kmsan_report+0x2d0/0x2d0 [ 144.373030][ T5006] ? kmsan_internal_check_memory+0x476/0x530 [ 144.379604][ T5006] ? kmsan_copy_to_user+0xd3/0xf0 [ 144.384964][ T5006] ? _copy_to_user+0xbc/0x100 [ 144.390033][ T5006] ? __se_sys_name_to_handle_at+0x949/0xb10 [ 144.396834][ T5006] ? __x64_sys_name_to_handle_at+0xe4/0x140 [ 144.403000][ T5006] ? do_syscall_64+0x44/0x110 [ 144.408061][ T5006] ? entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 144.414459][ T5006] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 144.421052][ T5006] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 144.427038][ T5006] ? kmsan_slab_alloc+0xdd/0x150 [ 144.432284][ T5006] ? slab_post_alloc_hook+0x129/0xa70 [ 144.438005][ T5006] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 144.444312][ T5006] ? kmsan_internal_set_shadow_origin+0x66/0xe0 [ 144.450795][ T5006] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 144.457545][ T5006] kmsan_internal_check_memory+0x476/0x530 [ 144.463529][ T5006] kmsan_copy_to_user+0xd3/0xf0 [ 144.468835][ T5006] ? should_fail_usercopy+0x2e/0x40 [ 144.474292][ T5006] _copy_to_user+0xbc/0x100 [ 144.479030][ T5006] __se_sys_name_to_handle_at+0x949/0xb10 [ 144.485078][ T5006] __x64_sys_name_to_handle_at+0xe4/0x140 [ 144.491039][ T5006] do_syscall_64+0x44/0x110 [ 144.496210][ T5006] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 144.502595][ T5006] RIP: 0033:0x7f54f00c6ad9 [ 144.507473][ T5006] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 144.527495][ T5006] RSP: 002b:00007ffc4cd1d208 EFLAGS: 00000246 ORIG_RAX: 000000000000012f [ 144.536186][ T5006] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f54f00c6ad9 [ 144.544303][ T5006] RDX: 0000000020000240 RSI: 0000000020000140 RDI: 0000000000000004 [ 144.552393][ T5006] RBP: 00007f54f013a5f0 R08: 0000000000000000 R09: 0000555556fa44c0 [ 144.560566][ T5006] R10: 00000000200000c0 R11: 0000000000000246 R12: 00007ffc4cd1d230 [ 144.568666][ T5006] R13: 00007ffc4cd1d458 R14: 431bde82d7b634db R15: 00007f54f010f03b [ 144.576869][ T5006] [ 144.580334][ T5006] Kernel Offset: disabled [ 144.584767][ T5006] Rebooting in 86400 seconds..