./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1266974665 <...> Warning: Permanently added '10.128.10.27' (ED25519) to the list of known hosts. execve("./syz-executor1266974665", ["./syz-executor1266974665"], 0x7ffc450d71b0 /* 10 vars */) = 0 brk(NULL) = 0x55558a25b000 brk(0x55558a25bd00) = 0x55558a25bd00 arch_prctl(ARCH_SET_FS, 0x55558a25b380) = 0 set_tid_address(0x55558a25b650) = 299 set_robust_list(0x55558a25b660, 24) = 0 rseq(0x55558a25bca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1266974665", 4096) = 28 getrandom("\x07\xb9\x3d\xbe\xdf\xe3\x8b\x86", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55558a25bd00 brk(0x55558a27cd00) = 0x55558a27cd00 brk(0x55558a27d000) = 0x55558a27d000 mprotect(0x7f108afe1000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 mkdir("./syzkaller.i3Wo7k", 0700) = 0 chmod("./syzkaller.i3Wo7k", 0777) = 0 chdir("./syzkaller.i3Wo7k") = 0 mkdir("./0", 0777) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 3 ioctl(3, LOOP_CLR_FD) = -1 ENXIO (No such device or address) close(3) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55558a25b650) = 300 ./strace-static-x86_64: Process 300 attached [pid 300] set_robust_list(0x55558a25b660, 24) = 0 [pid 300] chdir("./0") = 0 [pid 300] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 300] setpgid(0, 0) = 0 [pid 300] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 300] write(3, "1000", 4) = 4 [pid 300] close(3) = 0 [pid 300] symlink("/dev/binderfs", "./binderfs") = 0 [pid 300] write(1, "executing program\n", 18executing program ) = 18 [pid 300] memfd_create("syzkaller", 0) = 3 [pid 300] mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f1082b1e000 [ 28.861349][ T28] audit: type=1400 audit(1745329996.892:66): avc: denied { execmem } for pid=299 comm="syz-executor126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 28.891564][ T28] audit: type=1400 audit(1745329996.912:67): avc: denied { read write } for pid=299 comm="syz-executor126" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 28.918111][ T28] audit: type=1400 audit(1745329996.912:68): avc: denied { open } for pid=299 comm="syz-executor126" path="/dev/loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 28.944962][ T28] audit: type=1400 audit(1745329996.912:69): avc: denied { ioctl } for pid=299 comm="syz-executor126" path="/dev/loop0" dev="devtmpfs" ino=114 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [pid 300] write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 67108864) = 67108864 [pid 300] munmap(0x7f1082b1e000, 138412032) = 0 [pid 300] openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 [pid 300] ioctl(4, LOOP_SET_FD, 3) = 0 [pid 300] close(3) = 0 [pid 300] close(4) = 0 [pid 300] mkdir("./file0", 0777) = 0 [ 29.268816][ T300] loop0: detected capacity change from 0 to 131072 [ 29.278714][ T28] audit: type=1400 audit(1745329997.312:70): avc: denied { mounton } for pid=300 comm="syz-executor126" path="/root/syzkaller.i3Wo7k/0/file0" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 29.305100][ T300] F2FS-fs (loop0): Wrong CP boundary, start(512) end(198144) blocks(1024) [ 29.305133][ T300] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 29.316932][ T300] F2FS-fs (loop0): invalid crc value [ 29.331165][ T300] F2FS-fs (loop0): Found nat_bits in checkpoint [pid 300] mount("/dev/loop0", "./file0", "f2fs", 0, "") = 0 [pid 300] openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3 [pid 300] chdir("./file0") = 0 [pid 300] openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 [pid 300] ioctl(4, LOOP_CLR_FD) = 0 [pid 300] close(4) = 0 [pid 300] lstat("./file2", NULL) = -1 EFAULT (Bad address) [pid 300] rename("./file0", "./bus") = 0 [pid 300] clone(child_stack=NULL, flags=CLONE_FILES) = 307 [pid 300] exit_group(0) = ? [pid 300] +++ exited with 0 +++ --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=300, si_uid=0, si_status=0, si_utime=13, si_stime=30} --- restart_syscall(<... resuming interrupted clone ...>./strace-static-x86_64: Process 307 attached [ 29.369668][ T300] F2FS-fs (loop0): Try to recover 2th superblock, ret: 0 [ 29.378162][ T300] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e4 [ 29.387581][ T28] audit: type=1400 audit(1745329997.422:71): avc: denied { mount } for pid=300 comm="syz-executor126" name="/" dev="loop0" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 ) = 0 [pid 299] umount2("./0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 299] openat(AT_FDCWD, "./0", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 3 [pid 299] newfstatat(3, "", {st_mode=S_IFDIR|0700, st_size=4096, ...}, AT_EMPTY_PATH) = 0 [pid 299] getdents64(3, 0x55558a25c6f0 /* 4 entries */, 32768) = 112 [pid 299] umount2("./0/binderfs", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 299] newfstatat(AT_FDCWD, "./0/binderfs", {st_mode=S_IFLNK|0777, st_size=13, ...}, AT_SYMLINK_NOFOLLOW) = 0 [pid 299] unlink("./0/binderfs") = 0 [pid 299] umount2("./0/file0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EBUSY (Device or resource busy) [pid 299] newfstatat(AT_FDCWD, "./0/file0", {st_mode=S_IFDIR|0755, st_size=4096, ...}, AT_SYMLINK_NOFOLLOW) = 0 [pid 299] umount2("./0/file0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EBUSY (Device or resource busy) [pid 299] openat(AT_FDCWD, "./0/file0", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 [pid 299] newfstatat(4, "", {st_mode=S_IFDIR|0755, st_size=4096, ...}, AT_EMPTY_PATH) = 0 [pid 299] getdents64(4, 0x55558a264730 /* 7 entries */, 32768) = 200 [pid 299] umount2("./0/file0/file1", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 299] newfstatat(AT_FDCWD, "./0/file0/file1", {st_mode=S_IFREG|0755, st_size=10, ...}, AT_SYMLINK_NOFOLLOW) = 0 [pid 299] unlink("./0/file0/file1") = 0 [pid 299] umount2("./0/file0/file2", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 299] newfstatat(AT_FDCWD, "./0/file0/file2", {st_mode=S_IFREG|0755, st_size=9000, ...}, AT_SYMLINK_NOFOLLOW) = 0 [pid 299] unlink("./0/file0/file2") = 0 [pid 299] umount2("./0/file0/file3", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 299] newfstatat(AT_FDCWD, "./0/file0/file3", {st_mode=S_IFREG|0755, st_size=9000, ...}, AT_SYMLINK_NOFOLLOW) = 0 [ 29.414295][ T28] audit: type=1400 audit(1745329997.442:72): avc: denied { write } for pid=300 comm="syz-executor126" name="/" dev="loop0" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 29.432360][ T299] F2FS-fs (loop0): dec_valid_node_count: inconsistent i_blocks, ino:7, iblocks:0 [ 29.440518][ T28] audit: type=1400 audit(1745329997.442:73): avc: denied { remove_name } for pid=300 comm="syz-executor126" name="file0" dev="loop0" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 29.452459][ T299] ------------[ cut here ]------------ [ 29.476031][ T28] audit: type=1400 audit(1745329997.442:74): avc: denied { rename } for pid=300 comm="syz-executor126" name="file0" dev="loop0" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 29.480859][ T299] WARNING: CPU: 0 PID: 299 at fs/f2fs/inode.c:847 f2fs_evict_inode+0x1262/0x1540 [ 29.506147][ T28] audit: type=1400 audit(1745329997.442:75): avc: denied { add_name } for pid=300 comm="syz-executor126" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 29.515840][ T299] Modules linked in: [ 29.542901][ T299] CPU: 0 PID: 299 Comm: syz-executor126 Not tainted 6.1.129-syzkaller-00017-g642656a36791 #0 [ 29.553994][ T299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [pid 299] unlink("./0/file0/file3" [pid 307] exit(0) = ? [pid 307] +++ exited with 0 +++ [ 29.565129][ T299] RIP: 0010:f2fs_evict_inode+0x1262/0x1540 [ 29.572426][ T299] Code: 34 70 4a ff eb 0d e8 2d 70 4a ff 4d 89 e5 4c 8b 64 24 18 48 8b 5c 24 28 4c 89 e7 e8 78 38 03 00 e9 84 fc ff ff e8 0e 70 4a ff <0f> 0b 4c 89 f7 be 08 00 00 00 e8 7f 21 92 ff f0 41 80 0e 04 e9 61 [ 29.594922][ T299] RSP: 0018:ffffc90000df7a40 EFLAGS: 00010293 [ 29.602792][ T299] RAX: ffffffff822aca42 RBX: 0000000000000002 RCX: ffff88810d699440 [ 29.611798][ T299] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 29.620730][ T299] RBP: ffffc90000df7bb0 R08: ffffffff822ac6a8 R09: ffffed10200ac117 [ 29.629964][ T299] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881005605d0 [ 29.639015][ T299] R13: dffffc0000000000 R14: ffff88810e970078 R15: 1ffff920001bef5c [ 29.648629][ T299] FS: 000055558a25b380(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 29.658689][ T299] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 29.666712][ T299] CR2: 00007ffcfc031f98 CR3: 0000000125f07000 CR4: 00000000003506b0 [ 29.677617][ T299] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 29.687599][ T299] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 29.695992][ T299] Call Trace: [ 29.699330][ T299] [ 29.703091][ T299] ? show_regs+0x58/0x60 [ 29.707841][ T299] ? __warn+0x160/0x3d0 [ 29.712432][ T299] ? f2fs_evict_inode+0x1262/0x1540 [ 29.718596][ T299] ? report_bug+0x4d5/0x7d0 [ 29.723395][ T299] ? f2fs_evict_inode+0x1262/0x1540 [ 29.729645][ T299] ? handle_bug+0x41/0x70 [ 29.735074][ T299] ? exc_invalid_op+0x1b/0x50 [ 29.741301][ T299] ? asm_exc_invalid_op+0x1b/0x20 [ 29.747776][ T299] ? f2fs_evict_inode+0xec8/0x1540 [ 29.753425][ T299] ? f2fs_evict_inode+0x1262/0x1540 [ 29.760189][ T299] ? f2fs_evict_inode+0x1262/0x1540 [ 29.766407][ T299] ? f2fs_write_inode+0x790/0x790 [ 29.773888][ T299] ? bit_waitqueue+0x30/0x30 [ 29.779474][ T299] ? _raw_spin_unlock+0x4c/0x70 [ 29.785989][ T299] ? inode_io_list_del+0x18b/0x1a0 [ 29.791429][ T299] ? f2fs_write_inode+0x790/0x790 [ 29.799155][ T299] evict+0x529/0x930 [ 29.805533][ T299] ? proc_nr_inodes+0x320/0x320 [ 29.812920][ T299] ? __kasan_check_read+0x11/0x20 [ 29.823298][ T299] ? f2fs_drop_inode+0x18c/0xa50 [ 29.829953][ T299] ? __kasan_check_write+0x14/0x20 [ 29.835700][ T299] ? _atomic_dec_and_lock+0xfc/0x140 [ 29.847209][ T299] iput+0x616/0x690 [ 29.851278][ T299] do_unlinkat+0x4e1/0x920 [ 29.857453][ T299] ? fsnotify_link_count+0x100/0x100 [ 29.863920][ T299] ? strncpy_from_user+0x169/0x2b0 [ 29.870530][ T299] ? getname_flags+0x1fd/0x520 [ 29.876840][ T299] __x64_sys_unlink+0x49/0x50 [ 29.883008][ T299] x64_sys_call+0x289/0x9a0 [ 29.890491][ T299] do_syscall_64+0x3b/0x80 [ 29.896706][ T299] ? clear_bhb_loop+0x55/0xb0 [ 29.903833][ T299] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 29.910274][ T299] RIP: 0033:0x7f108af5cb97 [ 29.915186][ T299] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 29.940968][ T299] RSP: 002b:00007ffcfc0321f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 [ 29.951235][ T299] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f108af5cb97 [ 29.961664][ T299] RDX: 00007ffcfc032220 RSI: 00007ffcfc0322b0 RDI: 00007ffcfc0322b0 <... unlink resumed>) = 0 umount2("./0/file0/file.cold", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) newfstatat(AT_FDCWD, "./0/file0/file.cold", {st_mode=S_IFREG|0755, st_size=100, ...}, AT_SYMLINK_NOFOLLOW) = 0 [ 29.971273][ T299] RBP: 00007ffcfc0322b0 R08: 0000000000000000 R09: 0000000000000000 [ 29.980368][ T299] R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffcfc0333a0 [ 29.989328][ T299] R13: 000055558a264700 R14: 0000000000000001 R15: 431bde82d7b634db [ 29.998398][ T299] [ 30.002367][ T299] ---[ end trace 0000000000000000 ]--- [ 30.010556][ T299] ------------[ cut here ]------------ [ 30.016837][ T299] WARNING: CPU: 0 PID: 299 at fs/inode.c:332 drop_nlink+0xc1/0x110 [ 30.026851][ T299] Modules linked in: [ 30.031483][ T299] CPU: 0 PID: 299 Comm: syz-executor126 Tainted: G W 6.1.129-syzkaller-00017-g642656a36791 #0 [ 30.044206][ T299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 30.057031][ T299] RIP: 0010:drop_nlink+0xc1/0x110 [ 30.063583][ T299] Code: 1e 48 8d bb b8 04 00 00 be 08 00 00 00 e8 27 fe ef ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 8f 4c a8 ff <0f> 0b eb 88 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 62 ff ff ff 4c [ 30.087054][ T299] RSP: 0018:ffffc90000df7a68 EFLAGS: 00010293 [ 30.094147][ T299] RAX: ffffffff81ccedc1 RBX: 0000000000000000 RCX: ffff88810d699440 [ 30.103933][ T299] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 30.113703][ T299] RBP: ffffc90000df7a90 R08: ffffffff81cced44 R09: ffffc90000df7a20 [ 30.123091][ T299] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 30.135054][ T299] R13: 1ffff110200ac009 R14: ffff888100560000 R15: ffff888100560048 [ 30.145577][ T299] FS: 000055558a25b380(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 30.155052][ T299] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.164687][ T299] CR2: 00007ffcfc031f98 CR3: 0000000125f07000 CR4: 00000000003506b0 [ 30.173099][ T299] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 30.184532][ T299] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 30.193947][ T299] Call Trace: [ 30.198672][ T299] [ 30.201576][ T299] ? show_regs+0x58/0x60 [ 30.206302][ T299] ? __warn+0x160/0x3d0 [ 30.210959][ T299] ? drop_nlink+0xc1/0x110 [ 30.215783][ T299] ? report_bug+0x4d5/0x7d0 [ 30.220501][ T299] ? drop_nlink+0xc1/0x110 [ 30.225440][ T299] ? handle_bug+0x41/0x70 [ 30.230376][ T299] ? exc_invalid_op+0x1b/0x50 [ 30.235922][ T299] ? asm_exc_invalid_op+0x1b/0x20 [ 30.242876][ T299] ? drop_nlink+0x44/0x110 [ 30.247740][ T299] ? drop_nlink+0xc1/0x110 [ 30.252365][ T299] ? drop_nlink+0xc1/0x110 [ 30.257525][ T299] ? drop_nlink+0xc1/0x110 [ 30.263174][ T299] f2fs_drop_nlink+0x13a/0x3d0 [ 30.270078][ T299] ? f2fs_mark_inode_dirty_sync+0x11b/0x190 [ 30.277659][ T299] f2fs_delete_entry+0xde2/0xf40 [ 30.283870][ T299] f2fs_unlink+0x48b/0x880 [ 30.289361][ T299] ? f2fs_link+0x910/0x910 [ 30.294156][ T299] ? HAS_UNMAPPED_ID+0x1e6/0x240 [ 30.301034][ T299] ? selinux_inode_unlink+0x22/0x30 [ 30.306794][ T299] ? security_inode_unlink+0xcd/0x110 [ 30.313243][ T299] vfs_unlink+0x38c/0x630 [ 30.317945][ T299] do_unlinkat+0x483/0x920 [ 30.322791][ T299] ? fsnotify_link_count+0x100/0x100 [ 30.328468][ T299] ? strncpy_from_user+0x169/0x2b0 [ 30.334485][ T299] ? getname_flags+0x1fd/0x520 [ 30.341301][ T299] __x64_sys_unlink+0x49/0x50 [ 30.347441][ T299] x64_sys_call+0x289/0x9a0 [ 30.352270][ T299] do_syscall_64+0x3b/0x80 [ 30.356887][ T299] ? clear_bhb_loop+0x55/0xb0 [ 30.363074][ T299] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 30.370250][ T299] RIP: 0033:0x7f108af5cb97 [ 30.375197][ T299] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 30.399901][ T299] RSP: 002b:00007ffcfc0321f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 [ 30.408775][ T299] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f108af5cb97 unlink("./0/file0/file.cold") = 0 umount2("./0/file0/bus", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) newfstatat(AT_FDCWD, "./0/file0/bus", {st_mode=S_IFDIR|0755, st_size=3488, ...}, AT_SYMLINK_NOFOLLOW) = 0 umount2("./0/file0/bus", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) openat(AT_FDCWD, "./0/file0/bus", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 5 newfstatat(5, "", {st_mode=S_IFDIR|0755, st_size=3488, ...}, AT_EMPTY_PATH) = 0 getdents64(5, 0x55558a26c770 /* 4 entries */, 32768) = 112 umount2("./0/file0/bus/file0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 ENOENT (No such file or directory) newfstatat(AT_FDCWD, "./0/file0/bus/file0", 0x7ffcfc031130, AT_SYMLINK_NOFOLLOW) = -1 ENOENT (No such file or directory) exit_group(1) = ? +++ exited with 1 +++ [ 30.417965][ T299] RDX: 00007ffcfc032220 RSI: 00007ffcfc0322b0 RDI: 00007ffcfc0322b0 [ 30.427090][ T299] RBP: 00007ffcfc0322b0 R08: 0000000000000000 R09: 0000000000000000 [ 30.436878][ T299] R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffcfc0333a0 [ 30.446222][ T299] R13: 000055558a264700 R14: 0000000000000001 R15: 431bde82d7b634db [ 30.454802][ T299] [ 30.458720][ T299] ---[ end trace 0000000000000000 ]--- [ 34.477966][ T302] ================================================================== [ 34.488643][ T302] BUG: KASAN: use-after-free in __list_del_entry_valid+0xa6/0x130 [ 34.499837][ T302] Read of size 8 at addr ffff888100560988 by task kworker/u4:3/302 [ 34.509875][ T302] [ 34.513079][ T302] CPU: 0 PID: 302 Comm: kworker/u4:3 Tainted: G W 6.1.129-syzkaller-00017-g642656a36791 #0 [ 34.531182][ T302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 34.545498][ T302] Workqueue: writeback wb_workfn (flush-7:0) [ 34.552168][ T302] Call Trace: [ 34.556005][ T302] [ 34.559336][ T302] dump_stack_lvl+0x151/0x1b7 [ 34.564453][ T302] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 34.570476][ T302] ? _printk+0xd1/0x111 [ 34.575670][ T302] ? __virt_addr_valid+0x242/0x2f0 [ 34.583178][ T302] print_report+0x158/0x4e0 [ 34.588820][ T302] ? __virt_addr_valid+0x242/0x2f0 [ 34.594397][ T302] ? kasan_complete_mode_report_info+0x90/0x1b0 [ 34.601755][ T302] ? __list_del_entry_valid+0xa6/0x130 [ 34.609091][ T302] kasan_report+0x13c/0x170 [ 34.613918][ T302] ? __list_del_entry_valid+0xa6/0x130 [ 34.620807][ T302] __asan_report_load8_noabort+0x14/0x20 [ 34.627988][ T302] __list_del_entry_valid+0xa6/0x130 [ 34.634498][ T302] f2fs_inode_synced+0x100/0x2e0 [ 34.639982][ T302] f2fs_update_inode+0x72/0x1c40 [ 34.645806][ T302] ? __get_node_page+0x44d/0xb50 [ 34.651734][ T302] f2fs_update_inode_page+0x135/0x170 [ 34.657167][ T302] ? f2fs_write_inode+0x40e/0x790 [ 34.662125][ T302] f2fs_write_inode+0x416/0x790 [ 34.668080][ T302] __writeback_single_inode+0x4cf/0xb80 [ 34.673589][ T302] writeback_sb_inodes+0xb32/0x1910 [ 34.679404][ T302] ? queue_io+0x520/0x520 [ 34.684001][ T302] ? down_read_trylock+0x319/0x7d0 [ 34.689030][ T302] ? __writeback_inodes_wb+0x3f0/0x3f0 [ 34.695004][ T302] __writeback_inodes_wb+0x118/0x3f0 [ 34.700312][ T302] ? queue_io+0x3d0/0x520 [ 34.705480][ T302] wb_writeback+0x3da/0xa00 [ 34.711006][ T302] ? inode_cgwb_move_to_attached+0x3c0/0x3c0 [ 34.717279][ T302] ? __kasan_check_write+0x14/0x20 [ 34.722982][ T302] wb_workfn+0xbba/0x1030 [ 34.727140][ T302] ? inode_wait_for_writeback+0x280/0x280 [ 34.733623][ T302] ? finish_task_switch+0x167/0x7b0 [ 34.740367][ T302] ? __kasan_check_read+0x11/0x20 [ 34.747137][ T302] ? read_word_at_a_time+0x12/0x20 [ 34.752180][ T302] ? strscpy+0x9c/0x260 [ 34.757007][ T302] process_one_work+0x73d/0xcb0 [ 34.761727][ T302] worker_thread+0xa60/0x1260 [ 34.767168][ T302] ? __kasan_check_read+0x11/0x20 [ 34.772085][ T302] kthread+0x26d/0x300 [ 34.775955][ T302] ? worker_clr_flags+0x1a0/0x1a0 [ 34.780917][ T302] ? kthread_blkcg+0xd0/0xd0 [ 34.785338][ T302] ret_from_fork+0x1f/0x30 [ 34.790126][ T302] [ 34.793088][ T302] [ 34.795260][ T302] Allocated by task 300: [ 34.799954][ T302] kasan_set_track+0x4b/0x70 [ 34.804422][ T302] kasan_save_alloc_info+0x1f/0x30 [ 34.809680][ T302] __kasan_slab_alloc+0x6c/0x80 [ 34.814791][ T302] slab_post_alloc_hook+0x53/0x2c0 [ 34.819721][ T302] kmem_cache_alloc_lru+0x102/0x270 [ 34.824777][ T302] f2fs_alloc_inode+0x2d/0x350 [ 34.829353][ T302] iget_locked+0x18c/0x7e0 [ 34.833604][ T302] f2fs_iget+0x55/0x4ca0 [ 34.837793][ T302] f2fs_lookup+0x3c1/0xb50 [ 34.842556][ T302] __lookup_slow+0x2b9/0x3e0 [ 34.847466][ T302] lookup_slow+0x5a/0x80 [ 34.852124][ T302] walk_component+0x2e7/0x410 [ 34.856621][ T302] path_lookupat+0x16d/0x450 [ 34.861516][ T302] filename_lookup+0x251/0x600 [ 34.866259][ T302] vfs_statx+0x107/0x4b0 [ 34.870511][ T302] __se_sys_newlstat+0xda/0x7c0 [ 34.875452][ T302] __x64_sys_newlstat+0x5b/0x70 [ 34.880849][ T302] x64_sys_call+0x52/0x9a0 [ 34.885365][ T302] do_syscall_64+0x3b/0x80 [ 34.889603][ T302] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 34.895446][ T302] [ 34.897607][ T302] Freed by task 0: [ 34.902359][ T302] kasan_set_track+0x4b/0x70 [ 34.907896][ T302] kasan_save_free_info+0x2b/0x40 [ 34.913469][ T302] ____kasan_slab_free+0x131/0x180 [ 34.919726][ T302] __kasan_slab_free+0x11/0x20 [ 34.925004][ T302] kmem_cache_free+0x291/0x560 [ 34.930947][ T302] f2fs_free_inode+0x24/0x30 [ 34.936069][ T302] i_callback+0x4b/0x70 [ 34.940562][ T302] rcu_do_batch+0x552/0xbe0 [ 34.947686][ T302] rcu_core+0x502/0xf40 [ 34.952315][ T302] rcu_core_si+0x9/0x10 [ 34.956461][ T302] handle_softirqs+0x1db/0x650 [ 34.961322][ T302] __irq_exit_rcu+0x52/0xf0 [ 34.966243][ T302] irq_exit_rcu+0x9/0x10 [ 34.970312][ T302] sysvec_apic_timer_interrupt+0xa9/0xc0 [ 34.976086][ T302] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 34.983310][ T302] [ 34.985647][ T302] Last potentially related work creation: [ 34.991848][ T302] kasan_save_stack+0x3b/0x60 [ 34.996980][ T302] __kasan_record_aux_stack+0xb4/0xc0 [ 35.002707][ T302] kasan_record_aux_stack_noalloc+0xb/0x10 [ 35.008868][ T302] call_rcu+0xdc/0x10f0 [ 35.012860][ T302] evict+0x87d/0x930 [ 35.017144][ T302] iput+0x616/0x690 [ 35.020783][ T302] do_unlinkat+0x4e1/0x920 [ 35.025247][ T302] __x64_sys_unlink+0x49/0x50 [ 35.030230][ T302] x64_sys_call+0x289/0x9a0 [ 35.035113][ T302] do_syscall_64+0x3b/0x80 [ 35.039602][ T302] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 35.045557][ T302] [ 35.047907][ T302] The buggy address belongs to the object at ffff8881005605d0 [ 35.047907][ T302] which belongs to the cache f2fs_inode_cache of size 1360 [ 35.063960][ T302] The buggy address is located 952 bytes inside of [ 35.063960][ T302] 1360-byte region [ffff8881005605d0, ffff888100560b20) [ 35.078184][ T302] [ 35.080348][ T302] The buggy address belongs to the physical page: [ 35.087516][ T302] page:ffffea0004015800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100560 [ 35.098182][ T302] head:ffffea0004015800 order:3 compound_mapcount:0 compound_pincount:0 [ 35.107123][ T302] flags: 0x4000000000010200(slab|head|zone=1) [ 35.113514][ T302] raw: 4000000000010200 0000000000000000 dead000000000122 ffff8881002d2600 [ 35.123350][ T302] raw: 0000000000000000 0000000080160016 00000001ffffffff 0000000000000000 [ 35.132188][ T302] page dumped because: kasan: bad access detected [ 35.138624][ T302] page_owner tracks the page as allocated [ 35.144601][ T302] page last allocated via order 3, migratetype Reclaimable, gfp_mask 0xd2050(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_RECLAIMABLE), pid 300, tgid 300 (syz-executor126), ts 29367959439, free_ts 0 [ 35.170942][ T302] post_alloc_hook+0x213/0x220 [ 35.175809][ T302] prep_new_page+0x1b/0x110 [ 35.180553][ T302] get_page_from_freelist+0x3a98/0x3b10 [ 35.186285][ T302] __alloc_pages+0x234/0x610 [ 35.191234][ T302] alloc_slab_page+0x6c/0xf0 [ 35.196395][ T302] new_slab+0x90/0x3e0 [ 35.200902][ T302] ___slab_alloc+0x6f9/0xb80 [ 35.205681][ T302] __slab_alloc+0x5d/0xa0 [ 35.210036][ T302] kmem_cache_alloc_lru+0x149/0x270 [ 35.215794][ T302] f2fs_alloc_inode+0x2d/0x350 [ 35.220918][ T302] iget_locked+0x18c/0x7e0 [ 35.225410][ T302] f2fs_iget+0x55/0x4ca0 [ 35.229886][ T302] f2fs_fill_super+0x5360/0x6dc0 [ 35.234791][ T302] mount_bdev+0x282/0x3b0 [ 35.239060][ T302] f2fs_mount+0x34/0x40 [ 35.243558][ T302] legacy_get_tree+0xf1/0x190 [ 35.248424][ T302] page_owner free stack trace missing [ 35.253863][ T302] [ 35.256238][ T302] Memory state around the buggy address: [ 35.262188][ T302] ffff888100560880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.270974][ T302] ffff888100560900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.279103][ T302] >ffff888100560980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.287643][ T302] ^ [ 35.291931][ T302] ffff888100560a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.299998][ T302] ffff888100560a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.308140][ T302] ================================================================== [ 35.316257][ T302] Disabling lock debugging due to kernel taint