./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3764907549 <...> Warning: Permanently added '10.128.0.65' (ED25519) to the list of known hosts. execve("./syz-executor3764907549", ["./syz-executor3764907549"], 0x7ffe671c5270 /* 10 vars */) = 0 brk(NULL) = 0x555581d18000 brk(0x555581d18d00) = 0x555581d18d00 arch_prctl(ARCH_SET_FS, 0x555581d18380) = 0 set_tid_address(0x555581d18650) = 289 set_robust_list(0x555581d18660, 24) = 0 rseq(0x555581d18ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor3764907549", 4096) = 28 getrandom("\x1b\xb7\xda\x59\x6d\xa9\xa1\x9b", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555581d18d00 brk(0x555581d39d00) = 0x555581d39d00 brk(0x555581d3a000) = 0x555581d3a000 mprotect(0x7f343f2ee000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0executing program ) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 mkdir("./syzkaller.gZygEQ", 0700) = 0 chmod("./syzkaller.gZygEQ", 0777) = 0 chdir("./syzkaller.gZygEQ") = 0 write(1, "executing program\n", 18) = 18 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3436e3c000 write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 262144) = 262144 munmap(0x7f3436e3c000, 138412032) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 [ 28.871643][ T28] audit: type=1400 audit(1747603423.938:64): avc: denied { execmem } for pid=289 comm="syz-executor376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 28.878102][ T289] loop0: detected capacity change from 0 to 512 [ 28.891916][ T28] audit: type=1400 audit(1747603423.948:65): avc: denied { read write } for pid=289 comm="syz-executor376" name="loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 close(4) = 0 mkdir("\xe9\x1f\x71\x89\x59\x1e\x92\x33\x61\x4b", 0777) = 0 [ 28.898903][ T289] EXT4-fs: Ignoring removed orlov option [ 28.928326][ T28] audit: type=1400 audit(1747603423.948:66): avc: denied { open } for pid=289 comm="syz-executor376" path="/dev/loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 28.946216][ T289] EXT4-fs error (device loop0): ext4_xattr_inode_iget:404: comm syz-executor376: inode #1: comm syz-executor376: iget: illegal inode # [ 28.953285][ T28] audit: type=1400 audit(1747603423.948:67): avc: denied { ioctl } for pid=289 comm="syz-executor376" path="/dev/loop0" dev="devtmpfs" ino=118 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 28.967159][ T289] EXT4-fs error (device loop0): ext4_xattr_inode_iget:409: comm syz-executor376: error while reading EA inode 1 err=-117 mount("/dev/loop0", "\xe9\x1f\x71\x89\x59\x1e\x92\x33\x61\x4b", "ext4", MS_NOSYMFOLLOW|MS_NOATIME|MS_I_VERSION|0x200, "journal_ioprio=0x0000000000000005,nogrpid,orlov,minixdf,resgid=0x0000000000000000,stripe=0x000000000"...) = 0 openat(AT_FDCWD, "\xe9\x1f\x71\x89\x59\x1e\x92\x33\x61\x4b", O_RDONLY|O_DIRECTORY) = 3 chdir("\xe9\x1f\x71\x89\x59\x1e\x92\x33\x61\x4b") = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 ioctl(4, LOOP_CLR_FD) = 0 close(4) = 0 chdir("./file0") = 0 openat(AT_FDCWD, "net_prio.prioidx", O_RDWR|O_CREAT|O_NOCTTY|O_TRUNC|O_APPEND|FASYNC|0x18, 000) = 4 mkdir("./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", 005) = 0 [ 28.992755][ T28] audit: type=1400 audit(1747603423.968:68): avc: denied { mounton } for pid=289 comm="syz-executor376" path=2F726F6F742F73797A6B616C6C65722E675A796745512FE91F7189591E9233614B dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 29.006300][ T289] EXT4-fs (loop0): 1 orphan inode deleted [ 29.038775][ T289] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 29.048027][ T28] audit: type=1400 audit(1747603424.118:69): avc: denied { mount } for pid=289 comm="syz-executor376" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 creat("./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", 000) = 5 mknod("./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", 000) = 0 [ 29.069975][ T28] audit: type=1400 audit(1747603424.138:70): avc: denied { write } for pid=289 comm="syz-executor376" name="file0" dev="loop0" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 29.071277][ T289] ================================================================== [ 29.100290][ T289] BUG: KASAN: use-after-free in ext4_insert_dentry+0x388/0x710 [ 29.107961][ T289] Write of size 251 at addr ffff888124209f14 by task syz-executor376/289 [ 29.116560][ T289] [ 29.119052][ T289] CPU: 1 PID: 289 Comm: syz-executor376 Not tainted 6.1.134-syzkaller-00016-ga0fa2316cce1 #0 [ 29.129215][ T289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 29.139580][ T289] Call Trace: [ 29.142870][ T289] [ 29.145832][ T289] __dump_stack+0x21/0x24 [ 29.150168][ T289] dump_stack_lvl+0xee/0x150 [ 29.154796][ T289] ? __cfi_dump_stack_lvl+0x8/0x8 [ 29.160187][ T289] ? __cfi__printk+0x8/0x8 [ 29.164692][ T289] ? ext4_insert_dentry+0x388/0x710 [ 29.169896][ T289] print_address_description+0x71/0x210 [ 29.175791][ T289] print_report+0x4a/0x60 [ 29.180126][ T289] kasan_report+0x122/0x150 [ 29.184629][ T289] ? ext4_insert_dentry+0x388/0x710 [ 29.189916][ T289] ? ext4_insert_dentry+0x388/0x710 [ 29.195117][ T289] kasan_check_range+0x280/0x290 [ 29.200062][ T289] memcpy+0x44/0x70 [ 29.203877][ T289] ext4_insert_dentry+0x388/0x710 [ 29.208999][ T289] add_dirent_to_buf+0x2ac/0x670 [ 29.213980][ T289] make_indexed_dir+0xe55/0x14a0 [ 29.218935][ T289] ? add_dirent_to_buf+0x670/0x670 [ 29.224064][ T289] ? add_dirent_to_buf+0x45b/0x670 [ 29.229201][ T289] ext4_add_entry+0xb45/0xd70 [ 29.234062][ T289] ? ext4_inc_count+0x1b0/0x1b0 [ 29.238915][ T289] ? __cfi___ext4_new_inode+0x10/0x10 [ 29.244291][ T289] ? dquot_initialize+0x20/0x20 [ 29.249171][ T289] ext4_add_nondir+0x97/0x270 [ 29.253863][ T289] ext4_symlink+0x842/0x9b0 [ 29.258374][ T289] ? __cfi_ext4_symlink+0x10/0x10 [ 29.263421][ T289] ? security_inode_symlink+0xcf/0x120 [ 29.269252][ T289] vfs_symlink+0x261/0x3f0 [ 29.274675][ T289] do_symlinkat+0x124/0x5a0 [ 29.279559][ T289] __x64_sys_symlink+0x7e/0x90 [ 29.284733][ T289] x64_sys_call+0x369/0x9a0 [ 29.289722][ T289] do_syscall_64+0x4c/0xa0 [ 29.294187][ T289] ? clear_bhb_loop+0x15/0x70 [ 29.298929][ T289] ? clear_bhb_loop+0x15/0x70 [ 29.303713][ T289] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 29.309662][ T289] RIP: 0033:0x7f343f279cd9 [ 29.314316][ T289] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 29.335310][ T289] RSP: 002b:00007ffd7dbd7918 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 29.344001][ T289] RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f343f279cd9 [ 29.352013][ T289] RDX: 00007f343f279cd9 RSI: 0000200000000cc0 RDI: 0000200000000dc0 [ 29.360084][ T289] RBP: 0030656c69662f2e R08: 6c616b7a79732f2e R09: 6c616b7a79732f2e [ 29.368402][ T289] R10: 6c616b7a79732f2e R11: 0000000000000246 R12: 0000200000000180 [ 29.376374][ T289] R13: 00007ffd7dbd7b08 R14: 0000000000000001 R15: 0000000000000001 [ 29.384436][ T289] [ 29.387554][ T289] [ 29.389895][ T289] The buggy address belongs to the physical page: [ 29.396734][ T289] page:ffffea0004908240 refcount:3 mapcount:0 mapping:ffff88810054d850 index:0x3f pfn:0x124209 [ 29.408103][ T289] memcg:ffff888100336000 [ 29.412626][ T289] aops:def_blk_aops ino:700000 [ 29.417517][ T289] flags: 0x420000000000204a(referenced|dirty|workingset|private|zone=1) [ 29.426214][ T289] raw: 420000000000204a 0000000000000000 dead000000000122 ffff88810054d850 [ 29.435522][ T289] raw: 000000000000003f ffff888122609b28 00000003ffffffff ffff888100336000 [ 29.444131][ T289] page dumped because: kasan: bad access detected [ 29.450574][ T289] page_owner tracks the page as allocated [ 29.456370][ T289] page last allocated via order 0, migratetype Movable, gfp_mask 0x148c48(GFP_NOFS|__GFP_NOFAIL|__GFP_COMP|__GFP_HARDWALL|__GFP_MOVABLE), pid 289, tgid 289 (syz-executor376), ts 29071114979, free_ts 28877052334 [ 29.477127][ T289] post_alloc_hook+0x1f5/0x210 [ 29.481909][ T289] prep_new_page+0x1c/0x110 [ 29.486420][ T289] get_page_from_freelist+0x2c6e/0x2ce0 [ 29.491999][ T289] __alloc_pages+0x19e/0x3a0 [ 29.496689][ T289] __folio_alloc+0x12/0x40 [ 29.501309][ T289] __filemap_get_folio+0x6ec/0x980 [ 29.507060][ T289] pagecache_get_page+0x2b/0x110 [ 29.512104][ T289] __getblk_gfp+0x217/0x7d0 [ 29.516785][ T289] ext4_getblk+0x26c/0x6d0 [ 29.522068][ T289] ext4_bread+0x2b/0x170 [ 29.527181][ T289] ext4_append+0x2c3/0x560 [ 29.532076][ T289] make_indexed_dir+0x55d/0x14a0 [ 29.537137][ T289] ext4_add_entry+0xb45/0xd70 [ 29.542013][ T289] ext4_add_nondir+0x97/0x270 [ 29.546798][ T289] ext4_symlink+0x842/0x9b0 [ 29.551312][ T289] vfs_symlink+0x261/0x3f0 [ 29.555729][ T289] page last free stack trace: [ 29.560395][ T289] free_unref_page_prepare+0x742/0x750 [ 29.565943][ T289] free_unref_page_list+0xba/0x7c0 [ 29.571056][ T289] release_pages+0xad1/0xb20 [ 29.575649][ T289] free_pages_and_swap_cache+0x86/0xa0 [ 29.581281][ T289] tlb_finish_mmu+0x1aa/0x370 [ 29.585995][ T289] unmap_region+0x28d/0x2e0 [ 29.590503][ T289] do_mas_align_munmap+0xb94/0x11b0 [ 29.595792][ T289] do_mas_munmap+0x241/0x2b0 [ 29.600556][ T289] __vm_munmap+0x19f/0x2f0 [ 29.605234][ T289] __x64_sys_munmap+0x6b/0x80 [ 29.609940][ T289] x64_sys_call+0x8a/0x9a0 [ 29.614636][ T289] do_syscall_64+0x4c/0xa0 [ 29.619109][ T289] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 29.625033][ T289] [ 29.627381][ T289] Memory state around the buggy address: [ 29.633097][ T289] ffff888124209f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.641164][ T289] ffff888124209f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.649306][ T289] >ffff88812420a000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.657444][ T289] ^ [ 29.661514][ T289] ffff88812420a080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff symlink("./file0", "./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa") = 0 exit_group(0) = ? +++ exited with 0 +++ [ 29.669615][ T289] ffff88812420a100: ff ff ff ff ff ff ff ff ff ff ff ff