./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor360744939
<...>
Warning: Permanently added '10.128.0.29' (ED25519) to the list of known hosts.
execve("./syz-executor360744939", ["./syz-executor360744939"], 0x7fff9ad46630 /* 10 vars */) = 0
brk(NULL) = 0x55558d603000
brk(0x55558d603d00) = 0x55558d603d00
arch_prctl(ARCH_SET_FS, 0x55558d603380) = 0
set_tid_address(0x55558d603650) = 5822
set_robust_list(0x55558d603660, 24) = 0
rseq(0x55558d603ca0, 0x20, 0, 0x53053053) = 0
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
readlink("/proc/self/exe", "/root/syz-executor360744939", 4096) = 27
getrandom("\xc1\x42\x64\x8a\xeb\x5c\xa4\x44", 8, GRND_NONBLOCK) = 8
brk(NULL) = 0x55558d603d00
brk(0x55558d624d00) = 0x55558d624d00
brk(0x55558d625000) = 0x55558d625000
mprotect(0x7f1b02335000, 16384, PROT_READ) = 0
mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000
mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000
mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000
executing program
write(1, "executing program\n", 18) = 18
memfd_create("syzkaller", 0) = 3
mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f1af9e00000
write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 16777216) = 16777216
munmap(0x7f1af9e00000, 138412032) = 0
openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4
ioctl(4, LOOP_SET_FD, 3) = 0
close(3) = 0
close(4) = 0
mkdir("./bus", 0777) = 0
mount("/dev/loop0", "./bus", "jfs", 0, "") = 0
openat(AT_FDCWD, "./bus", O_RDONLY|O_DIRECTORY) = 3
chdir("./bus") = 0
openat(AT_FDCWD, "/dev/loop0", O_RDWR) = -1 EBUSY (Device or resource busy)
[ 86.737543][ T5822] loop0: detected capacity change from 0 to 32768
openat(AT_FDCWD, "hugetlb.1GB.usage_in_bytes", O_RDWR|O_CREAT|O_NOCTTY|O_TRUNC|O_APPEND|FASYNC|0x18, 000) = 4
openat(AT_FDCWD, ".", O_RDONLY|O_CLOEXEC) = 5
[ 86.810883][ T5822] ==================================================================
[ 86.819004][ T5822] BUG: KASAN: slab-out-of-bounds in dtReadFirst+0x502/0x930
[ 86.826343][ T5822] Read of size 4 at addr ffff888078ee4028 by task syz-executor360/5822
[ 86.834597][ T5822]
[ 86.836951][ T5822] CPU: 1 UID: 0 PID: 5822 Comm: syz-executor360 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(full)
[ 86.836975][ T5822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[ 86.836995][ T5822] Call Trace:
[ 86.837005][ T5822]
[ 86.837017][ T5822] dump_stack_lvl+0x189/0x250
[ 86.837050][ T5822] ? rcu_is_watching+0x15/0xb0
[ 86.837077][ T5822] ? __kasan_check_byte+0x12/0x40
[ 86.837106][ T5822] ? __pfx_dump_stack_lvl+0x10/0x10
[ 86.837131][ T5822] ? rcu_is_watching+0x15/0xb0
[ 86.837158][ T5822] ? lock_release+0x4b/0x3e0
[ 86.837182][ T5822] ? _raw_spin_lock_irqsave+0xb3/0xf0
[ 86.837217][ T5822] ? __virt_addr_valid+0x18c/0x540
[ 86.837241][ T5822] ? __virt_addr_valid+0x469/0x540
[ 86.837265][ T5822] print_report+0xb4/0x290
[ 86.837288][ T5822] ? dtReadFirst+0x502/0x930
[ 86.837311][ T5822] kasan_report+0x118/0x150
[ 86.837341][ T5822] ? dtReadFirst+0x502/0x930
[ 86.837368][ T5822] dtReadFirst+0x502/0x930
[ 86.837398][ T5822] jfs_readdir+0x709/0x3ac0
[ 86.837436][ T5822] ? __lock_acquire+0xaac/0xd20
[ 86.837460][ T5822] ? __pfx_jfs_readdir+0x10/0x10
[ 86.837498][ T5822] ? __pfx_jfs_readdir+0x10/0x10
[ 86.837520][ T5822] ? __pfx_jfs_readdir+0x10/0x10
[ 86.837544][ T5822] ? wrap_directory_iterator+0x87/0xe0
[ 86.837570][ T5822] ? __pfx_jfs_readdir+0x10/0x10
[ 86.837594][ T5822] wrap_directory_iterator+0x93/0xe0
[ 86.837621][ T5822] iterate_dir+0x5ac/0x770
[ 86.837647][ T5822] __se_sys_getdents64+0xe4/0x260
[ 86.837674][ T5822] ? __pfx___se_sys_getdents64+0x10/0x10
[ 86.837699][ T5822] ? __pfx_filldir64+0x10/0x10
[ 86.837731][ T5822] do_syscall_64+0xf6/0x210
[ 86.837757][ T5822] ? clear_bhb_loop+0x45/0xa0
[ 86.837780][ T5822] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 86.837800][ T5822] RIP: 0033:0x7f1b022bc6b9
[ 86.837822][ T5822] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 86.837840][ T5822] RSP: 002b:00007ffd68b4fe08 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9
[ 86.837862][ T5822] RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f1b022bc6b9
[ 86.837877][ T5822] RDX: 0000000000001000 RSI: 0000200000000f80 RDI: 0000000000000005
[ 86.837891][ T5822] RBP: 00007f1b02335610 R08: 0000000000000000 R09: 00007ffd68b4ffd8
[ 86.837905][ T5822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 86.837917][ T5822] R13: 00007ffd68b4ffc8 R14: 0000000000000001 R15: 0000000000000001
[ 86.837939][ T5822]
[ 86.837946][ T5822]
[ 87.084793][ T5822] Allocated by task 5822:
[ 87.089120][ T5822] kasan_save_track+0x3e/0x80
[ 87.093805][ T5822] __kasan_slab_alloc+0x6c/0x80
[ 87.098663][ T5822] kmem_cache_alloc_lru_noprof+0x1c6/0x3d0
[ 87.104565][ T5822] jfs_alloc_inode+0x28/0x70
[ 87.109158][ T5822] alloc_inode+0x67/0x1b0
[ 87.113493][ T5822] new_inode+0x22/0x170
[ 87.117653][ T5822] ialloc+0x4c/0x8f0
[ 87.121550][ T5822] jfs_create+0x18d/0xa80
[ 87.125882][ T5822] path_openat+0x14f1/0x3830
[ 87.130471][ T5822] do_filp_open+0x1fa/0x410
[ 87.134978][ T5822] do_sys_openat2+0x121/0x1c0
[ 87.139656][ T5822] __x64_sys_openat+0x138/0x170
[ 87.144505][ T5822] do_syscall_64+0xf6/0x210
[ 87.149007][ T5822] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 87.154913][ T5822]
[ 87.157236][ T5822] The buggy address belongs to the object at ffff888078ee3750
[ 87.157236][ T5822] which belongs to the cache jfs_ip of size 2232
[ 87.170963][ T5822] The buggy address is located 32 bytes to the right of
[ 87.170963][ T5822] allocated 2232-byte region [ffff888078ee3750, ffff888078ee4008)
[ 87.185637][ T5822]
[ 87.187968][ T5822] The buggy address belongs to the physical page:
[ 87.194478][ T5822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x78ee0
[ 87.203254][ T5822] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 87.211753][ T5822] flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff)
[ 87.219305][ T5822] page_type: f5(slab)
[ 87.223288][ T5822] raw: 00fff00000000040 ffff888147699640 dead000000000122 0000000000000000
[ 87.231962][ T5822] raw: 0000000000000000 00000000800d000d 00000000f5000000 0000000000000000
[ 87.240568][ T5822] head: 00fff00000000040 ffff888147699640 dead000000000122 0000000000000000
[ 87.249252][ T5822] head: 0000000000000000 00000000800d000d 00000000f5000000 0000000000000000
[ 87.257922][ T5822] head: 00fff00000000003 ffffea0001e3b801 00000000ffffffff 00000000ffffffff
[ 87.266591][ T5822] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[ 87.275256][ T5822] page dumped because: kasan: bad access detected
[ 87.281760][ T5822] page_owner tracks the page as allocated
[ 87.288009][ T5822] page last allocated via order 3, migratetype Reclaimable, gfp_mask 0xd2050(__GFP_RECLAIMABLE|__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5822, tgid 5822 (syz-executor360), ts 86777151515, free_ts 29209244113
[ 87.310670][ T5822] post_alloc_hook+0x1d8/0x230
[ 87.315452][ T5822] get_page_from_freelist+0x21c7/0x22a0
[ 87.321003][ T5822] __alloc_frozen_pages_noprof+0x181/0x370
[ 87.326810][ T5822] alloc_pages_mpol+0x232/0x4a0
[ 87.331668][ T5822] allocate_slab+0x8a/0x3b0
[ 87.336178][ T5822] ___slab_alloc+0xbfc/0x1480
[ 87.340858][ T5822] kmem_cache_alloc_lru_noprof+0x288/0x3d0
[ 87.346853][ T5822] jfs_alloc_inode+0x28/0x70
[ 87.351444][ T5822] alloc_inode+0x67/0x1b0
[ 87.355868][ T5822] new_inode+0x22/0x170
[ 87.360033][ T5822] jfs_fill_super+0x569/0xd90
[ 87.364807][ T5822] get_tree_bdev_flags+0x40b/0x4d0
[ 87.369924][ T5822] vfs_get_tree+0x8f/0x2b0
[ 87.374433][ T5822] do_new_mount+0x24a/0xa40
[ 87.378946][ T5822] __se_sys_mount+0x317/0x410
[ 87.383629][ T5822] do_syscall_64+0xf6/0x210
[ 87.388135][ T5822] page last free pid 1 tgid 1 stack trace:
[ 87.393937][ T5822] __free_frozen_pages+0xb05/0xcd0
[ 87.399051][ T5822] free_contig_range+0x159/0x440
[ 87.403995][ T5822] destroy_args+0x86/0x460
[ 87.408419][ T5822] debug_vm_pgtable+0x3cf/0x410
[ 87.413276][ T5822] do_one_initcall+0x233/0x820
[ 87.418133][ T5822] do_initcall_level+0x137/0x1f0
[ 87.423072][ T5822] do_initcalls+0x69/0xd0
[ 87.427404][ T5822] kernel_init_freeable+0x3d9/0x570
[ 87.432605][ T5822] kernel_init+0x1d/0x1d0
[ 87.436951][ T5822] ret_from_fork+0x4b/0x80
[ 87.441375][ T5822] ret_from_fork_asm+0x1a/0x30
[ 87.446222][ T5822]
[ 87.448552][ T5822] Memory state around the buggy address:
[ 87.454183][ T5822] ffff888078ee3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 87.462247][ T5822] ffff888078ee3f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 87.470311][ T5822] >ffff888078ee4000: 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 87.478371][ T5822] ^
[ 87.483738][ T5822] ffff888078ee4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 87.491798][ T5822] ffff888078ee4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 87.499855][ T5822] ==================================================================
[ 87.509001][ T5822] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 87.516311][ T5822] CPU: 1 UID: 0 PID: 5822 Comm: syz-executor360 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(full)
[ 87.527003][ T5822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[ 87.537077][ T5822] Call Trace:
[ 87.540371][ T5822]
[ 87.543324][ T5822] dump_stack_lvl+0x99/0x250
[ 87.547958][ T5822] ? __asan_memcpy+0x40/0x70
[ 87.552612][ T5822] ? __pfx_dump_stack_lvl+0x10/0x10
[ 87.557852][ T5822] ? __pfx__printk+0x10/0x10
[ 87.562481][ T5822] panic+0x2db/0x790
[ 87.566413][ T5822] ? __pfx_preempt_schedule+0x10/0x10
[ 87.571827][ T5822] ? __pfx_panic+0x10/0x10
[ 87.576269][ T5822] ? _raw_spin_unlock_irqrestore+0xfd/0x110
[ 87.582193][ T5822] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10
[ 87.588552][ T5822] ? dtReadFirst+0x502/0x930
[ 87.593164][ T5822] check_panic_on_warn+0x89/0xb0
[ 87.598124][ T5822] ? dtReadFirst+0x502/0x930
[ 87.602735][ T5822] end_report+0x78/0x160
[ 87.607017][ T5822] kasan_report+0x129/0x150
[ 87.611553][ T5822] ? dtReadFirst+0x502/0x930
[ 87.616177][ T5822] dtReadFirst+0x502/0x930
[ 87.620623][ T5822] jfs_readdir+0x709/0x3ac0
[ 87.625175][ T5822] ? __lock_acquire+0xaac/0xd20
[ 87.630071][ T5822] ? __pfx_jfs_readdir+0x10/0x10
[ 87.635052][ T5822] ? __pfx_jfs_readdir+0x10/0x10
[ 87.640028][ T5822] ? __pfx_jfs_readdir+0x10/0x10
[ 87.644994][ T5822] ? wrap_directory_iterator+0x87/0xe0
[ 87.650485][ T5822] ? __pfx_jfs_readdir+0x10/0x10
[ 87.655444][ T5822] wrap_directory_iterator+0x93/0xe0
[ 87.660754][ T5822] iterate_dir+0x5ac/0x770
[ 87.665200][ T5822] __se_sys_getdents64+0xe4/0x260
[ 87.670245][ T5822] ? __pfx___se_sys_getdents64+0x10/0x10
[ 87.675896][ T5822] ? __pfx_filldir64+0x10/0x10
[ 87.680692][ T5822] do_syscall_64+0xf6/0x210
[ 87.685216][ T5822] ? clear_bhb_loop+0x45/0xa0
[ 87.689913][ T5822] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 87.695826][ T5822] RIP: 0033:0x7f1b022bc6b9
[ 87.700257][ T5822] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 87.719884][ T5822] RSP: 002b:00007ffd68b4fe08 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9
[ 87.728319][ T5822] RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f1b022bc6b9
[ 87.736315][ T5822] RDX: 0000000000001000 RSI: 0000200000000f80 RDI: 0000000000000005
[ 87.744307][ T5822] RBP: 00007f1b02335610 R08: 0000000000000000 R09: 00007ffd68b4ffd8
[ 87.752293][ T5822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 87.760279][ T5822] R13: 00007ffd68b4ffc8 R14: 0000000000000001 R15: 0000000000000001
[ 87.768279][ T5822]
[ 87.771660][ T5822] Kernel Offset: disabled
[ 87.775990][ T5822] Rebooting in 86400 seconds..