./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor360744939 <...> Warning: Permanently added '10.128.0.29' (ED25519) to the list of known hosts. execve("./syz-executor360744939", ["./syz-executor360744939"], 0x7fff9ad46630 /* 10 vars */) = 0 brk(NULL) = 0x55558d603000 brk(0x55558d603d00) = 0x55558d603d00 arch_prctl(ARCH_SET_FS, 0x55558d603380) = 0 set_tid_address(0x55558d603650) = 5822 set_robust_list(0x55558d603660, 24) = 0 rseq(0x55558d603ca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor360744939", 4096) = 27 getrandom("\xc1\x42\x64\x8a\xeb\x5c\xa4\x44", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55558d603d00 brk(0x55558d624d00) = 0x55558d624d00 brk(0x55558d625000) = 0x55558d625000 mprotect(0x7f1b02335000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 executing program write(1, "executing program\n", 18) = 18 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f1af9e00000 write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 16777216) = 16777216 munmap(0x7f1af9e00000, 138412032) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 close(4) = 0 mkdir("./bus", 0777) = 0 mount("/dev/loop0", "./bus", "jfs", 0, "") = 0 openat(AT_FDCWD, "./bus", O_RDONLY|O_DIRECTORY) = 3 chdir("./bus") = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = -1 EBUSY (Device or resource busy) [ 86.737543][ T5822] loop0: detected capacity change from 0 to 32768 openat(AT_FDCWD, "hugetlb.1GB.usage_in_bytes", O_RDWR|O_CREAT|O_NOCTTY|O_TRUNC|O_APPEND|FASYNC|0x18, 000) = 4 openat(AT_FDCWD, ".", O_RDONLY|O_CLOEXEC) = 5 [ 86.810883][ T5822] ================================================================== [ 86.819004][ T5822] BUG: KASAN: slab-out-of-bounds in dtReadFirst+0x502/0x930 [ 86.826343][ T5822] Read of size 4 at addr ffff888078ee4028 by task syz-executor360/5822 [ 86.834597][ T5822] [ 86.836951][ T5822] CPU: 1 UID: 0 PID: 5822 Comm: syz-executor360 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(full) [ 86.836975][ T5822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 86.836995][ T5822] Call Trace: [ 86.837005][ T5822] [ 86.837017][ T5822] dump_stack_lvl+0x189/0x250 [ 86.837050][ T5822] ? rcu_is_watching+0x15/0xb0 [ 86.837077][ T5822] ? __kasan_check_byte+0x12/0x40 [ 86.837106][ T5822] ? __pfx_dump_stack_lvl+0x10/0x10 [ 86.837131][ T5822] ? rcu_is_watching+0x15/0xb0 [ 86.837158][ T5822] ? lock_release+0x4b/0x3e0 [ 86.837182][ T5822] ? _raw_spin_lock_irqsave+0xb3/0xf0 [ 86.837217][ T5822] ? __virt_addr_valid+0x18c/0x540 [ 86.837241][ T5822] ? __virt_addr_valid+0x469/0x540 [ 86.837265][ T5822] print_report+0xb4/0x290 [ 86.837288][ T5822] ? dtReadFirst+0x502/0x930 [ 86.837311][ T5822] kasan_report+0x118/0x150 [ 86.837341][ T5822] ? dtReadFirst+0x502/0x930 [ 86.837368][ T5822] dtReadFirst+0x502/0x930 [ 86.837398][ T5822] jfs_readdir+0x709/0x3ac0 [ 86.837436][ T5822] ? __lock_acquire+0xaac/0xd20 [ 86.837460][ T5822] ? __pfx_jfs_readdir+0x10/0x10 [ 86.837498][ T5822] ? __pfx_jfs_readdir+0x10/0x10 [ 86.837520][ T5822] ? __pfx_jfs_readdir+0x10/0x10 [ 86.837544][ T5822] ? wrap_directory_iterator+0x87/0xe0 [ 86.837570][ T5822] ? __pfx_jfs_readdir+0x10/0x10 [ 86.837594][ T5822] wrap_directory_iterator+0x93/0xe0 [ 86.837621][ T5822] iterate_dir+0x5ac/0x770 [ 86.837647][ T5822] __se_sys_getdents64+0xe4/0x260 [ 86.837674][ T5822] ? __pfx___se_sys_getdents64+0x10/0x10 [ 86.837699][ T5822] ? __pfx_filldir64+0x10/0x10 [ 86.837731][ T5822] do_syscall_64+0xf6/0x210 [ 86.837757][ T5822] ? clear_bhb_loop+0x45/0xa0 [ 86.837780][ T5822] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 86.837800][ T5822] RIP: 0033:0x7f1b022bc6b9 [ 86.837822][ T5822] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 86.837840][ T5822] RSP: 002b:00007ffd68b4fe08 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 86.837862][ T5822] RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f1b022bc6b9 [ 86.837877][ T5822] RDX: 0000000000001000 RSI: 0000200000000f80 RDI: 0000000000000005 [ 86.837891][ T5822] RBP: 00007f1b02335610 R08: 0000000000000000 R09: 00007ffd68b4ffd8 [ 86.837905][ T5822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 86.837917][ T5822] R13: 00007ffd68b4ffc8 R14: 0000000000000001 R15: 0000000000000001 [ 86.837939][ T5822] [ 86.837946][ T5822] [ 87.084793][ T5822] Allocated by task 5822: [ 87.089120][ T5822] kasan_save_track+0x3e/0x80 [ 87.093805][ T5822] __kasan_slab_alloc+0x6c/0x80 [ 87.098663][ T5822] kmem_cache_alloc_lru_noprof+0x1c6/0x3d0 [ 87.104565][ T5822] jfs_alloc_inode+0x28/0x70 [ 87.109158][ T5822] alloc_inode+0x67/0x1b0 [ 87.113493][ T5822] new_inode+0x22/0x170 [ 87.117653][ T5822] ialloc+0x4c/0x8f0 [ 87.121550][ T5822] jfs_create+0x18d/0xa80 [ 87.125882][ T5822] path_openat+0x14f1/0x3830 [ 87.130471][ T5822] do_filp_open+0x1fa/0x410 [ 87.134978][ T5822] do_sys_openat2+0x121/0x1c0 [ 87.139656][ T5822] __x64_sys_openat+0x138/0x170 [ 87.144505][ T5822] do_syscall_64+0xf6/0x210 [ 87.149007][ T5822] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.154913][ T5822] [ 87.157236][ T5822] The buggy address belongs to the object at ffff888078ee3750 [ 87.157236][ T5822] which belongs to the cache jfs_ip of size 2232 [ 87.170963][ T5822] The buggy address is located 32 bytes to the right of [ 87.170963][ T5822] allocated 2232-byte region [ffff888078ee3750, ffff888078ee4008) [ 87.185637][ T5822] [ 87.187968][ T5822] The buggy address belongs to the physical page: [ 87.194478][ T5822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x78ee0 [ 87.203254][ T5822] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 87.211753][ T5822] flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff) [ 87.219305][ T5822] page_type: f5(slab) [ 87.223288][ T5822] raw: 00fff00000000040 ffff888147699640 dead000000000122 0000000000000000 [ 87.231962][ T5822] raw: 0000000000000000 00000000800d000d 00000000f5000000 0000000000000000 [ 87.240568][ T5822] head: 00fff00000000040 ffff888147699640 dead000000000122 0000000000000000 [ 87.249252][ T5822] head: 0000000000000000 00000000800d000d 00000000f5000000 0000000000000000 [ 87.257922][ T5822] head: 00fff00000000003 ffffea0001e3b801 00000000ffffffff 00000000ffffffff [ 87.266591][ T5822] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 87.275256][ T5822] page dumped because: kasan: bad access detected [ 87.281760][ T5822] page_owner tracks the page as allocated [ 87.288009][ T5822] page last allocated via order 3, migratetype Reclaimable, gfp_mask 0xd2050(__GFP_RECLAIMABLE|__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5822, tgid 5822 (syz-executor360), ts 86777151515, free_ts 29209244113 [ 87.310670][ T5822] post_alloc_hook+0x1d8/0x230 [ 87.315452][ T5822] get_page_from_freelist+0x21c7/0x22a0 [ 87.321003][ T5822] __alloc_frozen_pages_noprof+0x181/0x370 [ 87.326810][ T5822] alloc_pages_mpol+0x232/0x4a0 [ 87.331668][ T5822] allocate_slab+0x8a/0x3b0 [ 87.336178][ T5822] ___slab_alloc+0xbfc/0x1480 [ 87.340858][ T5822] kmem_cache_alloc_lru_noprof+0x288/0x3d0 [ 87.346853][ T5822] jfs_alloc_inode+0x28/0x70 [ 87.351444][ T5822] alloc_inode+0x67/0x1b0 [ 87.355868][ T5822] new_inode+0x22/0x170 [ 87.360033][ T5822] jfs_fill_super+0x569/0xd90 [ 87.364807][ T5822] get_tree_bdev_flags+0x40b/0x4d0 [ 87.369924][ T5822] vfs_get_tree+0x8f/0x2b0 [ 87.374433][ T5822] do_new_mount+0x24a/0xa40 [ 87.378946][ T5822] __se_sys_mount+0x317/0x410 [ 87.383629][ T5822] do_syscall_64+0xf6/0x210 [ 87.388135][ T5822] page last free pid 1 tgid 1 stack trace: [ 87.393937][ T5822] __free_frozen_pages+0xb05/0xcd0 [ 87.399051][ T5822] free_contig_range+0x159/0x440 [ 87.403995][ T5822] destroy_args+0x86/0x460 [ 87.408419][ T5822] debug_vm_pgtable+0x3cf/0x410 [ 87.413276][ T5822] do_one_initcall+0x233/0x820 [ 87.418133][ T5822] do_initcall_level+0x137/0x1f0 [ 87.423072][ T5822] do_initcalls+0x69/0xd0 [ 87.427404][ T5822] kernel_init_freeable+0x3d9/0x570 [ 87.432605][ T5822] kernel_init+0x1d/0x1d0 [ 87.436951][ T5822] ret_from_fork+0x4b/0x80 [ 87.441375][ T5822] ret_from_fork_asm+0x1a/0x30 [ 87.446222][ T5822] [ 87.448552][ T5822] Memory state around the buggy address: [ 87.454183][ T5822] ffff888078ee3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 87.462247][ T5822] ffff888078ee3f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 87.470311][ T5822] >ffff888078ee4000: 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.478371][ T5822] ^ [ 87.483738][ T5822] ffff888078ee4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.491798][ T5822] ffff888078ee4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.499855][ T5822] ================================================================== [ 87.509001][ T5822] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 87.516311][ T5822] CPU: 1 UID: 0 PID: 5822 Comm: syz-executor360 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(full) [ 87.527003][ T5822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 87.537077][ T5822] Call Trace: [ 87.540371][ T5822] [ 87.543324][ T5822] dump_stack_lvl+0x99/0x250 [ 87.547958][ T5822] ? __asan_memcpy+0x40/0x70 [ 87.552612][ T5822] ? __pfx_dump_stack_lvl+0x10/0x10 [ 87.557852][ T5822] ? __pfx__printk+0x10/0x10 [ 87.562481][ T5822] panic+0x2db/0x790 [ 87.566413][ T5822] ? __pfx_preempt_schedule+0x10/0x10 [ 87.571827][ T5822] ? __pfx_panic+0x10/0x10 [ 87.576269][ T5822] ? _raw_spin_unlock_irqrestore+0xfd/0x110 [ 87.582193][ T5822] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 87.588552][ T5822] ? dtReadFirst+0x502/0x930 [ 87.593164][ T5822] check_panic_on_warn+0x89/0xb0 [ 87.598124][ T5822] ? dtReadFirst+0x502/0x930 [ 87.602735][ T5822] end_report+0x78/0x160 [ 87.607017][ T5822] kasan_report+0x129/0x150 [ 87.611553][ T5822] ? dtReadFirst+0x502/0x930 [ 87.616177][ T5822] dtReadFirst+0x502/0x930 [ 87.620623][ T5822] jfs_readdir+0x709/0x3ac0 [ 87.625175][ T5822] ? __lock_acquire+0xaac/0xd20 [ 87.630071][ T5822] ? __pfx_jfs_readdir+0x10/0x10 [ 87.635052][ T5822] ? __pfx_jfs_readdir+0x10/0x10 [ 87.640028][ T5822] ? __pfx_jfs_readdir+0x10/0x10 [ 87.644994][ T5822] ? wrap_directory_iterator+0x87/0xe0 [ 87.650485][ T5822] ? __pfx_jfs_readdir+0x10/0x10 [ 87.655444][ T5822] wrap_directory_iterator+0x93/0xe0 [ 87.660754][ T5822] iterate_dir+0x5ac/0x770 [ 87.665200][ T5822] __se_sys_getdents64+0xe4/0x260 [ 87.670245][ T5822] ? __pfx___se_sys_getdents64+0x10/0x10 [ 87.675896][ T5822] ? __pfx_filldir64+0x10/0x10 [ 87.680692][ T5822] do_syscall_64+0xf6/0x210 [ 87.685216][ T5822] ? clear_bhb_loop+0x45/0xa0 [ 87.689913][ T5822] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.695826][ T5822] RIP: 0033:0x7f1b022bc6b9 [ 87.700257][ T5822] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 87.719884][ T5822] RSP: 002b:00007ffd68b4fe08 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 87.728319][ T5822] RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f1b022bc6b9 [ 87.736315][ T5822] RDX: 0000000000001000 RSI: 0000200000000f80 RDI: 0000000000000005 [ 87.744307][ T5822] RBP: 00007f1b02335610 R08: 0000000000000000 R09: 00007ffd68b4ffd8 [ 87.752293][ T5822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 87.760279][ T5822] R13: 00007ffd68b4ffc8 R14: 0000000000000001 R15: 0000000000000001 [ 87.768279][ T5822] [ 87.771660][ T5822] Kernel Offset: disabled [ 87.775990][ T5822] Rebooting in 86400 seconds..