Warning: Permanently added '10.128.0.254' (ED25519) to the list of known hosts. executing program [ 65.208091][ T4168] loop0: detected capacity change from 0 to 32768 [ 65.303955][ T4168] ================================================================== [ 65.312226][ T4168] BUG: KASAN: slab-out-of-bounds in diWrite+0xbe7/0x1610 [ 65.319301][ T4168] Read of size 32 at addr ffff8880740e5110 by task syz-executor309/4168 [ 65.327782][ T4168] [ 65.330148][ T4168] CPU: 0 PID: 4168 Comm: syz-executor309 Not tainted 5.15.184-syzkaller #0 [ 65.338769][ T4168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 65.348872][ T4168] Call Trace: [ 65.352192][ T4168] [ 65.355151][ T4168] dump_stack_lvl+0x168/0x230 [ 65.359868][ T4168] ? show_regs_print_info+0x20/0x20 [ 65.365094][ T4168] ? load_image+0x3b0/0x3b0 [ 65.369619][ T4168] ? _raw_spin_lock_irqsave+0xb0/0xf0 [ 65.375024][ T4168] ? __rwlock_init+0x140/0x140 [ 65.379812][ T4168] ? mark_page_accessed+0xce5/0x12b0 [ 65.385122][ T4168] print_address_description+0x60/0x2d0 [ 65.390697][ T4168] ? diWrite+0xbe7/0x1610 [ 65.395058][ T4168] kasan_report+0xdf/0x130 [ 65.399503][ T4168] ? diWrite+0xbe7/0x1610 [ 65.403835][ T4168] ? diWrite+0xbe7/0x1610 [ 65.408165][ T4168] kasan_check_range+0x27b/0x290 [ 65.413099][ T4168] memcpy+0x25/0x60 [ 65.416921][ T4168] diWrite+0xbe7/0x1610 [ 65.421080][ T4168] txCommit+0x84b/0x51c0 [ 65.425319][ T4168] ? ktime_get_real_ts64+0x420/0x420 [ 65.430620][ T4168] ? txLinelock+0x160/0x160 [ 65.435122][ T4168] ? rcu_is_watching+0x11/0xa0 [ 65.439881][ T4168] ? __mark_inode_dirty+0x383/0xc60 [ 65.445075][ T4168] jfs_mkdir+0x875/0xa70 [ 65.449320][ T4168] ? jfs_symlink+0xe60/0xe60 [ 65.454008][ T4168] ? make_kgid+0x640/0x640 [ 65.458428][ T4168] ? apparmor_path_mkdir+0x1a3/0x220 [ 65.463720][ T4168] ? generic_permission+0x230/0x510 [ 65.468923][ T4168] ? inode_permission+0xef/0x480 [ 65.473854][ T4168] ? bpf_lsm_inode_mkdir+0x5/0x10 [ 65.478870][ T4168] ? security_inode_mkdir+0xb3/0x100 [ 65.484149][ T4168] vfs_mkdir+0x387/0x570 [ 65.488398][ T4168] do_mkdirat+0x1d7/0x5a0 [ 65.492724][ T4168] ? vfs_mkdir+0x570/0x570 [ 65.497140][ T4168] ? getname_flags+0x1fe/0x500 [ 65.501904][ T4168] __x64_sys_mkdir+0x6a/0x80 [ 65.506496][ T4168] do_syscall_64+0x4c/0xa0 [ 65.510906][ T4168] ? clear_bhb_loop+0x30/0x80 [ 65.515576][ T4168] ? clear_bhb_loop+0x30/0x80 [ 65.520246][ T4168] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 65.526144][ T4168] RIP: 0033:0x7fd4727e21a9 [ 65.530554][ T4168] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 65.550155][ T4168] RSP: 002b:00007ffea537bb08 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 65.558603][ T4168] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4727e21a9 [ 65.566659][ T4168] RDX: 00007fd4727e21a9 RSI: 0000000000000000 RDI: 0000200000000200 [ 65.574650][ T4168] RBP: 0000000000000004 R08: 0000000000000000 R09: 0000000000000000 [ 65.582614][ T4168] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffea537bb50 [ 65.590584][ T4168] R13: 00007ffea537bb90 R14: 0000000001000000 R15: 0000000000000003 [ 65.598564][ T4168] [ 65.601578][ T4168] [ 65.603922][ T4168] Allocated by task 0: [ 65.607976][ T4168] (stack is not available) [ 65.612404][ T4168] [ 65.614720][ T4168] The buggy address belongs to the object at ffff8880740e4a00 [ 65.614720][ T4168] which belongs to the cache jfs_ip of size 2240 [ 65.628428][ T4168] The buggy address is located 1808 bytes inside of [ 65.628428][ T4168] 2240-byte region [ffff8880740e4a00, ffff8880740e52c0) [ 65.641874][ T4168] The buggy address belongs to the page: [ 65.647505][ T4168] page:ffffea0001d03800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x740e0 [ 65.657651][ T4168] head:ffffea0001d03800 order:3 compound_mapcount:0 compound_pincount:0 [ 65.665968][ T4168] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 65.673958][ T4168] raw: 00fff00000010200 0000000000000000 dead000000000122 ffff88801d474c80 [ 65.682533][ T4168] raw: 0000000000000000 00000000800d000d 00000001ffffffff 0000000000000000 [ 65.691104][ T4168] page dumped because: kasan: bad access detected [ 65.697513][ T4168] page_owner tracks the page as allocated [ 65.703218][ T4168] page last allocated via order 3, migratetype Reclaimable, gfp_mask 0xd2050(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_RECLAIMABLE), pid 4168, ts 65286563648, free_ts 19398701585 [ 65.723283][ T4168] get_page_from_freelist+0x1b77/0x1c60 [ 65.728832][ T4168] __alloc_pages+0x1e1/0x470 [ 65.733420][ T4168] new_slab+0xc0/0x4b0 [ 65.737498][ T4168] ___slab_alloc+0x81e/0xdf0 [ 65.742099][ T4168] kmem_cache_alloc+0x195/0x290 [ 65.746940][ T4168] jfs_alloc_inode+0x17/0x50 [ 65.751558][ T4168] new_inode_pseudo+0x5f/0x210 [ 65.756315][ T4168] new_inode+0x25/0x1c0 [ 65.760466][ T4168] jfs_fill_super+0x392/0xaf0 [ 65.765133][ T4168] mount_bdev+0x287/0x3c0 [ 65.769453][ T4168] legacy_get_tree+0xe6/0x180 [ 65.774120][ T4168] vfs_get_tree+0x88/0x270 [ 65.778527][ T4168] do_new_mount+0x24a/0xa40 [ 65.783020][ T4168] __se_sys_mount+0x2d6/0x3c0 [ 65.787692][ T4168] do_syscall_64+0x4c/0xa0 [ 65.792107][ T4168] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 65.797996][ T4168] page last free stack trace: [ 65.802654][ T4168] free_unref_page_prepare+0x637/0x6c0 [ 65.808106][ T4168] free_unref_page+0x94/0x280 [ 65.812795][ T4168] free_contig_range+0x96/0xf0 [ 65.817551][ T4168] destroy_args+0xef/0x8b0 [ 65.821959][ T4168] debug_vm_pgtable+0x318/0x370 [ 65.826798][ T4168] do_one_initcall+0x1ee/0x680 [ 65.831705][ T4168] do_initcall_level+0x137/0x1f0 [ 65.836649][ T4168] do_initcalls+0x4b/0x90 [ 65.840982][ T4168] kernel_init_freeable+0x3ce/0x560 [ 65.846188][ T4168] kernel_init+0x19/0x1b0 [ 65.850572][ T4168] ret_from_fork+0x1f/0x30 [ 65.854988][ T4168] [ 65.857305][ T4168] Memory state around the buggy address: [ 65.862944][ T4168] ffff8880740e5000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.871002][ T4168] ffff8880740e5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.879139][ T4168] >ffff8880740e5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.887188][ T4168] ^ [ 65.892028][ T4168] ffff8880740e5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.900103][ T4168] ffff8880740e5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.908159][ T4168] ================================================================== [ 65.916212][ T4168] Disabling lock debugging due to kernel taint [ 65.923232][ T4168] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 65.930470][ T4168] CPU: 1 PID: 4168 Comm: syz-executor309 Tainted: G B 5.15.184-syzkaller #0 [ 65.940488][ T4168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 65.950538][ T4168] Call Trace: [ 65.953848][ T4168] [ 65.956768][ T4168] dump_stack_lvl+0x168/0x230 [ 65.961436][ T4168] ? show_regs_print_info+0x20/0x20 [ 65.966623][ T4168] ? load_image+0x3b0/0x3b0 [ 65.971222][ T4168] panic+0x2c9/0x7f0 [ 65.975129][ T4168] ? bpf_jit_dump+0xd0/0xd0 [ 65.979633][ T4168] ? _raw_spin_unlock_irqrestore+0xf6/0x100 [ 65.985518][ T4168] ? _raw_spin_unlock+0x40/0x40 [ 65.990362][ T4168] ? diWrite+0xbe7/0x1610 [ 65.994689][ T4168] check_panic_on_warn+0x80/0xa0 [ 65.999618][ T4168] ? diWrite+0xbe7/0x1610 [ 66.003941][ T4168] end_report+0x6d/0xf0 [ 66.008089][ T4168] kasan_report+0x102/0x130 [ 66.012583][ T4168] ? diWrite+0xbe7/0x1610 [ 66.016902][ T4168] ? diWrite+0xbe7/0x1610 [ 66.021221][ T4168] kasan_check_range+0x27b/0x290 [ 66.026154][ T4168] memcpy+0x25/0x60 [ 66.029956][ T4168] diWrite+0xbe7/0x1610 [ 66.034112][ T4168] txCommit+0x84b/0x51c0 [ 66.038349][ T4168] ? ktime_get_real_ts64+0x420/0x420 [ 66.043633][ T4168] ? txLinelock+0x160/0x160 [ 66.048289][ T4168] ? rcu_is_watching+0x11/0xa0 [ 66.053091][ T4168] ? __mark_inode_dirty+0x383/0xc60 [ 66.058290][ T4168] jfs_mkdir+0x875/0xa70 [ 66.062534][ T4168] ? jfs_symlink+0xe60/0xe60 [ 66.067124][ T4168] ? make_kgid+0x640/0x640 [ 66.071529][ T4168] ? apparmor_path_mkdir+0x1a3/0x220 [ 66.076896][ T4168] ? generic_permission+0x230/0x510 [ 66.082424][ T4168] ? inode_permission+0xef/0x480 [ 66.087371][ T4168] ? bpf_lsm_inode_mkdir+0x5/0x10 [ 66.092408][ T4168] ? security_inode_mkdir+0xb3/0x100 [ 66.097687][ T4168] vfs_mkdir+0x387/0x570 [ 66.101926][ T4168] do_mkdirat+0x1d7/0x5a0 [ 66.106246][ T4168] ? vfs_mkdir+0x570/0x570 [ 66.110652][ T4168] ? getname_flags+0x1fe/0x500 [ 66.115412][ T4168] __x64_sys_mkdir+0x6a/0x80 [ 66.119994][ T4168] do_syscall_64+0x4c/0xa0 [ 66.124402][ T4168] ? clear_bhb_loop+0x30/0x80 [ 66.129085][ T4168] ? clear_bhb_loop+0x30/0x80 [ 66.133753][ T4168] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 66.139643][ T4168] RIP: 0033:0x7fd4727e21a9 [ 66.144053][ T4168] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 66.163910][ T4168] RSP: 002b:00007ffea537bb08 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 66.172351][ T4168] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4727e21a9 [ 66.180316][ T4168] RDX: 00007fd4727e21a9 RSI: 0000000000000000 RDI: 0000200000000200 [ 66.188280][ T4168] RBP: 0000000000000004 R08: 0000000000000000 R09: 0000000000000000 [ 66.196350][ T4168] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffea537bb50 [ 66.204416][ T4168] R13: 00007ffea537bb90 R14: 0000000001000000 R15: 0000000000000003 [ 66.212399][ T4168] [ 66.215709][ T4168] Kernel Offset: disabled [ 66.220128][ T4168] Rebooting in 86400 seconds..