Warning: Permanently added '10.128.0.254' (ED25519) to the list of known hosts.
executing program
[ 65.208091][ T4168] loop0: detected capacity change from 0 to 32768
[ 65.303955][ T4168] ==================================================================
[ 65.312226][ T4168] BUG: KASAN: slab-out-of-bounds in diWrite+0xbe7/0x1610
[ 65.319301][ T4168] Read of size 32 at addr ffff8880740e5110 by task syz-executor309/4168
[ 65.327782][ T4168]
[ 65.330148][ T4168] CPU: 0 PID: 4168 Comm: syz-executor309 Not tainted 5.15.184-syzkaller #0
[ 65.338769][ T4168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 65.348872][ T4168] Call Trace:
[ 65.352192][ T4168]
[ 65.355151][ T4168] dump_stack_lvl+0x168/0x230
[ 65.359868][ T4168] ? show_regs_print_info+0x20/0x20
[ 65.365094][ T4168] ? load_image+0x3b0/0x3b0
[ 65.369619][ T4168] ? _raw_spin_lock_irqsave+0xb0/0xf0
[ 65.375024][ T4168] ? __rwlock_init+0x140/0x140
[ 65.379812][ T4168] ? mark_page_accessed+0xce5/0x12b0
[ 65.385122][ T4168] print_address_description+0x60/0x2d0
[ 65.390697][ T4168] ? diWrite+0xbe7/0x1610
[ 65.395058][ T4168] kasan_report+0xdf/0x130
[ 65.399503][ T4168] ? diWrite+0xbe7/0x1610
[ 65.403835][ T4168] ? diWrite+0xbe7/0x1610
[ 65.408165][ T4168] kasan_check_range+0x27b/0x290
[ 65.413099][ T4168] memcpy+0x25/0x60
[ 65.416921][ T4168] diWrite+0xbe7/0x1610
[ 65.421080][ T4168] txCommit+0x84b/0x51c0
[ 65.425319][ T4168] ? ktime_get_real_ts64+0x420/0x420
[ 65.430620][ T4168] ? txLinelock+0x160/0x160
[ 65.435122][ T4168] ? rcu_is_watching+0x11/0xa0
[ 65.439881][ T4168] ? __mark_inode_dirty+0x383/0xc60
[ 65.445075][ T4168] jfs_mkdir+0x875/0xa70
[ 65.449320][ T4168] ? jfs_symlink+0xe60/0xe60
[ 65.454008][ T4168] ? make_kgid+0x640/0x640
[ 65.458428][ T4168] ? apparmor_path_mkdir+0x1a3/0x220
[ 65.463720][ T4168] ? generic_permission+0x230/0x510
[ 65.468923][ T4168] ? inode_permission+0xef/0x480
[ 65.473854][ T4168] ? bpf_lsm_inode_mkdir+0x5/0x10
[ 65.478870][ T4168] ? security_inode_mkdir+0xb3/0x100
[ 65.484149][ T4168] vfs_mkdir+0x387/0x570
[ 65.488398][ T4168] do_mkdirat+0x1d7/0x5a0
[ 65.492724][ T4168] ? vfs_mkdir+0x570/0x570
[ 65.497140][ T4168] ? getname_flags+0x1fe/0x500
[ 65.501904][ T4168] __x64_sys_mkdir+0x6a/0x80
[ 65.506496][ T4168] do_syscall_64+0x4c/0xa0
[ 65.510906][ T4168] ? clear_bhb_loop+0x30/0x80
[ 65.515576][ T4168] ? clear_bhb_loop+0x30/0x80
[ 65.520246][ T4168] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 65.526144][ T4168] RIP: 0033:0x7fd4727e21a9
[ 65.530554][ T4168] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 65.550155][ T4168] RSP: 002b:00007ffea537bb08 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 65.558603][ T4168] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4727e21a9
[ 65.566659][ T4168] RDX: 00007fd4727e21a9 RSI: 0000000000000000 RDI: 0000200000000200
[ 65.574650][ T4168] RBP: 0000000000000004 R08: 0000000000000000 R09: 0000000000000000
[ 65.582614][ T4168] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffea537bb50
[ 65.590584][ T4168] R13: 00007ffea537bb90 R14: 0000000001000000 R15: 0000000000000003
[ 65.598564][ T4168]
[ 65.601578][ T4168]
[ 65.603922][ T4168] Allocated by task 0:
[ 65.607976][ T4168] (stack is not available)
[ 65.612404][ T4168]
[ 65.614720][ T4168] The buggy address belongs to the object at ffff8880740e4a00
[ 65.614720][ T4168] which belongs to the cache jfs_ip of size 2240
[ 65.628428][ T4168] The buggy address is located 1808 bytes inside of
[ 65.628428][ T4168] 2240-byte region [ffff8880740e4a00, ffff8880740e52c0)
[ 65.641874][ T4168] The buggy address belongs to the page:
[ 65.647505][ T4168] page:ffffea0001d03800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x740e0
[ 65.657651][ T4168] head:ffffea0001d03800 order:3 compound_mapcount:0 compound_pincount:0
[ 65.665968][ T4168] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff)
[ 65.673958][ T4168] raw: 00fff00000010200 0000000000000000 dead000000000122 ffff88801d474c80
[ 65.682533][ T4168] raw: 0000000000000000 00000000800d000d 00000001ffffffff 0000000000000000
[ 65.691104][ T4168] page dumped because: kasan: bad access detected
[ 65.697513][ T4168] page_owner tracks the page as allocated
[ 65.703218][ T4168] page last allocated via order 3, migratetype Reclaimable, gfp_mask 0xd2050(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_RECLAIMABLE), pid 4168, ts 65286563648, free_ts 19398701585
[ 65.723283][ T4168] get_page_from_freelist+0x1b77/0x1c60
[ 65.728832][ T4168] __alloc_pages+0x1e1/0x470
[ 65.733420][ T4168] new_slab+0xc0/0x4b0
[ 65.737498][ T4168] ___slab_alloc+0x81e/0xdf0
[ 65.742099][ T4168] kmem_cache_alloc+0x195/0x290
[ 65.746940][ T4168] jfs_alloc_inode+0x17/0x50
[ 65.751558][ T4168] new_inode_pseudo+0x5f/0x210
[ 65.756315][ T4168] new_inode+0x25/0x1c0
[ 65.760466][ T4168] jfs_fill_super+0x392/0xaf0
[ 65.765133][ T4168] mount_bdev+0x287/0x3c0
[ 65.769453][ T4168] legacy_get_tree+0xe6/0x180
[ 65.774120][ T4168] vfs_get_tree+0x88/0x270
[ 65.778527][ T4168] do_new_mount+0x24a/0xa40
[ 65.783020][ T4168] __se_sys_mount+0x2d6/0x3c0
[ 65.787692][ T4168] do_syscall_64+0x4c/0xa0
[ 65.792107][ T4168] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 65.797996][ T4168] page last free stack trace:
[ 65.802654][ T4168] free_unref_page_prepare+0x637/0x6c0
[ 65.808106][ T4168] free_unref_page+0x94/0x280
[ 65.812795][ T4168] free_contig_range+0x96/0xf0
[ 65.817551][ T4168] destroy_args+0xef/0x8b0
[ 65.821959][ T4168] debug_vm_pgtable+0x318/0x370
[ 65.826798][ T4168] do_one_initcall+0x1ee/0x680
[ 65.831705][ T4168] do_initcall_level+0x137/0x1f0
[ 65.836649][ T4168] do_initcalls+0x4b/0x90
[ 65.840982][ T4168] kernel_init_freeable+0x3ce/0x560
[ 65.846188][ T4168] kernel_init+0x19/0x1b0
[ 65.850572][ T4168] ret_from_fork+0x1f/0x30
[ 65.854988][ T4168]
[ 65.857305][ T4168] Memory state around the buggy address:
[ 65.862944][ T4168] ffff8880740e5000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 65.871002][ T4168] ffff8880740e5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 65.879139][ T4168] >ffff8880740e5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 65.887188][ T4168] ^
[ 65.892028][ T4168] ffff8880740e5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 65.900103][ T4168] ffff8880740e5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 65.908159][ T4168] ==================================================================
[ 65.916212][ T4168] Disabling lock debugging due to kernel taint
[ 65.923232][ T4168] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 65.930470][ T4168] CPU: 1 PID: 4168 Comm: syz-executor309 Tainted: G B 5.15.184-syzkaller #0
[ 65.940488][ T4168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 65.950538][ T4168] Call Trace:
[ 65.953848][ T4168]
[ 65.956768][ T4168] dump_stack_lvl+0x168/0x230
[ 65.961436][ T4168] ? show_regs_print_info+0x20/0x20
[ 65.966623][ T4168] ? load_image+0x3b0/0x3b0
[ 65.971222][ T4168] panic+0x2c9/0x7f0
[ 65.975129][ T4168] ? bpf_jit_dump+0xd0/0xd0
[ 65.979633][ T4168] ? _raw_spin_unlock_irqrestore+0xf6/0x100
[ 65.985518][ T4168] ? _raw_spin_unlock+0x40/0x40
[ 65.990362][ T4168] ? diWrite+0xbe7/0x1610
[ 65.994689][ T4168] check_panic_on_warn+0x80/0xa0
[ 65.999618][ T4168] ? diWrite+0xbe7/0x1610
[ 66.003941][ T4168] end_report+0x6d/0xf0
[ 66.008089][ T4168] kasan_report+0x102/0x130
[ 66.012583][ T4168] ? diWrite+0xbe7/0x1610
[ 66.016902][ T4168] ? diWrite+0xbe7/0x1610
[ 66.021221][ T4168] kasan_check_range+0x27b/0x290
[ 66.026154][ T4168] memcpy+0x25/0x60
[ 66.029956][ T4168] diWrite+0xbe7/0x1610
[ 66.034112][ T4168] txCommit+0x84b/0x51c0
[ 66.038349][ T4168] ? ktime_get_real_ts64+0x420/0x420
[ 66.043633][ T4168] ? txLinelock+0x160/0x160
[ 66.048289][ T4168] ? rcu_is_watching+0x11/0xa0
[ 66.053091][ T4168] ? __mark_inode_dirty+0x383/0xc60
[ 66.058290][ T4168] jfs_mkdir+0x875/0xa70
[ 66.062534][ T4168] ? jfs_symlink+0xe60/0xe60
[ 66.067124][ T4168] ? make_kgid+0x640/0x640
[ 66.071529][ T4168] ? apparmor_path_mkdir+0x1a3/0x220
[ 66.076896][ T4168] ? generic_permission+0x230/0x510
[ 66.082424][ T4168] ? inode_permission+0xef/0x480
[ 66.087371][ T4168] ? bpf_lsm_inode_mkdir+0x5/0x10
[ 66.092408][ T4168] ? security_inode_mkdir+0xb3/0x100
[ 66.097687][ T4168] vfs_mkdir+0x387/0x570
[ 66.101926][ T4168] do_mkdirat+0x1d7/0x5a0
[ 66.106246][ T4168] ? vfs_mkdir+0x570/0x570
[ 66.110652][ T4168] ? getname_flags+0x1fe/0x500
[ 66.115412][ T4168] __x64_sys_mkdir+0x6a/0x80
[ 66.119994][ T4168] do_syscall_64+0x4c/0xa0
[ 66.124402][ T4168] ? clear_bhb_loop+0x30/0x80
[ 66.129085][ T4168] ? clear_bhb_loop+0x30/0x80
[ 66.133753][ T4168] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 66.139643][ T4168] RIP: 0033:0x7fd4727e21a9
[ 66.144053][ T4168] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 66.163910][ T4168] RSP: 002b:00007ffea537bb08 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 66.172351][ T4168] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4727e21a9
[ 66.180316][ T4168] RDX: 00007fd4727e21a9 RSI: 0000000000000000 RDI: 0000200000000200
[ 66.188280][ T4168] RBP: 0000000000000004 R08: 0000000000000000 R09: 0000000000000000
[ 66.196350][ T4168] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffea537bb50
[ 66.204416][ T4168] R13: 00007ffea537bb90 R14: 0000000001000000 R15: 0000000000000003
[ 66.212399][ T4168]
[ 66.215709][ T4168] Kernel Offset: disabled
[ 66.220128][ T4168] Rebooting in 86400 seconds..