loop4: detected capacity change from 0 to 32768 ================================================================== BUG: KASAN: slab-use-after-free in diWrite+0xd98/0x18d4 fs/jfs/jfs_imap.c:753 Write of size 32 at addr ffff0000ca2ff200 by task syz.4.266/8507 CPU: 1 UID: 0 PID: 8507 Comm: syz.4.266 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 print_address_description+0xa8/0x254 mm/kasan/report.c:408 print_report+0x68/0x84 mm/kasan/report.c:521 kasan_report+0xb0/0x110 mm/kasan/report.c:634 check_region_inline mm/kasan/generic.c:-1 [inline] kasan_check_range+0x264/0x2a4 mm/kasan/generic.c:189 __asan_memcpy+0x54/0x84 mm/kasan/shadow.c:106 diWrite+0xd98/0x18d4 fs/jfs/jfs_imap.c:753 txCommit+0x5d0/0x3e00 fs/jfs/jfs_txnmgr.c:1255 add_missing_indices+0x6b8/0x9d8 fs/jfs/jfs_dtree.c:2664 jfs_readdir+0x1758/0x2fec fs/jfs/jfs_dtree.c:3020 wrap_directory_iterator+0x90/0xf0 fs/readdir.c:65 shared_jfs_readdir+0x30/0x40 fs/jfs/namei.c:1540 iterate_dir+0x458/0x5e0 fs/readdir.c:108 __do_sys_getdents64 fs/readdir.c:403 [inline] __se_sys_getdents64 fs/readdir.c:389 [inline] __arm64_sys_getdents64+0x114/0x2fc fs/readdir.c:389 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Allocated by task 8462: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x40/0x78 mm/kasan/common.c:68 kasan_save_alloc_info+0x44/0x54 mm/kasan/generic.c:562 unpoison_slab_object mm/kasan/common.c:319 [inline] __kasan_slab_alloc+0x70/0x88 mm/kasan/common.c:345 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4147 [inline] kmem_cache_alloc_bulk_noprof+0x440/0x710 mm/slub.c:5371 __io_alloc_req_refill+0xa8/0x298 io_uring/io_uring.c:955 io_alloc_req io_uring/io_uring.h:450 [inline] io_submit_sqes+0x974/0x186c io_uring/io_uring.c:2325 __do_sys_io_uring_enter io_uring/io_uring.c:3396 [inline] __se_sys_io_uring_enter io_uring/io_uring.c:3330 [inline] __arm64_sys_io_uring_enter+0x2d8/0x11b8 io_uring/io_uring.c:3330 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Freed by task 45: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x40/0x78 mm/kasan/common.c:68 kasan_save_free_info+0x58/0x70 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x68/0x88 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2380 [inline] slab_free_after_rcu_debug+0x11c/0x2f4 mm/slub.c:4692 rcu_do_batch kernel/rcu/tree.c:2568 [inline] rcu_core+0x848/0x17a4 kernel/rcu/tree.c:2824 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2841 handle_softirqs+0x328/0xc88 kernel/softirq.c:579 __do_softirq+0x14/0x20 kernel/softirq.c:613 Last potentially related work creation: kasan_save_stack+0x40/0x6c mm/kasan/common.c:47 kasan_record_aux_stack+0xb0/0xc8 mm/kasan/generic.c:548 slab_free_hook mm/slub.c:2341 [inline] slab_free mm/slub.c:4642 [inline] kmem_cache_free+0x354/0x550 mm/slub.c:4744 io_req_caches_free+0x98/0x110 io_uring/io_uring.c:2710 io_ring_exit_work+0x324/0x73c io_uring/io_uring.c:2910 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 The buggy address belongs to the object at ffff0000ca2ff140 which belongs to the cache io_kiocb of size 248 The buggy address is located 192 bytes inside of freed 248-byte region [ffff0000ca2ff140, ffff0000ca2ff238) The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10a2ff memcg:ffff0000ce102b81 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) page_type: f5(slab) raw: 05ffc00000000000 ffff0000c5ca0c80 dead000000000122 0000000000000000 raw: 0000000000000000 00000000000c000c 00000000f5000000 ffff0000ce102b81 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff0000ca2ff100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb ffff0000ca2ff180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff0000ca2ff200: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc ^ ffff0000ca2ff280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff0000ca2ff300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc ================================================================== non-latin1 character 0xffff found in JFS file name mount with iocharset=utf8 to access non-latin1 character 0x173 found in JFS file name mount with iocharset=utf8 to access