audit: type=1400 audit(1602770252.284:8): avc: denied { execmem } for pid=6494 comm="syz-executor012" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1
ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt
BUG: unable to handle kernel paging request at ffffffffffffff80
PGD 9470067 P4D 9470067 PUD 9472067 PMD 0
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 6494 Comm: syz-executor012 Not tainted 4.19.150-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:diFree+0x15b/0x24b0 fs/jfs/jfs_imap.c:866
Code: 28 48 8d 78 80 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 38 1e 00 00 48 8b 44 24 18 <48> 8b 68 80 4c 89 e8 48 c1 e8 0c 48 89 04 24 48 b8 00 00 00 00 00
RSP: 0018:ffff88808953f8b8 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff88809ec6bcc0 RCX: ffffffff828b6da5
RDX: 1ffffffffffffff0 RSI: ffffffff828d9e15 RDI: ffffffffffffff80
RBP: ffff888082f1c468 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff888082f1c538
R13: 0000000000000001 R14: ffffffff883a6040 R15: ffff888082f1c468
FS: 00000000025c4880(0000) GS:ffff8880ae300000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffff80 CR3: 00000000a917c000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
jfs_evict_inode+0x126/0x170 fs/jfs/inode.c:164
evict+0x2ed/0x780 fs/inode.c:559
iput_final fs/inode.c:1555 [inline]
iput+0x511/0x890 fs/inode.c:1581
diFreeSpecial fs/jfs/jfs_imap.c:563 [inline]
diFreeSpecial+0x63/0x80 fs/jfs/jfs_imap.c:555
jfs_mount+0x23f/0x3d0 fs/jfs/jfs_mount.c:222
jfs_fill_super+0x55c/0xb50 fs/jfs/super.c:589
mount_bdev+0x2fc/0x3b0 fs/super.c:1158
mount_fs+0xa3/0x318 fs/super.c:1261
vfs_kern_mount.part.0+0x68/0x470 fs/namespace.c:961
vfs_kern_mount fs/namespace.c:951 [inline]
do_new_mount fs/namespace.c:2469 [inline]
do_mount+0x51c/0x2f10 fs/namespace.c:2799
ksys_mount+0xcf/0x130 fs/namespace.c:3015
__do_sys_mount fs/namespace.c:3029 [inline]
__se_sys_mount fs/namespace.c:3026 [inline]
__x64_sys_mount+0xba/0x150 fs/namespace.c:3026
do_syscall_64+0xf9/0x670 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x446dea
Code: b8 08 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 fd ad fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 da ad fb ff c3 66 0f 1f 84 00 00 00 00 00
RSP: 002b:00007ffdcf911f98 EFLAGS: 00000283 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007ffdcf911fe0 RCX: 0000000000446dea
RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ffdcf911fa0
RBP: 00007ffdcf911fa0 R08: 00007ffdcf911fe0 R09: 6f6f6c2f7665642f
R10: 0000000000008001 R11: 0000000000000283 R12: 0000000000000004
R13: 0000000000000003 R14: 0000000000000003 R15: 0000000000000006
Modules linked in:
CR2: ffffffffffffff80
---[ end trace e3f5838396f0d1e6 ]---
RIP: 0010:diFree+0x15b/0x24b0 fs/jfs/jfs_imap.c:866
Code: 28 48 8d 78 80 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 38 1e 00 00 48 8b 44 24 18 <48> 8b 68 80 4c 89 e8 48 c1 e8 0c 48 89 04 24 48 b8 00 00 00 00 00
RSP: 0018:ffff88808953f8b8 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff88809ec6bcc0 RCX: ffffffff828b6da5
RDX: 1ffffffffffffff0 RSI: ffffffff828d9e15 RDI: ffffffffffffff80
RBP: ffff888082f1c468 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff888082f1c538
R13: 0000000000000001 R14: ffffffff883a6040 R15: ffff888082f1c468
FS: 00000000025c4880(0000) GS:ffff8880ae300000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffff80 CR3: 00000000a917c000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400