Warning: Permanently added '10.128.1.42' (ED25519) to the list of known hosts. executing program [ 34.049444][ T4292] loop0: detected capacity change from 0 to 32768 [ 34.055640][ T4292] (syz-executor296,4292,0):ocfs2_block_check_validate:402 ERROR: CRC32 failed: stored: 0xb3775c19, computed 0x2dd1c265. Applying ECC. [ 34.059749][ T4292] (syz-executor296,4292,0):ocfs2_block_check_validate:402 ERROR: CRC32 failed: stored: 0xb3775c19, computed 0x2dd1c265. Applying ECC. [ 34.070245][ T4292] (syz-executor296,4292,0):ocfs2_block_check_validate:402 ERROR: CRC32 failed: stored: 0xcfdff595, computed 0xefed4a20. Applying ECC. [ 34.075177][ T4292] JBD2: Ignoring recovery information on journal [ 34.091370][ T4292] ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode. [ 34.104847][ T4292] ================================================================== [ 34.106654][ T4292] BUG: KASAN: use-after-free in ocfs2_get_next_id+0x250/0x944 [ 34.108303][ T4292] Read of size 8 at addr ffff0000c4f51028 by task syz-executor296/4292 [ 34.109915][ T4292] [ 34.110360][ T4292] CPU: 0 PID: 4292 Comm: syz-executor296 Not tainted 6.1.124-syzkaller #0 [ 34.112082][ T4292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 34.114332][ T4292] Call trace: [ 34.115085][ T4292] dump_backtrace+0x1c8/0x1f4 [ 34.116083][ T4292] show_stack+0x2c/0x3c [ 34.116905][ T4292] dump_stack_lvl+0x108/0x170 [ 34.117886][ T4292] print_report+0x174/0x4c0 [ 34.118806][ T4292] kasan_report+0xd4/0x130 [ 34.119770][ T4292] __asan_report_load8_noabort+0x2c/0x38 [ 34.120936][ T4292] ocfs2_get_next_id+0x250/0x944 [ 34.121944][ T4292] dquot_get_next_dqblk+0x7c/0x348 [ 34.122912][ T4292] quota_getnextquota+0x264/0x650 [ 34.124058][ T4292] do_quotactl+0x52c/0x698 [ 34.125037][ T4292] __arm64_sys_quotactl+0x2d8/0x7a0 [ 34.126075][ T4292] invoke_syscall+0x98/0x2bc [ 34.127020][ T4292] el0_svc_common+0x138/0x258 [ 34.128010][ T4292] do_el0_svc+0x58/0x13c [ 34.128948][ T4292] el0_svc+0x58/0x168 [ 34.129720][ T4292] el0t_64_sync_handler+0x84/0xf0 [ 34.130842][ T4292] el0t_64_sync+0x18c/0x190 [ 34.131798][ T4292] [ 34.132302][ T4292] Allocated by task 4292: [ 34.133122][ T4292] kasan_set_track+0x4c/0x80 [ 34.134035][ T4292] kasan_save_alloc_info+0x24/0x30 [ 34.135143][ T4292] __kasan_kmalloc+0xac/0xc4 [ 34.136131][ T4292] kmalloc_trace+0x7c/0x94 [ 34.136948][ T4292] ocfs2_local_read_info+0x1b8/0x15bc [ 34.138082][ T4292] dquot_load_quota_sb+0x6f0/0xb1c [ 34.139216][ T4292] dquot_load_quota_inode+0x280/0x4f4 [ 34.140429][ T4292] ocfs2_enable_quotas+0x1d4/0x3cc [ 34.141606][ T4292] ocfs2_fill_super+0x3aa4/0x48c4 [ 34.142594][ T4292] mount_bdev+0x274/0x370 [ 34.143509][ T4292] ocfs2_mount+0x44/0x58 [ 34.144331][ T4292] legacy_get_tree+0xd4/0x16c [ 34.145319][ T4292] vfs_get_tree+0x90/0x274 [ 34.146254][ T4292] do_new_mount+0x278/0x8fc [ 34.147236][ T4292] path_mount+0x590/0xe5c [ 34.148092][ T4292] __arm64_sys_mount+0x45c/0x594 [ 34.149094][ T4292] invoke_syscall+0x98/0x2bc [ 34.150138][ T4292] el0_svc_common+0x138/0x258 [ 34.151158][ T4292] do_el0_svc+0x58/0x13c [ 34.152002][ T4292] el0_svc+0x58/0x168 [ 34.152829][ T4292] el0t_64_sync_handler+0x84/0xf0 [ 34.153882][ T4292] el0t_64_sync+0x18c/0x190 [ 34.154766][ T4292] [ 34.155277][ T4292] Freed by task 4292: [ 34.156143][ T4292] kasan_set_track+0x4c/0x80 [ 34.157415][ T4292] kasan_save_free_info+0x38/0x5c [ 34.158582][ T4292] ____kasan_slab_free+0x144/0x1c0 [ 34.159583][ T4292] __kasan_slab_free+0x18/0x28 [ 34.160503][ T4292] __kmem_cache_free+0x2c0/0x4b4 [ 34.161514][ T4292] kfree+0xcc/0x1b8 [ 34.162305][ T4292] ocfs2_local_free_info+0x720/0x8a4 [ 34.163424][ T4292] dquot_disable+0xebc/0x17c0 [ 34.164393][ T4292] ocfs2_susp_quotas+0x1f0/0x2d4 [ 34.165389][ T4292] ocfs2_remount+0x464/0x9cc [ 34.166326][ T4292] legacy_reconfigure+0xfc/0x114 [ 34.167407][ T4292] reconfigure_super+0x318/0x7a4 [ 34.168432][ T4292] path_mount+0xc70/0xe5c [ 34.169310][ T4292] __arm64_sys_mount+0x45c/0x594 [ 34.170276][ T4292] invoke_syscall+0x98/0x2bc [ 34.171349][ T4292] el0_svc_common+0x138/0x258 [ 34.172337][ T4292] do_el0_svc+0x58/0x13c [ 34.173222][ T4292] el0_svc+0x58/0x168 [ 34.174042][ T4292] el0t_64_sync_handler+0x84/0xf0 [ 34.175039][ T4292] el0t_64_sync+0x18c/0x190 [ 34.175916][ T4292] [ 34.176354][ T4292] The buggy address belongs to the object at ffff0000c4f51000 [ 34.176354][ T4292] which belongs to the cache kmalloc-1k of size 1024 [ 34.179332][ T4292] The buggy address is located 40 bytes inside of [ 34.179332][ T4292] 1024-byte region [ffff0000c4f51000, ffff0000c4f51400) [ 34.182092][ T4292] [ 34.182638][ T4292] The buggy address belongs to the physical page: [ 34.184085][ T4292] page:000000009369a4a1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104f50 [ 34.186296][ T4292] head:000000009369a4a1 order:3 compound_mapcount:0 compound_pincount:0 [ 34.188151][ T4292] flags: 0x5ffc00000010200(slab|head|node=0|zone=2|lastcpupid=0x7ff) [ 34.189847][ T4292] raw: 05ffc00000010200 dead000000000100 dead000000000122 ffff0000c0002780 [ 34.191662][ T4292] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 34.193477][ T4292] page dumped because: kasan: bad access detected [ 34.194683][ T4292] [ 34.195288][ T4292] Memory state around the buggy address: [ 34.196486][ T4292] ffff0000c4f50f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.198139][ T4292] ffff0000c4f50f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.199884][ T4292] >ffff0000c4f51000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.201621][ T4292] ^ [ 34.202717][ T4292] ffff0000c4f51080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.204364][ T4292] ffff0000c4f51100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.205984][ T4292] ================================================================== [ 34.208188][ T4292] Disabling lock debugging due to kernel taint executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program