Warning: Permanently added '10.128.0.116' (ED25519) to the list of known hosts. executing program [ 46.137709][ T4021] loop0: detected capacity change from 0 to 32768 [ 46.221489][ T4021] gfs2: fsid=syz:syz: Trying to join cluster "lock_nolock", "syz:syz" [ 46.223744][ T4021] gfs2: fsid=syz:syz: Now mounting FS (format 1801)... [ 46.232076][ T4021] gfs2: fsid=syz:syz.0: journal 0 mapped with 1 extents in 0ms [ 46.236045][ T1961] gfs2: fsid=syz:syz.0: jid=0, already locked for use [ 46.237884][ T1961] gfs2: fsid=syz:syz.0: jid=0: Looking at journal... [ 46.275778][ T1961] gfs2: fsid=syz:syz.0: jid=0: Journal head lookup took 37ms [ 46.278243][ T1961] gfs2: fsid=syz:syz.0: jid=0: Done [ 46.280298][ T4021] gfs2: fsid=syz:syz.0: first mount done, others may mount [ 46.374974][ T4021] ================================================================== [ 46.377151][ T4021] BUG: KASAN: stack-out-of-bounds in gfs2_file_buffered_write+0x4c8/0x874 [ 46.379412][ T4021] Read of size 8 at addr ffff80001d1a6fb0 by task syz-executor816/4021 [ 46.381614][ T4021] [ 46.382199][ T4021] CPU: 1 PID: 4021 Comm: syz-executor816 Not tainted 5.15.179-syzkaller #0 [ 46.384503][ T4021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 46.387279][ T4021] Call trace: [ 46.388156][ T4021] dump_backtrace+0x0/0x530 [ 46.389364][ T4021] show_stack+0x2c/0x3c [ 46.390578][ T4021] dump_stack_lvl+0x108/0x170 [ 46.391812][ T4021] print_address_description+0x7c/0x3f0 [ 46.393266][ T4021] kasan_report+0x174/0x1e4 [ 46.394422][ T4021] __asan_report_load8_noabort+0x44/0x50 [ 46.395912][ T4021] gfs2_file_buffered_write+0x4c8/0x874 [ 46.397375][ T4021] gfs2_file_write_iter+0x3b8/0xc80 [ 46.398708][ T4021] __kernel_write+0x488/0x8b8 [ 46.399942][ T4021] __dump_emit+0x200/0x338 [ 46.401144][ T4021] dump_emit+0x288/0x36c [ 46.402281][ T4021] elf_core_dump+0x2598/0x3640 [ 46.403521][ T4021] do_coredump+0x12c8/0x2890 [ 46.404740][ T4021] get_signal+0x3dc/0x1550 [ 46.405975][ T4021] do_notify_resume+0x320/0x32b8 [ 46.407292][ T4021] el0_da+0x118/0x20c [ 46.408376][ T4021] el0t_64_sync_handler+0xc0/0xe4 [ 46.409797][ T4021] el0t_64_sync+0x1a0/0x1a4 [ 46.410978][ T4021] [ 46.411576][ T4021] [ 46.412175][ T4021] addr ffff80001d1a6fb0 is located in stack of task syz-executor816/4021 at offset 48 in frame: [ 46.415089][ T4021] __kernel_write+0x0/0x8b8 [ 46.416336][ T4021] [ 46.416953][ T4021] this frame has 3 objects: [ 46.418165][ T4021] [32, 48) 'iov' [ 46.418175][ T4021] [64, 112) 'kiocb' [ 46.419126][ T4021] [144, 184) 'iter' [ 46.420208][ T4021] [ 46.421795][ T4021] Memory state around the buggy address: [ 46.423291][ T4021] ffff80001d1a6e80: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.425420][ T4021] ffff80001d1a6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.427644][ T4021] >ffff80001d1a6f80: f1 f1 f1 f1 00 00 f2 f2 00 00 00 00 00 00 f2 f2 [ 46.429715][ T4021] ^ [ 46.431246][ T4021] ffff80001d1a7000: f2 f2 00 00 00 00 00 f3 f3 f3 f3 f3 00 00 00 00 [ 46.433393][ T4021] ffff80001d1a7080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.435634][ T4021] ================================================================== [ 46.437815][ T4021] Disabling lock debugging due to kernel taint executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program