Warning: Permanently added '10.128.0.171' (ED25519) to the list of known hosts. executing program [ 32.316025][ T6236] loop0: detected capacity change from 0 to 32768 [ 32.337129][ T6236] ================================================================== [ 32.339097][ T6236] BUG: KASAN: slab-out-of-bounds in dtSearch+0x131c/0x1f34 [ 32.340647][ T6236] Read of size 1 at addr ffff0000dbf8c058 by task syz-executor318/6236 [ 32.342437][ T6236] [ 32.342947][ T6236] CPU: 0 PID: 6236 Comm: syz-executor318 Not tainted 6.9.0-rc6-syzkaller-g78186bd77b47 #0 [ 32.345128][ T6236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 32.347439][ T6236] Call trace: [ 32.348168][ T6236] dump_backtrace+0x1b8/0x1e4 [ 32.349201][ T6236] show_stack+0x2c/0x3c [ 32.350119][ T6236] dump_stack_lvl+0xe4/0x150 [ 32.351140][ T6236] print_report+0x198/0x538 [ 32.352172][ T6236] kasan_report+0xd8/0x138 [ 32.353168][ T6236] __asan_report_load1_noabort+0x20/0x2c [ 32.354448][ T6236] dtSearch+0x131c/0x1f34 [ 32.355424][ T6236] jfs_lookup+0x164/0x39c [ 32.356451][ T6236] __lookup_slow+0x250/0x374 [ 32.357486][ T6236] lookup_slow+0x60/0x84 [ 32.358446][ T6236] link_path_walk+0x7dc/0xc78 [ 32.359500][ T6236] path_lookupat+0x90/0x3d0 [ 32.360491][ T6236] do_o_path+0xa8/0x214 [ 32.361445][ T6236] path_openat+0x2210/0x2830 [ 32.362484][ T6236] do_filp_open+0x1bc/0x3cc [ 32.363465][ T6236] do_sys_openat2+0x124/0x1b8 [ 32.364489][ T6236] __arm64_sys_openat+0x1f0/0x240 [ 32.365646][ T6236] invoke_syscall+0x98/0x2b8 [ 32.366659][ T6236] el0_svc_common+0x130/0x23c [ 32.367713][ T6236] do_el0_svc+0x48/0x58 [ 32.368637][ T6236] el0_svc+0x54/0x168 [ 32.369552][ T6236] el0t_64_sync_handler+0x84/0xfc [ 32.370689][ T6236] el0t_64_sync+0x190/0x194 [ 32.371692][ T6236] [ 32.372220][ T6236] Allocated by task 6236: [ 32.373183][ T6236] kasan_save_track+0x40/0x78 [ 32.374236][ T6236] kasan_save_alloc_info+0x40/0x50 [ 32.375368][ T6236] __kasan_slab_alloc+0x74/0x8c [ 32.376451][ T6236] kmem_cache_alloc_lru+0x1e0/0x3c4 [ 32.377619][ T6236] jfs_alloc_inode+0x2c/0x68 [ 32.378668][ T6236] new_inode_pseudo+0x68/0x1d0 [ 32.379740][ T6236] new_inode+0x30/0x16c [ 32.380691][ T6236] ialloc+0x58/0x78c [ 32.381568][ T6236] jfs_create+0x190/0xa04 [ 32.382527][ T6236] path_openat+0xfb4/0x2830 [ 32.383547][ T6236] do_filp_open+0x1bc/0x3cc [ 32.384505][ T6236] do_sys_openat2+0x124/0x1b8 [ 32.385547][ T6236] __arm64_sys_openat+0x1f0/0x240 [ 32.386701][ T6236] invoke_syscall+0x98/0x2b8 [ 32.387728][ T6236] el0_svc_common+0x130/0x23c [ 32.388784][ T6236] do_el0_svc+0x48/0x58 [ 32.389702][ T6236] el0_svc+0x54/0x168 [ 32.390618][ T6236] el0t_64_sync_handler+0x84/0xfc [ 32.391787][ T6236] el0t_64_sync+0x190/0x194 [ 32.392771][ T6236] [ 32.393280][ T6236] The buggy address belongs to the object at ffff0000dbf8b780 [ 32.393280][ T6236] which belongs to the cache jfs_ip of size 2240 [ 32.396278][ T6236] The buggy address is located 24 bytes to the right of [ 32.396278][ T6236] allocated 2240-byte region [ffff0000dbf8b780, ffff0000dbf8c040) [ 32.399604][ T6236] [ 32.400126][ T6236] The buggy address belongs to the physical page: [ 32.401525][ T6236] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11bf88 [ 32.403505][ T6236] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.405171][ T6236] flags: 0x5ffe00000000840(slab|head|node=0|zone=2|lastcpupid=0xfff) [ 32.406758][ T6236] page_type: 0xffffffff() [ 32.407735][ T6236] raw: 05ffe00000000840 ffff0000c3d82780 dead000000000122 0000000000000000 [ 32.409685][ T6236] raw: 0000000000000000 00000000800d000d 00000001ffffffff 0000000000000000 [ 32.411617][ T6236] head: 05ffe00000000840 ffff0000c3d82780 dead000000000122 0000000000000000 [ 32.413519][ T6236] head: 0000000000000000 00000000800d000d 00000001ffffffff 0000000000000000 [ 32.415405][ T6236] head: 05ffe00000000003 fffffdffc36fe201 dead000000000122 00000000ffffffff [ 32.417349][ T6236] head: 0000000800000000 0000000000000000 00000000ffffffff 0000000000000000 [ 32.419300][ T6236] page dumped because: kasan: bad access detected [ 32.420868][ T6236] [ 32.421377][ T6236] Memory state around the buggy address: [ 32.422636][ T6236] ffff0000dbf8bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.424415][ T6236] ffff0000dbf8bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.426193][ T6236] >ffff0000dbf8c000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 32.428016][ T6236] ^ [ 32.429626][ T6236] ffff0000dbf8c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.431432][ T6236] ffff0000dbf8c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.433204][ T6236] ================================================================== [ 32.435713][ T6236] Disabling lock debugging due to kernel taint [ 32.437140][ T6236] ERROR: (device loop0): dtSearch: stack overrun! [ 32.437140][ T6236] [ 32.439309][ T6236] ERROR: (device loop0): remounting filesystem as read-only [ 32.440905][ T6236] btstack dump: [ 32.441680][ T6236] bn = 0, index = 0 [ 32.442515][ T6236] bn = 0, index = 0 [ 32.443423][ T6236] bn = 0, index = 0 [ 32.444262][ T6236] bn = 0, index = 0 [ 32.445117][ T6236] bn = 0, index = 0 [ 32.446129][ T6236] bn = 0, index = 0 [ 32.446999][ T6236] bn = 0, index = 0 [ 32.447807][ T6236] bn = 0, index = 0 [