Warning: Permanently added '10.128.0.160' (ED25519) to the list of known hosts. executing program [ 37.360295][ T4292] loop0: detected capacity change from 0 to 32768 [ 37.370852][ T4292] ================================================================== [ 37.372549][ T4292] BUG: KASAN: slab-out-of-bounds in dtSearch+0x131c/0x1f34 [ 37.374004][ T4292] Read of size 1 at addr ffff0000df7c4058 by task syz-executor400/4292 [ 37.375791][ T4292] [ 37.376235][ T4292] CPU: 0 PID: 4292 Comm: syz-executor400 Not tainted 6.1.119-syzkaller #0 [ 37.378018][ T4292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 37.380067][ T4292] Call trace: [ 37.380792][ T4292] dump_backtrace+0x1c8/0x1f4 [ 37.381743][ T4292] show_stack+0x2c/0x3c [ 37.382648][ T4292] dump_stack_lvl+0x108/0x170 [ 37.383688][ T4292] print_report+0x174/0x4c0 [ 37.384596][ T4292] kasan_report+0xd4/0x130 [ 37.385512][ T4292] __asan_report_load1_noabort+0x2c/0x38 [ 37.386802][ T4292] dtSearch+0x131c/0x1f34 [ 37.387645][ T4292] jfs_lookup+0x164/0x39c [ 37.388565][ T4292] lookup_one_qstr_excl+0x108/0x230 [ 37.389583][ T4292] do_renameat2+0x558/0xe64 [ 37.390483][ T4292] __arm64_sys_renameat2+0xe0/0xfc [ 37.391584][ T4292] invoke_syscall+0x98/0x2bc [ 37.392512][ T4292] el0_svc_common+0x138/0x258 [ 37.393384][ T4292] do_el0_svc+0x58/0x13c [ 37.394245][ T4292] el0_svc+0x58/0x168 [ 37.395014][ T4292] el0t_64_sync_handler+0x84/0xf0 [ 37.396041][ T4292] el0t_64_sync+0x18c/0x190 [ 37.397050][ T4292] [ 37.397530][ T4292] Allocated by task 4292: [ 37.398342][ T4292] kasan_set_track+0x4c/0x80 [ 37.399316][ T4292] kasan_save_alloc_info+0x24/0x30 [ 37.400364][ T4292] __kasan_slab_alloc+0x74/0x8c [ 37.401300][ T4292] slab_post_alloc_hook+0x74/0x458 [ 37.402380][ T4292] kmem_cache_alloc_lru+0x1ac/0x2f8 [ 37.403532][ T4292] jfs_alloc_inode+0x2c/0x68 [ 37.404496][ T4292] new_inode_pseudo+0x68/0x1d0 [ 37.405584][ T4292] new_inode+0x38/0x174 [ 37.406516][ T4292] ialloc+0x58/0x7c0 [ 37.407315][ T4292] jfs_create+0x190/0xa1c [ 37.408175][ T4292] path_openat+0xeac/0x2548 [ 37.409153][ T4292] do_filp_open+0x1bc/0x3cc [ 37.410230][ T4292] do_sys_openat2+0x128/0x3e0 [ 37.411222][ T4292] __arm64_sys_openat+0x1f0/0x240 [ 37.412244][ T4292] invoke_syscall+0x98/0x2bc [ 37.413210][ T4292] el0_svc_common+0x138/0x258 [ 37.414165][ T4292] do_el0_svc+0x58/0x13c [ 37.415074][ T4292] el0_svc+0x58/0x168 [ 37.415905][ T4292] el0t_64_sync_handler+0x84/0xf0 [ 37.416901][ T4292] el0t_64_sync+0x18c/0x190 [ 37.417782][ T4292] [ 37.418274][ T4292] The buggy address belongs to the object at ffff0000df7c3780 [ 37.418274][ T4292] which belongs to the cache jfs_ip of size 2240 [ 37.421048][ T4292] The buggy address is located 24 bytes to the right of [ 37.421048][ T4292] 2240-byte region [ffff0000df7c3780, ffff0000df7c4040) [ 37.423987][ T4292] [ 37.424495][ T4292] The buggy address belongs to the physical page: [ 37.425761][ T4292] page:00000000a2b86219 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11f7c0 [ 37.427802][ T4292] head:00000000a2b86219 order:3 compound_mapcount:0 compound_pincount:0 [ 37.429530][ T4292] flags: 0x5ffc00000010200(slab|head|node=0|zone=2|lastcpupid=0x7ff) [ 37.431239][ T4292] raw: 05ffc00000010200 0000000000000000 dead000000000122 ffff0000c6ee5e00 [ 37.433059][ T4292] raw: 0000000000000000 00000000800d000d 00000001ffffffff 0000000000000000 [ 37.434755][ T4292] page dumped because: kasan: bad access detected [ 37.436050][ T4292] [ 37.436528][ T4292] Memory state around the buggy address: [ 37.437671][ T4292] ffff0000df7c3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.439363][ T4292] ffff0000df7c3f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.440904][ T4292] >ffff0000df7c4000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.442527][ T4292] ^ [ 37.443820][ T4292] ffff0000df7c4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.445393][ T4292] ffff0000df7c4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.447077][ T4292] ================================================================== [ 37.449397][ T4292] Disabling lock debugging due to kernel taint [ 37.450648][ T4292] ERROR: (device loop0): dtSearch: stack overrun! [ 37.450648][ T4292] [ 37.452751][ T4292] ERROR: (device loop0): remounting filesystem as read-only [ 37.454188][ T4292] btstack dump: [ 37.454878][ T4292] bn = 0, index = 0 [ 37.455608][ T4292] bn = 0, index = 0 [ 37.456400][ T4292] bn = 0, index = 0 [ 37.457198][ T4292] bn = 0, index = 0 [ 37.457889][ T4292] bn = 0, index = 0 [ 37.458672][ T4292] bn = 0, index = 0 [ 37.459469][ T4292] bn = 0, index = 0 [ 37.460328][ T4292] bn = 0, index = 0 [ 37.461125][ T4292] jfs_lookup: dtSearch returned -5 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program