Warning: Permanently added '10.128.1.142' (ED25519) to the list of known hosts. executing program [ 103.609483][ T4032] loop0: detected capacity change from 0 to 32768 [ 103.696807][ T4032] read_mapping_page failed! [ 103.698124][ T4032] bread failed! [ 103.699070][ T4032] jfs_mkdir: dtInsert returned -EIO [ 103.700561][ T4032] ERROR: (device loop0): txAbort: [ 103.700561][ T4032] [ 103.703168][ T4032] ERROR: (device loop0): remounting filesystem as read-only [ 103.706526][ T4032] ================================================================== [ 103.708740][ T4032] BUG: KASAN: slab-out-of-bounds in dtSearch+0x12c0/0x1f34 [ 103.710712][ T4032] Read of size 1 at addr ffff0000e141b734 by task syz-executor210/4032 [ 103.712869][ T4032] [ 103.713507][ T4032] CPU: 1 PID: 4032 Comm: syz-executor210 Not tainted 5.15.165-syzkaller #0 [ 103.715778][ T4032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 103.718644][ T4032] Call trace: [ 103.719541][ T4032] dump_backtrace+0x0/0x530 [ 103.720802][ T4032] show_stack+0x2c/0x3c [ 103.721945][ T4032] dump_stack_lvl+0x108/0x170 [ 103.723242][ T4032] print_address_description+0x7c/0x3f0 [ 103.724931][ T4032] kasan_report+0x174/0x1e4 [ 103.726355][ T4032] __asan_report_load1_noabort+0x44/0x50 [ 103.727926][ T4032] dtSearch+0x12c0/0x1f34 [ 103.729052][ T4032] jfs_lookup+0x164/0x39c [ 103.730205][ T4032] __lookup_slow+0x250/0x388 [ 103.731581][ T4032] lookup_slow+0x60/0x84 [ 103.732713][ T4032] walk_component+0x394/0x4cc [ 103.734009][ T4032] path_lookupat+0x13c/0x3d0 [ 103.735282][ T4032] do_o_path+0xa8/0x214 [ 103.736381][ T4032] path_openat+0x216c/0x26cc [ 103.737661][ T4032] do_filp_open+0x1a8/0x3b4 [ 103.738926][ T4032] do_sys_openat2+0x128/0x3e0 [ 103.740211][ T4032] __arm64_sys_openat+0x1f0/0x240 [ 103.741527][ T4032] invoke_syscall+0x98/0x2b8 [ 103.742753][ T4032] el0_svc_common+0x138/0x258 [ 103.744038][ T4032] do_el0_svc+0x58/0x14c [ 103.745194][ T4032] el0_svc+0x7c/0x1f0 [ 103.746309][ T4032] el0t_64_sync_handler+0x84/0xe4 [ 103.747651][ T4032] el0t_64_sync+0x1a0/0x1a4 [ 103.748889][ T4032] [ 103.749579][ T4032] Allocated by task 4032: [ 103.750850][ T4032] __kasan_slab_alloc+0x8c/0xcc [ 103.752172][ T4032] slab_post_alloc_hook+0x74/0x3f4 [ 103.753552][ T4032] kmem_cache_alloc+0x1dc/0x45c [ 103.754877][ T4032] jfs_alloc_inode+0x24/0x60 [ 103.756182][ T4032] iget_locked+0x180/0x720 [ 103.757343][ T4032] jfs_iget+0x30/0x364 [ 103.758458][ T4032] jfs_fill_super+0x65c/0xa08 [ 103.759732][ T4032] mount_bdev+0x274/0x370 [ 103.760905][ T4032] jfs_do_mount+0x44/0x58 [ 103.762052][ T4032] legacy_get_tree+0xd4/0x16c [ 103.763269][ T4032] vfs_get_tree+0x90/0x274 [ 103.764495][ T4032] do_new_mount+0x278/0x8fc [ 103.765747][ T4032] path_mount+0x594/0x101c [ 103.766987][ T4032] __arm64_sys_mount+0x510/0x5e0 [ 103.768414][ T4032] invoke_syscall+0x98/0x2b8 [ 103.769664][ T4032] el0_svc_common+0x138/0x258 [ 103.770989][ T4032] do_el0_svc+0x58/0x14c [ 103.772096][ T4032] el0_svc+0x7c/0x1f0 [ 103.773282][ T4032] el0t_64_sync_handler+0x84/0xe4 [ 103.774595][ T4032] el0t_64_sync+0x1a0/0x1a4 [ 103.775793][ T4032] [ 103.776463][ T4032] The buggy address belongs to the object at ffff0000e141ae40 [ 103.776463][ T4032] which belongs to the cache jfs_ip of size 2240 [ 103.780342][ T4032] The buggy address is located 52 bytes to the right of [ 103.780342][ T4032] 2240-byte region [ffff0000e141ae40, ffff0000e141b700) [ 103.784108][ T4032] The buggy address belongs to the page: [ 103.785748][ T4032] page:000000000a72f75e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x121418 [ 103.788543][ T4032] head:000000000a72f75e order:3 compound_mapcount:0 compound_pincount:0 [ 103.790839][ T4032] flags: 0x5ffc00000010200(slab|head|node=0|zone=2|lastcpupid=0x7ff) [ 103.793040][ T4032] raw: 05ffc00000010200 0000000000000000 dead000000000122 ffff0000c6640900 [ 103.795354][ T4032] raw: 0000000000000000 00000000800d000d 00000001ffffffff 0000000000000000 [ 103.797699][ T4032] page dumped because: kasan: bad access detected [ 103.799467][ T4032] [ 103.800097][ T4032] Memory state around the buggy address: [ 103.801682][ T4032] ffff0000e141b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 103.803852][ T4032] ffff0000e141b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 103.806206][ T4032] >ffff0000e141b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 103.808483][ T4032] ^ [ 103.810098][ T4032] ffff0000e141b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 103.812399][ T4032] ffff0000e141b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 103.814578][ T4032] ================================================================== [ 103.816890][ T4032] Disabling lock debugging due to kernel taint executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program