... Log Wrap ... Log Wrap ... Log Wrap ... ================================================================== BUG: KASAN: use-after-free in instrument_atomic_write include/linux/instrumented.h:87 [inline] BUG: KASAN: use-after-free in clear_bit include/asm-generic/bitops/instrumented-atomic.h:41 [inline] BUG: KASAN: use-after-free in txEnd+0x2c0/0x4f0 fs/jfs/jfs_txnmgr.c:554 Write of size 8 at addr ffff0000f3891840 by task jfsCommit/94 CPU: 1 PID: 94 Comm: jfsCommit Not tainted 6.1.146-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Call trace: dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165 __dump_stack+0x30/0x40 lib/dump_stack.c:88 dump_stack_lvl+0xf8/0x160 lib/dump_stack.c:106 print_address_description+0x88/0x200 mm/kasan/report.c:316 print_report+0x50/0x68 mm/kasan/report.c:418 kasan_report+0xa8/0x100 mm/kasan/report.c:522 check_region_inline mm/kasan/generic.c:-1 [inline] kasan_check_range+0x260/0x2a0 mm/kasan/generic.c:189 __kasan_check_write+0x2c/0x3c mm/kasan/shadow.c:37 instrument_atomic_write include/linux/instrumented.h:87 [inline] clear_bit include/asm-generic/bitops/instrumented-atomic.h:41 [inline] txEnd+0x2c0/0x4f0 fs/jfs/jfs_txnmgr.c:554 txLazyCommit fs/jfs/jfs_txnmgr.c:2684 [inline] jfs_lazycommit+0x498/0x918 fs/jfs/jfs_txnmgr.c:2732 kthread+0x250/0x2d8 kernel/kthread.c:376 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:849 Allocated by task 4861: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4c/0x80 mm/kasan/common.c:52 kasan_save_alloc_info+0x28/0x34 mm/kasan/generic.c:505 ____kasan_kmalloc mm/kasan/common.c:374 [inline] __kasan_kmalloc+0xa0/0xb8 mm/kasan/common.c:383 kasan_kmalloc include/linux/kasan.h:211 [inline] kmalloc_trace+0x7c/0x94 mm/slab_common.c:1031 kmalloc include/linux/slab.h:563 [inline] kzalloc include/linux/slab.h:699 [inline] open_inline_log fs/jfs/jfs_logmgr.c:1159 [inline] lmLogOpen+0x288/0xd58 fs/jfs/jfs_logmgr.c:1069 jfs_mount_rw+0xe4/0x50c fs/jfs/jfs_mount.c:253 jfs_fill_super+0x484/0x948 fs/jfs/super.c:565 mount_bdev+0x264/0x358 fs/super.c:1443 jfs_do_mount+0x44/0x58 fs/jfs/super.c:670 legacy_get_tree+0xd4/0x16c fs/fs_context.c:632 vfs_get_tree+0x90/0x274 fs/super.c:1573 do_new_mount+0x228/0x810 fs/namespace.c:3058 path_mount+0x5b4/0xe78 fs/namespace.c:3388 do_mount fs/namespace.c:3401 [inline] __do_sys_mount fs/namespace.c:3609 [inline] __se_sys_mount fs/namespace.c:3586 [inline] __arm64_sys_mount+0x49c/0x584 fs/namespace.c:3586 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2bc arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x58/0x13c arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x138 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 Freed by task 4421: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4c/0x80 mm/kasan/common.c:52 kasan_save_free_info+0x3c/0x60 mm/kasan/generic.c:516 ____kasan_slab_free+0x148/0x1b0 mm/kasan/common.c:236 __kasan_slab_free+0x18/0x28 mm/kasan/common.c:244 kasan_slab_free include/linux/kasan.h:177 [inline] slab_free_hook mm/slub.c:1724 [inline] slab_free_freelist_hook+0x16c/0x1ec mm/slub.c:1750 slab_free mm/slub.c:3661 [inline] __kmem_cache_free+0xc0/0x224 mm/slub.c:3674 kfree+0xd0/0x1ac mm/slab_common.c:988 lmLogClose+0x250/0x4c8 fs/jfs/jfs_logmgr.c:-1 jfs_umount+0x244/0x328 fs/jfs/jfs_umount.c:116 jfs_put_super+0x90/0x188 fs/jfs/super.c:194 generic_shutdown_super+0x130/0x324 fs/super.c:501 kill_block_super+0x70/0xdc fs/super.c:1470 deactivate_locked_super+0xac/0x124 fs/super.c:332 deactivate_super+0xe8/0x108 fs/super.c:363 cleanup_mnt+0x37c/0x404 fs/namespace.c:1182 __cleanup_mnt+0x20/0x30 fs/namespace.c:1189 task_work_run+0x1ec/0x270 kernel/task_work.c:203 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] do_notify_resume+0x1f70/0x2b0c arch/arm64/kernel/signal.c:1137 prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:137 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:142 [inline] el0_svc+0x98/0x138 arch/arm64/kernel/entry-common.c:638 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 The buggy address belongs to the object at ffff0000f3891800 which belongs to the cache kmalloc-1k of size 1024 The buggy address is located 64 bytes inside of 1024-byte region [ffff0000f3891800, ffff0000f3891c00) The buggy address belongs to the physical page: page:00000000934370d6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x133890 head:00000000934370d6 order:3 compound_mapcount:0 compound_pincount:0 flags: 0x5ffc00000010200(slab|head|node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000010200 0000000000000000 dead000000000001 ffff0000c0002780 raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff0000f3891700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff0000f3891780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff0000f3891800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff0000f3891880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff0000f3891900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ================================================================== ... Log Wrap ... Log Wrap ... Log Wrap ... ... Log Wrap ... Log Wrap ... Log Wrap ... ... Log Wrap ... Log Wrap ... Log Wrap ... ... Log Wrap ... Log Wrap ... Log Wrap ... ... Log Wrap ... Log Wrap ... Log Wrap ... ... Log Wrap ... Log Wrap ... Log Wrap ... ... Log Wrap ... Log Wrap ... Log Wrap ... ... Log Wrap ... Log Wrap ... Log Wrap ... ... Log Wrap ... Log Wrap ... Log Wrap ... ... Log Wrap ... Log Wrap ... Log Wrap ... ... Log Wrap ... Log Wrap ... Log Wrap ... ... Log Wrap ... Log Wrap ... Log Wrap ... ... Log Wrap ... Log Wrap ... Log Wrap ... ... Log Wrap ... Log Wrap ... Log Wrap ... Unable to handle kernel paging request at virtual address dfff800000000006 KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037] Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006 CM = 0, WnR = 0 [dfff800000000006] address between user and kernel address ranges Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 94 Comm: jfsCommit Tainted: G B 6.1.146-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : write_special_inodes fs/jfs/jfs_logmgr.c:208 [inline] pc : lmLogSync+0x134/0x894 fs/jfs/jfs_logmgr.c:935 lr : write_special_inodes fs/jfs/jfs_logmgr.c:207 [inline] lr : lmLogSync+0x110/0x894 fs/jfs/jfs_logmgr.c:935 sp : ffff80001fd37b60 x29: ffff80001fd37c30 x28: 1ffff00003fa9222 x27: dfff800000000000 x26: 1ffff00002accdc4 x25: dfff800000000000 x24: ffff80001fd37b80 x23: 0000000000000002 x22: ffff700003fa6f70 x21: 0000000000000030 x20: ffff0000c357fc38 x19: ffff0000de235000 x18: ffff800011aabce0 x17: 0000000000000000 x16: ffff8000082e7c3c x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000030 x12: 0000000000ff0100 x11: ff008000086d0548 x10: 0000000000000000 x9 : 48accd41d92aac00 x8 : 0000000000000006 x7 : 0000000000000000 x6 : ffff800011a20fc0 x5 : 0000000000000000 x4 : 000000000000000c x3 : 0000000000000030 x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: write_special_inodes fs/jfs/jfs_logmgr.c:208 [inline] lmLogSync+0x134/0x894 fs/jfs/jfs_logmgr.c:935 jfs_syncpt+0x70/0x94 fs/jfs/jfs_logmgr.c:1041 txEnd+0x290/0x4f0 fs/jfs/jfs_txnmgr.c:549 txLazyCommit fs/jfs/jfs_txnmgr.c:2684 [inline] jfs_lazycommit+0x498/0x918 fs/jfs/jfs_txnmgr.c:2732 kthread+0x250/0x2d8 kernel/kthread.c:376 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:849 Code: 97c10e60 f94002a8 9100c115 d343fea8 (387b6908) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 97c10e60 bl 0xffffffffff043980 4: f94002a8 ldr x8, [x21] 8: 9100c115 add x21, x8, #0x30 c: d343fea8 lsr x8, x21, #3 * 10: 387b6908 ldrb w8, [x8, x27] <-- trapping instruction