REISERFS warning (device loop0): jdm-13090 reiserfs_new_inode: ACLs aren't enabled in the fs, but vfs thinks they are! REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. ================================================================== BUG: KASAN: use-after-free in leaf_paste_in_buffer+0x578/0x9f0 Read of size 48 at addr ffff0000e22aeff0 by task syz-executor220/5982 CPU: 1 PID: 5982 Comm: syz-executor220 Not tainted 6.4.0-rc5-syzkaller-g177239177378 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233 show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:351 [inline] print_report+0x174/0x514 mm/kasan/report.c:462 kasan_report+0xd4/0x130 mm/kasan/report.c:572 kasan_check_range+0x264/0x2a4 mm/kasan/generic.c:187 __asan_memcpy+0x3c/0x84 mm/kasan/shadow.c:105 leaf_paste_in_buffer+0x578/0x9f0 leaf_copy_dir_entries+0x2b4/0xa04 fs/reiserfs/lbalance.c:108 leaf_copy_boundary_item+0x8c4/0x1a34 fs/reiserfs/lbalance.c:168 leaf_copy_items fs/reiserfs/lbalance.c:551 [inline] leaf_move_items+0xa0c/0x1f7c fs/reiserfs/lbalance.c:726 leaf_shift_left+0xc8/0x39c fs/reiserfs/lbalance.c:750 balance_leaf_left fs/reiserfs/do_balan.c:616 [inline] balance_leaf+0x103c/0xe860 fs/reiserfs/do_balan.c:1409 do_balance+0x27c/0x788 fs/reiserfs/do_balan.c:1888 reiserfs_insert_item+0x940/0xa84 fs/reiserfs/stree.c:2259 reiserfs_get_block+0x18c0/0x45d8 fs/reiserfs/inode.c:868 __block_write_begin_int+0x460/0x1790 fs/buffer.c:2064 __block_write_begin+0x7c/0xa0 fs/buffer.c:2114 reiserfs_write_begin+0x328/0x71c fs/reiserfs/inode.c:2773 generic_perform_write+0x278/0x55c mm/filemap.c:3923 __generic_file_write_iter+0x168/0x388 mm/filemap.c:4051 generic_file_write_iter+0xb8/0x2b4 mm/filemap.c:4083 call_write_iter include/linux/fs.h:1868 [inline] new_sync_write fs/read_write.c:491 [inline] vfs_write+0x618/0x918 fs/read_write.c:584 ksys_write+0x15c/0x26c fs/read_write.c:637 __do_sys_write fs/read_write.c:649 [inline] __se_sys_write fs/read_write.c:646 [inline] __arm64_sys_write+0x7c/0x90 fs/read_write.c:646 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x244 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x198 arch/arm64/kernel/syscall.c:191 el0_svc+0x4c/0x160 arch/arm64/kernel/entry-common.c:647 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:665 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591 The buggy address belongs to the physical page: page:00000000a9854324 refcount:3 mapcount:0 mapping:00000000a0771125 index:0x214 pfn:0x1222ae memcg:ffff0000c1972000 aops:def_blk_aops ino:700000 flags: 0x5ffc00000002022(referenced|active|private|node=0|zone=2|lastcpupid=0x7ff) page_type: 0xffffffff() raw: 05ffc00000002022 0000000000000000 dead000000000122 ffff0000c1541e00 raw: 0000000000000214 ffff0000def361d0 00000003ffffffff ffff0000c1972000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff0000e22aef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff0000e22aef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff0000e22af000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff0000e22af080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff0000e22af100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================