loop0: detected capacity change from 0 to 32768 ================================================================== BUG: KASAN: use-after-free in diWrite+0xb48/0x15cc fs/jfs/jfs_imap.c:753 Write of size 32 at addr ffff0000d4a090c0 by task syz-executor248/4297 CPU: 1 PID: 4297 Comm: syz-executor248 Not tainted 6.1.128-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call trace: dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:316 [inline] print_report+0x174/0x4c0 mm/kasan/report.c:427 kasan_report+0xd4/0x130 mm/kasan/report.c:531 kasan_check_range+0x264/0x2a4 mm/kasan/generic.c:189 memcpy+0x60/0x90 mm/kasan/shadow.c:66 diWrite+0xb48/0x15cc fs/jfs/jfs_imap.c:753 txCommit+0x750/0x5574 fs/jfs/jfs_txnmgr.c:1255 add_missing_indices+0x760/0xa8c fs/jfs/jfs_dtree.c:2663 jfs_readdir+0x18ac/0x3030 fs/jfs/jfs_dtree.c:3019 iterate_dir+0x1f4/0x4ec __do_sys_getdents64 fs/readdir.c:369 [inline] __se_sys_getdents64 fs/readdir.c:354 [inline] __arm64_sys_getdents64+0x1c4/0x4a0 fs/readdir.c:354 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2bc arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x58/0x13c arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 Allocated by task 4281: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4c/0x80 mm/kasan/common.c:52 kasan_save_alloc_info+0x24/0x30 mm/kasan/generic.c:505 __kasan_slab_alloc+0x74/0x8c mm/kasan/common.c:328 kasan_slab_alloc include/linux/kasan.h:201 [inline] slab_post_alloc_hook+0x74/0x458 mm/slab.h:737 kmem_cache_alloc_bulk+0x430/0x4fc mm/slub.c:3854 napi_skb_cache_get+0x12c/0x1e8 net/core/skbuff.c:258 __napi_build_skb+0x28/0x310 net/core/skbuff.c:387 __napi_alloc_skb+0x1f8/0x4e4 net/core/skbuff.c:693 napi_alloc_skb include/linux/skbuff.h:3263 [inline] napi_get_frags+0x78/0x148 net/core/gro.c:699 gve_rx_add_frags drivers/net/ethernet/google/gve/gve_rx.c:309 [inline] gve_rx_qpl drivers/net/ethernet/google/gve/gve_rx.c:381 [inline] gve_rx_skb drivers/net/ethernet/google/gve/gve_rx.c:530 [inline] gve_rx drivers/net/ethernet/google/gve/gve_rx.c:580 [inline] gve_clean_rx_done drivers/net/ethernet/google/gve/gve_rx.c:728 [inline] gve_rx_poll+0x1158/0x2bbc drivers/net/ethernet/google/gve/gve_rx.c:782 gve_napi_poll+0xd4/0x2ac drivers/net/ethernet/google/gve/gve_main.c:210 __napi_poll+0xb4/0x3f0 net/core/dev.c:6547 napi_poll net/core/dev.c:6614 [inline] net_rx_action+0x5cc/0xd3c net/core/dev.c:6728 handle_softirqs+0x318/0xd58 kernel/softirq.c:578 __do_softirq+0x14/0x20 kernel/softirq.c:612 Freed by task 4281: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4c/0x80 mm/kasan/common.c:52 kasan_save_free_info+0x38/0x5c mm/kasan/generic.c:516 ____kasan_slab_free+0x144/0x1c0 mm/kasan/common.c:236 __kasan_slab_free+0x18/0x28 mm/kasan/common.c:244 kasan_slab_free include/linux/kasan.h:177 [inline] slab_free_hook mm/slub.c:1724 [inline] slab_free_freelist_hook mm/slub.c:1750 [inline] slab_free mm/slub.c:3661 [inline] kmem_cache_free+0x2f0/0x588 mm/slub.c:3683 kfree_skbmem+0x10c/0x19c __kfree_skb net/core/skbuff.c:871 [inline] skb_attempt_defer_free+0x274/0x41c net/core/skbuff.c:6676 tcp_eat_recv_skb net/ipv4/tcp.c:1661 [inline] tcp_recvmsg_locked+0xdd4/0x1ce4 net/ipv4/tcp.c:2655 tcp_recvmsg+0x1dc/0x714 net/ipv4/tcp.c:2701 inet_recvmsg+0x124/0x210 net/ipv4/af_inet.c:890 sock_recvmsg_nosec net/socket.c:1022 [inline] sock_recvmsg net/socket.c:1040 [inline] sock_read_iter+0x2dc/0x3d4 net/socket.c:1121 call_read_iter include/linux/fs.h:2259 [inline] new_sync_read fs/read_write.c:389 [inline] vfs_read+0x5bc/0x8b4 fs/read_write.c:470 ksys_read+0x15c/0x26c fs/read_write.c:613 __do_sys_read fs/read_write.c:623 [inline] __se_sys_read fs/read_write.c:621 [inline] __arm64_sys_read+0x7c/0x90 fs/read_write.c:621 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2bc arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x58/0x13c arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 The buggy address belongs to the object at ffff0000d4a09000 which belongs to the cache skbuff_head_cache of size 240 The buggy address is located 192 bytes inside of 240-byte region [ffff0000d4a09000, ffff0000d4a090f0) The buggy address belongs to the physical page: page:00000000dbcb1846 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114a09 flags: 0x5ffc00000000200(slab|node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000200 0000000000000000 dead000000000122 ffff0000c086c000 raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff0000d4a08f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff0000d4a09000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff0000d4a09080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc ^ ffff0000d4a09100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb ffff0000d4a09180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ================================================================== ERROR: (device loop0): jfs_readdir: JFS:Dtree error: ino = 2, bn=0, index = 0 ERROR: (device loop0): remounting filesystem as read-only