REISERFS warning (device loop4): jdm-13090 reiserfs_new_inode: ACLs aren't enabled in the fs, but vfs thinks they are! ================================================================== BUG: KASAN: use-after-free in bin_search_in_dir_item fs/reiserfs/namei.c:40 [inline] BUG: KASAN: use-after-free in search_by_entry_key+0x45c/0xe88 fs/reiserfs/namei.c:165 Read of size 4 at addr ffff00012fac6fc4 by task syz-executor.4/5398 CPU: 1 PID: 5398 Comm: syz-executor.4 Not tainted 5.15.131-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 Call trace: dump_backtrace+0x0/0x530 arch/arm64/kernel/stacktrace.c:152 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:216 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106 print_address_description+0x7c/0x3f0 mm/kasan/report.c:248 __kasan_report mm/kasan/report.c:434 [inline] kasan_report+0x174/0x1e4 mm/kasan/report.c:451 __asan_report_load_n_noabort+0x40/0x4c mm/kasan/report_generic.c:319 bin_search_in_dir_item fs/reiserfs/namei.c:40 [inline] search_by_entry_key+0x45c/0xe88 fs/reiserfs/namei.c:165 reiserfs_find_entry+0x2a8/0x1624 fs/reiserfs/namei.c:322 reiserfs_add_entry+0x604/0xc8c fs/reiserfs/namei.c:511 reiserfs_mkdir+0x588/0x77c fs/reiserfs/namei.c:862 xattr_mkdir fs/reiserfs/xattr.c:76 [inline] create_privroot fs/reiserfs/xattr.c:889 [inline] reiserfs_xattr_init+0x2b0/0x6dc fs/reiserfs/xattr.c:1012 reiserfs_fill_super+0x1b28/0x1e8c fs/reiserfs/super.c:2179 mount_bdev+0x274/0x370 fs/super.c:1387 get_super_block+0x44/0x58 fs/reiserfs/super.c:2608 legacy_get_tree+0xd4/0x16c fs/fs_context.c:611 vfs_get_tree+0x90/0x274 fs/super.c:1517 do_new_mount+0x25c/0x8c4 fs/namespace.c:2994 path_mount+0x590/0x104c fs/namespace.c:3324 do_mount fs/namespace.c:3337 [inline] __do_sys_mount fs/namespace.c:3545 [inline] __se_sys_mount fs/namespace.c:3522 [inline] __arm64_sys_mount+0x510/0x5e0 fs/namespace.c:3522 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:596 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:614 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 The buggy address belongs to the page: page:0000000042699cfc refcount:1 mapcount:1 mapping:0000000000000000 index:0x20119 pfn:0x16fac6 memcg:ffff0000cb8bc000 anon flags: 0x5ffc00000080814(uptodate|lru|arch_1|swapbacked|node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000080814 fffffc0004beb148 fffffc0004beaa48 ffff00012cda4aa1 raw: 0000000000020119 0000000000000000 0000000100000000 ffff0000cb8bc000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff00012fac6e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff00012fac6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff00012fac6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff00012fac7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff00012fac7080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== REISERFS (device loop4): Created .reiserfs_priv - reserved for xattr storage.