================================================================== BUG: KASAN: use-after-free in atomic_read include/asm-generic/atomic-instrumented.h:21 [inline] BUG: KASAN: use-after-free in diAlloc+0x20e/0x1440 fs/jfs/jfs_imap.c:1374 Read of size 4 at addr ffff88802da32fd0 by task syz-executor.1/25018 CPU: 0 PID: 25018 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_address_description.cold+0x54/0x219 mm/kasan/report.c:256 kasan_report_error.cold+0x8a/0x1b9 mm/kasan/report.c:354 kasan_report+0x8f/0xa0 mm/kasan/report.c:412 atomic_read include/asm-generic/atomic-instrumented.h:21 [inline] diAlloc+0x20e/0x1440 fs/jfs/jfs_imap.c:1374 ialloc+0x8c/0x970 fs/jfs/jfs_inode.c:69 jfs_create.part.0+0x12b/0x880 fs/jfs/namei.c:105 jfs_create+0x3f/0x60 fs/jfs/namei.c:90 lookup_open+0x893/0x1a20 fs/namei.c:3235 do_last fs/namei.c:3327 [inline] path_openat+0x1094/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 file_open_name+0x269/0x380 fs/open.c:1032 filp_open+0x47/0x70 fs/open.c:1052 do_coredump+0x1fb2/0x2d60 fs/coredump.c:717 get_signal+0xed9/0x1f70 kernel/signal.c:2583 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f0454b51797 Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b RSP: 002b:00007f045306cf00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 RAX: ffffffffffffffe5 RBX: 000000000000031c RCX: 00007f0454b51797 RDX: 0000000000000001 RSI: 000000002001d820 RDI: 0000000000000008 RBP: 0000000000000008 R08: 0000000000000000 R09: 0000000000000000 R10: 0005000000000024 R11: 0000000000000293 R12: 0000000000000008 R13: 0000000020000230 R14: 0000000000000002 R15: 00007f0454be9a20 The buggy address belongs to the page: page:ffffea0000b68c80 count:0 mapcount:0 mapping:0000000000000000 index:0x1 flags: 0xfff00000000000() raw: 00fff00000000000 dead000000000100 dead000000000200 0000000000000000 raw: 0000000000000001 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff88802da32e80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88802da32f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff88802da32f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88802da33000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88802da33080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================