REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. ================================================================== BUG: KASAN: use-after-free in reiserfs_find_actor+0x104/0x124 fs/reiserfs/inode.c:1625 Read of size 4 at addr ffff00010b09b3e0 by task syz-executor.0/11137 CPU: 0 PID: 11137 Comm: syz-executor.0 Not tainted 6.1.35-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 Call trace: dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:284 [inline] print_report+0x174/0x4c0 mm/kasan/report.c:395 kasan_report+0xd4/0x130 mm/kasan/report.c:495 __asan_report_load4_noabort+0x2c/0x38 mm/kasan/report_generic.c:350 reiserfs_find_actor+0x104/0x124 fs/reiserfs/inode.c:1625 find_inode+0x170/0x3b4 fs/inode.c:915 inode_insert5+0xf8/0x418 fs/inode.c:1170 insert_inode_locked4+0x68/0xa4 fs/inode.c:1680 reiserfs_new_inode+0x428/0x1724 fs/reiserfs/inode.c:1960 reiserfs_mkdir+0x4ac/0x77c fs/reiserfs/namei.c:845 vfs_mkdir+0x334/0x4e4 fs/namei.c:4036 do_mkdirat+0x20c/0x610 fs/namei.c:4061 __do_sys_mkdirat fs/namei.c:4076 [inline] __se_sys_mkdirat fs/namei.c:4074 [inline] __arm64_sys_mkdirat+0x90/0xa8 fs/namei.c:4074 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 Allocated by task 10427: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4c/0x80 mm/kasan/common.c:52 kasan_save_alloc_info+0x24/0x30 mm/kasan/generic.c:505 __kasan_slab_alloc+0x74/0x8c mm/kasan/common.c:328 kasan_slab_alloc include/linux/kasan.h:201 [inline] slab_post_alloc_hook+0x74/0x458 mm/slab.h:737 slab_alloc_node mm/slub.c:3398 [inline] slab_alloc mm/slub.c:3406 [inline] __kmem_cache_alloc_lru mm/slub.c:3413 [inline] kmem_cache_alloc_lru+0x1ac/0x2f8 mm/slub.c:3429 alloc_inode_sb include/linux/fs.h:3131 [inline] f2fs_alloc_inode+0x12c/0x4a8 fs/f2fs/super.c:1366 alloc_inode fs/inode.c:259 [inline] iget_locked+0x170/0x708 fs/inode.c:1286 f2fs_iget+0x5c/0x4938 fs/f2fs/inode.c:497 f2fs_fill_super+0x4ce0/0x6334 fs/f2fs/super.c:4333 mount_bdev+0x274/0x370 fs/super.c:1423 f2fs_mount+0x44/0x58 fs/f2fs/super.c:4580 legacy_get_tree+0xd4/0x16c fs/fs_context.c:610 vfs_get_tree+0x90/0x274 fs/super.c:1553 do_new_mount+0x25c/0x8c4 fs/namespace.c:3040 path_mount+0x590/0xe58 fs/namespace.c:3370 do_mount fs/namespace.c:3383 [inline] __do_sys_mount fs/namespace.c:3591 [inline] __se_sys_mount fs/namespace.c:3568 [inline] __arm64_sys_mount+0x45c/0x594 fs/namespace.c:3568 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 Last potentially related work creation: kasan_save_stack+0x40/0x70 mm/kasan/common.c:45 __kasan_record_aux_stack+0xcc/0xe8 mm/kasan/generic.c:486 kasan_record_aux_stack_noalloc+0x14/0x20 mm/kasan/generic.c:496 call_rcu+0xfc/0xa40 kernel/rcu/tree.c:2799 destroy_inode fs/inode.c:314 [inline] evict+0x5fc/0x68c fs/inode.c:679 iput_final fs/inode.c:1747 [inline] iput+0x7c0/0x8a4 fs/inode.c:1773 f2fs_fill_super+0x500c/0x6334 fs/f2fs/super.c:4516 mount_bdev+0x274/0x370 fs/super.c:1423 f2fs_mount+0x44/0x58 fs/f2fs/super.c:4580 legacy_get_tree+0xd4/0x16c fs/fs_context.c:610 vfs_get_tree+0x90/0x274 fs/super.c:1553 do_new_mount+0x25c/0x8c4 fs/namespace.c:3040 path_mount+0x590/0xe58 fs/namespace.c:3370 do_mount fs/namespace.c:3383 [inline] __do_sys_mount fs/namespace.c:3591 [inline] __se_sys_mount fs/namespace.c:3568 [inline] __arm64_sys_mount+0x45c/0x594 fs/namespace.c:3568 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 The buggy address belongs to the object at ffff00010b09ac88 which belongs to the cache f2fs_inode_cache of size 2152 The buggy address is located 1880 bytes inside of 2152-byte region [ffff00010b09ac88, ffff00010b09b4f0) The buggy address belongs to the physical page: page:000000000a22b701 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff00010b09f3c8 pfn:0x14b098 head:000000000a22b701 order:3 compound_mapcount:0 compound_pincount:0 memcg:ffff0000fff61401 flags: 0x5ffc00000010200(slab|head|node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000010200 0000000000000000 dead000000000001 ffff0000c756b680 raw: ffff00010b09f3c8 00000000800e0001 00000001ffffffff ffff0000fff61401 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff00010b09b280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff00010b09b300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff00010b09b380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff00010b09b400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff00010b09b480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc ==================================================================