UFO tlock:0xffffc90002862318 ================================================================== BUG: KASAN: use-after-free in dtInsertEntry+0x8a5/0x1270 fs/jfs/jfs_dtree.c:3999 Read of size 1 at addr ffff888074884e00 by task syz.4.36/4457 CPU: 0 PID: 4457 Comm: syz.4.36 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 Call Trace: dump_stack_lvl+0x168/0x230 lib/dump_stack.c:106 print_address_description+0x60/0x2d0 mm/kasan/report.c:248 __kasan_report mm/kasan/report.c:434 [inline] kasan_report+0xdf/0x130 mm/kasan/report.c:451 dtInsertEntry+0x8a5/0x1270 fs/jfs/jfs_dtree.c:3999 dtInsert+0x928/0x57a0 fs/jfs/jfs_dtree.c:894 jfs_create+0x69d/0xa50 fs/jfs/namei.c:137 lookup_open fs/namei.c:3470 [inline] open_last_lookups fs/namei.c:3540 [inline] path_openat+0x11e1/0x2f30 fs/namei.c:3747 do_filp_open+0x1b3/0x3e0 fs/namei.c:3777 do_sys_openat2+0x142/0x4a0 fs/open.c:1253 do_sys_open fs/open.c:1269 [inline] __do_sys_openat fs/open.c:1285 [inline] __se_sys_openat fs/open.c:1280 [inline] __x64_sys_openat+0x135/0x160 fs/open.c:1280 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7fa080059749 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa07e2c0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007fa0802affa0 RCX: 00007fa080059749 RDX: 0000000000002440 RSI: 0000200000000f40 RDI: ffffffffffffff9c RBP: 00007fa0800ddf91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fa0802b0038 R14: 00007fa0802affa0 R15: 00007ffc868528f8 Allocated by task 4189: kasan_save_stack mm/kasan/common.c:38 [inline] kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:434 [inline] __kasan_slab_alloc+0x9c/0xd0 mm/kasan/common.c:467 kasan_slab_alloc include/linux/kasan.h:254 [inline] slab_post_alloc_hook+0x4c/0x380 mm/slab.h:519 slab_alloc_node mm/slub.c:3225 [inline] slab_alloc mm/slub.c:3233 [inline] kmem_cache_alloc+0x100/0x290 mm/slub.c:3238 anon_vma_chain_alloc mm/rmap.c:138 [inline] __anon_vma_prepare+0x66/0x410 mm/rmap.c:192 anon_vma_prepare include/linux/rmap.h:152 [inline] do_anonymous_page mm/memory.c:3836 [inline] handle_pte_fault mm/memory.c:4648 [inline] __handle_mm_fault mm/memory.c:4785 [inline] handle_mm_fault+0x3b83/0x43b0 mm/memory.c:4883 do_user_addr_fault+0x489/0xc80 arch/x86/mm/fault.c:1357 handle_page_fault arch/x86/mm/fault.c:1445 [inline] exc_page_fault+0x60/0x100 arch/x86/mm/fault.c:1501 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:606 Freed by task 4189: kasan_save_stack mm/kasan/common.c:38 [inline] kasan_set_track+0x4b/0x70 mm/kasan/common.c:46 kasan_set_free_info+0x1f/0x40 mm/kasan/generic.c:360 ____kasan_slab_free+0xd5/0x110 mm/kasan/common.c:366 kasan_slab_free include/linux/kasan.h:230 [inline] slab_free_hook mm/slub.c:1710 [inline] slab_free_freelist_hook+0xea/0x170 mm/slub.c:1736 slab_free mm/slub.c:3504 [inline] kmem_cache_free+0x8f/0x210 mm/slub.c:3520 anon_vma_chain_free mm/rmap.c:143 [inline] unlink_anon_vmas+0x2c8/0x660 mm/rmap.c:417 anon_vma_merge include/linux/rmap.h:159 [inline] __vma_adjust+0x14e1/0x1c20 mm/mmap.c:966 vma_merge+0xad2/0xd00 mm/mmap.c:1238 mprotect_fixup+0x424/0x800 mm/mprotect.c:465 do_mprotect_pkey+0x657/0x910 mm/mprotect.c:636 __do_sys_mprotect mm/mprotect.c:662 [inline] __se_sys_mprotect mm/mprotect.c:659 [inline] __x64_sys_mprotect+0x7c/0x90 mm/mprotect.c:659 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 The buggy address belongs to the object at ffff888074884e00 which belongs to the cache anon_vma_chain of size 80 The buggy address is located 0 bytes inside of 80-byte region [ffff888074884e00, ffff888074884e50) The buggy address belongs to the page: page:ffffea0001d22100 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x74884 memcg:ffff88805eff2401 flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000200 ffffea0001d5cb00 0000001b0000001b ffff888140007140 raw: 0000000000000000 0000000000240024 00000001ffffffff ffff88805eff2401 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 3964, ts 40990728935, free_ts 40987901262 prep_new_page mm/page_alloc.c:2426 [inline] get_page_from_freelist+0x1b77/0x1c60 mm/page_alloc.c:4192 __alloc_pages+0x1e1/0x470 mm/page_alloc.c:5487 alloc_slab_page mm/slub.c:1780 [inline] allocate_slab mm/slub.c:1917 [inline] new_slab+0xc0/0x4b0 mm/slub.c:1980 ___slab_alloc+0x81e/0xdf0 mm/slub.c:3013 __slab_alloc mm/slub.c:3100 [inline] slab_alloc_node mm/slub.c:3191 [inline] slab_alloc mm/slub.c:3233 [inline] kmem_cache_alloc+0x195/0x290 mm/slub.c:3238 anon_vma_chain_alloc mm/rmap.c:138 [inline] __anon_vma_prepare+0x66/0x410 mm/rmap.c:192 anon_vma_prepare include/linux/rmap.h:152 [inline] do_anonymous_page mm/memory.c:3836 [inline] handle_pte_fault mm/memory.c:4648 [inline] __handle_mm_fault mm/memory.c:4785 [inline] handle_mm_fault+0x3b83/0x43b0 mm/memory.c:4883 faultin_page mm/gup.c:976 [inline] __get_user_pages+0x93e/0x11c0 mm/gup.c:1197 __get_user_pages_locked mm/gup.c:1382 [inline] __get_user_pages_remote+0x1cd/0x770 mm/gup.c:2007 get_arg_page+0x116/0x330 fs/exec.c:219 copy_string_kernel+0x14d/0x280 fs/exec.c:637 do_execveat_common+0x371/0x6d0 fs/exec.c:1931 do_execve fs/exec.c:2027 [inline] __do_sys_execve fs/exec.c:2103 [inline] __se_sys_execve fs/exec.c:2098 [inline] __x64_sys_execve+0x8e/0xa0 fs/exec.c:2098 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 page last free stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1340 [inline] free_pcp_prepare mm/page_alloc.c:1391 [inline] free_unref_page_prepare+0x637/0x6c0 mm/page_alloc.c:3317 free_unref_page+0x94/0x280 mm/page_alloc.c:3396 __vunmap+0x8ab/0xa40 mm/vmalloc.c:2628 free_work+0x56/0x80 mm/vmalloc.c:95 process_one_work+0x863/0x1000 kernel/workqueue.c:2310 worker_thread+0xaa8/0x12a0 kernel/workqueue.c:2457 kthread+0x436/0x520 kernel/kthread.c:334 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 Memory state around the buggy address: ffff888074884d00: fc fc fc fc fa fb fb fb fb fb fb fb fb fb fc fc ffff888074884d80: fc fc fa fb fb fb fb fb fb fb fb fb fc fc fc fc >ffff888074884e00: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb ^ ffff888074884e80: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb ffff888074884f00: fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb fb ==================================================================