------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:2260:2 index -536870912 is out of range for type 's64[128]' (aka 'long long[128]') CPU: 0 UID: 0 PID: 7041 Comm: syz.1.109 Not tainted 6.14.0-rc5-syzkaller-g77c95b8c7a16 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 ubsan_epilogue lib/ubsan.c:231 [inline] __ubsan_handle_out_of_bounds+0xf8/0x148 lib/ubsan.c:429 dbAllocBits+0x8dc/0x908 fs/jfs/jfs_dmap.c:2260 dbAllocDmap fs/jfs/jfs_dmap.c:2037 [inline] dbAllocNear+0x224/0x334 fs/jfs/jfs_dmap.c:1258 dbAlloc+0x8b4/0xb68 fs/jfs/jfs_dmap.c:843 diNewExt+0x7c0/0x2904 fs/jfs/jfs_imap.c:2261 diAllocExt fs/jfs/jfs_imap.c:1952 [inline] diAllocAG+0xa2c/0x1b7c fs/jfs/jfs_imap.c:1669 diAlloc+0x17c/0x13c8 fs/jfs/jfs_imap.c:1590 ialloc+0x84/0x790 fs/jfs/jfs_inode.c:56 jfs_mkdir+0x190/0xa08 fs/jfs/namei.c:225 vfs_mkdir+0x27c/0x410 fs/namei.c:4313 do_mkdirat+0x250/0x584 fs/namei.c:4336 __do_sys_mkdirat fs/namei.c:4351 [inline] __se_sys_mkdirat fs/namei.c:4349 [inline] __arm64_sys_mkdirat+0x8c/0xa4 fs/namei.c:4349 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 ---[ end trace ]--- Unable to handle kernel paging request at virtual address ffff5ffffa9cec07 KASAN: maybe wild-memory-access in range [0xfffeffffd4e76038-0xfffeffffd4e7603f] Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000001a50a7000 [ffff5ffffa9cec07] pgd=0000000000000000, p4d=0000000000000000 Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP Modules linked in: CPU: 0 UID: 0 PID: 7041 Comm: syz.1.109 Not tainted 6.14.0-rc5-syzkaller-g77c95b8c7a16 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : dbAllocBits+0x7d0/0x908 fs/jfs/jfs_dmap.c:2260 lr : dbAllocBits+0x8dc/0x908 fs/jfs/jfs_dmap.c:2260 sp : ffff80009f7c72a0 x29: ffff80009f7c72e0 x28: ffff0000d4fc9804 x27: 0000000000000004 x26: 0000000000000004 x25: ffff0000d4e76000 x24: fffffc000000002c x23: dfff800000000000 x22: ffff0000d4e76450 x21: 0000000000000004 x20: dfff800000000000 x19: fffeffffd4e76038 x18: 1fffe000366f1886 x17: ffff80008fbbd000 x16: ffff8000832b8f3c x15: ffff70001262e850 x14: 1ffff0001262e850 x13: 0000000000000004 x12: ffffffffffffffff x11: 0000000000080000 x10: 0000000000010ab4 x9 : ffff8000a42ca000 x8 : 1fffdffffa9cec07 x7 : ffff8000803d4bfc x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff8000802f8164 x2 : 0000000000000001 x1 : 0000000000000001 x0 : 00000000ffffffff Call trace: dbAllocBits+0x7d0/0x908 fs/jfs/jfs_dmap.c:2260 (P) dbAllocDmap fs/jfs/jfs_dmap.c:2037 [inline] dbAllocNear+0x224/0x334 fs/jfs/jfs_dmap.c:1258 dbAlloc+0x8b4/0xb68 fs/jfs/jfs_dmap.c:843 diNewExt+0x7c0/0x2904 fs/jfs/jfs_imap.c:2261 diAllocExt fs/jfs/jfs_imap.c:1952 [inline] diAllocAG+0xa2c/0x1b7c fs/jfs/jfs_imap.c:1669 diAlloc+0x17c/0x13c8 fs/jfs/jfs_imap.c:1590 ialloc+0x84/0x790 fs/jfs/jfs_inode.c:56 jfs_mkdir+0x190/0xa08 fs/jfs/namei.c:225 vfs_mkdir+0x27c/0x410 fs/namei.c:4313 do_mkdirat+0x250/0x584 fs/namei.c:4336 __do_sys_mkdirat fs/namei.c:4351 [inline] __se_sys_mkdirat fs/namei.c:4349 [inline] __arm64_sys_mkdirat+0x8c/0xa4 fs/namei.c:4349 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Code: 9100e113 f2fbfff7 d343fe68 93407f55 (38746908) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 9100e113 add x19, x8, #0x38 4: f2fbfff7 movk x23, #0xdfff, lsl #48 8: d343fe68 lsr x8, x19, #3 c: 93407f55 sxtw x21, w26 * 10: 38746908 ldrb w8, [x8, x20] <-- trapping instruction