Warning: Permanently added '10.128.0.151' (ED25519) to the list of known hosts. 2024/01/19 11:59:55 ignoring optional flag "sandboxArg"="0" 2024/01/19 11:59:55 parsed 1 programs 2024/01/19 11:59:55 executed programs: 0 [ 45.184597][ T2012] loop0: detected capacity change from 0 to 8192 [ 45.193346][ T2012] REISERFS (device loop0): found reiserfs format "3.5" with non-standard journal [ 45.203273][ T2012] REISERFS (device loop0): using ordered data mode [ 45.211836][ T2012] reiserfs: using flush barriers [ 45.217825][ T2012] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 45.236442][ T2012] REISERFS (device loop0): checking transaction log (loop0) [ 45.257140][ T2012] REISERFS (device loop0): Using r5 hash to sort names [ 45.324452][ T2016] loop0: detected capacity change from 0 to 8192 [ 45.333435][ T2016] REISERFS (device loop0): found reiserfs format "3.5" with non-standard journal [ 45.343770][ T2016] REISERFS (device loop0): using ordered data mode [ 45.350904][ T2016] reiserfs: using flush barriers [ 45.356777][ T2016] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 45.374065][ T2016] REISERFS (device loop0): checking transaction log (loop0) [ 45.400344][ T2016] REISERFS (device loop0): Using r5 hash to sort names [ 45.408806][ T2016] ================================================================== [ 45.417005][ T2016] BUG: KASAN: use-after-free in reiserfs_readdir_inode+0xa13/0x1330 [ 45.425722][ T2016] Read of size 8 at addr ffff88806ce75000 by task syz-executor.0/2016 [ 45.434246][ T2016] [ 45.436580][ T2016] CPU: 1 PID: 2016 Comm: syz-executor.0 Not tainted 5.15.147-syzkaller #0 [ 45.445264][ T2016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 45.455638][ T2016] Call Trace: [ 45.459273][ T2016] [ 45.462456][ T2016] dump_stack_lvl+0x41/0x5e [ 45.467571][ T2016] print_address_description.constprop.0.cold+0x6c/0x309 [ 45.475084][ T2016] ? reiserfs_readdir_inode+0xa13/0x1330 [ 45.481271][ T2016] ? reiserfs_readdir_inode+0xa13/0x1330 [ 45.487844][ T2016] kasan_report.cold+0x83/0xdf [ 45.493611][ T2016] ? reiserfs_readdir_inode+0xa13/0x1330 [ 45.499868][ T2016] kasan_check_range+0x13d/0x180 [ 45.505718][ T2016] reiserfs_readdir_inode+0xa13/0x1330 [ 45.511492][ T2016] ? do_raw_spin_unlock+0x171/0x230 [ 45.517648][ T2016] ? reiserfs_dir_fsync+0x140/0x140 [ 45.523189][ T2016] ? lock_downgrade+0x4f0/0x4f0 [ 45.528277][ T2016] ? lock_acquire+0x11a/0x250 [ 45.533801][ T2016] ? aa_file_perm+0xea/0xd00 [ 45.538408][ T2016] ? aa_file_perm+0xea/0xd00 [ 45.543235][ T2016] ? __lock_acquire.constprop.0+0x478/0xb30 [ 45.549281][ T2016] ? aa_path_link+0x2e0/0x2e0 [ 45.554267][ T2016] ? down_read_killable+0x1be/0x380 [ 45.559461][ T2016] ? down_read_interruptible+0x380/0x380 [ 45.565211][ T2016] ? fsnotify_perm.part.0+0x115/0x4c0 [ 45.570865][ T2016] iterate_dir+0x487/0x6d0 [ 45.575293][ T2016] __x64_sys_getdents64+0x122/0x220 [ 45.580670][ T2016] ? __ia32_sys_getdents+0x220/0x220 [ 45.586108][ T2016] ? compat_fillonedir+0x300/0x300 [ 45.591191][ T2016] ? vtime_user_exit+0xde/0x180 [ 45.596262][ T2016] do_syscall_64+0x35/0x80 [ 45.601334][ T2016] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.608817][ T2016] RIP: 0033:0x7fb1ae027959 [ 45.613526][ T2016] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 45.634729][ T2016] RSP: 002b:00007fb1adbaa0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 45.643600][ T2016] RAX: ffffffffffffffda RBX: 00007fb1ae146f80 RCX: 00007fb1ae027959 [ 45.652656][ T2016] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 45.661465][ T2016] RBP: 00007fb1ae083c88 R08: 0000000000000000 R09: 0000000000000000 [ 45.670737][ T2016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 45.679500][ T2016] R13: 0000000000000016 R14: 00007fb1ae146f80 R15: 00007fff7b114228 [ 45.687724][ T2016] [ 45.691533][ T2016] [ 45.694055][ T2016] The buggy address belongs to the page: [ 45.700100][ T2016] page:ffffea0001b39d40 refcount:0 mapcount:0 mapping:0000000000000000 index:0x1 pfn:0x6ce75 [ 45.711362][ T2016] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 45.719072][ T2016] raw: 00fff00000000000 ffffea0001b39d88 ffff8880bad3e120 0000000000000000 [ 45.728425][ T2016] raw: 0000000000000001 0000000000000000 00000000ffffffff 0000000000000000 [ 45.737285][ T2016] page dumped because: kasan: bad access detected [ 45.744187][ T2016] page_owner tracks the page as freed [ 45.749830][ T2016] page last allocated via order 0, migratetype Movable, gfp_mask 0x108c48(GFP_NOFS|__GFP_NOFAIL|__GFP_HARDWALL|__GFP_MOVABLE), pid 2012, ts 45244005171, free_ts 45275239742 [ 45.768404][ T2016] get_page_from_freelist+0x12d1/0x2d40 [ 45.774564][ T2016] __alloc_pages+0x1b2/0x440 [ 45.779777][ T2016] pagecache_get_page+0x299/0xdd0 [ 45.785069][ T2016] __getblk_slow+0x1a6/0x7a0 [ 45.790296][ T2016] reiserfs_breada+0x138/0x310 [ 45.796007][ T2016] journal_init+0x1fda/0x5da0 [ 45.800874][ T2016] reiserfs_fill_super+0x9cb/0x26d0 [ 45.807045][ T2016] mount_bdev+0x2c3/0x3a0 [ 45.811614][ T2016] legacy_get_tree+0xfa/0x1f0 [ 45.816268][ T2016] vfs_get_tree+0x83/0x1b0 [ 45.820780][ T2016] path_mount+0x41e/0x19f0 [ 45.826040][ T2016] __x64_sys_mount+0x1f5/0x260 [ 45.830970][ T2016] do_syscall_64+0x35/0x80 [ 45.835871][ T2016] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.841838][ T2016] page last free stack trace: [ 45.846658][ T2016] free_pcp_prepare+0x379/0x850 [ 45.851630][ T2016] free_unref_page_list+0x16f/0xbd0 [ 45.857003][ T2016] release_pages+0xb3a/0x1480 [ 45.861688][ T2016] __pagevec_release+0x59/0xe0 [ 45.867482][ T2016] truncate_inode_pages_range+0x250/0x9f0 [ 45.873562][ T2016] blkdev_put_whole+0x19b/0x210 [ 45.878984][ T2016] blkdev_put+0x385/0x700 [ 45.883469][ T2016] blkdev_close+0x88/0xb0 [ 45.887946][ T2016] __fput+0x1f0/0x9a0 [ 45.892372][ T2016] task_work_run+0xb8/0x140 [ 45.896944][ T2016] exit_to_user_mode_prepare+0x15a/0x160 [ 45.903267][ T2016] syscall_exit_to_user_mode+0x12/0x30 [ 45.909262][ T2016] do_syscall_64+0x42/0x80 [ 45.913992][ T2016] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.920423][ T2016] [ 45.922911][ T2016] Memory state around the buggy address: [ 45.930776][ T2016] ffff88806ce74f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 45.939204][ T2016] ffff88806ce74f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 45.947760][ T2016] >ffff88806ce75000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 45.955982][ T2016] ^ [ 45.960315][ T2016] ffff88806ce75080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 45.968988][ T2016] ffff88806ce75100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 45.977312][ T2016] ================================================================== [ 45.985875][ T2016] Disabling lock debugging due to kernel taint [ 45.992328][ T2016] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 45.999768][ T2016] Kernel Offset: disabled [ 46.004464][ T2016] Rebooting in 86400 seconds..