EXT4-fs (loop0): mounted filesystem without journal. Opts: discard,nodiscard,noquota,noinit_itable,stripe=0x0000000000000079,resgid=0x0000000000000000,sysvgroups,delalloc,delalloc,,errors=continue
ext4 filesystem being mounted at /0/file1 supports timestamps until (%ptR?) (0x7fffffff)
==================================================================
BUG: KASAN: use-after-free in ext4_ext_binsearch fs/ext4/extents.c:864 [inline]
BUG: KASAN: use-after-free in ext4_find_extent+0xba2/0xda0 fs/ext4/extents.c:980
Read of size 4 at addr ffff8881d9eebccc by task syz-executor426/364
CPU: 1 PID: 364 Comm: syz-executor426 Not tainted 5.4.289-syzkaller-00011-g39762b7a60e9 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1d8/0x241 lib/dump_stack.c:118
print_address_description+0x8c/0x600 mm/kasan/report.c:384
__kasan_report+0xf3/0x120 mm/kasan/report.c:516
kasan_report+0x30/0x60 mm/kasan/common.c:653
ext4_ext_binsearch fs/ext4/extents.c:864 [inline]
ext4_find_extent+0xba2/0xda0 fs/ext4/extents.c:980
ext4_ext_remove_space+0x339/0x4ba0 fs/ext4/extents.c:3021
ext4_punch_hole+0x6ac/0xad0 fs/ext4/inode.c:4492
ext4_fallocate+0x265/0x570 fs/ext4/extents.c:4949
vfs_fallocate+0x551/0x6b0 fs/open.c:309
ksys_fallocate fs/open.c:332 [inline]
__do_sys_fallocate fs/open.c:340 [inline]
__se_sys_fallocate fs/open.c:338 [inline]
__x64_sys_fallocate+0xb9/0x100 fs/open.c:338
do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
RIP: 0033:0x7fe64e436669
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fe64e3ed168 EFLAGS: 00000246 ORIG_RAX: 000000000000011d
RAX: ffffffffffffffda RBX: 00007fe64e4bf728 RCX: 00007fe64e436669
RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000005
RBP: 00007fe64e4bf720 R08: 00007fe64e3ed6c0 R09: 0000000000000000
R10: 0000000000001a00 R11: 0000000000000246 R12: 00007fe64e4bf72c
R13: 0000000000000006 R14: 00007ffd59e68ee0 R15: 00007ffd59e68fc8
The buggy address belongs to the page:
page:ffffea000767bac0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x1
flags: 0x8000000000000000()
raw: 8000000000000000 ffffea000767bb08 ffffea000767ba88 0000000000000000
raw: 0000000000000001 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner info is not present (never set?)
Memory state around the buggy address:
ffff8881d9eebb80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff8881d9eebc00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
>ffff8881d9eebc80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
^
ffff8881d9eebd00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff8881d9eebd80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
------------[ cut here ]------------
kernel BUG at fs/ext4/extents.c:3374!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 364 Comm: syz-executor426 Tainted: G B 5.4.289-syzkaller-00011-g39762b7a60e9 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
RIP: 0010:ext4_split_extent_at+0xc54/0x1110 fs/ext4/extents.c:3374
Code: ff e8 80 a2 a1 ff 4c 89 ef 48 8d b4 24 00 01 00 00 e8 60 3e 00 00 e9 2c fa ff ff b0 01 84 c0 0f 84 27 f6 ff ff e8 5c a2 a1 ff <0f> 0b 89 d9 80 e1 07 fe c1 38 c1 0f 8c be f4 ff ff 48 89 df e8 53
RSP: 0018:ffff8881ee1f7900 EFLAGS: 00010293
RAX: ffffffff81c2a814 RBX: 0000000000000001 RCX: ffff8881f0cfbf00
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffff8881ee1f7a70 R08: ffffffff81c29e1f R09: ffff8881ee1f7a00
R10: ffffffffffffffff R11: dffffc0000000001 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS: 00007fe64e3ed6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8a5e14bed8 CR3: 00000001dfe74000 CR4: 00000000003406b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
ext4_force_split_extent_at fs/ext4/extents.c:308 [inline]
ext4_ext_remove_space+0x6f3/0x4ba0 fs/ext4/extents.c:3067
ext4_punch_hole+0x6ac/0xad0 fs/ext4/inode.c:4492
ext4_fallocate+0x265/0x570 fs/ext4/extents.c:4949
vfs_fallocate+0x551/0x6b0 fs/open.c:309
ksys_fallocate fs/open.c:332 [inline]
__do_sys_fallocate fs/open.c:340 [inline]
__se_sys_fallocate fs/open.c:338 [inline]
__x64_sys_fallocate+0xb9/0x100 fs/open.c:338
do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
RIP: 0033:0x7fe64e436669
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fe64e3ed168 EFLAGS: 00000246 ORIG_RAX: 000000000000011d
RAX: ffffffffffffffda RBX: 00007fe64e4bf728 RCX: 00007fe64e436669
RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000005
RBP: 00007fe64e4bf720 R08: 00007fe64e3ed6c0 R09: 0000000000000000
R10: 0000000000001a00 R11: 0000000000000246 R12: 00007fe64e4bf72c
R13: 0000000000000006 R14: 00007ffd59e68ee0 R15: 00007ffd59e68fc8
Modules linked in:
---[ end trace b4a6d822cfff3d9d ]---
RIP: 0010:ext4_split_extent_at+0xc54/0x1110 fs/ext4/extents.c:3374
Code: ff e8 80 a2 a1 ff 4c 89 ef 48 8d b4 24 00 01 00 00 e8 60 3e 00 00 e9 2c fa ff ff b0 01 84 c0 0f 84 27 f6 ff ff e8 5c a2 a1 ff <0f> 0b 89 d9 80 e1 07 fe c1 38 c1 0f 8c be f4 ff ff 48 89 df e8 53
RSP: 0018:ffff8881ee1f7900 EFLAGS: 00010293
RAX: ffffffff81c2a814 RBX: 0000000000000001 RCX: ffff8881f0cfbf00
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffff8881ee1f7a70 R08: ffffffff81c29e1f R09: ffff8881ee1f7a00
R10: ffffffffffffffff R11: dffffc0000000001 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS: 00007fe64e3ed6c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000559965d246a0 CR3: 00000001dfe74000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400