================================================================== BUG: KASAN: out-of-bounds in end_buffer_read_sync+0x89/0x90 Write of size 4 at addr ffffc90003a7f820 by task ksoftirqd/1/21 CPU: 1 PID: 21 Comm: ksoftirqd/1 Not tainted 6.2.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: dump_stack_lvl+0x12e/0x1d0 print_report+0x163/0x4c0 kasan_report+0xce/0x100 kasan_check_range+0x283/0x290 end_buffer_read_sync+0x89/0x90 end_bio_bh_io_sync+0x8d/0xe0 blk_update_request+0x3a3/0x1000 blk_mq_end_request+0x39/0x60 blk_done_softirq+0x83/0x120 __do_softirq+0x308/0xaea run_ksoftirqd+0xa6/0x100 smpboot_thread_fn+0x534/0x8e0 kthread+0x232/0x2b0 ret_from_fork+0x1f/0x30 The buggy address belongs to the virtual mapping at [ffffc90003a78000, ffffc90003a81000) created by: copy_process+0x3d5/0x3b30 The buggy address belongs to the physical page: page:ffffea0000836540 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x20d95 memcg:ffff8880242f7a82 flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000000 0000000000000000 dead000000000122 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff ffff8880242f7a82 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x102dc2(GFP_HIGHUSER|__GFP_NOWARN|__GFP_ZERO), pid 7925, tgid 7925 (dhcpcd-run-hook), ts 132066917474, free_ts 132061054512 get_page_from_freelist+0x3403/0x3580 __alloc_pages+0x291/0x7e0 __vmalloc_node_range+0x703/0x10b0 dup_task_struct+0x575/0x690 copy_process+0x3d5/0x3b30 kernel_clone+0x17d/0x6f0 __x64_sys_clone+0x228/0x290 do_syscall_64+0x41/0xc0 entry_SYSCALL_64_after_hwframe+0x63/0xcd page last free stack trace: free_unref_page_prepare+0xf3a/0x1040 free_unref_page_list+0x6b1/0x950 release_pages+0x1a07/0x1bc0 tlb_flush_mmu+0xe9/0x1e0 tlb_finish_mmu+0xb6/0x1c0 exit_mmap+0x264/0x740 __mmput+0xcb/0x300 exit_mm+0x1c4/0x280 do_exit+0x4d0/0x1cf0 do_group_exit+0x1b9/0x280 __x64_sys_exit_group+0x3f/0x40 do_syscall_64+0x41/0xc0 entry_SYSCALL_64_after_hwframe+0x63/0xcd Memory state around the buggy address: ffffc90003a7f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 f2 f2 f2 ffffc90003a7f780: f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 >ffffc90003a7f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffffc90003a7f880: 00 00 00 f2 f2 f2 f2 f2 f2 f2 f2 f2 00 00 00 00 ffffc90003a7f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================