================================================================== BUG: KASAN: out-of-bounds in end_buffer_read_sync+0x89/0x90 Write of size 4 at addr ffffc90004247800 by task ksoftirqd/0/15 CPU: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.2.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 Call Trace: dump_stack_lvl+0x167/0x220 print_report+0x163/0x540 kasan_report+0x143/0x170 kasan_check_range+0x283/0x290 end_buffer_read_sync+0x89/0x90 end_bio_bh_io_sync+0x8d/0xe0 blk_update_request+0x3a3/0x1000 blk_mq_end_request+0x39/0x60 blk_done_softirq+0x83/0x120 __do_softirq+0x311/0xb1a run_ksoftirqd+0xc5/0x120 smpboot_thread_fn+0x534/0x8e0 kthread+0x232/0x2b0 ret_from_fork+0x1f/0x30 The buggy address belongs to the virtual mapping at [ffffc90004240000, ffffc90004249000) created by: copy_process+0x3d5/0x3b10 The buggy address belongs to the physical page: page:ffffea0001aff1c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x6bfc7 memcg:ffff88801ff81182 flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000000 0000000000000000 dead000000000122 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff ffff88801ff81182 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x102dc2(GFP_HIGHUSER|__GFP_NOWARN|__GFP_ZERO), pid 10222, tgid 10222 (syz-executor.0), ts 257407338625, free_ts 196364730712 get_page_from_freelist+0x37e0/0x3970 __alloc_pages+0x291/0x7f0 __vmalloc_node_range+0x700/0x1080 dup_task_struct+0x575/0x690 copy_process+0x3d5/0x3b10 kernel_clone+0x190/0x700 __x64_sys_clone+0x230/0x280 do_syscall_64+0x41/0xc0 entry_SYSCALL_64_after_hwframe+0x63/0xcd page last free stack trace: free_unref_page_prepare+0xf0e/0xf70 free_unref_page+0x37/0x3f0 kasan_depopulate_vmalloc_pte+0x6a/0x80 __apply_to_page_range+0x765/0x8c0 kasan_release_vmalloc+0x9a/0xb0 __purge_vmap_area_lazy+0x128e/0x15e0 drain_vmap_area_work+0x3b/0xc0 process_one_work+0x7ee/0x1010 worker_thread+0x8c9/0xfd0 kthread+0x232/0x2b0 ret_from_fork+0x1f/0x30 Memory state around the buggy address: ffffc90004247700: f1 f1 f1 f1 00 f3 f3 f3 00 00 00 00 00 00 00 00 ffffc90004247780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffc90004247800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffffc90004247880: f1 f1 f1 f1 00 00 00 f3 f3 f3 f3 f3 00 00 00 00 ffffc90004247900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================