================================================================== BUG: KASAN: slab-out-of-bounds in ext4_htree_fill_tree+0x1316/0x13e0 fs/ext4/namei.c:1220 Read of size 1 at addr ffff88810a804a67 by task syz-executor417/293 CPU: 1 PID: 293 Comm: syz-executor417 Not tainted 5.10.221-syzkaller-01371-g1240968f7644 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack_lvl+0x1e2/0x24b lib/dump_stack.c:118 print_address_description+0x81/0x3b0 mm/kasan/report.c:248 __kasan_report mm/kasan/report.c:435 [inline] kasan_report+0x179/0x1c0 mm/kasan/report.c:452 __asan_report_load1_noabort+0x14/0x20 mm/kasan/report_generic.c:306 ext4_htree_fill_tree+0x1316/0x13e0 fs/ext4/namei.c:1220 ext4_dx_readdir fs/ext4/dir.c:598 [inline] ext4_readdir+0x2dde/0x37c0 fs/ext4/dir.c:142 iterate_dir+0x265/0x580 __do_sys_getdents64 fs/readdir.c:369 [inline] __se_sys_getdents64+0x1c1/0x460 fs/readdir.c:354 __x64_sys_getdents64+0x7b/0x90 fs/readdir.c:354 do_syscall_64+0x34/0x70 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7fd46df65b23 Code: c1 66 0f 1f 44 00 00 48 83 c4 08 48 89 ef 5b 5d e9 42 12 fb ff 66 90 b8 ff ff ff 7f 48 39 c2 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 RSP: 002b:00007ffdbc39f5f8 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9 RAX: ffffffffffffffda RBX: 00005555561f4830 RCX: 00007fd46df65b23 RDX: 0000000000008000 RSI: 00005555561f4830 RDI: 0000000000000004 RBP: 00005555561f4804 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000001000 R11: 0000000000000293 R12: ffffffffffffffb8 R13: 0000000000000010 R14: 00005555561f4800 R15: 00007ffdbc3a1870 Allocated by task 1: kasan_save_stack mm/kasan/common.c:38 [inline] kasan_set_track mm/kasan/common.c:45 [inline] set_alloc_info mm/kasan/common.c:430 [inline] ____kasan_kmalloc+0xdb/0x110 mm/kasan/common.c:509 __kasan_kmalloc+0x9/0x10 mm/kasan/common.c:518 kasan_kmalloc include/linux/kasan.h:254 [inline] kmem_cache_alloc_trace+0x18a/0x2e0 mm/slub.c:2974 kmem_cache_alloc_node_trace include/linux/slab.h:440 [inline] kmalloc_node include/linux/slab.h:570 [inline] kzalloc_node include/linux/slab.h:675 [inline] blkg_alloc+0x6f/0x550 block/blk-cgroup.c:158 blkcg_init_queue+0x2d/0x320 block/blk-cgroup.c:1166 blk_alloc_queue+0x49f/0x640 block/blk-core.c:575 blk_mq_init_queue_data block/blk-mq.c:3149 [inline] blk_mq_init_queue+0x36/0xd0 block/blk-mq.c:3168 scsi_mq_alloc_queue+0x42/0x140 drivers/scsi/scsi_lib.c:1900 scsi_alloc_sdev+0x642/0x970 drivers/scsi/scsi_scan.c:284 scsi_probe_and_add_lun+0x1aa/0x4260 drivers/scsi/scsi_scan.c:1098 __scsi_scan_target+0x1fb/0xe80 drivers/scsi/scsi_scan.c:1581 scsi_scan_channel drivers/scsi/scsi_scan.c:1669 [inline] scsi_scan_host_selected+0x334/0x5f0 drivers/scsi/scsi_scan.c:1698 do_scsi_scan_host drivers/scsi/scsi_scan.c:1837 [inline] scsi_scan_host+0x3a8/0x670 drivers/scsi/scsi_scan.c:1867 virtscsi_probe+0x92e/0xbf0 drivers/scsi/virtio_scsi.c:915 virtio_dev_probe+0x87d/0xad0 drivers/virtio/virtio.c:274 really_probe+0x39c/0xaf0 drivers/base/dd.c:558 driver_probe_device+0xfd/0x260 drivers/base/dd.c:752 device_driver_attach+0x188/0x290 drivers/base/dd.c:1035 __driver_attach+0x14f/0x390 drivers/base/dd.c:1124 bus_for_each_dev+0x17b/0x1f0 drivers/base/bus.c:305 driver_attach+0x42/0x50 drivers/base/dd.c:1140 bus_add_driver+0x33f/0x590 drivers/base/bus.c:622 driver_register+0x2e2/0x3e0 drivers/base/driver.c:240 register_virtio_driver+0x97/0xc0 drivers/virtio/virtio.c:325 init+0x66/0xde drivers/scsi/virtio_scsi.c:1009 do_one_initcall+0x189/0x620 init/main.c:1197 do_initcall_level+0x186/0x304 init/main.c:1270 do_initcalls+0x4e/0x8e init/main.c:1286 do_basic_setup+0x88/0x91 init/main.c:1306 kernel_init_freeable+0x2be/0x3f5 init/main.c:1510 kernel_init+0x11/0x280 init/main.c:1397 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298 Freed by task 287: kasan_save_stack mm/kasan/common.c:38 [inline] kasan_set_track+0x4b/0x70 mm/kasan/common.c:45 kasan_set_free_info+0x23/0x40 mm/kasan/generic.c:370 ____kasan_slab_free+0x121/0x160 mm/kasan/common.c:362 __kasan_slab_free+0x11/0x20 mm/kasan/common.c:370 kasan_slab_free include/linux/kasan.h:220 [inline] slab_free_hook mm/slub.c:1595 [inline] slab_free_freelist_hook+0xc0/0x190 mm/slub.c:1621 slab_free mm/slub.c:3203 [inline] kfree+0xc3/0x270 mm/slub.c:4191 skb_free_head net/core/skbuff.c:606 [inline] skb_release_data+0x5c6/0x6f0 net/core/skbuff.c:626 skb_release_all net/core/skbuff.c:680 [inline] __kfree_skb net/core/skbuff.c:694 [inline] consume_skb+0xac/0x250 net/core/skbuff.c:851 skb_free_datagram+0x28/0xe0 net/core/datagram.c:325 netlink_recvmsg+0x5ef/0x11b0 net/netlink/af_netlink.c:1995 ____sys_recvmsg+0x286/0x530 ___sys_recvmsg+0x1ec/0x690 net/socket.c:2637 __sys_recvmsg net/socket.c:2667 [inline] __do_sys_recvmsg net/socket.c:2677 [inline] __se_sys_recvmsg net/socket.c:2674 [inline] __x64_sys_recvmsg+0x1ee/0x2c0 net/socket.c:2674 do_syscall_64+0x34/0x70 entry_SYSCALL_64_after_hwframe+0x61/0xcb Last potentially related work creation: kasan_save_stack+0x3b/0x60 mm/kasan/common.c:38 __kasan_record_aux_stack+0xd3/0x100 mm/kasan/generic.c:348 kasan_record_aux_stack_noalloc+0xb/0x10 mm/kasan/generic.c:358 __call_rcu kernel/rcu/tree.c:2976 [inline] call_rcu+0x135/0x11f0 kernel/rcu/tree.c:3050 blkg_release+0x23/0x30 block/blk-cgroup.c:114 percpu_ref_put_many include/linux/percpu-refcount.h:322 [inline] percpu_ref_put include/linux/percpu-refcount.h:338 [inline] percpu_ref_call_confirm_rcu lib/percpu-refcount.c:163 [inline] percpu_ref_switch_to_atomic_rcu+0x5a5/0x5b0 lib/percpu-refcount.c:200 rcu_do_batch+0x597/0xc40 kernel/rcu/tree.c:2494 rcu_core+0x5ad/0xe40 kernel/rcu/tree.c:2735 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2748 __do_softirq+0x268/0x5bb kernel/softirq.c:309 The buggy address belongs to the object at ffff88810a804800 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 103 bytes to the right of 512-byte region [ffff88810a804800, ffff88810a804a00) The buggy address belongs to the page: page:ffffea00042a0100 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10a804 head:ffffea00042a0100 order:2 compound_mapcount:0 compound_pincount:0 flags: 0x4000000000010200(slab|head) raw: 4000000000010200 0000000000000000 0000000100000001 ffff888100043080 raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1, ts 2044768285, free_ts 0 set_page_owner include/linux/page_owner.h:35 [inline] post_alloc_hook mm/page_alloc.c:2456 [inline] prep_new_page+0x166/0x180 mm/page_alloc.c:2462 get_page_from_freelist+0x2d8c/0x2f30 mm/page_alloc.c:4254 __alloc_pages_nodemask+0x435/0xaf0 mm/page_alloc.c:5348 allocate_slab mm/slub.c:1808 [inline] new_slab+0x80/0x400 mm/slub.c:1869 new_slab_objects mm/slub.c:2627 [inline] ___slab_alloc+0x302/0x4b0 mm/slub.c:2791 __slab_alloc+0x63/0xa0 mm/slub.c:2831 slab_alloc_node mm/slub.c:2913 [inline] slab_alloc mm/slub.c:2955 [inline] kmem_cache_alloc_trace+0x1bd/0x2e0 mm/slub.c:2972 kmem_cache_alloc_node_trace include/linux/slab.h:440 [inline] kmalloc_node include/linux/slab.h:570 [inline] kzalloc_node include/linux/slab.h:675 [inline] blkg_alloc+0x6f/0x550 block/blk-cgroup.c:158 blkcg_init_queue+0x2d/0x320 block/blk-cgroup.c:1166 blk_alloc_queue+0x49f/0x640 block/blk-core.c:575 blk_mq_init_queue_data block/blk-mq.c:3149 [inline] blk_mq_init_queue+0x36/0xd0 block/blk-mq.c:3168 scsi_mq_alloc_queue+0x42/0x140 drivers/scsi/scsi_lib.c:1900 scsi_alloc_sdev+0x642/0x970 drivers/scsi/scsi_scan.c:284 scsi_probe_and_add_lun+0x1aa/0x4260 drivers/scsi/scsi_scan.c:1098 __scsi_scan_target+0x1fb/0xe80 drivers/scsi/scsi_scan.c:1581 scsi_scan_channel drivers/scsi/scsi_scan.c:1669 [inline] scsi_scan_host_selected+0x334/0x5f0 drivers/scsi/scsi_scan.c:1698 page_owner free stack trace missing Memory state around the buggy address: ffff88810a804900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff88810a804980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff88810a804a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff88810a804a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff88810a804b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ==================================================================