ldm_validate_privheads(): Disk read failed. EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock ================================================================== BUG: KASAN: use-after-free in __fb_pad_aligned_buffer include/linux/fb.h:674 [inline] BUG: KASAN: use-after-free in bit_putcs_aligned drivers/video/fbdev/core/bitblit.c:96 [inline] BUG: KASAN: use-after-free in bit_putcs+0xbaf/0xd10 drivers/video/fbdev/core/bitblit.c:185 Read of size 1 at addr ffff8880558367b2 by task syz-executor.3/10550 CPU: 0 PID: 10550 Comm: syz-executor.3 Not tainted 4.19.131-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2fe lib/dump_stack.c:118 print_address_description.cold+0x54/0x219 mm/kasan/report.c:256 kasan_report_error.cold+0x8a/0x1c7 mm/kasan/report.c:354 kasan_report mm/kasan/report.c:412 [inline] __asan_report_load1_noabort+0x88/0x90 mm/kasan/report.c:430 __fb_pad_aligned_buffer include/linux/fb.h:674 [inline] bit_putcs_aligned drivers/video/fbdev/core/bitblit.c:96 [inline] bit_putcs+0xbaf/0xd10 drivers/video/fbdev/core/bitblit.c:185 fbcon_putcs+0x336/0x4f0 drivers/video/fbdev/core/fbcon.c:1323 con_flush drivers/tty/vt/vt.c:2552 [inline] do_con_write+0x1269/0x1d90 drivers/tty/vt/vt.c:2757 con_write+0x22/0xb0 drivers/tty/vt/vt.c:3138 process_output_block drivers/tty/n_tty.c:593 [inline] n_tty_write+0x3c0/0xff0 drivers/tty/n_tty.c:2331 do_tty_write drivers/tty/tty_io.c:960 [inline] tty_write+0x496/0x810 drivers/tty/tty_io.c:1044 __vfs_write+0xf7/0x770 fs/read_write.c:485 __kernel_write+0x109/0x370 fs/read_write.c:506 write_pipe_buf+0x153/0x1f0 fs/splice.c:798 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x389/0x800 fs/splice.c:627 splice_from_pipe fs/splice.c:662 [inline] default_file_splice_write+0xd8/0x180 fs/splice.c:810 do_splice_from fs/splice.c:852 [inline] direct_splice_actor+0x115/0x160 fs/splice.c:1025 splice_direct_to_actor+0x33f/0x8d0 fs/splice.c:980 do_splice_direct+0x1a7/0x270 fs/splice.c:1068 do_sendfile+0x550/0xc30 fs/read_write.c:1447 __do_sys_sendfile64 fs/read_write.c:1508 [inline] __se_sys_sendfile64+0x147/0x160 fs/read_write.c:1494 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45cb29 Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fc2b435fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 RAX: ffffffffffffffda RBX: 00000000004fd880 RCX: 000000000045cb29 RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0800000080004103 R11: 0000000000000246 R12: 00000000ffffffff R13: 0000000000000905 R14: 00000000004cbe3c R15: 00007fc2b43606d4 Allocated by task 8676: __do_kmalloc_node mm/slab.c:3689 [inline] __kmalloc_node_track_caller+0x4c/0x70 mm/slab.c:3703 __kmalloc_reserve net/core/skbuff.c:137 [inline] __alloc_skb+0xae/0x560 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:995 [inline] _sctp_make_chunk+0x50/0x260 net/sctp/sm_make_chunk.c:1411 sctp_make_control+0x30/0x2d0 net/sctp/sm_make_chunk.c:1458 sctp_make_heartbeat+0x8c/0x270 net/sctp/sm_make_chunk.c:1165 sctp_sf_heartbeat.constprop.0+0x21/0x170 net/sctp/sm_statefuns.c:1015 sctp_sf_do_prm_requestheartbeat+0x22/0x100 net/sctp/sm_statefuns.c:5356 sctp_do_sm+0x118/0x4e50 net/sctp/sm_sideeffect.c:1167 sctp_primitive_REQUESTHEARTBEAT+0x9b/0xc0 net/sctp/primitive.c:200 sctp_apply_peer_addr_params+0x135/0x1ef0 net/sctp/socket.c:2537 sctp_setsockopt_peer_addr_params+0x457/0x510 net/sctp/socket.c:2789 sctp_setsockopt net/sctp/socket.c:4362 [inline] sctp_setsockopt+0x1e87/0x4b60 net/sctp/socket.c:4301 __sys_setsockopt+0x14d/0x240 net/socket.c:1901 __do_sys_setsockopt net/socket.c:1912 [inline] __se_sys_setsockopt net/socket.c:1909 [inline] __x64_sys_setsockopt+0xba/0x150 net/socket.c:1909 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe Freed by task 8676: __cache_free mm/slab.c:3503 [inline] kfree+0xcc/0x210 mm/slab.c:3822 skb_free_head net/core/skbuff.c:554 [inline] skb_release_data+0x6de/0x920 net/core/skbuff.c:574 skb_release_all net/core/skbuff.c:631 [inline] __kfree_skb net/core/skbuff.c:645 [inline] consume_skb+0x113/0x3d0 net/core/skbuff.c:705 sctp_chunk_destroy net/sctp/sm_make_chunk.c:1471 [inline] sctp_chunk_put+0x182/0x270 net/sctp/sm_make_chunk.c:1498 sctp_packet_pack net/sctp/output.c:495 [inline] sctp_packet_transmit+0x10a4/0x3270 net/sctp/output.c:609 sctp_outq_flush_transports+0x19d/0x340 net/sctp/outqueue.c:1165 sctp_outq_flush net/sctp/outqueue.c:1213 [inline] sctp_outq_uncork+0x185/0x200 net/sctp/outqueue.c:776 sctp_cmd_interpreter net/sctp/sm_sideeffect.c:1815 [inline] sctp_side_effects net/sctp/sm_sideeffect.c:1199 [inline] sctp_do_sm+0x4d5/0x4e50 net/sctp/sm_sideeffect.c:1170 sctp_primitive_REQUESTHEARTBEAT+0x9b/0xc0 net/sctp/primitive.c:200 sctp_apply_peer_addr_params+0x135/0x1ef0 net/sctp/socket.c:2537 sctp_setsockopt_peer_addr_params+0x457/0x510 net/sctp/socket.c:2789 sctp_setsockopt net/sctp/socket.c:4362 [inline] sctp_setsockopt+0x1e87/0x4b60 net/sctp/socket.c:4301 __sys_setsockopt+0x14d/0x240 net/socket.c:1901 __do_sys_setsockopt net/socket.c:1912 [inline] __se_sys_setsockopt net/socket.c:1909 [inline] __x64_sys_setsockopt+0xba/0x150 net/socket.c:1909 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe The buggy address belongs to the object at ffff888055836780 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 50 bytes inside of 512-byte region [ffff888055836780, ffff888055836980) The buggy address belongs to the page: page:ffffea0001560d80 count:1 mapcount:0 mapping:ffff88812c39c940 index:0xffff888055836c80 flags: 0xfffe0000000100(slab) raw: 00fffe0000000100 ffffea00020a8308 ffffea00014b4e48 ffff88812c39c940 raw: ffff888055836c80 ffff888055836000 0000000100000002 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff888055836680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff888055836700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff888055836780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff888055836800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff888055836880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ==================================================================