================================================================== BUG: KASAN: use-after-free in ext4_search_dir+0xf7/0x1b0 fs/ext4/namei.c:1543 Read of size 1 at addr ffff888133b5dfa9 by task syz-executor.2/483 CPU: 1 PID: 483 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00132-g92704e00b599 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x151/0x1b7 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:316 [inline] print_report+0x158/0x4e0 mm/kasan/report.c:427 kasan_report+0x13c/0x170 mm/kasan/report.c:531 __asan_report_load1_noabort+0x14/0x20 mm/kasan/report_generic.c:348 ext4_search_dir+0xf7/0x1b0 fs/ext4/namei.c:1543 ext4_find_inline_entry+0x4b6/0x5e0 fs/ext4/inline.c:1722 __ext4_find_entry+0x2b0/0x1af0 fs/ext4/namei.c:1616 ext4_lookup_entry fs/ext4/namei.c:1771 [inline] ext4_lookup+0x176/0x740 fs/ext4/namei.c:1839 lookup_one_qstr_excl+0x143/0x290 fs/namei.c:1604 filename_create+0x28e/0x530 fs/namei.c:3878 do_mkdirat+0xbd/0x450 fs/namei.c:4122 __do_sys_mkdirat fs/namei.c:4147 [inline] __se_sys_mkdirat fs/namei.c:4145 [inline] __x64_sys_mkdirat+0x89/0xa0 fs/namei.c:4145 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f1f19a7cee9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f1f1a8600c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 RAX: ffffffffffffffda RBX: 00007f1f19bb3fa0 RCX: 00007f1f19a7cee9 RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 000000000000000d RBP: 00007f1f19ac947f R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f1f19bb3fa0 R15: 00007ffeff811bd8 Allocated by task 310: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4b/0x70 mm/kasan/common.c:52 kasan_save_alloc_info+0x1f/0x30 mm/kasan/generic.c:505 ____kasan_kmalloc mm/kasan/common.c:379 [inline] __kasan_kmalloc+0x9c/0xb0 mm/kasan/common.c:388 kasan_kmalloc include/linux/kasan.h:212 [inline] kmalloc_node_trace+0x3d/0xb0 mm/slab_common.c:1064 kmalloc_node include/linux/slab.h:575 [inline] kzalloc_node include/linux/slab.h:700 [inline] __get_vm_area_node+0x129/0x370 mm/vmalloc.c:2505 __vmalloc_node_range+0x36e/0x1540 mm/vmalloc.c:3194 __vmalloc_node mm/vmalloc.c:3299 [inline] vzalloc+0x78/0x90 mm/vmalloc.c:3372 xt_counters_alloc+0x44/0x50 net/netfilter/x_tables.c:1379 __do_replace+0xbf/0xa60 net/ipv6/netfilter/ip6_tables.c:1065 do_replace net/ipv6/netfilter/ip6_tables.c:1156 [inline] do_ip6t_set_ctl+0x2dab/0x3f60 net/ipv6/netfilter/ip6_tables.c:1638 nf_setsockopt+0x274/0x2a0 net/netfilter/nf_sockopt.c:101 ipv6_setsockopt+0x161/0x1a0 net/ipv6/ipv6_sockglue.c:1030 tcp_setsockopt+0xce/0xe0 net/ipv4/tcp.c:3824 sock_common_setsockopt+0xa2/0xc0 net/core/sock.c:3694 __sys_setsockopt+0x4dc/0x8b0 net/socket.c:2273 __do_sys_setsockopt net/socket.c:2284 [inline] __se_sys_setsockopt net/socket.c:2281 [inline] __x64_sys_setsockopt+0xbf/0xd0 net/socket.c:2281 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x63/0xcd Freed by task 310: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4b/0x70 mm/kasan/common.c:52 kasan_save_free_info+0x2b/0x40 mm/kasan/generic.c:516 ____kasan_slab_free+0x131/0x180 mm/kasan/common.c:241 __kasan_slab_free+0x11/0x20 mm/kasan/common.c:249 kasan_slab_free include/linux/kasan.h:178 [inline] slab_free_hook mm/slub.c:1745 [inline] slab_free_freelist_hook mm/slub.c:1771 [inline] slab_free mm/slub.c:3684 [inline] __kmem_cache_free+0x218/0x3b0 mm/slub.c:3697 kfree+0x7a/0xf0 mm/slab_common.c:1009 __vunmap+0xaac/0xb60 mm/vmalloc.c:2736 __vfree mm/vmalloc.c:2776 [inline] vfree+0x5c/0x80 mm/vmalloc.c:2807 __do_replace+0x87c/0xa60 net/ipv6/netfilter/ip6_tables.c:1109 do_replace net/ipv6/netfilter/ip6_tables.c:1156 [inline] do_ip6t_set_ctl+0x2dab/0x3f60 net/ipv6/netfilter/ip6_tables.c:1638 nf_setsockopt+0x274/0x2a0 net/netfilter/nf_sockopt.c:101 ipv6_setsockopt+0x161/0x1a0 net/ipv6/ipv6_sockglue.c:1030 tcp_setsockopt+0xce/0xe0 net/ipv4/tcp.c:3824 sock_common_setsockopt+0xa2/0xc0 net/core/sock.c:3694 __sys_setsockopt+0x4dc/0x8b0 net/socket.c:2273 __do_sys_setsockopt net/socket.c:2284 [inline] __se_sys_setsockopt net/socket.c:2281 [inline] __x64_sys_setsockopt+0xbf/0xd0 net/socket.c:2281 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x63/0xcd The buggy address belongs to the object at ffff888133b5df80 which belongs to the cache kmalloc-64 of size 64 The buggy address is located 41 bytes inside of 64-byte region [ffff888133b5df80, ffff888133b5dfc0) The buggy address belongs to the physical page: page:ffffea0004ced740 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x133b5d flags: 0x4000000000000200(slab|zone=1) raw: 4000000000000200 0000000000000000 dead000000000122 ffff888100042780 raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 310, tgid 310 (syz-executor.1), ts 25450911621, free_ts 25447512073 set_page_owner include/linux/page_owner.h:33 [inline] post_alloc_hook+0x213/0x220 mm/page_alloc.c:2590 prep_new_page+0x1b/0x110 mm/page_alloc.c:2597 get_page_from_freelist+0x27ea/0x2870 mm/page_alloc.c:4425 __alloc_pages+0x3a1/0x780 mm/page_alloc.c:5712 alloc_slab_page+0x6c/0xf0 allocate_slab mm/slub.c:1962 [inline] new_slab+0x90/0x3e0 mm/slub.c:2015 ___slab_alloc+0x6f9/0xb80 mm/slub.c:3203 __slab_alloc+0x5d/0xa0 mm/slub.c:3302 slab_alloc_node mm/slub.c:3387 [inline] __kmem_cache_alloc_node+0x1af/0x250 mm/slub.c:3460 __do_kmalloc_node mm/slab_common.c:956 [inline] __kmalloc+0xa3/0x1e0 mm/slab_common.c:970 kmalloc include/linux/slab.h:558 [inline] kzalloc include/linux/slab.h:689 [inline] ext4_htree_store_dirent+0x8d/0x670 fs/ext4/dir.c:474 htree_dirblock_to_tree+0x930/0x10d0 fs/ext4/namei.c:1140 ext4_htree_fill_tree+0x73d/0x13e0 fs/ext4/namei.c:1219 ext4_dx_readdir fs/ext4/dir.c:597 [inline] ext4_readdir+0x2f4b/0x3930 fs/ext4/dir.c:142 iterate_dir+0x265/0x610 __do_sys_getdents64 fs/readdir.c:369 [inline] __se_sys_getdents64+0x1c1/0x460 fs/readdir.c:354 page last free stack trace: reset_page_owner include/linux/page_owner.h:26 [inline] free_pages_prepare mm/page_alloc.c:1498 [inline] free_pcp_prepare mm/page_alloc.c:1572 [inline] free_unref_page_prepare+0x83d/0x850 mm/page_alloc.c:3498 free_unref_page+0xb2/0x5c0 mm/page_alloc.c:3594 free_the_page mm/page_alloc.c:798 [inline] __free_pages+0x61/0xf0 mm/page_alloc.c:5801 bpf_ringbuf_free kernel/bpf/ringbuf.c:226 [inline] ringbuf_map_free+0xbe/0x120 kernel/bpf/ringbuf.c:235 bpf_map_free_deferred+0xf7/0x1b0 kernel/bpf/syscall.c:622 process_one_work+0x73d/0xcb0 kernel/workqueue.c:2299 worker_thread+0xa60/0x1260 kernel/workqueue.c:2446 kthread+0x26d/0x300 kernel/kthread.c:386 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 Memory state around the buggy address: ffff888133b5de80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc ffff888133b5df00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc >ffff888133b5df80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc ^ ffff888133b5e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888133b5e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== EXT4-fs error (device loop2): ext4_check_all_de:655: inode #12: block 7: comm syz-executor.2: bad entry in directory: rec_len is smaller than minimal - offset=56, inode=0, rec_len=0, size=124 fake=0