================================================================== BUG: KASAN: out-of-bounds in end_buffer_read_sync+0x89/0x90 Write of size 4 at addr ffffc9000b66f820 by task ksoftirqd/0/15 CPU: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.3.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 Call Trace: dump_stack_lvl+0x12e/0x1d0 print_report+0x163/0x510 kasan_report+0x108/0x140 kasan_check_range+0x283/0x290 end_buffer_read_sync+0x89/0x90 end_bio_bh_io_sync+0x8d/0xe0 blk_update_request+0x3a3/0x1000 blk_mq_end_request+0x39/0x60 blk_done_softirq+0x83/0x120 __do_softirq+0x2ab/0x8ea run_ksoftirqd+0xa6/0x100 smpboot_thread_fn+0x534/0x890 kthread+0x232/0x2b0 ret_from_fork+0x1f/0x30 The buggy address belongs to the virtual mapping at [ffffc9000b668000, ffffc9000b671000) created by: copy_process+0x3d5/0x3b60 The buggy address belongs to the physical page: page:ffffea0000a47680 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x291da memcg:ffff888026d52e02 flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000000 0000000000000000 dead000000000122 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff ffff888026d52e02 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x102dc2(GFP_HIGHUSER|__GFP_NOWARN|__GFP_ZERO), pid 14215, tgid 14215 (syz-executor.2), ts 286320445811, free_ts 284961732809 get_page_from_freelist+0x31e9/0x3360 __alloc_pages+0x255/0x670 __vmalloc_node_range+0x700/0x1080 dup_task_struct+0x575/0x690 copy_process+0x3d5/0x3b60 kernel_clone+0x17d/0x5d0 __x64_sys_clone+0x228/0x290 do_syscall_64+0x41/0xc0 entry_SYSCALL_64_after_hwframe+0x63/0xcd page last free stack trace: free_unref_page_prepare+0xe2f/0xe70 free_unref_page_list+0x596/0x830 release_pages+0x1a07/0x1bc0 __pagevec_release+0x66/0xe0 invalidate_mapping_pagevec+0x3f1/0x4c0 ntfs_loadlog_and_replay+0x34b/0x570 ntfs_fill_super+0x2066/0x3f70 get_tree_bdev+0x3d7/0x620 vfs_get_tree+0x7f/0x220 do_new_mount+0x1e5/0x940 __se_sys_mount+0x20d/0x2a0 do_syscall_64+0x41/0xc0 entry_SYSCALL_64_after_hwframe+0x63/0xcd Memory state around the buggy address: ffffc9000b66f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 f2 f2 f2 ffffc9000b66f780: f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 >ffffc9000b66f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffffc9000b66f880: 00 00 00 f2 f2 f2 f2 f2 f2 f2 f2 f2 00 00 00 00 ffffc9000b66f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================