================================================================== BUG: KASAN: out-of-bounds in end_buffer_read_sync+0x89/0x90 Write of size 4 at addr ffffc9000624f820 by task ksoftirqd/0/15 CPU: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.3.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 Call Trace: dump_stack_lvl+0x12e/0x1d0 print_report+0x163/0x510 kasan_report+0x108/0x140 kasan_check_range+0x283/0x290 end_buffer_read_sync+0x89/0x90 end_bio_bh_io_sync+0x8d/0xe0 blk_update_request+0x3a3/0x1000 blk_mq_end_request+0x39/0x60 blk_done_softirq+0x83/0x120 __do_softirq+0x2ab/0x8ea run_ksoftirqd+0xa6/0x100 smpboot_thread_fn+0x534/0x890 kthread+0x232/0x2b0 ret_from_fork+0x1f/0x30 The buggy address belongs to the virtual mapping at [ffffc90006248000, ffffc90006251000) created by: copy_process+0x3d5/0x3b60 The buggy address belongs to the physical page: page:ffffea0001b1b300 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x6c6cc flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000000 0000000000000000 dead000000000122 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x102dc2(GFP_HIGHUSER|__GFP_NOWARN|__GFP_ZERO), pid 14535, tgid 14535 (syz-executor326), ts 468666185828, free_ts 468605612210 get_page_from_freelist+0x31e9/0x3360 __alloc_pages+0x255/0x670 __vmalloc_node_range+0x700/0x1080 dup_task_struct+0x575/0x690 copy_process+0x3d5/0x3b60 kernel_clone+0x17d/0x5d0 __x64_sys_clone+0x228/0x290 do_syscall_64+0x41/0xc0 entry_SYSCALL_64_after_hwframe+0x63/0xcd page last free stack trace: free_unref_page_prepare+0xe2f/0xe70 free_unref_page_list+0x596/0x830 release_pages+0x1a07/0x1bc0 tlb_flush_mmu+0xe9/0x1e0 tlb_finish_mmu+0xb6/0x1c0 exit_mmap+0x267/0x670 __mmput+0xcb/0x300 exit_mm+0x1c4/0x280 do_exit+0x4d0/0x1cf0 do_group_exit+0x1b9/0x280 __x64_sys_exit_group+0x3f/0x40 do_syscall_64+0x41/0xc0 entry_SYSCALL_64_after_hwframe+0x63/0xcd Memory state around the buggy address: ffffc9000624f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffc9000624f780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffc9000624f800: f1 f1 f1 f1 00 00 00 00 00 00 00 f2 f2 f2 f2 f2 ^ ffffc9000624f880: 00 f2 f2 f2 01 f3 f3 f3 00 00 00 00 00 00 00 00 ffffc9000624f900: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f3 f3 f3 ==================================================================