================================================================== BUG: KASAN: use-after-free in crc_itu_t+0x218/0x2a0 lib/crc-itu-t.c:60 Read of size 1 at addr ffff88805a46a000 by task syz-executor/10481 CPU: 1 PID: 10481 Comm: syz-executor Not tainted 6.1.106-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106 print_address_description mm/kasan/report.c:284 [inline] print_report+0x15f/0x4f0 mm/kasan/report.c:395 kasan_report+0x136/0x160 mm/kasan/report.c:495 crc_itu_t+0x218/0x2a0 lib/crc-itu-t.c:60 udf_finalize_lvid fs/udf/super.c:2023 [inline] udf_sync_fs+0x1ce/0x380 fs/udf/super.c:2379 sync_filesystem+0xe8/0x220 fs/sync.c:56 generic_shutdown_super+0x6b/0x340 fs/super.c:474 kill_block_super+0x7a/0xe0 fs/super.c:1470 deactivate_locked_super+0xa0/0x110 fs/super.c:332 cleanup_mnt+0x490/0x520 fs/namespace.c:1186 task_work_run+0x246/0x300 kernel/task_work.c:203 exit_task_work include/linux/task_work.h:39 [inline] do_exit+0xa73/0x26a0 kernel/exit.c:871 do_group_exit+0x202/0x2b0 kernel/exit.c:1021 __do_sys_exit_group kernel/exit.c:1032 [inline] __se_sys_exit_group kernel/exit.c:1030 [inline] __x64_sys_exit_group+0x3b/0x40 kernel/exit.c:1030 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7f274c579e79 Code: Unable to access opcode bytes at 0x7f274c579e4f. RSP: 002b:00007ffefb6b4d78 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 00007f274c5e784e RCX: 00007f274c579e79 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 RBP: 0000000000000010 R08: 00007ffefb6b2b16 R09: 00007ffefb6b6030 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffefb6b6030 R13: 00007f274c5e77dc R14: 00005555574da4a8 R15: 00007ffefb6b70f0 The buggy address belongs to the physical page: page:ffffea0001691a80 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x5a46a flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000000 ffffea0001705988 ffffea000172ed08 0000000000000000 raw: 0000000000000000 0000000000000001 00000000ffffff7f 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 1, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 10549, tgid 10549 (dhcpcd-run-hook), ts 718652120072, free_ts 733694125138 set_page_owner include/linux/page_owner.h:31 [inline] post_alloc_hook+0x18d/0x1b0 mm/page_alloc.c:2517 prep_new_page mm/page_alloc.c:2524 [inline] get_page_from_freelist+0x322e/0x33b0 mm/page_alloc.c:4290 __alloc_pages+0x28d/0x770 mm/page_alloc.c:5558 alloc_slab_page+0x6a/0x150 mm/slub.c:1794 allocate_slab mm/slub.c:1939 [inline] new_slab+0x84/0x2d0 mm/slub.c:1992 ___slab_alloc+0xc20/0x1270 mm/slub.c:3180 kmem_cache_alloc_bulk+0x19d/0x4d0 mm/slub.c:3830 mt_alloc_bulk lib/maple_tree.c:157 [inline] mas_alloc_nodes+0x3df/0x800 lib/maple_tree.c:1299 mas_node_count_gfp lib/maple_tree.c:1359 [inline] mas_preallocate+0x12d/0x350 lib/maple_tree.c:5804 __vma_adjust+0x8df/0x1f40 mm/mmap.c:724 __split_vma+0x36e/0x530 do_mas_align_munmap+0x953/0x15f0 mm/mmap.c:2491 do_mas_munmap+0x246/0x2b0 mm/mmap.c:2640 mmap_region+0x8e6/0x1fa0 mm/mmap.c:2688 do_mmap+0x8c5/0xf60 mm/mmap.c:1425 vm_mmap_pgoff+0x1ca/0x2d0 mm/util.c:520 page last free stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1444 [inline] free_pcp_prepare mm/page_alloc.c:1494 [inline] free_unref_page_prepare+0xf63/0x1120 mm/page_alloc.c:3369 free_unref_page+0x33/0x3e0 mm/page_alloc.c:3464 qlink_free mm/kasan/quarantine.c:168 [inline] qlist_free_all+0x76/0xe0 mm/kasan/quarantine.c:187 kasan_quarantine_reduce+0x156/0x170 mm/kasan/quarantine.c:294 __kasan_slab_alloc+0x1f/0x70 mm/kasan/common.c:305 kasan_slab_alloc include/linux/kasan.h:201 [inline] slab_post_alloc_hook+0x52/0x3a0 mm/slab.h:737 slab_alloc_node mm/slub.c:3398 [inline] kmem_cache_alloc_node+0x136/0x310 mm/slub.c:3443 alloc_task_struct_node kernel/fork.c:171 [inline] dup_task_struct+0x57/0x6d0 kernel/fork.c:980 copy_process+0x637/0x4060 kernel/fork.c:2098 kernel_clone+0x222/0x920 kernel/fork.c:2682 __do_sys_clone kernel/fork.c:2823 [inline] __se_sys_clone kernel/fork.c:2807 [inline] __x64_sys_clone+0x231/0x280 kernel/fork.c:2807 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 Memory state around the buggy address: ffff88805a469f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88805a469f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88805a46a000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88805a46a080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805a46a100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================