================================================================== BUG: KASAN: slab-out-of-bounds in cleancache_fs_enabled_mapping include/linux/cleancache.h:56 [inline] BUG: KASAN: slab-out-of-bounds in cleancache_invalidate_page include/linux/cleancache.h:110 [inline] BUG: KASAN: slab-out-of-bounds in unaccount_page_cache_page+0x6d8/0x750 mm/filemap.c:163 Read of size 4 at addr ffff88812e5bf470 by task syz-executor.5/31685 CPU: 1 PID: 31685 Comm: syz-executor.5 Not tainted 5.15.106-syzkaller-00249-g19c0ed55a470 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x151/0x1b7 lib/dump_stack.c:106 print_address_description+0x87/0x3b0 mm/kasan/report.c:248 __kasan_report mm/kasan/report.c:427 [inline] kasan_report+0x179/0x1c0 mm/kasan/report.c:444 __asan_report_load4_noabort+0x14/0x20 mm/kasan/report_generic.c:308 cleancache_fs_enabled_mapping include/linux/cleancache.h:56 [inline] cleancache_invalidate_page include/linux/cleancache.h:110 [inline] unaccount_page_cache_page+0x6d8/0x750 mm/filemap.c:163 __delete_from_page_cache+0xc6/0x5b0 mm/filemap.c:231 __remove_mapping+0x566/0x690 mm/vmscan.c:1197 shrink_page_list+0x25f1/0x5820 mm/vmscan.c:1789 shrink_inactive_list mm/vmscan.c:2261 [inline] shrink_list mm/vmscan.c:2506 [inline] shrink_lruvec+0x17e9/0x4340 mm/vmscan.c:5694 shrink_node_memcgs mm/vmscan.c:5886 [inline] shrink_node+0x1077/0x24e0 mm/vmscan.c:5916 shrink_zones mm/vmscan.c:6119 [inline] do_try_to_free_pages+0x5b6/0x1570 mm/vmscan.c:6177 try_to_free_mem_cgroup_pages+0x36c/0x850 mm/vmscan.c:6491 try_charge_memcg+0x48f/0x1550 mm/memcontrol.c:2685 try_charge mm/memcontrol.c:2810 [inline] charge_memcg+0x6b/0x1a0 mm/memcontrol.c:6812 __mem_cgroup_charge+0x37/0x130 mm/memcontrol.c:6848 mem_cgroup_charge include/linux/memcontrol.h:710 [inline] __add_to_page_cache_locked+0x2d1/0xa20 mm/filemap.c:892 add_to_page_cache_lru+0x11b/0x2c0 mm/filemap.c:984 pagecache_get_page+0xbe1/0xeb0 mm/filemap.c:1951 grab_cache_page_write_begin+0x5d/0xa0 mm/filemap.c:3785 simple_write_begin+0x34/0x160 fs/libfs.c:533 generic_perform_write+0x2bc/0x5a0 mm/filemap.c:3831 __generic_file_write_iter+0x25b/0x4b0 mm/filemap.c:3958 generic_file_write_iter+0xaf/0x1c0 mm/filemap.c:3990 __kernel_write+0x5ab/0xa60 fs/read_write.c:539 __dump_emit+0x261/0x3a0 fs/coredump.c:875 dump_emit+0x381/0x3f0 fs/coredump.c:912 dump_user_range+0x86/0x1c0 fs/coredump.c:949 elf_core_dump+0x3663/0x3e80 fs/binfmt_elf.c:2285 do_coredump+0x1834/0x3050 fs/coredump.c:826 get_signal+0x4c8/0x1630 kernel/signal.c:2877 arch_do_signal_or_restart+0xbd/0x1680 arch/x86/kernel/signal.c:865 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop+0xa0/0xe0 kernel/entry/common.c:172 exit_to_user_mode_prepare+0x5a/0xa0 kernel/entry/common.c:208 __syscall_exit_to_user_mode_work kernel/entry/common.c:290 [inline] syscall_exit_to_user_mode+0x26/0x160 kernel/entry/common.c:301 do_syscall_64+0x49/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7f43708ab169 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f436f5fd168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 RAX: 00000000087f6e00 RBX: 00007f43709cb050 RCX: 00007f43708ab169 RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 RBP: 00007f4370906ca1 R08: 0000000000000000 R09: 0000000000000000 R10: 00008400fffffffa R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc2baf897f R14: 00007f436f5fd300 R15: 0000000000022000 The buggy address belongs to the page: page:ffffea0004b96e00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12e5b8 head:ffffea0004b96e00 order:3 compound_mapcount:0 compound_pincount:0 flags: 0x4000000000010000(head|zone=1) raw: 4000000000010000 0000000000000000 dead000000000122 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 3, migratetype Unmovable, gfp_mask 0x140dc0(GFP_USER|__GFP_COMP|__GFP_ZERO), pid 4001, ts 2370675026022, free_ts 2334221622049 set_page_owner include/linux/page_owner.h:33 [inline] post_alloc_hook+0x1a3/0x1b0 mm/page_alloc.c:2502 prep_new_page mm/page_alloc.c:2508 [inline] get_page_from_freelist+0x2c14/0x2cf0 mm/page_alloc.c:4291 __alloc_pages+0x386/0x7b0 mm/page_alloc.c:5569 __alloc_pages_node include/linux/gfp.h:591 [inline] alloc_pages_node include/linux/gfp.h:605 [inline] alloc_pages include/linux/gfp.h:618 [inline] kmalloc_order+0x4c/0x110 mm/slab_common.c:999 kmalloc_order_trace+0x1a/0xb0 mm/slab_common.c:1015 kmalloc_large include/linux/slab.h:537 [inline] kmalloc include/linux/slab.h:601 [inline] kzalloc include/linux/slab.h:738 [inline] can_pernet_init+0x5d/0x320 net/can/af_can.c:797 ops_init+0x1cf/0x4a0 net/core/net_namespace.c:135 setup_net+0x34b/0xb50 net/core/net_namespace.c:329 copy_net_ns+0x381/0x5f0 net/core/net_namespace.c:473 create_new_namespaces+0x416/0x670 kernel/nsproxy.c:110 copy_namespaces+0x1d1/0x220 kernel/nsproxy.c:178 copy_process+0x12e7/0x3260 kernel/fork.c:2259 kernel_clone+0x21e/0x9e0 kernel/fork.c:2659 __do_sys_clone3 kernel/fork.c:2943 [inline] __se_sys_clone3 kernel/fork.c:2927 [inline] __x64_sys_clone3+0x376/0x3a0 kernel/fork.c:2927 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x61/0xcb page last free stack trace: reset_page_owner include/linux/page_owner.h:26 [inline] free_pages_prepare mm/page_alloc.c:1370 [inline] free_pcp_prepare mm/page_alloc.c:1442 [inline] free_unref_page_prepare+0x7c8/0x7d0 mm/page_alloc.c:3441 free_unref_page+0xac/0x2c0 mm/page_alloc.c:3521 free_the_page mm/page_alloc.c:711 [inline] __free_pages+0x61/0xf0 mm/page_alloc.c:5645 __free_slab+0xec/0x1d0 mm/slub.c:2018 free_slab mm/slub.c:2033 [inline] discard_slab mm/slub.c:2039 [inline] __unfreeze_partials+0x165/0x1a0 mm/slub.c:2525 put_cpu_partial+0xc4/0x120 mm/slub.c:2605 __slab_free+0x1c8/0x290 mm/slub.c:3386 do_slab_free mm/slub.c:3505 [inline] ___cache_free+0x109/0x120 mm/slub.c:3524 qlink_free+0x4d/0x90 mm/kasan/quarantine.c:157 qlist_free_all+0x44/0xb0 mm/kasan/quarantine.c:176 kasan_quarantine_reduce+0x15a/0x180 mm/kasan/quarantine.c:283 __kasan_slab_alloc+0x2f/0xe0 mm/kasan/common.c:443 kasan_slab_alloc include/linux/kasan.h:217 [inline] slab_post_alloc_hook+0x53/0x2c0 mm/slab.h:550 slab_alloc_node mm/slub.c:3238 [inline] slab_alloc mm/slub.c:3246 [inline] kmem_cache_alloc_trace+0xf9/0x210 mm/slub.c:3263 kmalloc include/linux/slab.h:608 [inline] kzalloc include/linux/slab.h:738 [inline] vhost_vsock_alloc_pkt drivers/vhost/vsock.c:369 [inline] vhost_vsock_handle_tx_kick+0x3e7/0xc70 drivers/vhost/vsock.c:537 vhost_worker+0x1a4/0x2d0 drivers/vhost/vhost.c:372 Memory state around the buggy address: ffff88812e5bf300: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe ffff88812e5bf380: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe >ffff88812e5bf400: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe ^ ffff88812e5bf480: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe ffff88812e5bf500: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe ==================================================================