list_add corruption. prev->next should be next (ffff8881f705c060), but was ffff888101bffe70. (prev=ffff888101bffe70). ------------[ cut here ]------------ kernel BUG at lib/list_debug.c:28! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 385 Comm: syz-executor.1 Not tainted 5.10.117-syzkaller-00814-gfdd06dc6b0f8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__list_add_valid+0xc6/0xd0 lib/list_debug.c:26 Code: 48 c7 c7 40 db 43 85 4c 89 e6 4c 89 f1 31 c0 e8 ad 2b 40 02 0f 0b 48 c7 c7 00 dc 43 85 4c 89 f6 4c 89 e1 31 c0 e8 97 2b 40 02 <0f> 0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 54 53 49 RSP: 0018:ffffc90000007a00 EFLAGS: 00010046 RAX: 0000000000000075 RBX: ffff8881f705c068 RCX: 4777600a18bdfc00 RDX: 0000000000000101 RSI: 0000000000000101 RDI: 0000000000000000 RBP: ffffc90000007a28 R08: ffffffff8153a998 R09: ffffed103ee0a5d8 R10: ffffed103ee0a5d8 R11: 1ffff1103ee0a5d7 R12: ffff888101bffe70 R13: dffffc0000000000 R14: ffff8881f705c060 R15: ffff888101bffe70 FS: 0000555555996400(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055555599fb38 CR3: 0000000129326000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __list_add include/linux/list.h:67 [inline] list_add_tail include/linux/list.h:100 [inline] insert_work+0x107/0x330 kernel/workqueue.c:1352 __queue_work+0x971/0xd30 kernel/workqueue.c:1514 queue_work_on+0xf2/0x150 kernel/workqueue.c:1541 queue_work include/linux/workqueue.h:513 [inline] css_release+0xae/0xc0 kernel/cgroup/cgroup.c:5161 percpu_ref_put_many include/linux/percpu-refcount.h:322 [inline] percpu_ref_put include/linux/percpu-refcount.h:338 [inline] percpu_ref_call_confirm_rcu lib/percpu-refcount.c:162 [inline] percpu_ref_switch_to_atomic_rcu+0x5a2/0x5b0 lib/percpu-refcount.c:199 rcu_do_batch+0x59e/0xc40 kernel/rcu/tree.c:2485 rcu_core+0x59b/0xe30 kernel/rcu/tree.c:2726 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2739 __do_softirq+0x27e/0x596 kernel/softirq.c:305 asm_call_irq_on_stack+0xf/0x20 __run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline] do_softirq_own_stack+0x60/0x80 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:402 [inline] __irq_exit_rcu+0x128/0x150 kernel/softirq.c:432 irq_exit_rcu+0x9/0x10 kernel/softirq.c:444 sysvec_apic_timer_interrupt+0xbf/0xe0 arch/x86/kernel/apic/apic.c:1095 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:635 RIP: 0010:memset+0x2d/0x40 mm/kasan/shadow.c:47 Code: e5 41 57 41 56 53 49 89 d7 41 89 f6 48 89 fb 48 8b 4d 08 48 89 d6 ba 01 00 00 00 e8 6d ed ff ff 84 c0 74 10 48 89 df 44 89 f6 <4c> 89 fa e8 fb 79 ca 00 eb 02 31 c0 5b 41 5e 41 5f 5d c3 55 48 89 RSP: 0018:ffffc90000cc7398 EFLAGS: 00000202 RAX: 0000000000000101 RBX: ffffc90000cc73c0 RCX: ffffffff81a6641d RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffffc90000cc73c0 RBP: ffffc90000cc73b0 R08: dffffc0000000000 R09: fffff52000198eb8 R10: 0000000000000000 R11: 0000000000000000 R12: ffff888110af0440 R13: ffffffff81d3def9 R14: 0000000000000000 R15: 0000000000000200 kasan_save_stack mm/kasan/common.c:35 [inline] kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:428 [inline] ____kasan_kmalloc+0xcd/0x110 mm/kasan/common.c:507 __kasan_kmalloc+0x9/0x10 mm/kasan/common.c:516 kasan_kmalloc include/linux/kasan.h:269 [inline] __kmalloc+0x1f7/0x360 mm/slub.c:4042 kmalloc include/linux/slab.h:557 [inline] kzalloc include/linux/slab.h:664 [inline] ext4_htree_store_dirent+0x89/0x670 fs/ext4/dir.c:480 htree_dirblock_to_tree+0x922/0x10b0 fs/ext4/namei.c:1074 ext4_htree_fill_tree+0x741/0x1420 fs/ext4/namei.c:1153 ext4_dx_readdir fs/ext4/dir.c:603 [inline] ext4_readdir+0x2e2d/0x3840 fs/ext4/dir.c:147 iterate_dir+0x25b/0x580 fs/readdir.c:64 __do_sys_getdents64 fs/readdir.c:369 [inline] __se_sys_getdents64+0x1e9/0x4a0 fs/readdir.c:354 __x64_sys_getdents64+0x7b/0x90 fs/readdir.c:354 do_syscall_64+0x34/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f912856af17 Code: 00 00 0f 05 eb b9 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 81 fa ff ff ff 7f b8 ff ff ff 7f 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 48 RSP: 002b:00007ffda94ca418 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9 RAX: ffffffffffffffda RBX: 0000555555997b00 RCX: 00007f912856af17 RDX: 0000000000008000 RSI: 0000555555997b30 RDI: 0000000000000003 RBP: 0000555555997b30 R08: 0000000000000030 R09: 00007f912862c640 R10: 0000000000000231 R11: 0000000000000293 R12: ffffffffffffffb8 R13: 0000555555997b04 R14: 0000000000000016 R15: 00007ffda94cb610 Modules linked in: ---[ end trace cdf9250b56721477 ]--- RIP: 0010:__list_add_valid+0xc6/0xd0 lib/list_debug.c:26 Code: 48 c7 c7 40 db 43 85 4c 89 e6 4c 89 f1 31 c0 e8 ad 2b 40 02 0f 0b 48 c7 c7 00 dc 43 85 4c 89 f6 4c 89 e1 31 c0 e8 97 2b 40 02 <0f> 0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 54 53 49 RSP: 0018:ffffc90000007a00 EFLAGS: 00010046 RAX: 0000000000000075 RBX: ffff8881f705c068 RCX: 4777600a18bdfc00 RDX: 0000000000000101 RSI: 0000000000000101 RDI: 0000000000000000 RBP: ffffc90000007a28 R08: ffffffff8153a998 R09: ffffed103ee0a5d8 R10: ffffed103ee0a5d8 R11: 1ffff1103ee0a5d7 R12: ffff888101bffe70 R13: dffffc0000000000 R14: ffff8881f705c060 R15: ffff888101bffe70 FS: 0000555555996400(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055555599fb38 CR3: 0000000129326000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: e5 41 in $0x41,%eax 2: 57 push %rdi 3: 41 56 push %r14 5: 53 push %rbx 6: 49 89 d7 mov %rdx,%r15 9: 41 89 f6 mov %esi,%r14d c: 48 89 fb mov %rdi,%rbx f: 48 8b 4d 08 mov 0x8(%rbp),%rcx 13: 48 89 d6 mov %rdx,%rsi 16: ba 01 00 00 00 mov $0x1,%edx 1b: e8 6d ed ff ff callq 0xffffed8d 20: 84 c0 test %al,%al 22: 74 10 je 0x34 24: 48 89 df mov %rbx,%rdi 27: 44 89 f6 mov %r14d,%esi * 2a: 4c 89 fa mov %r15,%rdx <-- trapping instruction 2d: e8 fb 79 ca 00 callq 0xca7a2d 32: eb 02 jmp 0x36 34: 31 c0 xor %eax,%eax 36: 5b pop %rbx 37: 41 5e pop %r14 39: 41 5f pop %r15 3b: 5d pop %rbp 3c: c3 retq 3d: 55 push %rbp 3e: 48 rex.W 3f: 89 .byte 0x89