EXT4-fs (sda1): re-mounted. Opts: ================================================================== BUG: KASAN: slab-out-of-bounds in __ext4_check_dir_entry+0x2de/0x320 fs/ext4/dir.c:69 Read of size 2 at addr ffff8801b1c69002 by task syz-executor2/10515 CPU: 0 PID: 10515 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #9 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x24d lib/dump_stack.c:53 print_address_description+0x73/0x250 mm/kasan/report.c:256 kasan_report_error mm/kasan/report.c:354 [inline] kasan_report+0x23c/0x360 mm/kasan/report.c:412 __asan_report_load2_noabort+0x14/0x20 mm/kasan/report.c:431 __ext4_check_dir_entry+0x2de/0x320 fs/ext4/dir.c:69 ext4_readdir+0xd00/0x3600 fs/ext4/dir.c:237 iterate_dir+0x1ca/0x530 fs/readdir.c:51 SYSC_getdents64 fs/readdir.c:314 [inline] SyS_getdents64+0x221/0x420 fs/readdir.c:295 do_syscall_64+0x281/0x940 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x454e79 RSP: 002b:00007fed6fc56c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 RAX: ffffffffffffffda RBX: 00007fed6fc576d4 RCX: 0000000000454e79 RDX: ffffffffffffffba RSI: 0000000020001540 RDI: 0000000000000013 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000000000a9 R14: 00000000006f3078 R15: 0000000000000000 Allocated by task 4478: save_stack+0x43/0xd0 mm/kasan/kasan.c:447 set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0xad/0xe0 mm/kasan/kasan.c:552 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:489 kmem_cache_alloc_node+0x144/0x760 mm/slab.c:3632 __alloc_skb+0xf1/0x780 net/core/skbuff.c:193 alloc_skb_fclone include/linux/skbuff.h:1025 [inline] sk_stream_alloc_skb+0x126/0x9a0 net/ipv4/tcp.c:866 tcp_sendmsg_locked+0x15f6/0x3c70 net/ipv4/tcp.c:1301 tcp_sendmsg+0x2f/0x50 net/ipv4/tcp.c:1463 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:764 sock_sendmsg_nosec net/socket.c:630 [inline] sock_sendmsg+0xca/0x110 net/socket.c:640 sock_write_iter+0x31a/0x5d0 net/socket.c:909 call_write_iter include/linux/fs.h:1782 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x684/0x970 fs/read_write.c:482 vfs_write+0x189/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xef/0x220 fs/read_write.c:581 do_syscall_64+0x281/0x940 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x42/0xb7 Freed by task 4478: save_stack+0x43/0xd0 mm/kasan/kasan.c:447 set_track mm/kasan/kasan.c:459 [inline] __kasan_slab_free+0x11a/0x170 mm/kasan/kasan.c:520 kasan_slab_free+0xe/0x10 mm/kasan/kasan.c:527 __cache_free mm/slab.c:3486 [inline] kmem_cache_free+0x83/0x2a0 mm/slab.c:3744 kfree_skbmem+0xdd/0x1d0 net/core/skbuff.c:603 __kfree_skb net/core/skbuff.c:642 [inline] consume_skb+0x15b/0x490 net/core/skbuff.c:701 __dev_kfree_skb_any+0x85/0xa0 net/core/dev.c:2550 dev_consume_skb_any include/linux/netdevice.h:3296 [inline] free_old_xmit_skbs+0xbf/0x1d0 drivers/net/virtio_net.c:1234 start_xmit+0x1b4/0x16f0 drivers/net/virtio_net.c:1386 __netdev_start_xmit include/linux/netdevice.h:4066 [inline] netdev_start_xmit include/linux/netdevice.h:4075 [inline] xmit_one net/core/dev.c:3026 [inline] dev_hard_start_xmit+0x24e/0xac0 net/core/dev.c:3042 sch_direct_xmit+0x40d/0x1140 net/sched/sch_generic.c:327 qdisc_restart net/sched/sch_generic.c:399 [inline] __qdisc_run+0x676/0x19b0 net/sched/sch_generic.c:410 __dev_xmit_skb net/core/dev.c:3217 [inline] __dev_queue_xmit+0xb8b/0x2fc0 net/core/dev.c:3525 dev_queue_xmit+0x17/0x20 net/core/dev.c:3590 neigh_hh_output include/net/neighbour.h:472 [inline] neigh_output include/net/neighbour.h:480 [inline] ip_finish_output2+0xf4d/0x1550 net/ipv4/ip_output.c:229 ip_finish_output+0x864/0xd60 net/ipv4/ip_output.c:317 NF_HOOK_COND include/linux/netfilter.h:277 [inline] ip_output+0x1d2/0x860 net/ipv4/ip_output.c:405 dst_output include/net/dst.h:443 [inline] ip_local_out+0x95/0x160 net/ipv4/ip_output.c:124 ip_queue_xmit+0x8c0/0x1920 net/ipv4/ip_output.c:504 tcp_transmit_skb+0x1b12/0x3960 net/ipv4/tcp_output.c:1176 tcp_write_xmit+0x689/0x5470 net/ipv4/tcp_output.c:2394 __tcp_push_pending_frames+0xa0/0x250 net/ipv4/tcp_output.c:2567 tcp_push+0x547/0x780 net/ipv4/tcp.c:726 tcp_sendmsg_locked+0x289a/0x3c70 net/ipv4/tcp.c:1426 tcp_sendmsg+0x2f/0x50 net/ipv4/tcp.c:1463 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:764 sock_sendmsg_nosec net/socket.c:630 [inline] sock_sendmsg+0xca/0x110 net/socket.c:640 sock_write_iter+0x31a/0x5d0 net/socket.c:909 call_write_iter include/linux/fs.h:1782 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x684/0x970 fs/read_write.c:482 vfs_write+0x189/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xef/0x220 fs/read_write.c:581 do_syscall_64+0x281/0x940 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x42/0xb7 The buggy address belongs to the object at ffff8801b1c69040 which belongs to the cache skbuff_fclone_cache of size 472 The buggy address is located 62 bytes to the left of 472-byte region [ffff8801b1c69040, ffff8801b1c69218) The buggy address belongs to the page: page:ffffea0006c71a40 count:1 mapcount:0 mapping:ffff8801b1c69040 index:0xffff8801b1c69cc0 flags: 0x2fffc0000000100(slab) raw: 02fffc0000000100 ffff8801b1c69040 ffff8801b1c69cc0 0000000100000003 raw: ffff8801d948b738 ffffea0006ebcb20 ffff8801d9bff500 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801b1c68f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801b1c68f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8801b1c69000: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb ^ ffff8801b1c69080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8801b1c69100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ==================================================================