bisecting fixing commit since 2c8a3fceddf0dd87f278e7a5e01350f86f844b1c building syzkaller on 98682e5e2aefc9aad61354f4f3ac93be96002a2a testing commit 2c8a3fceddf0dd87f278e7a5e01350f86f844b1c with gcc (GCC) 8.4.1 20210217 kernel signature: 1c40e52348d09e58bc788910d59cc639f58ea02979062b810530d014d89ecb0f all runs: crashed: KASAN: out-of-bounds Read in leaf_paste_entries testing current HEAD 7d7d1c0ab3eb7c8d8f63a126535018007823b207 testing commit 7d7d1c0ab3eb7c8d8f63a126535018007823b207 with gcc (GCC) 8.4.1 20210217 kernel signature: b31072059fa654ce958adf92414dc94666ce93f5f37392164bc91a0a6f4c45df all runs: crashed: KASAN: out-of-bounds Read in leaf_paste_entries revisions tested: 2, total time: 29m26.471414692s (build: 22m6.383015268s, test: 6m41.874677082s) the crash still happens on HEAD commit msg: Linux 4.14.232 crash: KASAN: out-of-bounds Read in leaf_paste_entries batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 REISERFS (device loop2): checking transaction log (loop2) REISERFS (device loop5): Using tea hash to sort names batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! ================================================================== BUG: KASAN: out-of-bounds in memmove include/linux/string.h:391 [inline] BUG: KASAN: out-of-bounds in leaf_paste_entries+0x3f9/0xa20 fs/reiserfs/lbalance.c:1378 batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 Read of size 18446744073709551584 at addr ffff8880807dafa4 by task syz-executor.5/9623 CPU: 0 PID: 9623 Comm: syz-executor.5 Not tainted 4.14.232-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x14b/0x1e7 lib/dump_stack.c:58 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! print_address_description.cold.6+0x9/0x1ca mm/kasan/report.c:252 kasan_report_error mm/kasan/report.c:351 [inline] kasan_report mm/kasan/report.c:409 [inline] kasan_report.cold.7+0x11a/0x2d3 mm/kasan/report.c:393 check_memory_region_inline mm/kasan/kasan.c:260 [inline] check_memory_region+0x13c/0x1b0 mm/kasan/kasan.c:267 memmove+0x23/0x50 mm/kasan/kasan.c:293 memmove include/linux/string.h:391 [inline] leaf_paste_entries+0x3f9/0xa20 fs/reiserfs/lbalance.c:1378 balance_leaf_finish_node_paste_dirent fs/reiserfs/do_balan.c:1306 [inline] balance_leaf_finish_node_paste.isra.15+0x49b/0x12c0 fs/reiserfs/do_balan.c:1332 batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 balance_leaf_finish_node fs/reiserfs/do_balan.c:1375 [inline] balance_leaf fs/reiserfs/do_balan.c:1463 [inline] do_balance+0x25dc/0x6c30 fs/reiserfs/do_balan.c:1899 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 reiserfs_paste_into_item+0x4ad/0x5e0 fs/reiserfs/stree.c:2148 reiserfs_add_entry+0x772/0xb30 fs/reiserfs/namei.c:566 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready reiserfs_mkdir+0x586/0x820 fs/reiserfs/namei.c:858 xattr_mkdir.constprop.6+0x80/0xc0 fs/reiserfs/xattr.c:76 create_privroot fs/reiserfs/xattr.c:880 [inline] reiserfs_xattr_init+0x35f/0xa10 fs/reiserfs/xattr.c:1002 batman_adv: batadv0: Interface activated: batadv_slave_0 reiserfs_fill_super+0x19a3/0x26f0 fs/reiserfs/super.c:2180 batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 mount_bdev+0x26f/0x330 fs/super.c:1134 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! get_super_block+0x10/0x20 fs/reiserfs/super.c:2609 mount_fs+0x7f/0x270 fs/super.c:1237 vfs_kern_mount.part.9+0x58/0x3c0 fs/namespace.c:1046 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2549 [inline] do_mount+0x352/0x2af0 fs/namespace.c:2879 batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xb1/0xd0 fs/namespace.c:3072 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! do_syscall_64+0x1c7/0x5b0 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4672ba RSP: 002b:00007fe15063afa8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004672ba RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe15063b000 RBP: 00007fe15063b040 R08: 00007fe15063b040 R09: 0000000020000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 R13: 0000000020000100 R14: 00007fe15063b000 R15: 00000000200003c0 batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 The buggy address belongs to the page: page:ffffea000201f680 count:3 mapcount:0 mapping:ffff88809036f5a8 index:0x3d97 flags: 0xfff00000001044(referenced|active|private) raw: 00fff00000001044 ffff88809036f5a8 0000000000003d97 00000003ffffffff raw: dead000000000100 dead000000000200 ffff888086eb0930 ffff8880b5fd6a00 page dumped because: kasan: bad access detected page->mem_cgroup:ffff8880b5fd6a00 Memory state around the buggy address: ffff8880807dae80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8880807daf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8880807daf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff8880807db000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff8880807db080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================