Warning: Permanently added '10.128.1.20' (ED25519) to the list of known hosts. 2025/10/30 20:46:07 ignoring optional flag "type"="gce" 2025/10/30 20:46:07 parsed 1 programs [ 74.683628][ T1886] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2025/10/30 20:46:15 executed programs: 0 [ 81.450419][ T2388] loop0: detected capacity change from 0 to 512 [ 81.467753][ T2388] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 81.542605][ T2388] loop0: detected capacity change from 512 to 511 [ 81.556538][ T1936] EXT4-fs error (device loop0): htree_dirblock_to_tree:1080: inode #2: block 21: comm syz-executor: bad entry in directory: directory entry overrun - offset=1004, inode=0, rec_len=1000, size=1024 fake=0 [ 81.577594][ T1936] ================================================================== [ 81.585805][ T1936] BUG: KASAN: use-after-free in ext4_read_inline_data+0x18f/0x280 [ 81.593710][ T1936] Read of size 324 at addr ffff888129116c05 by task syz-executor/1936 [ 81.601834][ T1936] [ 81.604154][ T1936] CPU: 0 UID: 0 PID: 1936 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(none) [ 81.604161][ T1936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 81.604167][ T1936] Call Trace: [ 81.604170][ T1936] [ 81.604173][ T1936] dump_stack_lvl+0xf4/0x170 [ 81.604183][ T1936] ? __pfx_dump_stack_lvl+0x10/0x10 [ 81.604188][ T1936] ? rcu_is_watching+0x1f/0xa0 [ 81.604192][ T1936] ? __virt_addr_valid+0x176/0x2b0 [ 81.604198][ T1936] ? lock_release+0x42/0x2f0 [ 81.604203][ T1936] ? lock_acquire+0x69/0x210 [ 81.604207][ T1936] ? __virt_addr_valid+0x262/0x2b0 [ 81.604211][ T1936] print_report+0xca/0x240 [ 81.604215][ T1936] ? ext4_read_inline_data+0x18f/0x280 [ 81.604220][ T1936] kasan_report+0x118/0x150 [ 81.604226][ T1936] ? ext4_read_inline_data+0x18f/0x280 [ 81.604230][ T1936] kasan_check_range+0x2b0/0x2c0 [ 81.604234][ T1936] ? ext4_read_inline_data+0x18f/0x280 [ 81.604238][ T1936] __asan_memcpy+0x29/0x70 [ 81.604243][ T1936] ext4_read_inline_data+0x18f/0x280 [ 81.604248][ T1936] ext4_inlinedir_to_tree+0x2d8/0xab0 [ 81.604253][ T1936] ? __pfx_ext4_inlinedir_to_tree+0x10/0x10 [ 81.604257][ T1936] ? __page_table_check_zero+0x84/0x290 [ 81.604266][ T1936] ext4_htree_fill_tree+0x3cb/0xef0 [ 81.604273][ T1936] ? __pfx_ext4_htree_fill_tree+0x10/0x10 [ 81.604277][ T1936] ? __pfx_css_rstat_updated+0x10/0x10 [ 81.604282][ T1936] ? inode_query_iversion+0xbe/0x130 [ 81.604286][ T1936] ? __lock_acquire+0x74/0x4c0 [ 81.604290][ T1936] ext4_readdir+0x233a/0x2d10 [ 81.604297][ T1936] ? handle_mm_fault+0x1d0b/0x2310 [ 81.604302][ T1936] ? __pfx_ext4_readdir+0x10/0x10 [ 81.604311][ T1936] ? rwsem_read_trylock+0x18e/0x210 [ 81.604315][ T1936] ? __pfx_rwsem_read_trylock+0x10/0x10 [ 81.604319][ T1936] ? iterate_dir+0xb5/0x4c0 [ 81.604323][ T1936] ? down_read_killable+0x120/0x1a0 [ 81.604329][ T1936] iterate_dir+0x1aa/0x4c0 [ 81.604334][ T1936] __se_sys_getdents64+0xd3/0x1b0 [ 81.604339][ T1936] ? __pfx___se_sys_getdents64+0x10/0x10 [ 81.604343][ T1936] ? exc_page_fault+0x62/0xa0 [ 81.604346][ T1936] ? __pfx_filldir64+0x10/0x10 [ 81.604351][ T1936] ? do_user_addr_fault+0x378/0xc30 [ 81.604357][ T1936] do_syscall_64+0x8f/0x250 [ 81.604361][ T1936] ? fpregs_assert_state_consistent+0x48/0x60 [ 81.604367][ T1936] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 81.604372][ T1936] RIP: 0033:0x7f8d87cfc013 [ 81.604380][ T1936] Code: c1 66 0f 1f 44 00 00 48 83 c4 08 48 89 ef 5b 5d e9 52 43 f8 ff 66 90 b8 ff ff ff 7f 48 39 c2 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 c7 c2 a8 ff ff ff f7 d8 [ 81.604384][ T1936] RSP: 002b:00007fff400592d8 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9 [ 81.604393][ T1936] RAX: ffffffffffffffda RBX: 000055555cc91520 RCX: 00007f8d87cfc013 [ 81.604396][ T1936] RDX: 0000000000008000 RSI: 000055555cc91520 RDI: 0000000000000006 [ 81.604399][ T1936] RBP: 000055555cc914f4 R08: 0000000000000000 R09: 0000000000000000 [ 81.604401][ T1936] R10: 0000000000001000 R11: 0000000000000293 R12: ffffffffffffffa8 [ 81.604404][ T1936] R13: 0000000000000016 R14: 000055555cc914f0 R15: 00007fff4005c670 [ 81.604408][ T1936] [ 81.604410][ T1936] [ 81.905933][ T1936] The buggy address belongs to the physical page: [ 81.912353][ T1936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x60 pfn:0x129116 [ 81.921297][ T1936] flags: 0x200000000000000(node=0|zone=2) [ 81.927004][ T1936] raw: 0200000000000000 ffffea0004a442c8 ffffea0004a446c8 0000000000000000 [ 81.935569][ T1936] raw: 0000000000000060 0000000000000000 00000000ffffffff 0000000000000000 [ 81.944486][ T1936] page dumped because: kasan: bad access detected [ 81.950888][ T1936] page_owner tracks the page as freed [ 81.956238][ T1936] page last allocated via order 0, migratetype Movable, gfp_mask 0x140cca(GFP_HIGHUSER_MOVABLE|__GFP_COMP), pid 2165, tgid 2165 (modprobe), ts 78643490548, free_ts 78646503597 [ 81.973821][ T1936] post_alloc_hook+0x168/0x1a0 [ 81.978571][ T1936] get_page_from_freelist+0x29f0/0x2bb0 [ 81.984090][ T1936] __alloc_frozen_pages_noprof+0x26b/0x460 [ 81.989863][ T1936] alloc_pages_mpol+0xcb/0x270 [ 81.994600][ T1936] vma_alloc_folio_noprof+0x288/0x400 [ 81.999939][ T1936] folio_prealloc+0x24/0xf0 [ 82.004411][ T1936] handle_mm_fault+0xff1/0x2310 [ 82.009227][ T1936] do_user_addr_fault+0x31a/0xc30 [ 82.014223][ T1936] exc_page_fault+0x62/0xa0 [ 82.018695][ T1936] asm_exc_page_fault+0x26/0x30 [ 82.023610][ T1936] page last free pid 2165 tgid 2165 stack trace: [ 82.029915][ T1936] free_unref_folios+0xcdd/0x12b0 [ 82.034910][ T1936] folios_put_refs+0x319/0x400 [ 82.039740][ T1936] free_pages_and_swap_cache+0x20d/0x3c0 [ 82.045344][ T1936] tlb_flush_mmu+0x2ba/0x500 [ 82.049911][ T1936] tlb_finish_mmu+0xaa/0x190 [ 82.054465][ T1936] exit_mmap+0x37a/0x840 [ 82.058675][ T1936] __mmput+0x62/0x290 [ 82.062622][ T1936] exit_mm+0x11b/0x1b0 [ 82.066656][ T1936] do_exit+0x506/0x1d50 [ 82.070778][ T1936] do_group_exit+0x1b1/0x280 [ 82.075346][ T1936] __x64_sys_exit_group+0x3f/0x40 [ 82.080350][ T1936] x64_sys_call+0x21f7/0x2200 [ 82.085011][ T1936] do_syscall_64+0x8f/0x250 [ 82.089499][ T1936] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.095368][ T1936] [ 82.097668][ T1936] Memory state around the buggy address: [ 82.103266][ T1936] ffff888129116b00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 82.111310][ T1936] ffff888129116b80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 82.119423][ T1936] >ffff888129116c00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 82.127455][ T1936] ^ [ 82.131492][ T1936] ffff888129116c80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 82.139521][ T1936] ffff888129116d00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 82.147637][ T1936] ================================================================== [ 82.155970][ T1936] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 82.163441][ T1936] Kernel Offset: disabled [ 82.167755][ T1936] Rebooting in 86400 seconds..