================================================================== BUG: KASAN: use-after-free in __lock_acquire+0x41e6/0x5dc0 kernel/locking/lockdep.c:5004 Read of size 8 at addr ffff8881b9940028 by task syz-executor.0/5495 CPU: 1 PID: 5495 Comm: syz-executor.0 Not tainted 6.6.0-next-20231031-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:364 [inline] print_report+0xc3/0x620 mm/kasan/report.c:475 kasan_report+0xd9/0x110 mm/kasan/report.c:588 __lock_acquire+0x41e6/0x5dc0 kernel/locking/lockdep.c:5004 lock_acquire kernel/locking/lockdep.c:5753 [inline] lock_acquire+0x1b1/0x530 kernel/locking/lockdep.c:5718 do_write_seqcount_begin_nested include/linux/seqlock.h:525 [inline] do_write_seqcount_begin include/linux/seqlock.h:551 [inline] psi_account_irqtime+0x29d/0x510 kernel/sched/psi.c:1016 update_rq_clock_task kernel/sched/core.c:725 [inline] update_rq_clock kernel/sched/core.c:769 [inline] update_rq_clock+0x24a/0xb20 kernel/sched/core.c:750 scheduler_tick+0xee/0x650 kernel/sched/core.c:5648 update_process_times+0x19e/0x220 kernel/time/timer.c:2076 tick_sched_handle+0x8e/0x170 kernel/time/tick-sched.c:255 tick_nohz_highres_handler+0xe9/0x110 kernel/time/tick-sched.c:1516 __run_hrtimer kernel/time/hrtimer.c:1688 [inline] __hrtimer_run_queues+0x654/0xc00 kernel/time/hrtimer.c:1752 hrtimer_interrupt+0x31b/0x800 kernel/time/hrtimer.c:1814 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1065 [inline] __sysvec_apic_timer_interrupt+0x10c/0x400 arch/x86/kernel/apic/apic.c:1082 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1076 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645 RIP: 0010:memmove+0x28/0x1b0 arch/x86/lib/memmove_64.S:44 Code: c3 90 f3 0f 1e fa 48 89 f8 48 39 fe 7d 0f 49 89 f0 49 01 d0 49 39 f8 0f 8f b5 00 00 00 48 83 fa 20 0f 82 01 01 00 00 48 89 d1 a4 c3 48 81 fa a8 02 00 00 72 05 40 38 fe 74 47 48 83 ea 20 48 RSP: 0018:ffffc900052b6f18 EFLAGS: 00010286 RAX: ffff888068cebfb4 RBX: 0000000000000002 RCX: fffffffffe0143a1 RDX: ffffffffffffffe0 RSI: ffff88806acd7be3 RDI: ffff88806acd7bf3 RBP: 0000000000000020 R08: ffff888068cebf84 R09: 0000766972705f73 R10: 667265736965722e R11: 0000766972705f73 R12: 0000000000000001 R13: 0000000000000000 R14: ffff888068cebfa4 R15: 0000000000000010 leaf_paste_entries+0x43c/0x920 fs/reiserfs/lbalance.c:1377 balance_leaf_finish_node_paste_dirent fs/reiserfs/do_balan.c:1295 [inline] balance_leaf_finish_node_paste fs/reiserfs/do_balan.c:1321 [inline] balance_leaf_finish_node fs/reiserfs/do_balan.c:1364 [inline] balance_leaf+0x9476/0xcd90 fs/reiserfs/do_balan.c:1452 do_balance+0x337/0x840 fs/reiserfs/do_balan.c:1888 reiserfs_paste_into_item+0x629/0x7c0 fs/reiserfs/stree.c:2158 reiserfs_add_entry+0x936/0xd70 fs/reiserfs/namei.c:565 reiserfs_mkdir+0x68a/0x9a0 fs/reiserfs/namei.c:860 xattr_mkdir fs/reiserfs/xattr.c:77 [inline] create_privroot fs/reiserfs/xattr.c:891 [inline] reiserfs_xattr_init+0x57f/0xbb0 fs/reiserfs/xattr.c:1007 reiserfs_fill_super+0x2139/0x3150 fs/reiserfs/super.c:2175 mount_bdev+0x1df/0x2d0 fs/super.c:1650 legacy_get_tree+0x109/0x220 fs/fs_context.c:662 vfs_get_tree+0x8c/0x370 fs/super.c:1771 do_new_mount fs/namespace.c:3337 [inline] path_mount+0x148e/0x1ed0 fs/namespace.c:3664 do_mount fs/namespace.c:3677 [inline] __do_sys_mount fs/namespace.c:3886 [inline] __se_sys_mount fs/namespace.c:3863 [inline] __x64_sys_mount+0x293/0x310 fs/namespace.c:3863 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x62/0x6a RIP: 0033:0x7f0e3067e1ea Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f0e31433ee8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f0e31433f80 RCX: 00007f0e3067e1ea RDX: 0000000020001100 RSI: 0000000020000040 RDI: 00007f0e31433f40 RBP: 0000000020001100 R08: 00007f0e31433f80 R09: 0000000000000080 R10: 0000000000000080 R11: 0000000000000246 R12: 0000000020000040 R13: 00007f0e31433f40 R14: 00000000000010f6 R15: 00000000200000c0 The buggy address belongs to the physical page: page:ffffea0006e65000 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1b9940 flags: 0x57ff00000000000(node=1|zone=2|lastcpupid=0x7ff) page_type: 0xffffffff() raw: 057ff00000000000 ffffea0006e65008 ffffea0006e65008 0000000000000000 raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner info is not present (never set?) Memory state around the buggy address: ffff8881b993ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff8881b993ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff8881b9940000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff8881b9940080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff8881b9940100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== ---------------- Code disassembly (best guess): 0: c3 ret 1: 90 nop 2: f3 0f 1e fa endbr64 6: 48 89 f8 mov %rdi,%rax 9: 48 39 fe cmp %rdi,%rsi c: 7d 0f jge 0x1d e: 49 89 f0 mov %rsi,%r8 11: 49 01 d0 add %rdx,%r8 14: 49 39 f8 cmp %rdi,%r8 17: 0f 8f b5 00 00 00 jg 0xd2 1d: 48 83 fa 20 cmp $0x20,%rdx 21: 0f 82 01 01 00 00 jb 0x128 27: 48 89 d1 mov %rdx,%rcx * 2a: f3 a4 rep movsb %ds:(%rsi),%es:(%rdi) <-- trapping instruction 2c: c3 ret 2d: 48 81 fa a8 02 00 00 cmp $0x2a8,%rdx 34: 72 05 jb 0x3b 36: 40 38 fe cmp %dil,%sil 39: 74 47 je 0x82 3b: 48 83 ea 20 sub $0x20,%rdx 3f: 48 rex.W