Buffer I/O error on dev loop0, logical block 3245774, async page read syz-executor140: attempt to access beyond end of device loop0: rw=0, sector=17669878, nr_sectors = 2 limit=128 Buffer I/O error on dev loop0, logical block 8834939, async page read ================================================================== BUG: KASAN: slab-use-after-free in sysv_new_inode+0xfc7/0x1160 fs/sysv/ialloc.c:153 Read of size 2 at addr ffff888078fb61ce by task syz-executor140/5853 CPU: 0 UID: 0 PID: 5853 Comm: syz-executor140 Not tainted 6.13.0-rc3-next-20241220-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x169/0x550 mm/kasan/report.c:489 kasan_report+0x143/0x180 mm/kasan/report.c:602 sysv_new_inode+0xfc7/0x1160 fs/sysv/ialloc.c:153 sysv_mknod+0x4e/0xe0 fs/sysv/namei.c:53 lookup_open fs/namei.c:3649 [inline] open_last_lookups fs/namei.c:3748 [inline] path_openat+0x192f/0x3580 fs/namei.c:3984 do_filp_open+0x27f/0x4e0 fs/namei.c:4014 do_sys_openat2+0x13e/0x1d0 fs/open.c:1427 do_sys_open fs/open.c:1442 [inline] __do_sys_openat fs/open.c:1458 [inline] __se_sys_openat fs/open.c:1453 [inline] __x64_sys_openat+0x247/0x2a0 fs/open.c:1453 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7faa32146f79 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffdceb58658 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007faa3218f095 RCX: 00007faa32146f79 RDX: 000000000000275a RSI: 00000000200000c0 RDI: 00000000ffffff9c RBP: 00007faa321c45f0 R08: 000055557ead04c0 R09: 000055557ead04c0 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdceb58680 R13: 00007ffdceb588a8 R14: 431bde82d7b634db R15: 00007faa3218f03b Allocated by task 5841: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 unpoison_slab_object mm/kasan/common.c:319 [inline] __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:345 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4115 [inline] slab_alloc_node mm/slub.c:4164 [inline] kmem_cache_alloc_node_noprof+0x1d9/0x380 mm/slub.c:4216 kmalloc_reserve+0xa8/0x2a0 net/core/skbuff.c:587 __alloc_skb+0x1f3/0x440 net/core/skbuff.c:678 alloc_skb include/linux/skbuff.h:1323 [inline] __tcp_send_ack+0xa2/0x600 net/ipv4/tcp_output.c:4246 tcp_cleanup_rbuf net/ipv4/tcp.c:1517 [inline] tcp_recvmsg_locked+0x330f/0x3c80 net/ipv4/tcp.c:2822 tcp_recvmsg+0x25d/0x920 net/ipv4/tcp.c:2852 inet_recvmsg+0x150/0x2d0 net/ipv4/af_inet.c:883 sock_recvmsg_nosec net/socket.c:1044 [inline] sock_recvmsg+0x1ae/0x280 net/socket.c:1066 sock_read_iter+0x2c4/0x3d0 net/socket.c:1136 new_sync_read fs/read_write.c:484 [inline] vfs_read+0x975/0xb40 fs/read_write.c:565 ksys_read+0x18f/0x2b0 fs/read_write.c:708 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 5841: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2353 [inline] slab_free mm/slub.c:4609 [inline] kmem_cache_free+0x195/0x410 mm/slub.c:4711 skb_kfree_head net/core/skbuff.c:1084 [inline] skb_free_head net/core/skbuff.c:1098 [inline] skb_release_data+0x677/0x8a0 net/core/skbuff.c:1125 skb_release_all net/core/skbuff.c:1190 [inline] __kfree_skb net/core/skbuff.c:1204 [inline] sk_skb_reason_drop+0x1c9/0x380 net/core/skbuff.c:1242 kfree_skb_reason include/linux/skbuff.h:1263 [inline] dev_kfree_skb_any_reason+0x153/0x170 net/core/dev.c:3205 __free_old_xmit+0x2f3/0x6f0 virtnet_free_old_xmit drivers/net/virtio_net.c:632 [inline] free_old_xmit drivers/net/virtio_net.c:1067 [inline] start_xmit+0x278/0x23d0 drivers/net/virtio_net.c:3261 __netdev_start_xmit include/linux/netdevice.h:5049 [inline] netdev_start_xmit include/linux/netdevice.h:5058 [inline] xmit_one net/core/dev.c:3590 [inline] dev_hard_start_xmit+0x27a/0x7d0 net/core/dev.c:3606 sch_direct_xmit+0x29c/0x5d0 net/sched/sch_generic.c:343 __dev_xmit_skb net/core/dev.c:3827 [inline] __dev_queue_xmit+0x1a8f/0x3f50 net/core/dev.c:4400 neigh_output include/net/neighbour.h:539 [inline] ip_finish_output2+0xdc9/0x12b0 net/ipv4/ip_output.c:236 ip_local_out net/ipv4/ip_output.c:130 [inline] __ip_queue_xmit+0x12ca/0x1ef0 net/ipv4/ip_output.c:536 __tcp_transmit_skb+0x2582/0x3ba0 net/ipv4/tcp_output.c:1468 tcp_transmit_skb net/ipv4/tcp_output.c:1486 [inline] tcp_write_xmit+0x17b5/0x6bf0 net/ipv4/tcp_output.c:2829 __tcp_push_pending_frames+0x9b/0x360 net/ipv4/tcp_output.c:3012 tcp_sendmsg_locked+0x47ce/0x5330 net/ipv4/tcp.c:1326 tcp_sendmsg+0x30/0x50 net/ipv4/tcp.c:1358 sock_sendmsg_nosec net/socket.c:711 [inline] __sock_sendmsg+0x1a6/0x270 net/socket.c:726 sock_write_iter+0x2d7/0x3f0 net/socket.c:1158 new_sync_write fs/read_write.c:586 [inline] vfs_write+0xacf/0xd10 fs/read_write.c:679 ksys_write+0x18f/0x2b0 fs/read_write.c:731 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f The buggy address belongs to the object at ffff888078fb6100 which belongs to the cache skbuff_small_head of size 640 The buggy address is located 206 bytes inside of freed 640-byte region [ffff888078fb6100, ffff888078fb6380) The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x78fb4 head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff) page_type: f5(slab) raw: 00fff00000000040 ffff88801e6c9a00 dead000000000122 0000000000000000 raw: 0000000000000000 0000000000150015 00000000f5000000 0000000000000000 head: 00fff00000000040 ffff88801e6c9a00 dead000000000122 0000000000000000 head: 0000000000000000 0000000000150015 00000000f5000000 0000000000000000 head: 00fff00000000002 ffffea0001e3ed01 ffffffffffffffff 0000000000000000 head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd2820(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5841, tgid 5841 (sshd), ts 260155072443, free_ts 260007288192 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x1f4/0x240 mm/page_alloc.c:1551 prep_new_page mm/page_alloc.c:1559 [inline] get_page_from_freelist+0x365c/0x37a0 mm/page_alloc.c:3477 __alloc_frozen_pages_noprof+0x292/0x710 mm/page_alloc.c:4754 alloc_pages_mpol+0x30e/0x550 mm/mempolicy.c:2270 alloc_slab_page mm/slub.c:2423 [inline] allocate_slab+0x8f/0x3a0 mm/slub.c:2587 new_slab mm/slub.c:2640 [inline] ___slab_alloc+0xc27/0x14a0 mm/slub.c:3826 __slab_alloc+0x58/0xa0 mm/slub.c:3916 __slab_alloc_node mm/slub.c:3991 [inline] slab_alloc_node mm/slub.c:4152 [inline] kmem_cache_alloc_node_noprof+0x269/0x380 mm/slub.c:4216 kmalloc_reserve+0xa8/0x2a0 net/core/skbuff.c:587 __alloc_skb+0x1f3/0x440 net/core/skbuff.c:678 alloc_skb include/linux/skbuff.h:1323 [inline] __tcp_send_ack+0xa2/0x600 net/ipv4/tcp_output.c:4246 tcp_cleanup_rbuf net/ipv4/tcp.c:1517 [inline] tcp_recvmsg_locked+0x330f/0x3c80 net/ipv4/tcp.c:2822 tcp_recvmsg+0x25d/0x920 net/ipv4/tcp.c:2852 inet_recvmsg+0x150/0x2d0 net/ipv4/af_inet.c:883 sock_recvmsg_nosec net/socket.c:1044 [inline] sock_recvmsg+0x1ae/0x280 net/socket.c:1066 sock_read_iter+0x2c4/0x3d0 net/socket.c:1136 page last free pid 5843 tgid 5843 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1127 [inline] free_frozen_pages+0xe0d/0x10e0 mm/page_alloc.c:2660 __folio_put+0x2b3/0x360 mm/swap.c:112 pipe_buf_release include/linux/pipe_fs_i.h:219 [inline] pipe_update_tail fs/pipe.c:224 [inline] pipe_read+0x6ed/0x13e0 fs/pipe.c:344 new_sync_read fs/read_write.c:484 [inline] vfs_read+0x975/0xb40 fs/read_write.c:565 ksys_read+0x18f/0x2b0 fs/read_write.c:708 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Memory state around the buggy address: ffff888078fb6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff888078fb6100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff888078fb6180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff888078fb6200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff888078fb6280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ==================================================================