Warning: Permanently added '10.128.0.212' (ED25519) to the list of known hosts. executing program [ 32.523398][ T6164] ================================================================== [ 32.525649][ T6164] BUG: KASAN: slab-use-after-free in __arm64_sys_io_cancel+0x370/0x374 [ 32.527887][ T6164] Read of size 4 at addr ffff0000dbca0020 by task syz-executor819/6164 [ 32.530159][ T6164] [ 32.530789][ T6164] CPU: 1 PID: 6164 Comm: syz-executor819 Not tainted 6.8.0-rc7-syzkaller-g707081b61156 #0 [ 32.533450][ T6164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 32.536130][ T6164] Call trace: [ 32.537025][ T6164] dump_backtrace+0x1b8/0x1e4 [ 32.538290][ T6164] show_stack+0x2c/0x3c [ 32.539400][ T6164] dump_stack_lvl+0xd0/0x124 [ 32.540594][ T6164] print_report+0x178/0x518 [ 32.541883][ T6164] kasan_report+0xd8/0x138 [ 32.543080][ T6164] __asan_report_load4_noabort+0x20/0x2c [ 32.544550][ T6164] __arm64_sys_io_cancel+0x370/0x374 [ 32.546006][ T6164] invoke_syscall+0x98/0x2b8 [ 32.547252][ T6164] el0_svc_common+0x130/0x23c [ 32.548527][ T6164] do_el0_svc+0x48/0x58 [ 32.549644][ T6164] el0_svc+0x54/0x168 [ 32.550663][ T6164] el0t_64_sync_handler+0x84/0xfc [ 32.552049][ T6164] el0t_64_sync+0x190/0x194 [ 32.553245][ T6164] [ 32.553858][ T6164] Allocated by task 6164: [ 32.555022][ T6164] kasan_save_track+0x40/0x78 [ 32.556255][ T6164] kasan_save_alloc_info+0x40/0x50 [ 32.557610][ T6164] __kasan_slab_alloc+0x74/0x8c [ 32.558956][ T6164] kmem_cache_alloc+0x1dc/0x488 [ 32.560259][ T6164] io_submit_one+0x204/0x14f8 [ 32.561523][ T6164] __arm64_sys_io_submit+0x248/0x3c8 [ 32.562936][ T6164] invoke_syscall+0x98/0x2b8 [ 32.564122][ T6164] el0_svc_common+0x130/0x23c [ 32.565363][ T6164] do_el0_svc+0x48/0x58 [ 32.566571][ T6164] el0_svc+0x54/0x168 [ 32.567656][ T6164] el0t_64_sync_handler+0x84/0xfc [ 32.569003][ T6164] el0t_64_sync+0x190/0x194 [ 32.570216][ T6164] [ 32.570837][ T6164] Freed by task 25: [ 32.571884][ T6164] kasan_save_track+0x40/0x78 [ 32.573172][ T6164] kasan_save_free_info+0x54/0x6c [ 32.574533][ T6164] poison_slab_object+0x124/0x18c [ 32.575920][ T6164] __kasan_slab_free+0x3c/0x70 [ 32.577204][ T6164] kmem_cache_free+0x15c/0x3d4 [ 32.578457][ T6164] iocb_put+0x680/0x8c4 [ 32.579595][ T6164] aio_poll_complete_work+0x3a4/0x570 [ 32.581097][ T6164] process_one_work+0x694/0x1204 [ 32.582463][ T6164] worker_thread+0x938/0xef4 [ 32.583720][ T6164] kthread+0x288/0x310 [ 32.584816][ T6164] ret_from_fork+0x10/0x20 [ 32.586053][ T6164] [ 32.586678][ T6164] Last potentially related work creation: [ 32.588218][ T6164] kasan_save_stack+0x40/0x6c [ 32.589521][ T6164] __kasan_record_aux_stack+0xcc/0xe8 [ 32.590949][ T6164] kasan_record_aux_stack_noalloc+0x14/0x20 [ 32.592552][ T6164] insert_work+0x54/0x2d4 [ 32.593709][ T6164] __queue_work+0xcb0/0x12bc [ 32.594922][ T6164] queue_work_on+0x9c/0x128 [ 32.596129][ T6164] aio_poll_cancel+0xc4/0x13c [ 32.597408][ T6164] __arm64_sys_io_cancel+0x1cc/0x374 [ 32.598880][ T6164] invoke_syscall+0x98/0x2b8 [ 32.600137][ T6164] el0_svc_common+0x130/0x23c [ 32.601411][ T6164] do_el0_svc+0x48/0x58 [ 32.602578][ T6164] el0_svc+0x54/0x168 [ 32.603673][ T6164] el0t_64_sync_handler+0x84/0xfc [ 32.605024][ T6164] el0t_64_sync+0x190/0x194 [ 32.606257][ T6164] [ 32.606891][ T6164] The buggy address belongs to the object at ffff0000dbca0000 [ 32.606891][ T6164] which belongs to the cache aio_kiocb of size 216 [ 32.610630][ T6164] The buggy address is located 32 bytes inside of [ 32.610630][ T6164] freed 216-byte region [ffff0000dbca0000, ffff0000dbca00d8) [ 32.614329][ T6164] [ 32.614969][ T6164] The buggy address belongs to the physical page: [ 32.616732][ T6164] page:000000001ab5eb14 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11bca0 [ 32.619538][ T6164] flags: 0x5ffc00000000800(slab|node=0|zone=2|lastcpupid=0x7ff) [ 32.621593][ T6164] page_type: 0xffffffff() [ 32.622803][ T6164] raw: 05ffc00000000800 ffff0000c41e8640 dead000000000122 0000000000000000 [ 32.625135][ T6164] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000 [ 32.627412][ T6164] page dumped because: kasan: bad access detected [ 32.629155][ T6164] [ 32.629773][ T6164] Memory state around the buggy address: [ 32.631469][ T6164] ffff0000dbc9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.633632][ T6164] ffff0000dbc9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.635891][ T6164] >ffff0000dbca0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.638009][ T6164] ^ [ 32.639408][ T6164] ffff0000dbca0080: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc [ 32.641621][ T6164] ffff0000dbca0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.643850][ T6164] ================================================================== [ 32.646232][ T6164] Disabling lock debugging due to kernel taint executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program