Warning: Permanently added '10.128.10.2' (ED25519) to the list of known hosts. executing program [ 37.059137][ T6163] ================================================================== [ 37.061367][ T6163] BUG: KASAN: slab-use-after-free in __arm64_sys_io_cancel+0x370/0x374 [ 37.063631][ T6163] Read of size 4 at addr ffff0000d7564020 by task syz-executor148/6163 [ 37.065777][ T6163] [ 37.066380][ T6163] CPU: 1 PID: 6163 Comm: syz-executor148 Not tainted 6.8.0-rc7-syzkaller-g707081b61156 #0 [ 37.069023][ T6163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 37.071741][ T6163] Call trace: [ 37.072605][ T6163] dump_backtrace+0x1b8/0x1e4 [ 37.073867][ T6163] show_stack+0x2c/0x3c [ 37.074952][ T6163] dump_stack_lvl+0xd0/0x124 [ 37.076119][ T6163] print_report+0x178/0x518 [ 37.077315][ T6163] kasan_report+0xd8/0x138 [ 37.078480][ T6163] __asan_report_load4_noabort+0x20/0x2c [ 37.079947][ T6163] __arm64_sys_io_cancel+0x370/0x374 [ 37.081310][ T6163] invoke_syscall+0x98/0x2b8 [ 37.082542][ T6163] el0_svc_common+0x130/0x23c [ 37.083815][ T6163] do_el0_svc+0x48/0x58 [ 37.084928][ T6163] el0_svc+0x54/0x168 [ 37.085982][ T6163] el0t_64_sync_handler+0x84/0xfc [ 37.087349][ T6163] el0t_64_sync+0x190/0x194 [ 37.088556][ T6163] [ 37.089147][ T6163] Allocated by task 6163: [ 37.090325][ T6163] kasan_save_track+0x40/0x78 [ 37.091560][ T6163] kasan_save_alloc_info+0x40/0x50 [ 37.092908][ T6163] __kasan_slab_alloc+0x74/0x8c [ 37.094240][ T6163] kmem_cache_alloc+0x1dc/0x488 [ 37.095565][ T6163] io_submit_one+0x204/0x14f8 [ 37.096796][ T6163] __arm64_sys_io_submit+0x248/0x3c8 [ 37.098201][ T6163] invoke_syscall+0x98/0x2b8 [ 37.099412][ T6163] el0_svc_common+0x130/0x23c [ 37.100664][ T6163] do_el0_svc+0x48/0x58 [ 37.101740][ T6163] el0_svc+0x54/0x168 [ 37.102827][ T6163] el0t_64_sync_handler+0x84/0xfc [ 37.104136][ T6163] el0t_64_sync+0x190/0x194 [ 37.105305][ T6163] [ 37.105898][ T6163] Freed by task 23: [ 37.106867][ T6163] kasan_save_track+0x40/0x78 [ 37.108144][ T6163] kasan_save_free_info+0x54/0x6c [ 37.109475][ T6163] poison_slab_object+0x124/0x18c [ 37.110822][ T6163] __kasan_slab_free+0x3c/0x70 [ 37.112092][ T6163] kmem_cache_free+0x15c/0x3d4 [ 37.113387][ T6163] iocb_put+0x680/0x8c4 [ 37.114529][ T6163] aio_poll_complete_work+0x3a4/0x570 [ 37.115964][ T6163] process_one_work+0x694/0x1204 [ 37.117297][ T6163] worker_thread+0x938/0xef4 [ 37.118539][ T6163] kthread+0x288/0x310 [ 37.119622][ T6163] ret_from_fork+0x10/0x20 [ 37.120803][ T6163] [ 37.121407][ T6163] Last potentially related work creation: [ 37.122974][ T6163] kasan_save_stack+0x40/0x6c [ 37.124304][ T6163] __kasan_record_aux_stack+0xcc/0xe8 [ 37.125757][ T6163] kasan_record_aux_stack_noalloc+0x14/0x20 [ 37.127320][ T6163] insert_work+0x54/0x2d4 [ 37.128442][ T6163] __queue_work+0xcb0/0x12bc [ 37.129677][ T6163] queue_work_on+0x9c/0x128 [ 37.130810][ T6163] aio_poll_cancel+0xc4/0x13c [ 37.132023][ T6163] __arm64_sys_io_cancel+0x1cc/0x374 [ 37.133444][ T6163] invoke_syscall+0x98/0x2b8 [ 37.134638][ T6163] el0_svc_common+0x130/0x23c [ 37.135900][ T6163] do_el0_svc+0x48/0x58 [ 37.136975][ T6163] el0_svc+0x54/0x168 [ 37.138005][ T6163] el0t_64_sync_handler+0x84/0xfc [ 37.139316][ T6163] el0t_64_sync+0x190/0x194 [ 37.140527][ T6163] [ 37.141086][ T6163] The buggy address belongs to the object at ffff0000d7564000 [ 37.141086][ T6163] which belongs to the cache aio_kiocb of size 216 [ 37.144778][ T6163] The buggy address is located 32 bytes inside of [ 37.144778][ T6163] freed 216-byte region [ffff0000d7564000, ffff0000d75640d8) [ 37.148430][ T6163] [ 37.149049][ T6163] The buggy address belongs to the physical page: [ 37.150771][ T6163] page:00000000b95b0c60 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x117564 [ 37.153493][ T6163] flags: 0x5ffc00000000800(slab|node=0|zone=2|lastcpupid=0x7ff) [ 37.155498][ T6163] page_type: 0xffffffff() [ 37.156632][ T6163] raw: 05ffc00000000800 ffff0000c1edb3c0 dead000000000122 0000000000000000 [ 37.158852][ T6163] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000 [ 37.161113][ T6163] page dumped because: kasan: bad access detected [ 37.162859][ T6163] [ 37.163461][ T6163] Memory state around the buggy address: [ 37.165003][ T6163] ffff0000d7563f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.167328][ T6163] ffff0000d7563f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.169589][ T6163] >ffff0000d7564000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.171789][ T6163] ^ [ 37.173158][ T6163] ffff0000d7564080: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc [ 37.175346][ T6163] ffff0000d7564100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.177507][ T6163] ================================================================== [ 37.179914][ T6163] Disabling lock debugging due to kernel taint executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program