ci starts bisection 2024-09-17 12:48:05.517045681 +0000 UTC m=+44256.155347975 bisecting cause commit starting from a430d95c5efa2b545d26a094eb5f624e36732af0 building syzkaller on c673ca06b23cea94091ab496ef62c3513e434585 ensuring issue is reproducible on original commit a430d95c5efa2b545d26a094eb5f624e36732af0 testing commit a430d95c5efa2b545d26a094eb5f624e36732af0 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: d0fb6e49a8e39b539242baa5752637fca55630407533a27e7291a1495f873e44 run #0: crashed: KASAN: slab-out-of-bounds Read in smk_access run #1: crashed: KASAN: slab-out-of-bounds Read in smk_access run #2: crashed: KASAN: slab-use-after-free Read in smk_access run #3: crashed: KASAN: slab-use-after-free Read in smk_access run #4: crashed: KASAN: slab-use-after-free Read in smk_access run #5: crashed: KASAN: slab-use-after-free Read in smk_access run #6: crashed: KASAN: slab-out-of-bounds Read in smk_access run #7: crashed: KASAN: slab-use-after-free Read in smk_access run #8: crashed: KASAN: slab-out-of-bounds Read in smk_access run #9: crashed: KASAN: slab-out-of-bounds Read in smk_access run #10: crashed: KASAN: slab-use-after-free Read in smk_access run #11: crashed: KASAN: slab-out-of-bounds Read in smk_access run #12: crashed: KASAN: slab-use-after-free Read in smk_access run #13: crashed: KASAN: slab-out-of-bounds Read in smk_access run #14: crashed: KASAN: slab-use-after-free Read in smk_access run #15: crashed: KASAN: slab-use-after-free Read in smk_access run #16: crashed: KASAN: slab-use-after-free Read in smk_access run #17: crashed: KASAN: slab-out-of-bounds Read in smk_access run #18: crashed: KASAN: slab-out-of-bounds Read in smk_access run #19: crashed: KASAN: slab-use-after-free Read in smk_access representative crash: KASAN: slab-out-of-bounds Read in smk_access, types: [KASAN] check whether we can drop unnecessary instrumentation disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit a430d95c5efa2b545d26a094eb5f624e36732af0 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 948ca2d34898513f045d1579365d1727ae127c1481ec5652d8522b99eb047311 run #0: crashed: KASAN: slab-use-after-free Read in smk_access run #1: crashed: KASAN: slab-out-of-bounds Read in smk_access run #2: crashed: KASAN: slab-use-after-free Read in smk_access run #3: crashed: KASAN: slab-out-of-bounds Read in smk_access run #4: crashed: KASAN: slab-use-after-free Read in smk_access run #5: crashed: KASAN: slab-use-after-free Read in smk_access run #6: crashed: KASAN: slab-use-after-free Read in smk_access run #7: crashed: KASAN: slab-use-after-free Read in smk_access run #8: crashed: KASAN: slab-use-after-free Read in smk_access run #9: crashed: KASAN: slab-use-after-free Read in smk_access representative crash: KASAN: slab-use-after-free Read in smk_access, types: [KASAN] the bug reproduces without the instrumentation disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed kconfig minimization: base=4037 full=8147 leaves diff=2106 split chunks (needed=false): <2106> split chunk #0 of len 2106 into 5 parts testing without sub-chunk 1/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit a430d95c5efa2b545d26a094eb5f624e36732af0 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e138873d9ef49271b19533d9491ac647a18e3b3b94129ea0dbe97ab1d89cf199 run #0: crashed: KASAN: slab-use-after-free Read in smk_access run #1: crashed: KASAN: slab-out-of-bounds Read in smk_access run #2: crashed: KASAN: slab-out-of-bounds Read in smk_access run #3: crashed: KASAN: slab-use-after-free Read in smk_access run #4: crashed: KASAN: slab-use-after-free Read in smk_access run #5: crashed: KASAN: slab-use-after-free Read in smk_access run #6: crashed: KASAN: slab-use-after-free Read in smk_access run #7: crashed: KASAN: slab-use-after-free Read in smk_access run #8: crashed: KASAN: slab-out-of-bounds Read in smk_access run #9: crashed: KASAN: slab-out-of-bounds Read in smk_access representative crash: KASAN: slab-use-after-free Read in smk_access, types: [KASAN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit a430d95c5efa2b545d26a094eb5f624e36732af0 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: d0ed21c07cab6eafa0bae68ab12337ecd1cb4d791033e05abdfa4845ace5486d run #0: crashed: KASAN: slab-use-after-free Read in smk_access run #1: crashed: KASAN: slab-use-after-free Read in smk_access run #2: crashed: KASAN: slab-use-after-free Read in smk_access run #3: crashed: KASAN: slab-use-after-free Read in smk_access run #4: crashed: KASAN: slab-use-after-free Read in smk_access run #5: crashed: KASAN: slab-use-after-free Read in smk_access run #6: crashed: KASAN: slab-out-of-bounds Read in smk_access run #7: crashed: KASAN: slab-use-after-free Read in smk_access run #8: crashed: KASAN: slab-out-of-bounds Read in smk_access run #9: crashed: KASAN: slab-use-after-free Read in smk_access representative crash: KASAN: slab-use-after-free Read in smk_access, types: [KASAN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit a430d95c5efa2b545d26a094eb5f624e36732af0 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e9220575f702d37f33e0bbc78fd64dce559ce3c37717977c5ece4514138804ee all runs: OK false negative chance: 0.000 testing without sub-chunk 4/5 disabling configs for [LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit a430d95c5efa2b545d26a094eb5f624e36732af0 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 3feb17e37b73a7529367fcd97f978fb0b04ec3c032624828ce647da39844a785 run #0: crashed: general protection fault in smack_log_callback run #1: crashed: KASAN: slab-use-after-free Read in smk_access run #2: crashed: KASAN: slab-use-after-free Read in smk_access run #3: crashed: KASAN: slab-use-after-free Read in smk_access run #4: crashed: KASAN: slab-out-of-bounds Read in smk_access run #5: crashed: general protection fault in smack_log_callback run #6: crashed: KASAN: slab-out-of-bounds Read in smk_access run #7: crashed: KASAN: slab-use-after-free Read in smk_access run #8: crashed: KASAN: slab-use-after-free Read in smk_access run #9: crashed: KASAN: slab-use-after-free Read in smk_access representative crash: KASAN: slab-use-after-free Read in smk_access, types: [KASAN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit a430d95c5efa2b545d26a094eb5f624e36732af0 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 4cead2ae356db8bae3c648e82ab54548538ae29c53919092d401c882f206d1b8 run #0: crashed: KASAN: slab-use-after-free Read in smk_access run #1: crashed: KASAN: slab-use-after-free Read in smk_access run #2: crashed: general protection fault in smack_log_callback run #3: crashed: KASAN: slab-out-of-bounds Read in smk_access run #4: crashed: KASAN: slab-out-of-bounds Read in smk_access run #5: crashed: KASAN: slab-use-after-free Read in smk_access run #6: crashed: KASAN: slab-out-of-bounds Read in smk_access run #7: crashed: KASAN: slab-use-after-free Read in smk_access run #8: crashed: KASAN: slab-out-of-bounds Read in smk_access run #9: crashed: KASAN: slab-out-of-bounds Read in smk_access representative crash: KASAN: slab-use-after-free Read in smk_access, types: [KASAN] the chunk can be dropped minimized to 422 configs; suspects: [AX25 BRIDGE BRIDGE_NETFILTER CAN CFG80211 CHECKPOINT_RESTORE DVB_CORE FB_CORE HAMRADIO HID_NINTENDO HSR INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_USER_ACCESS INPUT_JOYSTICK INPUT_MOUSE IP6_NF_RAW IPV6_MULTIPLE_TABLES IP_NF_RAW IP_SET IP_VS IP_VS_PE_SIP IP_VS_PROTO_AH IP_VS_PROTO_AH_ESP IP_VS_PROTO_ESP IP_VS_PROTO_SCTP IP_VS_PROTO_UDP IP_VS_RR IP_VS_SED IP_VS_SH IP_VS_TWOS IP_VS_WLC IP_VS_WRR IRQ_BYPASS_MANAGER IRQ_POLL IR_IGORPLUGUSB IR_IGUANA IR_IMON IR_IMON_RAW IR_MCEUSB IR_REDRAT3 IR_STREAMZAP IR_TOY IR_TTUSBIR ISDN ISDN_CAPI JFFS2_CMODE_PRIORITY JFFS2_COMPRESSION_OPTIONS JFFS2_FS JFFS2_FS_POSIX_ACL JFFS2_FS_SECURITY JFFS2_FS_WRITEBUFFER JFFS2_FS_XATTR JFFS2_LZO JFFS2_RTIME JFFS2_RUBIN JFFS2_SUMMARY JFFS2_ZLIB JFS_DEBUG JFS_FS JFS_POSIX_ACL JFS_SECURITY JOYSTICK_IFORCE JOYSTICK_IFORCE_USB JOYSTICK_PXRC JOYSTICK_XPAD JOYSTICK_XPAD_FF JOYSTICK_XPAD_LEDS KARMA_PARTITION KCOV KCOV_ENABLE_COMPARISONS KCOV_INSTRUMENT_ALL KEYS_REQUEST_CACHE KEY_DH_OPERATIONS KEY_NOTIFICATIONS KSM KVM KVM_AMD KVM_ASYNC_PF KVM_COMMON KVM_COMPAT KVM_GENERIC_DIRTYLOG_READ_PROTECT KVM_GENERIC_HARDWARE_ENABLING KVM_GENERIC_MEMORY_ATTRIBUTES KVM_GENERIC_MMU_NOTIFIER KVM_GENERIC_PRE_FAULT_MEMORY KVM_GENERIC_PRIVATE_MEM KVM_HYPERV KVM_MMIO KVM_PRIVATE_MEM KVM_PROVE_MMU KVM_SW_PROTECTED_VM KVM_VFIO KVM_XEN KVM_XFER_TO_GUEST_WORK L2TP L2TP_ETH L2TP_IP L2TP_V3 LAPB LAPBETHER LDM_PARTITION LEGACY_PTYS LIBCRC32C LIBNVDIMM LINEAR_RANGES LLC LLC2 LOGIG940_FF LOGIRUMBLEPAD2_FF LOGO LOGO_LINUX_MONO LOGO_LINUX_VGA16 LPC_ICH LWTUNNEL LWTUNNEL_BPF LZ4HC_COMPRESS LZ4_COMPRESS MAC80211 MAC80211_HAS_RC MAC80211_HWSIM MAC80211_MESH MAC80211_RC_DEFAULT_MINSTREL MAC80211_RC_MINSTREL MACSEC MACVLAN MACVTAP MAC_PARTITION MAPPING_DIRTY_HELPERS MDIO_MVUSB MD_RAID0 MD_RAID1 MD_RAID10 MD_RAID456 MEDIA_ANALOG_TV_SUPPORT MEDIA_ATTACH MEDIA_CONTROLLER MEDIA_CONTROLLER_DVB MEDIA_DIGITAL_TV_SUPPORT MEDIA_RADIO_SUPPORT MEDIA_SDR_SUPPORT MEDIA_SUPPORT MEDIA_SUPPORT_FILTER MEDIA_TUNER MEDIA_TUNER_MSI001 MEMORY_BALLOON MEMORY_HOTPLUG MEMORY_HOTPLUG_DEFAULT_ONLINE MEMORY_ISOLATION MEMREGION MEMSTICK MEMSTICK_REALTEK_USB MEM_SOFT_DIRTY MFD_CORE MFD_SYSCON MHI_BUS MHI_WWAN_CTRL MHP_MEMMAP_ON_MEMORY MICROCHIP_PHY MINIX_FS MINIX_SUBPARTITION MISC_RTSX MISC_RTSX_USB MISDN MISDN_DSP MISDN_HFCUSB MISDN_L1OIP MKISS MLX4_CORE MLX4_INFINIBAND MMC MMC_REALTEK_USB MMC_USHC MMC_VUB300 MODULE_COMPRESS_NONE MODULE_SRCVERSION_ALL MODVERSIONS MOST MOST_USB_HDM MOUSE_APPLETOUCH MOUSE_BCM5974 MOUSE_PS2 MOUSE_PS2_ALPS MOUSE_PS2_BYD MOUSE_PS2_CYPRESS MOUSE_PS2_FOCALTECH MOUSE_PS2_LIFEBOOK MOUSE_PS2_LOGIPS2PP MOUSE_PS2_SMBUS MOUSE_PS2_SYNAPTICS MOUSE_PS2_SYNAPTICS_SMBUS MOUSE_PS2_TRACKPOINT MOUSE_SYNAPTICS_USB MPLS MPLS_IPTUNNEL MPLS_ROUTING MPTCP MPTCP_IPV6 MRP MTD MTD_BLKDEVS MTD_BLOCK MTD_BLOCK2MTD MTD_CFI_I1 MTD_CFI_I2 MTD_MAP_BANK_WIDTH_1 MTD_MAP_BANK_WIDTH_2 MTD_MAP_BANK_WIDTH_4 MTD_MTDRAM MTD_PHRAM MTD_SLRAM MUSB_PIO_ONLY ND_BTT ND_CLAIM ND_PFN NETDEVSIM NETFILTER_ADVANCED NETFILTER_BPF_LINK NETFILTER_FAMILY_ARP NETFILTER_FAMILY_BRIDGE NETFILTER_NETLINK_ACCT NETFILTER_NETLINK_GLUE_CT NETFILTER_NETLINK_OSF NETFILTER_NETLINK_QUEUE NETFILTER_SYNPROXY NETFILTER_XTABLES_COMPAT NETFILTER_XT_CONNMARK NETFILTER_XT_MATCH_BPF NETFILTER_XT_MATCH_CGROUP NETFILTER_XT_MATCH_CLUSTER NETFILTER_XT_MATCH_COMMENT NETFILTER_XT_MATCH_CONNBYTES NETFILTER_XT_MATCH_CONNLABEL NETFILTER_XT_MATCH_CONNLIMIT NETFILTER_XT_MATCH_CONNMARK NETFILTER_XT_MATCH_CPU NETFILTER_XT_MATCH_DCCP NETFILTER_XT_MATCH_DEVGROUP NETFILTER_XT_MATCH_DSCP NETFILTER_XT_MATCH_ECN NETFILTER_XT_MATCH_ESP NETFILTER_XT_MATCH_HASHLIMIT NETFILTER_XT_MATCH_HELPER NETFILTER_XT_MATCH_HL NETFILTER_XT_MATCH_IPCOMP NETFILTER_XT_MATCH_IPRANGE NETFILTER_XT_MATCH_IPVS NETFILTER_XT_MATCH_L2TP NETFILTER_XT_MATCH_LENGTH NETFILTER_XT_MATCH_LIMIT NETFILTER_XT_MATCH_MAC NETFILTER_XT_MATCH_MARK NETFILTER_XT_MATCH_MULTIPORT NETFILTER_XT_MATCH_NFACCT NETFILTER_XT_MATCH_OSF NETFILTER_XT_MATCH_OWNER NETFILTER_XT_MATCH_PHYSDEV NETFILTER_XT_MATCH_PKTTYPE NETFILTER_XT_MATCH_QUOTA NETFILTER_XT_MATCH_RATEEST NETFILTER_XT_MATCH_REALM NETFILTER_XT_MATCH_RECENT NETFILTER_XT_MATCH_SCTP NETFILTER_XT_MATCH_SOCKET NETFILTER_XT_MATCH_STATISTIC NETFILTER_XT_MATCH_STRING NETFILTER_XT_MATCH_TCPMSS NETFILTER_XT_MATCH_TIME NETFILTER_XT_MATCH_U32 NETFILTER_XT_SET NETFILTER_XT_TARGET_AUDIT NETFILTER_XT_TARGET_CHECKSUM NETFILTER_XT_TARGET_CLASSIFY NETFILTER_XT_TARGET_CONNMARK NETFILTER_XT_TARGET_CT NETFILTER_XT_TARGET_DSCP NETFILTER_XT_TARGET_HL NETFILTER_XT_TARGET_HMARK NETFILTER_XT_TARGET_IDLETIMER NETFILTER_XT_TARGET_LED NETFILTER_XT_TARGET_MARK NETFILTER_XT_TARGET_NETMAP NETFILTER_XT_TARGET_NFQUEUE NETFILTER_XT_TARGET_NOTRACK NETFILTER_XT_TARGET_RATEEST NETFILTER_XT_TARGET_REDIRECT NETFILTER_XT_TARGET_TCPOPTSTRIP NETFILTER_XT_TARGET_TEE NETFILTER_XT_TARGET_TPROXY NETFILTER_XT_TARGET_TRACE NETLINK_DIAG NETROM NET_9P_RDMA NET_ACT_BPF NET_ACT_CONNMARK NET_ACT_CSUM NET_ACT_CT NET_ACT_CTINFO NET_ACT_GATE NET_ACT_IFE NET_ACT_MPLS NET_ACT_NAT NET_ACT_PEDIT NET_ACT_POLICE NET_ACT_SAMPLE NET_ACT_SIMP NET_ACT_SKBEDIT NET_ACT_SKBMOD NET_ACT_TUNNEL_KEY NET_ACT_VLAN NET_CLS_BASIC NET_CLS_BPF NET_CLS_FLOW NET_CLS_FLOWER NET_CLS_FW NET_CLS_MATCHALL NET_CLS_ROUTE4 NET_DEVLINK NET_DEVMEM NET_DROP_MONITOR NET_DSA NET_DSA_TAG_BRCM NET_DSA_TAG_BRCM_COMMON NET_DSA_TAG_BRCM_PREPEND NET_DSA_TAG_MTK NET_DSA_TAG_QCA NET_DSA_TAG_RTL4_A NET_EMATCH_CANID NET_EMATCH_CMP NET_EMATCH_IPSET NET_EMATCH_IPT NET_EMATCH_META NET_EMATCH_NBYTE NET_EMATCH_TEXT NET_EMATCH_U32 NET_FC NET_FOU NET_FOU_IP_TUNNELS NET_IFE NET_IFE_SKBMARK NET_IFE_SKBPRIO NET_IFE_SKBTCINDEX NET_IPGRE NET_IPGRE_BROADCAST NET_IPGRE_DEMUX NET_IPIP NET_IPVTI NET_KEY NET_KEY_MIGRATE NET_L3_MASTER_DEV NET_MPLS_GSO NET_NCSI NET_NSH NET_REDIRECT NET_SCH_CAKE NET_SCH_CBS NET_SCH_CHOKE NET_SCH_CODEL NET_SCH_DRR NET_SCH_ETF NET_SCH_ETS NET_SCH_FQ NET_SCH_FQ_CODEL NET_SCH_FQ_PIE NET_SCH_GRED NET_SCH_HFSC NET_SCH_HHF NET_SCH_HTB NET_SCH_INGRESS NET_SCH_MQPRIO NET_SCH_MQPRIO_LIB NET_SCH_MULTIQ NET_SCH_NETEM NET_SCH_PIE NET_SCH_PLUG NET_SCH_PRIO NET_SCH_QFQ NET_SCH_RED NET_SCH_SFB NET_SCH_SFQ NET_SCH_SKBPRIO NET_SCH_TAPRIO NET_SCH_TBF NET_SCH_TEQL NET_SOCK_MSG NET_SWITCHDEV NET_TC_SKB_EXT NET_TEAM NET_TEAM_MODE_ACTIVEBACKUP NET_TEAM_MODE_BROADCAST NET_TEAM_MODE_LOADBALANCE NET_TEAM_MODE_RANDOM NET_TEAM_MODE_ROUNDROBIN NET_UDP_TUNNEL NET_VRF NFC NFC_DIGITAL NFC_FDP NFC_HCI NFC_MRVL NFC_MRVL_USB NFC_NCI NFC_NCI_UART NFC_PN533 NFC_PN533_USB NFC_PORT100 NFC_SHDLC NFC_SIM NFC_VIRTUAL_NCI NFSD NFSD_BLOCKLAYOUT NFSD_FLEXFILELAYOUT NFSD_PNFS NFSD_SCSILAYOUT NFSD_V3_ACL NFSD_V4 NFSD_V4_2_INTER_SSC NFSD_V4_SECURITY_LABEL NFS_FSCACHE NFS_V4_1 NFS_V4_2 NFS_V4_2_READ_PLUS NFS_V4_2_SSC_HELPER NFS_V4_SECURITY_LABEL NFT_BRIDGE_META NFT_BRIDGE_REJECT NFT_COMPAT NFT_CONNLIMIT NFT_CT NFT_DUP_IPV4 NFT_DUP_IPV6 NFT_DUP_NETDEV NFT_FIB NFT_FIB_INET NFT_FIB_IPV4 NFT_FIB_IPV6 NFT_FIB_NETDEV NFT_FLOW_OFFLOAD NFT_HASH NFT_LIMIT NFT_LOG NFT_MASQ NFT_NAT NFT_NUMGEN NFT_OSF NFT_QUEUE NFT_QUOTA NFT_REDIR NFT_REJECT NFT_REJECT_INET NFT_REJECT_IPV4 NFT_REJECT_IPV6 NFT_REJECT_NETDEV NFT_SOCKET NFT_SYNPROXY NFT_TPROXY NFT_TUNNEL NFT_XFRM NF_CONNTRACK_AMANDA NF_CONNTRACK_BRIDGE NF_CONNTRACK_BROADCAST NF_CONNTRACK_EVENTS NF_CONNTRACK_H323 NF_CONNTRACK_LABELS NF_CONNTRACK_MARK NF_CONNTRACK_NETBIOS_NS NF_CONNTRACK_OVS NF_CONNTRACK_PPTP NF_CONNTRACK_SANE NF_CONNTRACK_SNMP NF_CONNTRACK_TFTP NF_CONNTRACK_TIMEOUT NF_CONNTRACK_TIMESTAMP NF_CONNTRACK_ZONES NF_CT_NETLINK_HELPER NF_CT_NETLINK_TIMEOUT NF_CT_PROTO_DCCP NF_CT_PROTO_GRE NF_CT_PROTO_SCTP NF_CT_PROTO_UDPLITE NF_DUP_IPV4 NF_DUP_IPV6 NF_DUP_NETDEV NF_FLOW_TABLE NF_FLOW_TABLE_INET NF_NAT_AMANDA NF_NAT_H323 NF_NAT_OVS NF_NAT_PPTP NF_NAT_REDIRECT NF_NAT_SNMP_BASIC NF_NAT_TFTP NF_SOCKET_IPV4 NF_SOCKET_IPV6 NF_TABLES NF_TABLES_BRIDGE NF_TABLES_INET NF_TABLES_IPV4 NF_TABLES_IPV6 NF_TABLES_NETDEV NF_TPROXY_IPV4 NF_TPROXY_IPV6 NILFS2_FS NINTENDO_FF NLMON NLS_CODEPAGE_1250 NLS_CODEPAGE_1251 NLS_CODEPAGE_737 NLS_CODEPAGE_775 NLS_CODEPAGE_850 NLS_CODEPAGE_852 NLS_CODEPAGE_855 NLS_CODEPAGE_857 NLS_CODEPAGE_860 NLS_CODEPAGE_861 NLS_CODEPAGE_862 NLS_CODEPAGE_863 NLS_CODEPAGE_864 PAGE_POOL PARTITION_ADVANCED PSAMPLE RC_CORE RC_DEVICES RFKILL SPI USB_GADGET USB_MUSB_HDRC VIDEO_DEV WAN WATCH_QUEUE WIRELESS WLAN WWAN X25 X86_X32_ABI] disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed picked [v6.11 v6.10 v6.9 v6.7 v6.5 v6.3 v6.1 v5.19 v5.16 v5.13 v5.10 v5.7 v5.4 v5.1 v4.19] out of 34 release tags testing release v6.11 testing commit 98f7e32f20d28ec452afb208f9cffc08448a2652 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 5160813d2c2f684be6b15a115161835f4f2dacca3e427b16e17c7f2deec79a98 all runs: OK false negative chance: 0.000 # git bisect start a430d95c5efa2b545d26a094eb5f624e36732af0 98f7e32f20d28ec452afb208f9cffc08448a2652 Bisecting: 1286 revisions left to test after this (roughly 10 steps) [9f6b619edf2e85746f261b42ae8f818a59d126f7] net: support non paged skb frags testing commit 9f6b619edf2e85746f261b42ae8f818a59d126f7 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 8b01af8d99041876b29e546a812fb39b1c513c42d4304dda223b632d20ecb382 all runs: OK false negative chance: 0.000 # git bisect good 9f6b619edf2e85746f261b42ae8f818a59d126f7 Bisecting: 614 revisions left to test after this (roughly 9 steps) [02824a5fd11f99b4637668926a59aab3698b46a9] Merge tag 'pm-6.12-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/rafael/linux-pm testing commit 02824a5fd11f99b4637668926a59aab3698b46a9 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 0feb1541d4963cdd4eccf47e657578a59a1831189cc60793bc3a985c0f8436be all runs: OK false negative chance: 0.000 # git bisect good 02824a5fd11f99b4637668926a59aab3698b46a9 Bisecting: 352 revisions left to test after this (roughly 8 steps) [effdcd5275ed645f6e0f8e8ce690b97795722197] Merge tag 'affs-for-6.12-tag' of git://git.kernel.org/pub/scm/linux/kernel/git/kdave/linux testing commit effdcd5275ed645f6e0f8e8ce690b97795722197 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 0e26e9a3327eb5cf0327825364c3d5c1246133baa8555f23f00e230e1dafb2e8 all runs: OK false negative chance: 0.000 # git bisect good effdcd5275ed645f6e0f8e8ce690b97795722197 Bisecting: 189 revisions left to test after this (roughly 8 steps) [3a4d319a8fb5a9bbdf5b31ef32841eb286b1dcc2] Merge tag 'for-6.12/io_uring-20240913' of git://git.kernel.dk/linux testing commit 3a4d319a8fb5a9bbdf5b31ef32841eb286b1dcc2 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: fedd9cb5aeac0bb0acef08ff247faf53baaa6d36daa5d4365e7d911a3be08593 all runs: OK false negative chance: 0.000 # git bisect good 3a4d319a8fb5a9bbdf5b31ef32841eb286b1dcc2 Bisecting: 100 revisions left to test after this (roughly 7 steps) [68d20eb60efbdc80662efedeb088353e9c4aa17f] zram: Shrink zram_table_entry::flags. testing commit 68d20eb60efbdc80662efedeb088353e9c4aa17f gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: f4cc324091528e9c4136f15b972a8947e5812be6185b1f5d326306c4d9897d25 all runs: OK false negative chance: 0.000 # git bisect good 68d20eb60efbdc80662efedeb088353e9c4aa17f Bisecting: 51 revisions left to test after this (roughly 6 steps) [43a64bd02f9369be02c4c9312fc0965f78f65ad5] cifs: Remove redundant setting of NETFS_SREQ_HIT_EOF testing commit 43a64bd02f9369be02c4c9312fc0965f78f65ad5 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 4368aa4914e5494a56b6ae97e112fd5b7252cf34bfa2016991b88cb0f8768720 all runs: OK false negative chance: 0.000 # git bisect good 43a64bd02f9369be02c4c9312fc0965f78f65ad5 Bisecting: 25 revisions left to test after this (roughly 5 steps) [7c373e4f1445263728d3eeab7e33e932c8f4a288] fsverity: expose verified fsverity built-in signatures to LSMs testing commit 7c373e4f1445263728d3eeab7e33e932c8f4a288 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: f4f7ed2ae0d44845132839574d8cd2d93edc8e3f7e0a4d62a0b647ea3f0e2552 run #0: crashed: KASAN: slab-out-of-bounds Read in smk_access run #1: crashed: KASAN: slab-use-after-free Read in smk_access run #2: crashed: KASAN: slab-use-after-free Read in smk_access run #3: crashed: KASAN: slab-use-after-free Read in smk_access run #4: crashed: KASAN: slab-use-after-free Read in smk_access run #5: crashed: KASAN: slab-out-of-bounds Read in smk_access run #6: crashed: KASAN: slab-use-after-free Read in smk_access run #7: crashed: KASAN: slab-use-after-free Read in smk_access run #8: crashed: KASAN: slab-use-after-free Read in smk_access run #9: crashed: KASAN: slab-out-of-bounds Read in smk_access representative crash: KASAN: slab-out-of-bounds Read in smk_access, types: [KASAN] # git bisect bad 7c373e4f1445263728d3eeab7e33e932c8f4a288 Bisecting: 12 revisions left to test after this (roughly 4 steps) [54a88cd259204f80672393602501567c74d64106] ipe: add policy parser testing commit 54a88cd259204f80672393602501567c74d64106 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: f03bf45b68c35f13aeb1312e7d98124ca10d9e33e53eda83294d43e0c5cf6925 run #0: crashed: KASAN: slab-out-of-bounds Read in smk_access run #1: crashed: KASAN: slab-out-of-bounds Read in smk_access run #2: crashed: KASAN: slab-use-after-free Read in smk_access run #3: crashed: KASAN: slab-out-of-bounds Read in smk_access run #4: crashed: KASAN: slab-use-after-free Read in smk_access run #5: crashed: KASAN: slab-out-of-bounds Read in smk_access run #6: crashed: KASAN: slab-out-of-bounds Read in smk_access run #7: crashed: KASAN: slab-out-of-bounds Read in smk_access run #8: crashed: KASAN: slab-out-of-bounds Read in smk_access run #9: crashed: general protection fault in smack_log_callback representative crash: KASAN: slab-out-of-bounds Read in smk_access, types: [KASAN] # git bisect bad 54a88cd259204f80672393602501567c74d64106 Bisecting: 6 revisions left to test after this (roughly 3 steps) [61a1dcdceb44d79e5ab511295791b88ea178c045] lsm: infrastructure management of the perf_event security blob testing commit 61a1dcdceb44d79e5ab511295791b88ea178c045 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: fac10e80e3b27bb7652160064dad8041930425aa9497c2ced9d8c3d6c666ab1a run #0: crashed: KASAN: slab-use-after-free Read in smk_access run #1: crashed: KASAN: slab-use-after-free Read in smk_access run #2: crashed: KASAN: slab-out-of-bounds Read in smk_access run #3: crashed: KASAN: slab-out-of-bounds Read in smk_access run #4: crashed: KASAN: slab-out-of-bounds Read in smk_access run #5: crashed: KASAN: slab-use-after-free Read in smk_access run #6: crashed: KASAN: slab-use-after-free Read in smk_access run #7: crashed: KASAN: slab-out-of-bounds Read in smk_access run #8: crashed: KASAN: slab-use-after-free Read in smk_access run #9: crashed: KASAN: slab-use-after-free Read in smk_access representative crash: KASAN: slab-use-after-free Read in smk_access, types: [KASAN] # git bisect bad 61a1dcdceb44d79e5ab511295791b88ea178c045 Bisecting: 2 revisions left to test after this (roughly 2 steps) [09001284eebfc1b684e81d1db0f006787d35f3e1] lsm: add helper for blob allocations testing commit 09001284eebfc1b684e81d1db0f006787d35f3e1 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e1380305ef5bc5d1466f03be7df7aa03d004a51f05bc39a7f2e66ec30314c457 run #0: crashed: KASAN: slab-use-after-free Read in smk_access run #1: crashed: KASAN: slab-out-of-bounds Read in smk_access run #2: crashed: KASAN: slab-out-of-bounds Read in smk_access run #3: crashed: KASAN: slab-use-after-free Read in smk_access run #4: crashed: KASAN: slab-out-of-bounds Read in smk_access run #5: crashed: KASAN: slab-out-of-bounds Read in smk_access run #6: crashed: KASAN: slab-use-after-free Read in smk_access run #7: crashed: KASAN: slab-out-of-bounds Read in smk_access run #8: crashed: KASAN: slab-out-of-bounds Read in smk_access run #9: crashed: KASAN: slab-use-after-free Read in smk_access representative crash: KASAN: slab-use-after-free Read in smk_access, types: [KASAN] # git bisect bad 09001284eebfc1b684e81d1db0f006787d35f3e1 Bisecting: 0 revisions left to test after this (roughly 1 step) [5f8d28f6d7d568dbbc8c5bce94894474c07afd4f] lsm: infrastructure management of the key security blob testing commit 5f8d28f6d7d568dbbc8c5bce94894474c07afd4f gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 5f05b53523c670c7dbe33ffa59af6662119b4fdee321b4311791ed99d4445e4b run #0: crashed: KASAN: slab-use-after-free Read in smk_access run #1: crashed: KASAN: slab-out-of-bounds Read in smk_access run #2: crashed: KASAN: slab-out-of-bounds Read in smk_access run #3: crashed: KASAN: slab-use-after-free Read in smk_access run #4: crashed: KASAN: slab-use-after-free Read in smk_access run #5: crashed: KASAN: slab-out-of-bounds Read in smk_access run #6: crashed: KASAN: slab-use-after-free Read in smk_access run #7: crashed: KASAN: slab-out-of-bounds Read in smk_access run #8: crashed: KASAN: slab-use-after-free Read in smk_access run #9: crashed: KASAN: slab-use-after-free Read in smk_access representative crash: KASAN: slab-use-after-free Read in smk_access, types: [KASAN] # git bisect bad 5f8d28f6d7d568dbbc8c5bce94894474c07afd4f Bisecting: 0 revisions left to test after this (roughly 0 steps) [2aff9d20d50ac45dd13a013ef5231f4fb8912356] lsm: infrastructure management of the sock security testing commit 2aff9d20d50ac45dd13a013ef5231f4fb8912356 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 4461cd6ddb45268fcd9ab32889ab97170ca8094bcdc5ce595c6cc70206a54c4c all runs: OK false negative chance: 0.000 # git bisect good 2aff9d20d50ac45dd13a013ef5231f4fb8912356 5f8d28f6d7d568dbbc8c5bce94894474c07afd4f is the first bad commit commit 5f8d28f6d7d568dbbc8c5bce94894474c07afd4f Author: Casey Schaufler Date: Wed Jul 10 14:32:26 2024 -0700 lsm: infrastructure management of the key security blob Move management of the key->security blob out of the individual security modules and into the security infrastructure. Instead of allocating the blobs from within the modules the modules tell the infrastructure how much space is required, and the space is allocated there. There are no existing modules that require a key_free hook, so the call to it and the definition for it have been removed. Signed-off-by: Casey Schaufler Reviewed-by: John Johansen [PM: subject tweak] Signed-off-by: Paul Moore include/linux/lsm_hook_defs.h | 1 - include/linux/lsm_hooks.h | 1 + security/security.c | 39 +++++++++++++++++++++++++++++++++++++-- security/selinux/hooks.c | 21 ++++----------------- security/selinux/include/objsec.h | 7 +++++++ security/smack/smack.h | 7 +++++++ security/smack/smack_lsm.c | 31 +++++++++++++------------------ 7 files changed, 69 insertions(+), 38 deletions(-) accumulated error probability: 0.00 culprit signature: 5f05b53523c670c7dbe33ffa59af6662119b4fdee321b4311791ed99d4445e4b parent signature: 4461cd6ddb45268fcd9ab32889ab97170ca8094bcdc5ce595c6cc70206a54c4c revisions tested: 20, total time: 7h58m12.801718782s (build: 5h1m35.288961573s, test: 2h42m7.348163839s) first bad commit: 5f8d28f6d7d568dbbc8c5bce94894474c07afd4f lsm: infrastructure management of the key security blob recipients (to): ["casey@schaufler-ca.com" "john.johansen@canonical.com" "paul@paul-moore.com"] recipients (cc): [] crash: KASAN: slab-use-after-free Read in smk_access ================================================================== BUG: KASAN: slab-use-after-free in smk_access+0xab/0x3f0 security/smack/smack_access.c:147 Read of size 8 at addr ffff8881056c1b20 by task syz.0.15/4745 CPU: 0 UID: 60928 PID: 4745 Comm: syz.0.15 Not tainted 6.11.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call Trace: __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x231/0x330 lib/dump_stack.c:119 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 kasan_report+0x143/0x180 mm/kasan/report.c:601 smk_access+0xab/0x3f0 security/smack/smack_access.c:147 smack_watch_key+0x2ac/0x370 security/smack/smack_lsm.c:4656 security_watch_key+0x65/0x90 security/security.c:4359 keyctl_watch_key+0x2b7/0x480 security/keys/keyctl.c:1813 __do_sys_keyctl security/keys/keyctl.c:2021 [inline] __se_sys_keyctl+0x409/0xc10 security/keys/keyctl.c:1874 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x190 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f91164fdef9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f9115f7f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa RAX: ffffffffffffffda RBX: 00007f91166b5f80 RCX: 00007f91164fdef9 RDX: 0000000000000004 RSI: 000000002eb862bd RDI: 0000000000000020 RBP: 00007f9116570b76 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f91166b5f80 R15: 00007ffdd617dfa8 Allocated by task 4327: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:370 [inline] __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387 kasan_kmalloc include/linux/kasan.h:211 [inline] __do_kmalloc_node mm/slub.c:4158 [inline] __kmalloc_node_track_caller_noprof+0x1fb/0x460 mm/slub.c:4177 kstrdup+0x3a/0x80 mm/util.c:64 bprm_change_interp+0x82/0xc0 fs/exec.c:1637 load_script+0x6a4/0x820 fs/binfmt_script.c:125 search_binary_handler fs/exec.c:1821 [inline] exec_binprm fs/exec.c:1863 [inline] bprm_execve+0x769/0x1590 fs/exec.c:1914 do_execveat_common+0x55a/0x6f0 fs/exec.c:2021 do_execve fs/exec.c:2095 [inline] __do_sys_execve fs/exec.c:2171 [inline] __se_sys_execve fs/exec.c:2166 [inline] __x64_sys_execve+0x92/0xb0 fs/exec.c:2166 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x190 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 4327: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579 poison_slab_object+0xe0/0x150 mm/kasan/common.c:240 __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2252 [inline] slab_free mm/slub.c:4473 [inline] kfree+0x12f/0x310 mm/slub.c:4594 free_bprm+0x26e/0x2e0 fs/exec.c:1573 do_execveat_common+0x383/0x6f0 fs/exec.c:2023 do_execve fs/exec.c:2095 [inline] __do_sys_execve fs/exec.c:2171 [inline] __se_sys_execve fs/exec.c:2166 [inline] __x64_sys_execve+0x92/0xb0 fs/exec.c:2166 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x190 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f The buggy address belongs to the object at ffff8881056c1b20 which belongs to the cache kmalloc-8 of size 8 The buggy address is located 0 bytes inside of freed 8-byte region [ffff8881056c1b20, ffff8881056c1b28) The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056c1 anon flags: 0x200000000000000(node=0|zone=2) page_type: 0xfdffffff(slab) raw: 0200000000000000 ffff888100041500 0000000000000000 dead000000000001 raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 1, tgid 1 (swapper/0), ts 3684132729, free_ts 0 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x10f/0x130 mm/page_alloc.c:1493 prep_new_page mm/page_alloc.c:1501 [inline] get_page_from_freelist+0x37f4/0x3920 mm/page_alloc.c:3442 __alloc_pages_noprof+0x256/0x670 mm/page_alloc.c:4700 __alloc_pages_node_noprof include/linux/gfp.h:269 [inline] alloc_pages_node_noprof include/linux/gfp.h:296 [inline] alloc_slab_page+0x5f/0x120 mm/slub.c:2321 allocate_slab+0x5d/0x290 mm/slub.c:2484 new_slab mm/slub.c:2537 [inline] ___slab_alloc+0xa7f/0x11d0 mm/slub.c:3723 __slab_alloc mm/slub.c:3813 [inline] __slab_alloc_node mm/slub.c:3866 [inline] slab_alloc_node mm/slub.c:4025 [inline] __do_kmalloc_node mm/slub.c:4157 [inline] __kmalloc_noprof+0x25a/0x440 mm/slub.c:4170 kmalloc_noprof include/linux/slab.h:685 [inline] kzalloc_noprof include/linux/slab.h:807 [inline] acpi_ut_create_package_object+0x1d7/0x310 drivers/acpi/acpica/utobject.c:148 acpi_ut_copy_epackage_to_ipackage drivers/acpi/acpica/utcopy.c:554 [inline] acpi_ut_copy_eobject_to_iobject+0x3cb/0x9d0 drivers/acpi/acpica/utcopy.c:612 acpi_evaluate_object+0x4ba/0xaf0 drivers/acpi/acpica/nsxfeval.c:259 acpi_evaluate_dsm drivers/acpi/utils.c:798 [inline] acpi_check_dsm+0x294/0x870 drivers/acpi/utils.c:830 device_has_acpi_name drivers/pci/pci-label.c:44 [inline] smbios_attr_is_visible+0x9c/0x420 drivers/pci/pci-label.c:121 create_files fs/sysfs/group.c:65 [inline] internal_create_group+0x70f/0x1150 fs/sysfs/group.c:180 internal_create_groups fs/sysfs/group.c:220 [inline] sysfs_create_groups+0x56/0x120 fs/sysfs/group.c:246 bus_add_device+0x168/0x460 drivers/base/bus.c:493 device_add+0x59b/0xc00 drivers/base/core.c:3636 page_owner free stack trace missing Memory state around the buggy address: ffff8881056c1a00: fa fc fc fc 00 fc fc fc fa fc fc fc fa fc fc fc ffff8881056c1a80: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc >ffff8881056c1b00: 00 fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc ^ ffff8881056c1b80: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc ffff8881056c1c00: 06 fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc ==================================================================