ci2 starts bisection 2023-12-10 13:21:17.314966848 +0000 UTC m=+222434.420888198 bisecting fixing commit since 35361bdac25a867d60abc3c01ee11782a7e2b0ed building syzkaller on bf285f0cf1f7863e0b0d17980de703fab89476bb ensuring issue is reproducible on original commit 35361bdac25a867d60abc3c01ee11782a7e2b0ed testing commit 35361bdac25a867d60abc3c01ee11782a7e2b0ed gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: f0f9b8c89005ef7e2c851a8668d032ff69e41f7e0b755c35686b9adb85f0e7a7 run #0: crashed: KASAN: use-after-free Read in process_one_work run #1: crashed: KASAN: use-after-free Read in process_one_work run #2: crashed: KASAN: use-after-free Read in worker_thread run #3: crashed: KASAN: use-after-free Read in worker_thread run #4: crashed: KASAN: use-after-free Read in worker_thread run #5: crashed: KASAN: use-after-free Read in worker_thread run #6: crashed: KASAN: use-after-free Read in worker_thread run #7: crashed: KASAN: use-after-free Read in process_one_work run #8: crashed: KASAN: use-after-free Read in process_one_work run #9: crashed: KASAN: use-after-free Read in process_one_work run #10: crashed: KASAN: use-after-free Read in worker_thread run #11: crashed: KASAN: use-after-free Read in process_one_work run #12: crashed: KASAN: use-after-free Read in worker_thread run #13: crashed: KASAN: use-after-free Read in process_one_work run #14: crashed: KASAN: use-after-free Read in process_one_work run #15: crashed: KASAN: use-after-free Read in process_one_work run #16: crashed: KASAN: use-after-free Read in worker_thread run #17: crashed: KASAN: use-after-free Read in process_one_work run #18: crashed: KASAN: use-after-free Read in process_one_work run #19: crashed: KASAN: use-after-free Read in worker_thread representative crash: KASAN: use-after-free Read in process_one_work, types: [KASAN] check whether we can drop unnecessary instrumentation disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit 35361bdac25a867d60abc3c01ee11782a7e2b0ed gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 11a6384ab962ada1a0d2d55e2ff014ce2c5f79e88be35c1cc212c00d262f52d7 run #0: crashed: KASAN: use-after-free Read in process_one_work run #1: crashed: KASAN: use-after-free Read in worker_thread run #2: crashed: KASAN: use-after-free Read in process_one_work run #3: crashed: KASAN: use-after-free Read in process_one_work run #4: crashed: KASAN: use-after-free Read in process_one_work run #5: crashed: KASAN: use-after-free Read in process_one_work run #6: crashed: KASAN: use-after-free Read in process_one_work run #7: crashed: KASAN: use-after-free Read in process_one_work run #8: crashed: KASAN: use-after-free Read in worker_thread run #9: crashed: KASAN: use-after-free Read in process_one_work representative crash: KASAN: use-after-free Read in process_one_work, types: [KASAN] the bug reproduces without the instrumentation disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed kconfig minimization: base=5179 full=6485 leaves diff=250 split chunks (needed=false): <250> split chunk #0 of len 250 into 5 parts testing without sub-chunk 1/5 disabling configs for [LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit 35361bdac25a867d60abc3c01ee11782a7e2b0ed gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 8b4ab83fd66a1713ee9807c662b6c01bec7467fbdf2268f5e86ebac1ad408179 run #0: crashed: KASAN: use-after-free Read in process_one_work run #1: crashed: KASAN: use-after-free Read in process_one_work run #2: crashed: KASAN: use-after-free Read in worker_thread run #3: crashed: KASAN: use-after-free Read in worker_thread run #4: crashed: KASAN: use-after-free Read in worker_thread run #5: crashed: KASAN: use-after-free Read in worker_thread run #6: crashed: KASAN: use-after-free Read in worker_thread run #7: crashed: KASAN: use-after-free Read in worker_thread run #8: crashed: KASAN: use-after-free Read in worker_thread run #9: crashed: KASAN: use-after-free Read in process_one_work representative crash: KASAN: use-after-free Read in process_one_work, types: [KASAN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit 35361bdac25a867d60abc3c01ee11782a7e2b0ed gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 3790e0d9f1073960921613d8c548402df72a10287700fc5d19f5cdae3674603d run #0: crashed: KASAN: use-after-free Read in worker_thread run #1: crashed: KASAN: use-after-free Read in process_one_work run #2: crashed: KASAN: use-after-free Read in process_one_work run #3: crashed: KASAN: use-after-free Read in worker_thread run #4: crashed: KASAN: use-after-free Read in process_one_work run #5: crashed: KASAN: use-after-free Read in worker_thread run #6: crashed: KASAN: use-after-free Read in process_one_work run #7: crashed: KASAN: use-after-free Read in worker_thread run #8: crashed: KASAN: use-after-free Read in process_one_work run #9: crashed: KASAN: use-after-free Read in process_one_work representative crash: KASAN: use-after-free Read in worker_thread, types: [KASAN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit 35361bdac25a867d60abc3c01ee11782a7e2b0ed gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: ab8df0895437473a195eff004049b608250c4a5c67a26c42293f5a26ba3ae725 run #0: crashed: KASAN: use-after-free Read in worker_thread run #1: crashed: KASAN: use-after-free Read in worker_thread run #2: crashed: KASAN: use-after-free Read in worker_thread run #3: crashed: KASAN: use-after-free Read in worker_thread run #4: crashed: KASAN: use-after-free Read in process_one_work run #5: crashed: KASAN: use-after-free Read in worker_thread run #6: crashed: KASAN: use-after-free Read in worker_thread run #7: crashed: KASAN: use-after-free Read in worker_thread run #8: crashed: KASAN: use-after-free Read in process_one_work run #9: OK representative crash: KASAN: use-after-free Read in worker_thread, types: [KASAN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit 35361bdac25a867d60abc3c01ee11782a7e2b0ed gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: ef719ef38eacbc3756071dc5c248932540b09376f035f798a05903a3162e1ebd run #0: crashed: KASAN: use-after-free Read in process_one_work run #1: crashed: KASAN: use-after-free Read in worker_thread run #2: crashed: KASAN: use-after-free Read in process_one_work run #3: crashed: KASAN: use-after-free Read in process_one_work run #4: crashed: KASAN: use-after-free Read in process_one_work run #5: crashed: KASAN: use-after-free Read in process_one_work run #6: crashed: KASAN: use-after-free Read in worker_thread run #7: crashed: KASAN: use-after-free Read in worker_thread run #8: crashed: KASAN: use-after-free Read in process_one_work run #9: crashed: KASAN: use-after-free Read in worker_thread representative crash: KASAN: use-after-free Read in process_one_work, types: [KASAN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit 35361bdac25a867d60abc3c01ee11782a7e2b0ed gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 failed building 35361bdac25a867d60abc3c01ee11782a7e2b0ed: net/socket.c:1225: undefined reference to `wext_handle_ioctl' net/socket.c:3420: undefined reference to `compat_wext_handle_ioctl' net/core/net-procfs.c:329: undefined reference to `wext_proc_init' net/core/net-procfs.c:345: undefined reference to `wext_proc_exit' minimized to 50 configs; suspects: [HID_ZEROPLUS USB_NET_CDC_MBIM USB_NET_CDC_SUBSET USB_NET_CDC_SUBSET_ENABLE USB_NET_DM9601 USB_NET_GL620A USB_NET_MCS7830 USB_NET_NET1080 USB_NET_PLUSB USB_NET_RNDIS_HOST USB_NET_SMSC75XX USB_NET_SMSC95XX USB_NET_SR9700 USB_NET_SR9800 USB_NET_ZAURUS USB_OHCI_HCD USB_OHCI_HCD_PCI USB_OHCI_HCD_PLATFORM USB_OTG USB_OTG_FSM USB_PRINTER USB_SERIAL_GENERIC USB_SERIAL_PL2303 USB_STORAGE_ALAUDA USB_STORAGE_CYPRESS_ATACB USB_STORAGE_DATAFAB USB_STORAGE_FREECOM USB_STORAGE_ISD200 USB_STORAGE_JUMPSHOT USB_STORAGE_KARMA USB_STORAGE_ONETOUCH USB_STORAGE_SDDR09 USB_STORAGE_SDDR55 USB_STORAGE_USBAT USB_TRANCEVIBRATOR USB_U_AUDIO USB_U_ETHER USB_U_SERIAL USB_WDM WLAN WLAN_VENDOR_ATH WLAN_VENDOR_ATMEL WLAN_VENDOR_BROADCOM WLAN_VENDOR_INTERSIL WLAN_VENDOR_MARVELL WLAN_VENDOR_MEDIATEK WLAN_VENDOR_MICROCHIP WLAN_VENDOR_PURELIFI WLAN_VENDOR_RALINK WLAN_VENDOR_REALTEK WLAN_VENDOR_RSI WLAN_VENDOR_SILABS WLAN_VENDOR_ZYDAS X86_X32_ABI ZEROPLUS_FF] disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing current HEAD ddf142e5a817e3a260e5dedce0cd29db6fbaa010 testing commit ddf142e5a817e3a260e5dedce0cd29db6fbaa010 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 761f877881c553becba6408f1a3c4bac09af93f2addbf8a56ba9d9457b65222a run #0: crashed: KASAN: use-after-free Read in process_one_work run #1: crashed: KASAN: use-after-free Read in worker_thread run #2: crashed: KASAN: use-after-free Read in worker_thread run #3: crashed: KASAN: use-after-free Read in process_one_work run #4: crashed: KASAN: use-after-free Read in worker_thread run #5: crashed: KASAN: use-after-free Read in worker_thread run #6: crashed: KASAN: use-after-free Read in process_one_work run #7: crashed: KASAN: use-after-free Read in worker_thread run #8: crashed: KASAN: use-after-free Read in process_one_work run #9: crashed: KASAN: use-after-free Read in worker_thread representative crash: KASAN: use-after-free Read in process_one_work, types: [KASAN] crash still not fixed/happens on the oldest tested release revisions tested: 7, total time: 1h18m32.708754163s (build: 19m34.366713985s, test: 56m2.084362478s) crash still not fixed or there were kernel test errors commit msg: ANDROID: netlink: add netlink poll and hooks crash: KASAN: use-after-free Read in process_one_work ================================================================== BUG: KASAN: use-after-free in __list_del_entry_valid+0xa6/0x130 lib/list_debug.c:62 Read of size 8 at addr ffff8881121eccf0 by task kworker/0:5/403 CPU: 0 PID: 403 Comm: kworker/0:5 Not tainted 6.1.57-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 Workqueue: mld mld_dad_work Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x105/0x148 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:316 [inline] print_report+0x158/0x4e0 mm/kasan/report.c:427 kasan_report+0x13c/0x170 mm/kasan/report.c:531 __asan_report_load8_noabort+0x14/0x20 mm/kasan/report_generic.c:351 __list_del_entry_valid+0xa6/0x130 lib/list_debug.c:62 __list_del_entry include/linux/list.h:134 [inline] list_del_init include/linux/list.h:206 [inline] process_one_work+0x464/0xd00 kernel/workqueue.c:2243 worker_thread+0x892/0xf20 kernel/workqueue.c:2446 kthread+0x215/0x270 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 Allocated by task 299: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4b/0x70 mm/kasan/common.c:52 kasan_save_alloc_info+0x1f/0x30 mm/kasan/generic.c:505 ____kasan_kmalloc mm/kasan/common.c:379 [inline] __kasan_kmalloc+0x9c/0xb0 mm/kasan/common.c:388 kasan_kmalloc include/linux/kasan.h:212 [inline] __do_kmalloc_node mm/slab_common.c:957 [inline] __kmalloc_node+0xa9/0x180 mm/slab_common.c:964 kmalloc_node include/linux/slab.h:579 [inline] kvmalloc_node+0x1fc/0x550 mm/util.c:592 kvmalloc include/linux/slab.h:706 [inline] kvzalloc include/linux/slab.h:714 [inline] alloc_netdev_mqs+0x5f/0xe50 net/core/dev.c:10594 alloc_etherdev_mqs+0x22/0x30 net/ethernet/eth.c:394 usbnet_probe+0x1c4/0x24d0 drivers/net/usb/usbnet.c:1693 usb_probe_interface+0x466/0x8e0 drivers/usb/core/driver.c:396 really_probe+0x214/0x760 drivers/base/dd.c:639 __driver_probe_device+0x146/0x2b0 drivers/base/dd.c:808 driver_probe_device+0x4f/0x350 drivers/base/dd.c:838 __device_attach_driver+0x294/0x350 drivers/base/dd.c:966 bus_for_each_drv+0x152/0x1b0 drivers/base/bus.c:427 __device_attach+0x2bc/0x450 drivers/base/dd.c:1038 device_initial_probe+0xe/0x10 drivers/base/dd.c:1087 bus_probe_device+0x8d/0x190 drivers/base/bus.c:487 device_add+0x718/0xc20 drivers/base/core.c:3664 usb_set_configuration+0x158b/0x1b80 drivers/usb/core/message.c:2165 usb_generic_driver_probe+0x66/0x100 drivers/usb/core/generic.c:238 usb_probe_device+0xd2/0x1e0 drivers/usb/core/driver.c:293 really_probe+0x214/0x760 drivers/base/dd.c:639 __driver_probe_device+0x146/0x2b0 drivers/base/dd.c:808 driver_probe_device+0x4f/0x350 drivers/base/dd.c:838 __device_attach_driver+0x294/0x350 drivers/base/dd.c:966 bus_for_each_drv+0x152/0x1b0 drivers/base/bus.c:427 __device_attach+0x2bc/0x450 drivers/base/dd.c:1038 device_initial_probe+0xe/0x10 drivers/base/dd.c:1087 bus_probe_device+0x8d/0x190 drivers/base/bus.c:487 device_add+0x718/0xc20 drivers/base/core.c:3664 usb_new_device+0xdac/0x16d0 drivers/usb/core/hub.c:2590 hub_port_connect drivers/usb/core/hub.c:5482 [inline] hub_port_connect_change drivers/usb/core/hub.c:5622 [inline] port_event drivers/usb/core/hub.c:5782 [inline] hub_event+0x2211/0x3a10 drivers/usb/core/hub.c:5864 process_one_work+0x6de/0xd00 kernel/workqueue.c:2299 worker_thread+0x892/0xf20 kernel/workqueue.c:2446 kthread+0x215/0x270 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 Freed by task 299: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4b/0x70 mm/kasan/common.c:52 kasan_save_free_info+0x2b/0x40 mm/kasan/generic.c:516 ____kasan_slab_free+0x131/0x180 mm/kasan/common.c:241 __kasan_slab_free+0x11/0x20 mm/kasan/common.c:249 kasan_slab_free include/linux/kasan.h:178 [inline] slab_free_hook mm/slub.c:1745 [inline] slab_free_freelist_hook mm/slub.c:1771 [inline] slab_free mm/slub.c:3684 [inline] __kmem_cache_free+0x1fa/0x370 mm/slub.c:3697 kfree+0x7a/0xf0 mm/slab_common.c:1009 kvfree+0x20/0x30 mm/util.c:639 netdev_freemem+0x3a/0x50 net/core/dev.c:10548 netdev_release+0x64/0x90 net/core/net-sysfs.c:1906 device_release+0x91/0x140 kobject_cleanup lib/kobject.c:681 [inline] kobject_release lib/kobject.c:712 [inline] kref_put include/linux/kref.h:65 [inline] kobject_put+0xfc/0x140 lib/kobject.c:729 put_device+0xe/0x10 drivers/base/core.c:3772 free_netdev+0x2d4/0x390 net/core/dev.c:10741 usbnet_disconnect+0x207/0x350 drivers/net/usb/usbnet.c:1632 usb_unbind_interface+0x171/0x720 drivers/usb/core/driver.c:458 device_remove drivers/base/dd.c:550 [inline] __device_release_driver drivers/base/dd.c:1283 [inline] device_release_driver_internal+0x4a8/0x790 drivers/base/dd.c:1309 device_release_driver+0xd/0x10 drivers/base/dd.c:1332 bus_remove_device+0x229/0x300 drivers/base/bus.c:529 device_del+0x558/0xc00 drivers/base/core.c:3852 usb_disable_device+0x2b8/0x570 drivers/usb/core/message.c:1414 usb_disconnect+0x2b8/0x790 drivers/usb/core/hub.c:2253 hub_port_connect drivers/usb/core/hub.c:5321 [inline] hub_port_connect_change drivers/usb/core/hub.c:5622 [inline] port_event drivers/usb/core/hub.c:5782 [inline] hub_event+0x15de/0x3a10 drivers/usb/core/hub.c:5864 process_one_work+0x6de/0xd00 kernel/workqueue.c:2299 process_scheduled_works kernel/workqueue.c:2362 [inline] worker_thread+0xb8f/0xf20 kernel/workqueue.c:2448 kthread+0x215/0x270 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 Last potentially related work creation: kasan_save_stack+0x3b/0x60 mm/kasan/common.c:45 __kasan_record_aux_stack+0xb4/0xc0 mm/kasan/generic.c:486 kasan_record_aux_stack_noalloc+0xb/0x10 mm/kasan/generic.c:496 insert_work+0x4d/0x270 kernel/workqueue.c:1368 __queue_work+0x7a6/0x9f0 kernel/workqueue.c:1527 queue_work_on+0x11c/0x130 kernel/workqueue.c:1555 usbnet_link_change+0xca/0xe0 usbnet_probe+0x1a1a/0x24d0 drivers/net/usb/usbnet.c:1840 usb_probe_interface+0x466/0x8e0 drivers/usb/core/driver.c:396 really_probe+0x214/0x760 drivers/base/dd.c:639 __driver_probe_device+0x146/0x2b0 drivers/base/dd.c:808 driver_probe_device+0x4f/0x350 drivers/base/dd.c:838 __device_attach_driver+0x294/0x350 drivers/base/dd.c:966 bus_for_each_drv+0x152/0x1b0 drivers/base/bus.c:427 __device_attach+0x2bc/0x450 drivers/base/dd.c:1038 device_initial_probe+0xe/0x10 drivers/base/dd.c:1087 bus_probe_device+0x8d/0x190 drivers/base/bus.c:487 device_add+0x718/0xc20 drivers/base/core.c:3664 usb_set_configuration+0x158b/0x1b80 drivers/usb/core/message.c:2165 usb_generic_driver_probe+0x66/0x100 drivers/usb/core/generic.c:238 usb_probe_device+0xd2/0x1e0 drivers/usb/core/driver.c:293 really_probe+0x214/0x760 drivers/base/dd.c:639 __driver_probe_device+0x146/0x2b0 drivers/base/dd.c:808 driver_probe_device+0x4f/0x350 drivers/base/dd.c:838 __device_attach_driver+0x294/0x350 drivers/base/dd.c:966 bus_for_each_drv+0x152/0x1b0 drivers/base/bus.c:427 __device_attach+0x2bc/0x450 drivers/base/dd.c:1038 device_initial_probe+0xe/0x10 drivers/base/dd.c:1087 bus_probe_device+0x8d/0x190 drivers/base/bus.c:487 device_add+0x718/0xc20 drivers/base/core.c:3664 usb_new_device+0xdac/0x16d0 drivers/usb/core/hub.c:2590 hub_port_connect drivers/usb/core/hub.c:5482 [inline] hub_port_connect_change drivers/usb/core/hub.c:5622 [inline] port_event drivers/usb/core/hub.c:5782 [inline] hub_event+0x2211/0x3a10 drivers/usb/core/hub.c:5864 process_one_work+0x6de/0xd00 kernel/workqueue.c:2299 worker_thread+0x892/0xf20 kernel/workqueue.c:2446 kthread+0x215/0x270 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 The buggy address belongs to the object at ffff8881121ec000 which belongs to the cache kmalloc-4k of size 4096 The buggy address is located 3312 bytes inside of 4096-byte region [ffff8881121ec000, ffff8881121ed000) The buggy address belongs to the physical page: page:ffffea0004487a00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1121e8 head:ffffea0004487a00 order:3 compound_mapcount:0 compound_pincount:0 flags: 0x4000000000010200(slab|head|zone=1) raw: 4000000000010200 ffffea0004487400 dead000000000002 ffff888100043380 raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 112, tgid 112 (udevadm), ts 3988734166, free_ts 0 set_page_owner include/linux/page_owner.h:33 [inline] post_alloc_hook mm/page_alloc.c:2566 [inline] prep_new_page+0x512/0x5e0 mm/page_alloc.c:2573 get_page_from_freelist+0x288b/0x2910 mm/page_alloc.c:4397 __alloc_pages+0x39f/0x780 mm/page_alloc.c:5684 alloc_slab_page+0x6c/0xf0 allocate_slab mm/slub.c:1962 [inline] new_slab+0x7b/0x370 mm/slub.c:2015 ___slab_alloc+0x611/0x9a0 mm/slub.c:3203 __slab_alloc+0x52/0x90 mm/slub.c:3302 slab_alloc_node mm/slub.c:3387 [inline] __kmem_cache_alloc_node+0x1af/0x250 mm/slub.c:3460 kmalloc_trace+0x2a/0xa0 mm/slab_common.c:1047 kmalloc include/linux/slab.h:553 [inline] kzalloc include/linux/slab.h:689 [inline] kobject_uevent_env+0x1d9/0x4f0 lib/kobject_uevent.c:524 kobject_synth_uevent+0x76e/0x900 lib/kobject_uevent.c:208 uevent_store+0x1a/0x50 drivers/base/core.c:2656 dev_attr_store+0x52/0x70 drivers/base/core.c:2358 sysfs_kf_write+0x101/0x120 fs/sysfs/file.c:136 kernfs_fop_write_iter+0x288/0x380 fs/kernfs/file.c:330 call_write_iter include/linux/fs.h:2215 [inline] new_sync_write fs/read_write.c:491 [inline] vfs_write+0xa13/0xd40 fs/read_write.c:584 page_owner free stack trace missing Memory state around the buggy address: ffff8881121ecb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8881121ecc00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff8881121ecc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff8881121ecd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8881121ecd80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ================================================================== usb 2-1: new high-speed USB device number 3 using dummy_hcd usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 usb 2-1: Product: syz usb 2-1: Manufacturer: syz usb 2-1: SerialNumber: syz cdc_ncm 2-1:1.0: MAC-Address: 42:42:42:42:42:42 cdc_ncm 2-1:1.0: dwNtbInMaxSize=16 is too small. Using 2048 cdc_ncm 2-1:1.0: setting rx_max = 2048 cdc_ncm 2-1:1.0: setting tx_max = 88 cdc_ncm 2-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.1-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 usb 2-1: USB disconnect, device number 3 cdc_ncm 2-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.1-1, CDC NCM (NO ZLP)