ci starts bisection 2024-04-17 04:48:32.784525909 +0000 UTC m=+30480.152566548 bisecting cause commit starting from 9ed46da14b9b9b2ad4edb3b0c545b6dbe5c00d39 building syzkaller on c8349e48534ea6d8f01515335d95de8ebf5da8df fetch other tags and check if the commit is present ensuring issue is reproducible on original commit 9ed46da14b9b9b2ad4edb3b0c545b6dbe5c00d39 testing commit 9ed46da14b9b9b2ad4edb3b0c545b6dbe5c00d39 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 37699b6c63597e8ca92651387b2812d1ad3bc53e78abfe4771ed2b64a3179061 run #0: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #1: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #2: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #3: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #4: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #5: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #6: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #7: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #8: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #9: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #10: crashed: KASAN: slab-use-after-free Read in __vma_reservation_common run #11: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #12: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #13: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #14: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #15: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #16: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #17: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #18: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #19: crashed: KASAN: slab-use-after-free Read in hugetlb_fault representative crash: KASAN: slab-use-after-free Read in hugetlb_fault, types: [KASAN] check whether we can drop unnecessary instrumentation disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit 9ed46da14b9b9b2ad4edb3b0c545b6dbe5c00d39 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e2b3319b41c47588254f3f7bd0f129d378da9e0087c600b45bbeb8c1e6528c61 all runs: crashed: KASAN: slab-use-after-free Read in hugetlb_fault representative crash: KASAN: slab-use-after-free Read in hugetlb_fault, types: [KASAN] the bug reproduces without the instrumentation disabling configs for [LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG], they are not needed kconfig minimization: base=3976 full=8021 leaves diff=2013 split chunks (needed=false): <2013> split chunk #0 of len 2013 into 5 parts testing without sub-chunk 1/5 disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit 9ed46da14b9b9b2ad4edb3b0c545b6dbe5c00d39 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: c30f4ca81809ba0286ea3e0b051b7e038d22ba3aba9919b32b9b827700a11bac all runs: crashed: KASAN: slab-use-after-free Read in hugetlb_fault representative crash: KASAN: slab-use-after-free Read in hugetlb_fault, types: [KASAN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit 9ed46da14b9b9b2ad4edb3b0c545b6dbe5c00d39 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 45e6882127c119290e185901e2c169978bda6ebddaed2431974c274c882e8e98 all runs: crashed: KASAN: slab-use-after-free Read in hugetlb_fault representative crash: KASAN: slab-use-after-free Read in hugetlb_fault, types: [KASAN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit 9ed46da14b9b9b2ad4edb3b0c545b6dbe5c00d39 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 769afe00d1a04bc6202a041bbced1919ad2382121c4a4b5681f5de46fc95507e all runs: crashed: KASAN: slab-use-after-free Read in hugetlb_fault representative crash: KASAN: slab-use-after-free Read in hugetlb_fault, types: [KASAN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG LOCKDEP], they are not needed testing commit 9ed46da14b9b9b2ad4edb3b0c545b6dbe5c00d39 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: fdb7602d328ba6074612e9803a9145a92a766317e9d1505fe0944e27e50b46f4 all runs: OK false negative chance: 0.000 testing without sub-chunk 5/5 disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit 9ed46da14b9b9b2ad4edb3b0c545b6dbe5c00d39 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 78fa82a8899e60879167f65466f0e93725f773445ed849fecd05b943c7012090 run #0: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #1: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #2: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #3: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #4: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #5: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #6: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #7: OK run #8: OK run #9: OK representative crash: KASAN: slab-use-after-free Read in hugetlb_fault, types: [KASAN] the chunk can be dropped minimized to 403 configs; suspects: [AF_RXRPC ARCH_ENABLE_MEMORY_HOTREMOVE ATM AX25 CFG80211 CMA DAX DLM DVB_CORE ENCRYPTED_KEYS EXTCON GENEVE GPIOLIB HAMRADIO HAVE_CLK HID_SENSOR_HUB HID_SMARTJOYPLUS HID_THRUSTMASTER IIO INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_IPOIB INFINIBAND_USER_ACCESS INFINIBAND_VIRT_DMA INPUT_TABLET INPUT_TOUCHSCREEN IP_SCTP L2TP LIBNVDIMM MEDIA_COMMON_OPTIONS MEDIA_DIGITAL_TV_SUPPORT MEDIA_RADIO_SUPPORT MEDIA_SDR_SUPPORT MEDIA_SUPPORT MEDIA_USB_SUPPORT MEMORY_HOTPLUG MEMORY_HOTREMOVE MFD_DLN2 MFD_RETU MMC MTD MTD_UBI NETFILTER_CONNCOUNT NET_IPGRE NET_IPGRE_DEMUX NFS_V4_1 NF_NAT_TFTP NF_SOCKET_IPV4 NF_SOCKET_IPV6 NF_TPROXY_IPV4 NF_TPROXY_IPV6 NILFS2_FS NLMON NLS_CODEPAGE_1250 NLS_CODEPAGE_1251 NLS_CODEPAGE_737 NLS_CODEPAGE_775 NLS_CODEPAGE_850 NLS_CODEPAGE_852 NLS_CODEPAGE_855 NLS_CODEPAGE_857 NLS_CODEPAGE_860 NLS_CODEPAGE_861 NLS_CODEPAGE_862 NLS_CODEPAGE_863 NLS_CODEPAGE_864 NLS_CODEPAGE_865 NLS_CODEPAGE_866 NLS_CODEPAGE_869 NLS_CODEPAGE_874 NLS_CODEPAGE_932 NLS_CODEPAGE_936 NLS_CODEPAGE_949 NLS_CODEPAGE_950 NLS_ISO8859_13 NLS_ISO8859_14 NLS_ISO8859_15 NLS_ISO8859_2 NLS_ISO8859_3 NLS_ISO8859_4 NLS_ISO8859_5 NLS_ISO8859_6 NLS_ISO8859_7 NLS_ISO8859_8 NLS_ISO8859_9 NLS_KOI8_R NLS_KOI8_U NLS_MAC_CELTIC NLS_MAC_CENTEURO NLS_MAC_CROATIAN NLS_MAC_CYRILLIC NLS_MAC_GAELIC NLS_MAC_GREEK NLS_MAC_ICELAND NLS_MAC_INUIT NLS_MAC_ROMAN NLS_MAC_ROMANIAN NLS_MAC_TURKISH NLS_UCS2_UTILS NOP_USB_XCEIV NOZOMI NTFS3_FS NTFS3_FS_POSIX_ACL NTFS3_LZX_XPRESS NULL_TTY NUMA_BALANCING NUMA_BALANCING_DEFAULT_ENABLED NUMA_EMU NUMA_KEEP_MEMINFO NVDIMM_DAX NVDIMM_KEYS NVDIMM_PFN NVME_CORE NVME_FABRICS NVME_FC NVME_MULTIPATH NVME_RDMA NVME_TARGET NVME_TARGET_FC NVME_TARGET_FCLOOP NVME_TARGET_LOOP NVME_TARGET_RDMA NVME_TARGET_TCP NVME_TCP N_GSM N_HDLC OCFS2_DEBUG_FS OCFS2_FS OCFS2_FS_O2CB OCFS2_FS_STATS OCFS2_FS_USERSPACE_CLUSTER OF_GPIO OF_PMEM OMFS_FS OPENVSWITCH OPENVSWITCH_GENEVE OPENVSWITCH_GRE OPENVSWITCH_VXLAN ORANGEFS_FS OSF_PARTITION OVERLAY_FS OVERLAY_FS_DEBUG OVERLAY_FS_INDEX OVERLAY_FS_REDIRECT_ALWAYS_FOLLOW OVERLAY_FS_REDIRECT_DIR PACKET_DIAG PAGE_IDLE_FLAG PAGE_POOL PAGE_REPORTING PAHOLE_HAS_BTF_TAG PAHOLE_HAS_LANG_EXCLUDE PAHOLE_HAS_SPLIT_BTF PARPORT PARPORT_NOT_PC PARTITION_ADVANCED PCCARD PCCARD_NONSTATIC PCIEAER PCI_ENDPOINT PCI_IOV PCMCIA PCMCIA_LOAD_CIS PERCPU_STATS PERSISTENT_KEYRINGS PHONET PHYLINK PHY_CPCAP_USB PHY_QCOM_USB_HS PHY_QCOM_USB_HSIC PHY_SAMSUNG_USB2 PHY_TUSB1210 PKCS7_TEST_KEY PKCS8_PRIVATE_KEY_PARSER PM_CLK PNFS_BLOCK PNFS_FILE_LAYOUT PNFS_FLEXFILE_LAYOUT PPP PPPOATM PPPOE PPPOE_HASH_BITS_4 PPPOL2TP PPP_ASYNC PPP_BSDCOMP PPP_DEFLATE PPP_FILTER PPP_MPPE PPP_MULTILINK PPP_SYNC_TTY PPTP PREEMPT PREEMPT_NOTIFIERS PROC_CHILDREN PSI PSTORE PSTORE_COMPRESS QCOM_QMI_HELPERS QNX4FS_FS QNX6FS_FS QRTR QRTR_TUN R8712U RADIO_ADAPTERS RADIO_SHARK RADIO_SHARK2 RADIO_TEA575X RAID6_PQ RAID_ATTRS RC_ATI_REMOTE RC_CORE RC_DEVICES RDMA_RXE RDMA_SIW RDS RDS_RDMA RDS_TCP READ_ONLY_THP_FOR_FS REALTEK_AUTOPM REED_SOLOMON REED_SOLOMON_DEC8 REGMAP REGMAP_I2C REGMAP_IRQ REGMAP_MMIO REGMAP_SPI REGULATOR REGULATOR_TWL4030 REISERFS_FS REISERFS_FS_POSIX_ACL REISERFS_FS_SECURITY REISERFS_FS_XATTR REISERFS_PROC_INFO RESET_CONTROLLER RFKILL RFKILL_INPUT RFKILL_LEDS RMI4_2D_SENSOR RMI4_CORE RMI4_F03 RMI4_F03_SERIO RMI4_F11 RMI4_F12 RMI4_F30 ROMFS_BACKED_BY_BOTH ROMFS_FS ROMFS_ON_BLOCK ROMFS_ON_MTD ROSE RTC_DRV_HID_SENSOR_TIME RXKAD SCHED_CORE SCREEN_INFO SCSI_FC_ATTRS SCSI_HPSA SCSI_ISCSI_ATTRS SCSI_LOGGING SCSI_NETLINK SCSI_SAS_ATA SCSI_SAS_ATTRS SCSI_SAS_LIBSAS SCSI_SCAN_ASYNC SCSI_SRP_ATTRS SCTP_COOKIE_HMAC_MD5 SCTP_COOKIE_HMAC_SHA1 SCTP_DEFAULT_COOKIE_HMAC_MD5 SECONDARY_TRUSTED_KEYRING SECURITY_INFINIBAND SECURITY_NETWORK_XFRM SERIAL_DEV_BUS SERIAL_DEV_CTRL_TTYPORT SERIAL_MCTRL_GPIO SGI_PARTITION SIGNATURE SIGNED_PE_FILE_VERIFICATION SKB_DECRYPTED SLHC SLIP SLIP_COMPRESSED SLIP_MODE_SLIP6 SLIP_SMART SMARTJOYPLUS_FF SMBFS SMC SMC_DIAG SMSC_PHY SMS_SIANO_MDTV SMS_SIANO_RC SMS_USB_DRV SND SND_ALOOP SND_BCD2000 SND_CTL_FAST_LOOKUP SND_CTL_LED SND_DEBUG SND_DMA_SGBUF SND_DRIVERS SND_DUMMY SND_DYNAMIC_MINORS SND_HDA SND_HDA_CODEC_ANALOG SND_HDA_CODEC_CA0110 SND_HDA_CODEC_CA0132 SND_HDA_CODEC_CIRRUS SND_HDA_CODEC_CMEDIA SND_HDA_CODEC_CONEXANT SND_HDA_CODEC_HDMI SND_HDA_CODEC_REALTEK SND_HDA_CODEC_SI3054 SND_HDA_CODEC_SIGMATEL SND_HDA_CODEC_VIA SND_HDA_COMPONENT SND_HDA_CORE SND_HDA_GENERIC SND_HDA_GENERIC_LEDS SND_HDA_HWDEP SND_HDA_I915 SND_HDA_INPUT_BEEP SND_HDA_INTEL SND_HDA_PATCH_LOADER SND_HDA_RECONFIG SND_HDA_SCODEC_COMPONENT SND_HRTIMER SND_HWDEP SND_INTEL_DSP_CONFIG SND_INTEL_NHLT SND_INTEL_SOUNDWIRE_ACPI SND_JACK SND_JACK_INPUT_DEV SND_MIXER_OSS SND_OSSEMUL SND_PCI SND_PCM SND_PCMCIA SND_PCM_OSS SND_PCM_OSS_PLUGINS SND_PCM_TIMER SND_PCM_XRUN_DEBUG SND_PROC_FS SND_RAWMIDI SND_SEQUENCER SND_SEQUENCER_OSS SND_SEQ_DEVICE SND_SEQ_DUMMY SND_SEQ_HRTIMER_DEFAULT SND_SEQ_MIDI SND_SEQ_MIDI_EVENT SND_SEQ_VIRMIDI SND_SOC SND_SOC_I2C_AND_SPI SND_SUPPORT_OLD_API SND_TIMER SND_USB SND_USB_6FIRE SND_USB_AUDIO SND_USB_AUDIO_USE_MEDIA_CONTROLLER SND_USB_CAIAQ SND_USB_CAIAQ_INPUT SND_USB_HIFACE SND_USB_LINE6 SND_USB_POD SND_USB_PODHD SND_USB_TONEPORT SND_USB_UA101 SND_USB_US122L SND_USB_USX2Y SND_USB_VARIAX SND_VERBOSE_PROCFS SND_VIRMIDI SND_VIRTIO SND_VMASTER SND_X86 SOCK_VALIDATE_XMIT SOLARIS_X86_PARTITION SONY_FF SOUND SOUNDWIRE SOUND_OSS_CORE SOUND_OSS_CORE_PRECLAIM SPI SPI_DLN2 SPI_DYNAMIC SPI_MASTER SQUASHFS SQUASHFS_4K_DEVBLK_SIZE SQUASHFS_COMPILE_DECOMP_SINGLE SQUASHFS_DECOMP_SINGLE SQUASHFS_FILE_DIRECT SQUASHFS_LZ4 SQUASHFS_LZO SQUASHFS_XATTR SQUASHFS_XZ SQUASHFS_ZLIB SQUASHFS_ZSTD SSB SSB_PCIHOST_POSSIBLE SSB_PCMCIAHOST_POSSIBLE SSB_SDIOHOST_POSSIBLE STAGING STP STREAM_PARSER SUNRPC_BACKCHANNEL SUN_PARTITION SW_SYNC SYSFB SYSV68_PARTITION SYSV_FS TABLET_USB_ACECAD TABLET_USB_AIPTEK TABLET_USB_HANWANG TABLET_USB_KBTAB TABLET_USB_PEGASUS TAHVO_USB TAHVO_USB_HOST_BY_DEFAULT TASKS_TRACE_RCU TCG_CRB TCG_TIS TCG_TIS_CORE TCG_TPM TCP_CONG_BBR TCP_CONG_BIC TCP_CONG_CDG TCP_CONG_DCTCP TCP_CONG_HSTCP TCP_CONG_HTCP TCP_CONG_HYBLA TCP_CONG_ILLINOIS TCP_CONG_LP TCP_CONG_NV TCP_CONG_SCALABLE TCP_CONG_VEGAS TCP_CONG_VENO TCP_CONG_WESTWOOD TCP_CONG_YEAH TEXTSEARCH TEXTSEARCH_BM TEXTSEARCH_FSM TEXTSEARCH_KMP THERMAL_NETLINK THP_SWAP THRUSTMASTER_FF TIPC TIPC_CRYPTO TIPC_DIAG TIPC_MEDIA_IB TIPC_MEDIA_UDP TLS TLS_TOE TMPFS_QUOTA TOUCHSCREEN_SUR40 TOUCHSCREEN_USB_3M TOUCHSCREEN_USB_COMPOSITE TOUCHSCREEN_USB_DMC_TSC10 TOUCHSCREEN_USB_E2I TOUCHSCREEN_USB_EASYTOUCH TOUCHSCREEN_USB_EGALAX TOUCHSCREEN_USB_ELO TOUCHSCREEN_USB_ETT_TC45USB TOUCHSCREEN_USB_ETURBO TOUCHSCREEN_USB_GENERAL_TOUCH TOUCHSCREEN_USB_GOTOP TOUCHSCREEN_USB_GUNZE TOUCHSCREEN_USB_IDEALTEK TOUCHSCREEN_USB_IRTOUCH TOUCHSCREEN_USB_ITM TOUCHSCREEN_USB_JASTEC TOUCHSCREEN_USB_NEXIO TOUCHSCREEN_USB_PANJIT TOUCHSCREEN_USB_ZYTRONIC TRANSPARENT_HUGEPAGE TRANSPARENT_HUGEPAGE_MADVISE TTPCI_EEPROM TTY_PRINTK TUN_VNET_CROSS_LE TWL4030_CORE TYPEC TYPEC_FUSB302 TYPEC_TCPCI TYPEC_TCPM TYPEC_TPS6598X TYPEC_UCSI UBIFS_ATIME_SUPPORT UBIFS_FS UBIFS_FS_ADVANCED_COMPR UBIFS_FS_LZO UBIFS_FS_SECURITY UBIFS_FS_XATTR UBIFS_FS_ZLIB UBIFS_FS_ZSTD UCSI_ACPI UDF_FS UDMABUF UFS_FS UFS_FS_WRITE UHID ULTRIX_PARTITION UNICODE UNIXWARE_DISKLABEL UNIX_DIAG USB4 USB4_NET USBIP_CORE USBIP_HOST USBIP_VHCI_HCD USBIP_VUDC USBPCWATCHDOG USB_ACM USB_ADUTUX USB_AIRSPY USB_ALI_M5632 USB_AN2720 USB_APPLEDISPLAY USB_ARMLINUX USB_BDC_UDC USB_BELKIN USB_C67X00_HCD USB_CATC USB_CDC_PHONET USB_CHAOSKEY USB_CHIPIDEA USB_CHIPIDEA_HOST USB_CHIPIDEA_PCI USB_CHIPIDEA_UDC USB_CONFIGFS USB_CONFIGFS_ACM USB_CONFIGFS_ECM USB_DWC2 USB_GADGET USB_MUSB_HDRC USB_NET_CDC_SUBSET USB_ROLE_SWITCH USB_STORAGE_REALTEK USB_ULPI_BUS USB_USBNET VIDEO_DEV VXLAN WIRELESS WLAN ZONE_DEVICE] disabling configs for [LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG], they are not needed picked [v6.8 v6.7 v6.6 v6.4 v6.2 v6.0 v5.18 v5.16 v5.13 v5.10 v5.7 v5.4 v5.1 v4.19] out of 31 release tags testing release v6.8 testing commit e8f897f4afef0031fe618a8e94127a0934896aba gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: cfb097ea555b320b0d374643e3f4ee1bdc518f37a28b18de9c663331bb312bfa all runs: OK false negative chance: 0.000 # git bisect start 9ed46da14b9b9b2ad4edb3b0c545b6dbe5c00d39 e8f897f4afef0031fe618a8e94127a0934896aba Bisecting: 10085 revisions left to test after this (roughly 13 steps) [c442a42363b2ce5c3eb2b0ff1e052ee956f0a29f] Merge tag '9p-for-6.9' of git://git.kernel.org/pub/scm/linux/kernel/git/ericvh/v9fs testing commit c442a42363b2ce5c3eb2b0ff1e052ee956f0a29f gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 7b6228549bfcba7f27ab4ff4a079fe547b29ff55c5eaf4742e3d15b67d15e6ad run #0: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #1: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #2: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #3: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #4: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #5: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #6: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #7: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #8: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #9: OK representative crash: KASAN: slab-use-after-free Read in hugetlb_fault, types: [KASAN] # git bisect bad c442a42363b2ce5c3eb2b0ff1e052ee956f0a29f Bisecting: 4789 revisions left to test after this (roughly 12 steps) [9187210eee7d87eea37b45ea93454a88681894a4] Merge tag 'net-next-6.9' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next testing commit 9187210eee7d87eea37b45ea93454a88681894a4 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 14a523ca79c3f065a132bcb16a2ad5b7730b868af3e4b2431e049c1da9097f79 all runs: OK false negative chance: 0.000 # git bisect good 9187210eee7d87eea37b45ea93454a88681894a4 Bisecting: 1918 revisions left to test after this (roughly 11 steps) [480e035fc4c714fb5536e64ab9db04fedc89e910] Merge tag 'drm-next-2024-03-13' of https://gitlab.freedesktop.org/drm/kernel testing commit 480e035fc4c714fb5536e64ab9db04fedc89e910 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 565d23c6afaae9938b3d2f77d4266818732e4d6208d5a7bcf32cdf5627dfd017 all runs: OK false negative chance: 0.000 # git bisect good 480e035fc4c714fb5536e64ab9db04fedc89e910 Bisecting: 903 revisions left to test after this (roughly 10 steps) [6d75c6f40a03c97e1ecd683ae54e249abb9d922b] Merge tag 'arm64-upstream' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux testing commit 6d75c6f40a03c97e1ecd683ae54e249abb9d922b gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: cb1e9001e6258e72c58c1db9aea4e9fb5725d5501dfc9ee91eda7f2dc2e10985 all runs: OK false negative chance: 0.000 # git bisect good 6d75c6f40a03c97e1ecd683ae54e249abb9d922b Bisecting: 467 revisions left to test after this (roughly 9 steps) [270700dd06ca41a4779c19eb46608f076bb7d40e] mm/zswap: remove the memcpy if acomp is not sleepable testing commit 270700dd06ca41a4779c19eb46608f076bb7d40e gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e0bc0243f151a6bbc83c46366c6fe544a099e6eb52bfc5b8d62667c7c0242e11 run #0: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #1: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #2: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #3: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #4: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #5: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #6: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #7: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #8: OK run #9: OK representative crash: KASAN: slab-use-after-free Read in hugetlb_fault, types: [KASAN] # git bisect bad 270700dd06ca41a4779c19eb46608f076bb7d40e Bisecting: 217 revisions left to test after this (roughly 8 steps) [562ce8285b5da3f0d2087341f262c0c728d43f31] virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal testing commit 562ce8285b5da3f0d2087341f262c0c728d43f31 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 7a2b281f24da5dae58507385d209ee24c9d981f4846cfdff68bc0d71a69ba4f1 all runs: OK false negative chance: 0.000 # git bisect good 562ce8285b5da3f0d2087341f262c0c728d43f31 Bisecting: 108 revisions left to test after this (roughly 7 steps) [f5eec03611d9352c8b19134ecd4742a6ebc45282] mm/util.c: add byte count to __vm_enough_memory failure warning testing commit f5eec03611d9352c8b19134ecd4742a6ebc45282 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: cb50ad27d82cc9eab3eb7c5cc1bfdcd0cf0b4620d052816dc424869d04b07ca9 all runs: OK false negative chance: 0.000 # git bisect good f5eec03611d9352c8b19134ecd4742a6ebc45282 Bisecting: 54 revisions left to test after this (roughly 6 steps) [435a75548109f19e5b5b14ae35b9acb063c084e9] mm: use folio more widely in __split_huge_page testing commit 435a75548109f19e5b5b14ae35b9acb063c084e9 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: cc4716f8b6b311439364a5a7711fb6e6dd741aafed080292e26c21682fe562e2 run #0: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #1: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #2: crashed: KASAN: slab-use-after-free Read in __vma_reservation_common run #3: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #4: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #5: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #6: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #7: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #8: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #9: OK representative crash: KASAN: slab-use-after-free Read in hugetlb_fault, types: [KASAN] # git bisect bad 435a75548109f19e5b5b14ae35b9acb063c084e9 Bisecting: 26 revisions left to test after this (roughly 5 steps) [fc4d182316bd5309b4066fd9ef21529ea397a7d4] mm: huge_memory: enable debugfs to split huge pages to any order testing commit fc4d182316bd5309b4066fd9ef21529ea397a7d4 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 7092946e288ca210f54ac437279627be4c052dc01c14bfdc01b4d1ae5d41c290 run #0: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #1: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #2: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #3: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #4: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #5: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #6: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #7: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #8: OK run #9: OK representative crash: KASAN: slab-use-after-free Read in hugetlb_fault, types: [KASAN] # git bisect bad fc4d182316bd5309b4066fd9ef21529ea397a7d4 Bisecting: 13 revisions left to test after this (roughly 4 steps) [dc24559472a682eb124e869cb110e7a2fd857322] lib/stackdepot: off by one in depot_fetch_stack() testing commit dc24559472a682eb124e869cb110e7a2fd857322 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 8e93cd2fae617c0d6108332ec69cfa48f57716f9a95c1507724e6c071e92ae40 run #0: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #1: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #2: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #3: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #4: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #5: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #6: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #7: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #8: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #9: OK representative crash: KASAN: slab-use-after-free Read in hugetlb_fault, types: [KASAN] # git bisect bad dc24559472a682eb124e869cb110e7a2fd857322 Bisecting: 6 revisions left to test after this (roughly 3 steps) [7dac0ec8fa3f4977d04974e94806dfa8bdac7ed2] hugetlb: pass struct vm_fault through to hugetlb_handle_userfault() testing commit 7dac0ec8fa3f4977d04974e94806dfa8bdac7ed2 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 2dcb0317e71ec6142ce6f538951e8031f59145dd90ada77387a91165ee4a2cb3 all runs: OK false negative chance: 0.000 # git bisect good 7dac0ec8fa3f4977d04974e94806dfa8bdac7ed2 Bisecting: 3 revisions left to test after this (roughly 2 steps) [fd2f556c4f3bcad46f1ddb461a0eb85c11033a13] selftest: damon: fix minor typos in test logs testing commit fd2f556c4f3bcad46f1ddb461a0eb85c11033a13 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: aa639e84b918b554e0badcc9d05cfb59e141ab5906c2d23f708acc613e2b43ee run #0: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #1: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #2: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #3: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #4: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #5: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #6: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #7: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #8: OK run #9: OK representative crash: KASAN: slab-use-after-free Read in hugetlb_fault, types: [KASAN] # git bisect bad fd2f556c4f3bcad46f1ddb461a0eb85c11033a13 Bisecting: 0 revisions left to test after this (roughly 1 step) [7c43a553792a1701affeef20959dfb2ccb26dcee] hugetlb: allow faults to be handled under the VMA lock testing commit 7c43a553792a1701affeef20959dfb2ccb26dcee gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 5323be8efc6c04a3ac04f846923298186e12220b570aad71417018932c303993 run #0: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #1: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #2: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #3: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #4: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #5: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #6: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #7: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #8: crashed: KASAN: slab-use-after-free Read in hugetlb_fault run #9: OK representative crash: KASAN: slab-use-after-free Read in hugetlb_fault, types: [KASAN] # git bisect bad 7c43a553792a1701affeef20959dfb2ccb26dcee Bisecting: 0 revisions left to test after this (roughly 0 steps) [9acad7ba3e25d11f4c96df1b7312ae89e6faca5c] hugetlb: use vmf_anon_prepare() instead of anon_vma_prepare() testing commit 9acad7ba3e25d11f4c96df1b7312ae89e6faca5c gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 4f2694242051838a3106e4d9d91a233c2e7a105b5aaa68d5610f9b0460a0ad02 all runs: OK false negative chance: 0.000 # git bisect good 9acad7ba3e25d11f4c96df1b7312ae89e6faca5c 7c43a553792a1701affeef20959dfb2ccb26dcee is the first bad commit commit 7c43a553792a1701affeef20959dfb2ccb26dcee Author: Vishal Moola (Oracle) Date: Wed Feb 21 15:47:32 2024 -0800 hugetlb: allow faults to be handled under the VMA lock Hugetlb can now safely handle faults under the VMA lock, so allow it to do so. This patch may cause ltp hugemmap10 to "fail". Hugemmap10 tests hugetlb counters, and expects the counters to remain unchanged on failure to handle a fault. In hugetlb_no_page(), vmf_anon_prepare() may bailout with no anon_vma under the VMA lock after allocating a folio for the hugepage. In free_huge_folio(), this folio is completely freed on bailout iff there is a surplus of hugetlb pages. This will remove a folio off the freelist and decrement the number of hugepages while ltp expects these counters to remain unchanged on failure. Originally this could only happen due to OOM failures, but now it may also occur after we allocate a hugetlb folio without a suitable anon_vma under the VMA lock. This should only happen for the first freshly allocated hugepage in this vma. Link: https://lkml.kernel.org/r/20240221234732.187629-6-vishal.moola@gmail.com Signed-off-by: Vishal Moola (Oracle) Reviewed-by: Matthew Wilcox (Oracle) Cc: Muchun Song Signed-off-by: Andrew Morton mm/hugetlb.c | 6 ------ 1 file changed, 6 deletions(-) accumulated error probability: 0.00 culprit signature: 5323be8efc6c04a3ac04f846923298186e12220b570aad71417018932c303993 parent signature: 4f2694242051838a3106e4d9d91a233c2e7a105b5aaa68d5610f9b0460a0ad02 revisions tested: 22, total time: 10h27m0.527150991s (build: 5h27m39.694046773s, test: 4h45m0.093244846s) first bad commit: 7c43a553792a1701affeef20959dfb2ccb26dcee hugetlb: allow faults to be handled under the VMA lock recipients (to): ["akpm@linux-foundation.org" "vishal.moola@gmail.com" "willy@infradead.org"] recipients (cc): [] crash: KASAN: slab-use-after-free Read in hugetlb_fault ================================================================== BUG: KASAN: slab-use-after-free in __vma_shareable_lock include/linux/hugetlb.h:1268 [inline] BUG: KASAN: slab-use-after-free in hugetlb_vma_unlock_read mm/hugetlb.c:280 [inline] BUG: KASAN: slab-use-after-free in hugetlb_no_page mm/hugetlb.c:6316 [inline] BUG: KASAN: slab-use-after-free in hugetlb_fault+0x1689/0x1fb0 mm/hugetlb.c:6422 Read of size 8 at addr ffff8880783fa020 by task syz-executor.3/4951 CPU: 0 PID: 4951 Comm: syz-executor.3 Not tainted 6.8.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xf8/0x260 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:377 [inline] print_report+0x167/0x540 mm/kasan/report.c:488 kasan_report+0x142/0x180 mm/kasan/report.c:601 __vma_shareable_lock include/linux/hugetlb.h:1268 [inline] hugetlb_vma_unlock_read mm/hugetlb.c:280 [inline] hugetlb_no_page mm/hugetlb.c:6316 [inline] hugetlb_fault+0x1689/0x1fb0 mm/hugetlb.c:6422 handle_mm_fault+0x362e/0x5380 mm/memory.c:5667 do_user_addr_fault arch/x86/mm/fault.c:1364 [inline] handle_page_fault arch/x86/mm/fault.c:1507 [inline] exc_page_fault+0x484/0x860 arch/x86/mm/fault.c:1563 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:570 RIP: 0033:0x7f79e3a2c621 Code: 48 8b 54 24 08 48 85 d2 74 17 8b 44 24 18 0f c8 89 c0 48 89 44 24 18 48 83 fa 01 0f 85 b3 01 00 00 48 8b 44 24 10 8b 54 24 18 <89> 10 e9 15 fd ff ff 48 8b 44 24 10 8b 10 48 8b 44 24 08 48 85 c0 RSP: 002b:00007ffdb86ef570 EFLAGS: 00010246 RAX: 0000000020000004 RBX: 0000000000000004 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000055555593c360 RBP: 0000000000000004 R08: 0000000000000000 R09: 0000000000000000 R10: 00007ffdb86ef6e0 R11: 0000000000000246 R12: 00007f79e3600128 R13: fffffffffffffffe R14: 00007f79e3600000 R15: 00007f79e3600130 Allocated by task 4953: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 unpoison_slab_object mm/kasan/common.c:312 [inline] __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:338 kasan_slab_alloc include/linux/kasan.h:201 [inline] slab_post_alloc_hook mm/slub.c:3813 [inline] slab_alloc_node mm/slub.c:3860 [inline] kmem_cache_alloc+0x15a/0x390 mm/slub.c:3867 vm_area_alloc+0x1f/0x1c0 kernel/fork.c:465 mmap_region+0xa35/0x1a20 mm/mmap.c:2799 do_mmap+0x6f2/0xbd0 mm/mmap.c:1377 vm_mmap_pgoff+0x21a/0x3a0 mm/util.c:556 ksys_mmap_pgoff+0x314/0x3c0 mm/mmap.c:1423 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x94/0x170 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x6f/0x77 Freed by task 15: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:589 poison_slab_object+0xee/0x1a0 mm/kasan/common.c:240 __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2121 [inline] slab_free mm/slub.c:4299 [inline] kmem_cache_free+0x136/0x330 mm/slub.c:4363 rcu_do_batch kernel/rcu/tree.c:2190 [inline] rcu_core+0xc4b/0x1470 kernel/rcu/tree.c:2465 __do_softirq+0x1be/0x586 kernel/softirq.c:553 Last potentially related work creation: kasan_save_stack+0x3f/0x60 mm/kasan/common.c:47 __kasan_record_aux_stack+0xac/0xc0 mm/kasan/generic.c:551 __call_rcu_common kernel/rcu/tree.c:2715 [inline] call_rcu+0x159/0x8e0 kernel/rcu/tree.c:2829 remove_vma mm/mmap.c:148 [inline] remove_mt mm/mmap.c:2281 [inline] do_vmi_align_munmap+0xe35/0x14b0 mm/mmap.c:2624 do_vmi_munmap+0x1b5/0x210 mm/mmap.c:2688 mmap_region+0x63a/0x1a20 mm/mmap.c:2739 do_mmap+0x6f2/0xbd0 mm/mmap.c:1377 vm_mmap_pgoff+0x21a/0x3a0 mm/util.c:556 ksys_mmap_pgoff+0x314/0x3c0 mm/mmap.c:1423 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x94/0x170 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x6f/0x77 The buggy address belongs to the object at ffff8880783fa000 which belongs to the cache vm_area_struct of size 176 The buggy address is located 32 bytes inside of freed 176-byte region [ffff8880783fa000, ffff8880783fa0b0) The buggy address belongs to the physical page: page:ffffea0001e0fe80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x783fa memcg:ffff88801459a301 anon flags: 0xfff00000000800(slab|node=0|zone=1|lastcpupid=0x7ff) page_type: 0xffffffff() raw: 00fff00000000800 ffff88800a2e4b40 ffffea0001e08480 dead000000000003 raw: 0000000000000000 0000000000110011 00000001ffffffff ffff88801459a301 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1748, tgid 1748 (modprobe), ts 30274777986, free_ts 23443043961 set_page_owner include/linux/page_owner.h:31 [inline] post_alloc_hook+0x10f/0x130 mm/page_alloc.c:1533 prep_new_page mm/page_alloc.c:1540 [inline] get_page_from_freelist+0x345c/0x3600 mm/page_alloc.c:3311 __alloc_pages+0x255/0x650 mm/page_alloc.c:4567 __alloc_pages_node include/linux/gfp.h:238 [inline] alloc_pages_node include/linux/gfp.h:261 [inline] alloc_slab_page+0x5f/0x160 mm/slub.c:2190 allocate_slab mm/slub.c:2354 [inline] new_slab+0x70/0x270 mm/slub.c:2407 ___slab_alloc+0xa79/0x10b0 mm/slub.c:3540 __slab_alloc mm/slub.c:3625 [inline] __slab_alloc_node mm/slub.c:3678 [inline] slab_alloc_node mm/slub.c:3850 [inline] kmem_cache_alloc+0x235/0x390 mm/slub.c:3867 vm_area_dup+0x21/0x160 kernel/fork.c:480 __split_vma+0xfe/0xb10 mm/mmap.c:2331 do_vmi_align_munmap+0x3ba/0x14b0 mm/mmap.c:2542 do_vmi_munmap+0x1b5/0x210 mm/mmap.c:2688 mmap_region+0x63a/0x1a20 mm/mmap.c:2739 do_mmap+0x6f2/0xbd0 mm/mmap.c:1377 vm_mmap_pgoff+0x21a/0x3a0 mm/util.c:556 ksys_mmap_pgoff+0x2d9/0x3c0 mm/mmap.c:1423 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x94/0x170 arch/x86/entry/common.c:83 page last free pid 1716 tgid 1716 stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1140 [inline] free_unref_page_prepare+0x7e5/0x900 mm/page_alloc.c:2346 free_unref_page+0x37/0x3a0 mm/page_alloc.c:2486 pipe_buf_release include/linux/pipe_fs_i.h:219 [inline] pipe_update_tail fs/pipe.c:234 [inline] pipe_read+0x4fc/0xdd0 fs/pipe.c:354 call_read_iter include/linux/fs.h:2079 [inline] new_sync_read fs/read_write.c:395 [inline] vfs_read+0x84f/0xb10 fs/read_write.c:476 ksys_read+0x163/0x250 fs/read_write.c:619 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x94/0x170 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x6f/0x77 Memory state around the buggy address: ffff8880783f9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff8880783f9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff8880783fa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff8880783fa080: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fa fb ffff8880783fa100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ==================================================================