ci starts bisection 2023-07-17 08:02:48.207361023 +0000 UTC m=+209613.157192414 bisecting fixing commit since fd37b884003c7e46a0337b6e9212326d3ee1f40d building syzkaller on 749afb64a55dba8e4a50d96bc287ae06346b4244 ensuring issue is reproducible on original commit fd37b884003c7e46a0337b6e9212326d3ee1f40d testing commit fd37b884003c7e46a0337b6e9212326d3ee1f40d gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 244b8bfd8837fd887e32ec643233eecf3c0c1ed0d82bbe148b52636ebcb1dc0c run #0: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #1: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #2: crashed: KASAN: slab-out-of-bounds Read in hfsplus_read_wrapper run #3: crashed: KASAN: slab-out-of-bounds Read in hfsplus_read_wrapper run #4: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #5: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #6: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #7: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #8: crashed: general protection fault in nsim_dev_trap_report_work run #9: crashed: general protection fault in nsim_dev_trap_report_work run #10: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #11: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #12: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #13: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #14: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #15: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #16: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #17: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #18: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #19: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #20: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #21: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #22: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #23: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #24: crashed: general protection fault in ipv6_chk_mcast_addr run #25: crashed: general protection fault in ipv6_chk_mcast_addr run #26: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #27: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #28: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #29: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #30: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #31: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #32: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #33: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #34: crashed: general protection fault in refill_obj_stock run #35: crashed: general protection fault in refill_obj_stock run #36: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #37: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #38: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #39: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper representative crash: KASAN: slab-use-after-free Read in hfsplus_read_wrapper, types: [KASAN] check whether we can drop unnecessary instrumentation disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit fd37b884003c7e46a0337b6e9212326d3ee1f40d gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: c2dcb15cd2c1572c112d8364eb5eee2f2b8d2f2adb830c7d444faa84dce9789a run #0: crashed: general protection fault in refill_obj_stock run #1: crashed: general protection fault in refill_obj_stock run #2: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #3: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #4: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #5: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #6: crashed: INFO: trying to register non-static key in __dev_queue_xmit run #7: crashed: INFO: trying to register non-static key in __dev_queue_xmit run #8: crashed: general protection fault in refill_obj_stock run #9: crashed: general protection fault in refill_obj_stock run #10: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #11: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #12: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #13: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #14: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #15: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #16: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #17: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #18: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #19: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper representative crash: KASAN: slab-use-after-free Read in hfsplus_read_wrapper, types: [KASAN UNKNOWN] the bug reproduces without the instrumentation disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed kconfig minimization: base=3877 full=7584 leaves diff=1997 split chunks (needed=false): <1997> split chunk #0 of len 1997 into 5 parts testing without sub-chunk 1/5 testing commit fd37b884003c7e46a0337b6e9212326d3ee1f40d gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: d717f1899c488afb115c67c60cca3cc71a340f4329d4349272f1fb7f8aeb8dc2 run #0: crashed: general protection fault in bio_uninit run #1: crashed: general protection fault in bio_uninit run #2: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #3: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #4: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #5: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #6: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #7: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #8: crashed: KASAN: slab-out-of-bounds Read in hfsplus_read_wrapper run #9: crashed: KASAN: slab-out-of-bounds Read in hfsplus_read_wrapper run #10: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #11: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #12: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #13: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #14: crashed: general protection fault in refill_obj_stock run #15: crashed: general protection fault in refill_obj_stock run #16: crashed: KASAN: slab-out-of-bounds Read in hfsplus_read_wrapper run #17: crashed: KASAN: slab-out-of-bounds Read in hfsplus_read_wrapper run #18: crashed: general protection fault in bio_uninit run #19: crashed: general protection fault in bio_uninit representative crash: KASAN: slab-use-after-free Read in hfsplus_read_wrapper, types: [KASAN UNKNOWN] the chunk can be dropped testing without sub-chunk 2/5 testing commit fd37b884003c7e46a0337b6e9212326d3ee1f40d gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: ed49c9a9e58d15862cd30a56f4e075ef366917d7bf73d8b2695dba159ad354b7 all runs: OK false negative chance: 0.000 testing without sub-chunk 3/5 testing commit fd37b884003c7e46a0337b6e9212326d3ee1f40d gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 5cedbf67038fbe744110eb0f813b51bba8ffd4d58d88aae69cdf671124de1976 run #0: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #1: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #2: crashed: KASAN: slab-use-after-free Read in do_ip6t_set_ctl run #3: crashed: KASAN: slab-use-after-free Read in do_ip6t_set_ctl run #4: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #5: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #6: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #7: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #8: crashed: general protection fault in __find_rr_leaf run #9: crashed: general protection fault in __find_rr_leaf run #10: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #11: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #12: crashed: general protection fault in ipv6_chk_mcast_addr run #13: crashed: general protection fault in ipv6_chk_mcast_addr run #14: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #15: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #16: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #17: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #18: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #19: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper representative crash: KASAN: use-after-free Read in hfsplus_read_wrapper, types: [KASAN] the chunk can be dropped testing without sub-chunk 4/5 testing commit fd37b884003c7e46a0337b6e9212326d3ee1f40d gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 030310978c12d6ba70b41e362c0abbddae28b2c854eefd03fdac0e643bf3e0c8 run #0: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #1: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #2: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #3: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #4: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #5: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #6: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #7: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #8: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #9: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #10: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #11: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #12: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #13: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #14: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #15: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #16: crashed: general protection fault in ipv6_chk_mcast_addr run #17: crashed: general protection fault in ipv6_chk_mcast_addr run #18: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #19: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper representative crash: KASAN: slab-use-after-free Read in hfsplus_read_wrapper, types: [KASAN] the chunk can be dropped testing without sub-chunk 5/5 testing commit fd37b884003c7e46a0337b6e9212326d3ee1f40d gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 0b7853d9a9f17fb2355ba796fd09e43eee36af6c6bffa05a3eccbea6d924f565 run #0: crashed: general protection fault in refill_obj_stock run #1: crashed: general protection fault in refill_obj_stock run #2: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #3: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #4: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #5: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #6: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #7: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #8: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #9: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #10: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #11: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #12: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #13: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #14: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #15: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #16: crashed: general protection fault in __mod_timer run #17: crashed: general protection fault in __mod_timer run #18: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #19: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper representative crash: KASAN: use-after-free Read in hfsplus_read_wrapper, types: [KASAN] the chunk can be dropped minimized to 400 configs; suspects: [6LOWPAN ARCH_ENABLE_MEMORY_HOTREMOVE ASUS_WMI CMA COMMON_CLK DAX DLM DRM DRM_BRIDGE DRM_DISPLAY_HDMI_HELPER DRM_DISPLAY_HELPER DRM_DP_AUX_BUS DRM_DP_AUX_CHARDEV DRM_FBDEV_EMULATION DRM_GEM_SHMEM_HELPER DRM_I915 DRM_I915_CAPTURE_ERROR DRM_I915_COMPRESS_ERROR DRM_I915_USERPTR DRM_KMS_HELPER DRM_MIPI_DSI DRM_PANEL DRM_PANEL_BRIDGE DRM_PANEL_EDP DRM_PANEL_ORIENTATION_QUIRKS DRM_SIMPLEDRM DRM_TTM DRM_TTM_HELPER DRM_UDL DRM_VGEM DRM_VIRTIO_GPU DRM_VIRTIO_GPU_KMS DRM_VKMS DRM_VMWGFX DRM_VRAM_HELPER DUMMY DVB_AF9013 DVB_AF9033 DVB_AS102 DVB_AS102_FE DVB_B2C2_FLEXCOP DVB_B2C2_FLEXCOP_USB DVB_CORE DVB_DIB3000MB DVB_DIB3000MC DVB_EC100 DVB_GP8PSK_FE DVB_RTL2830 DVB_RTL2832 DVB_RTL2832_SDR DVB_TEST_DRIVERS DVB_TTUSB_BUDGET DVB_TTUSB_DEC DVB_USB DVB_USB_A800 DVB_USB_AF9005 DVB_USB_AF9005_REMOTE DVB_USB_AF9015 DVB_USB_AF9035 DVB_USB_ANYSEE DVB_USB_AU6610 DVB_USB_AZ6007 DVB_USB_AZ6027 DVB_USB_CE6230 DVB_USB_CINERGY_T2 DVB_USB_CXUSB DVB_USB_DIB0700 DVB_USB_DIB3000MC DVB_USB_DIBUSB_MB DVB_USB_DIBUSB_MC DVB_USB_DIGITV DVB_USB_DTT200U DVB_USB_DTV5100 DVB_USB_DVBSKY DVB_USB_DW2102 DVB_USB_EC168 DVB_USB_GL861 DVB_USB_GP8PSK DVB_USB_LME2510 DVB_USB_M920X DVB_USB_MXL111SF DVB_USB_NOVA_T_USB2 DVB_USB_OPERA1 DVB_USB_PCTV452E DVB_USB_RTL28XXU DVB_USB_TECHNISAT_USB2 DVB_USB_TTUSB2 DVB_USB_UMT_010 DVB_USB_V2 DVB_USB_VP702X DVB_USB_VP7045 DVB_USB_ZD1301 DVB_VIDTV DVB_ZL10353 ECRYPT_FS ECRYPT_FS_MESSAGING EDAC EEPROM_93CX6 EFS_FS ENCRYPTED_KEYS EQUALIZER EROFS_FS EROFS_FS_POSIX_ACL EROFS_FS_SECURITY EROFS_FS_XATTR EROFS_FS_ZIP EVM EVM_ADD_XATTRS EVM_ATTR_FSUUID EXFAT_FS EXPORTFS_BLOCK_OPS EXT3_FS EXT3_FS_POSIX_ACL EXT3_FS_SECURITY EXTCON EXTCON_INTEL_CHT_WC F2FS_CHECK_FS F2FS_FAULT_INJECTION F2FS_FS F2FS_FS_COMPRESSION F2FS_FS_LZ4 F2FS_FS_LZ4HC F2FS_FS_LZO F2FS_FS_LZORLE F2FS_FS_POSIX_ACL F2FS_FS_SECURITY F2FS_FS_XATTR F2FS_FS_ZSTD F2FS_STAT_FS FANOTIFY FANOTIFY_ACCESS_PERMISSIONS FB FB_CFB_COPYAREA FB_CFB_FILLRECT FB_CFB_IMAGEBLIT FB_DEFERRED_IO FB_NOTIFY FB_SYS_COPYAREA FB_SYS_FILLRECT FB_SYS_FOPS FB_SYS_IMAGEBLIT FB_TILEBLITTING FB_VESA FB_VGA16 FB_VIRTUAL FDDI FIREWIRE FIREWIRE_NET FIREWIRE_OHCI FIREWIRE_SBP2 FONT_8x16 FONT_8x8 FONT_SUPPORT FRAMEBUFFER_CONSOLE FRAMEBUFFER_CONSOLE_DETECT_PRIMARY FRAMEBUFFER_CONSOLE_ROTATION FRONTSWAP FS_DAX FS_DAX_PMD FS_ENCRYPTION FS_ENCRYPTION_ALGS FS_VERITY FS_VERITY_BUILTIN_SIGNATURES FTL FUSE_DAX FUSE_FS FW_LOADER_COMPRESS FW_LOADER_PAGED_BUF FW_LOADER_SYSFS FW_LOADER_USER_HELPER FW_LOADER_USER_HELPER_FALLBACK GACT_PROB GARP GENERIC_PHY GET_FREE_REGION GFS2_FS GFS2_FS_LOCKING_DLM GOOGLE_COREBOOT_TABLE GOOGLE_FIRMWARE GOOGLE_MEMCONSOLE GOOGLE_MEMCONSOLE_COREBOOT GOOGLE_VPD GPIOLIB GPIOLIB_IRQCHIP GPIO_ACPI GPIO_DLN2 GPIO_VIPERBOARD GREENASIA_FF GREYBUS GREYBUS_BRIDGED_PHY GREYBUS_ES2 GREYBUS_HID GREYBUS_USB GTP GUEST_PERF_EVENTS GVE HAVE_ARCH_NODE_DEV_GROUP HAVE_ARCH_USERFAULTFD_MINOR HAVE_ARCH_USERFAULTFD_WP HAVE_BOOTMEM_INFO_NODE HAVE_CLK_PREPARE HAVE_HARDENED_USERCOPY_ALLOCATOR HAVE_KVM_CPU_RELAX_INTERCEPT HAVE_KVM_DIRTY_RING HAVE_KVM_DIRTY_RING_ACQ_REL HAVE_KVM_DIRTY_RING_TSO HAVE_KVM_EVENTFD HAVE_KVM_IRQCHIP HAVE_KVM_IRQFD HAVE_KVM_IRQ_BYPASS HAVE_KVM_IRQ_ROUTING HAVE_KVM_MSI HAVE_KVM_NO_POLL HAVE_KVM_PFNCACHE HAVE_KVM_PM_NOTIFIER HAVE_SCHED_AVG_IRQ HDLC HDLC_CISCO HDLC_FR HDLC_PPP HDLC_RAW HDLC_RAW_ETH HDLC_X25 HDMI HFSPLUS_FS HFS_FS HID_ACCUTOUCH HID_ACRUX HID_ACRUX_FF HID_ALPS HID_APPLEIR HID_ASUS HID_AUREAL HID_BATTERY_STRENGTH HID_BETOP_FF HID_CMEDIA HID_CORSAIR HID_CP2112 HID_ELECOM HID_ELO HID_EMS_FF HID_GEMBIRD HID_GFRM HID_GREENASIA HID_GT683R HID_HOLTEK HID_ICADE HID_KEYTOUCH HID_KYE HID_LCPOWER HID_LED HID_LENOVO HID_LOGITECH_DJ HID_LOGITECH_HIDPP HID_MAGICMOUSE HID_MAYFLASH HID_MULTITOUCH HID_NTI HID_ORTEK HID_PENMOUNT HID_PICOLCD HID_PICOLCD_BACKLIGHT HID_PICOLCD_CIR HID_PICOLCD_FB HID_PICOLCD_LCD HID_PICOLCD_LEDS HID_PLANTRONICS HID_PRIMAX HID_PRODIKEYS HID_RETRODE HID_RMI HID_ROCCAT HID_SAITEK HID_SENSOR_ACCEL_3D HID_SENSOR_ALS HID_SENSOR_CUSTOM_SENSOR HID_SENSOR_DEVICE_ROTATION HID_SENSOR_GYRO_3D HID_SENSOR_HUB HID_SENSOR_HUMIDITY HID_SENSOR_IIO_COMMON HID_SENSOR_IIO_TRIGGER HID_SENSOR_INCLINOMETER_3D HID_SENSOR_MAGNETOMETER_3D HID_SENSOR_PRESS HID_SENSOR_PROX HID_SENSOR_TEMP HID_SPEEDLINK HID_STEELSERIES HID_THINGM HID_TIVO HID_TWINHAN HID_UCLOGIC HID_UDRAW_PS3 HID_WACOM HID_WALTOP HID_WIIMOTE HID_XINMO HID_ZYDACRON HMM_MIRROR HOLTEK_FF HOTPLUG_PCI_PCIE HPET_MMAP HPET_MMAP_DEFAULT HPFS_FS I2C_ALGOBIT I2C_CHARDEV I2C_DESIGNWARE_CORE I2C_DESIGNWARE_PLATFORM I2C_DIOLAN_U2C I2C_DLN2 I2C_MUX I2C_MUX_REG I2C_ROBOTFUZZ_OSIF I2C_SI4713 I2C_SLAVE I2C_SLAVE_EEPROM I2C_TINY_USB I2C_VIPERBOARD IEEE802154 IEEE802154_6LOWPAN IEEE802154_ATUSB IEEE802154_DRIVERS IEEE802154_HWSIM IEEE802154_NL802154_EXPERIMENTAL IEEE802154_SOCKET IFB IIO IIO_BUFFER IIO_KFIFO_BUF IIO_TRIGGER IIO_TRIGGERED_BUFFER IKCONFIG IKCONFIG_PROC IMA IMA_APPRAISE IMA_APPRAISE_MODSIG IMA_DEFAULT_HASH_SHA256 IMA_LSM_RULES IMA_MEASURE_ASYMMETRIC_KEYS IMA_NG_TEMPLATE IMA_QUEUE_EARLY_BOOT_KEYS IMA_READ_POLICY IMA_WRITE_POLICY INET6_ESPINTCP INET6_ESP_OFFLOAD INET6_IPCOMP INET6_TUNNEL INET6_XFRM_TUNNEL INET_AH INET_DCCP_DIAG INET_DIAG INET_DIAG_DESTROY INET_ESP INET_ESPINTCP INET_ESP_OFFLOAD INET_IPCOMP INET_MPTCP_DIAG INET_RAW_DIAG INET_SCTP_DIAG INET_TCP_DIAG INET_UDP_DIAG INET_XFRM_TUNNEL INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_ADDR_TRANS_CONFIGFS INFINIBAND_IPOIB INFINIBAND_IPOIB_CM INFINIBAND_IPOIB_DEBUG INFINIBAND_ISER INFINIBAND_ON_DEMAND_PAGING INFINIBAND_RTRS INFINIBAND_SRP INFINIBAND_USER_ACCESS INFINIBAND_USER_MAD INFINIBAND_USER_MEM INIT_STACK_NONE INPUT_ATI_REMOTE2 INPUT_CM109 INPUT_IMS_PCU INPUT_JOYDEV INPUT_KEYSPAN_REMOTE INPUT_LEDS INPUT_MOUSEDEV INPUT_MOUSEDEV_PSAUX INPUT_POWERMATE INPUT_UINPUT INPUT_YEALINK INTEGRITY INTEGRITY_ASYMMETRIC_KEYS INTEGRITY_AUDIT INTEGRITY_SIGNATURE INTEGRITY_TRUSTED_KEYRING INTEL_IDMA64 INTEL_IOATDMA INTEL_IOMMU_DEFAULT_ON INTEL_IOMMU_SVM INTEL_ISH_HID INTEL_SOC_PMIC_CHTWC INTERVAL_TREE INTERVAL_TREE_SPAN_ITER IOMMUFD IOMMUFD_TEST IOMMU_SVA IP6_NF_MATCH_AH IP6_NF_MATCH_EUI64 IP6_NF_MATCH_FRAG IP6_NF_MATCH_HL IP6_NF_MATCH_MH IP6_NF_MATCH_OPTS IP6_NF_MATCH_RPFILTER IP6_NF_MATCH_RT IP6_NF_MATCH_SRH IP6_NF_NAT IP6_NF_RAW IP6_NF_SECURITY IP6_NF_TARGET_HL IP6_NF_TARGET_MASQUERADE IP6_NF_TARGET_NPT IP6_NF_TARGET_SYNPROXY IPV6_FOU IPV6_FOU_TUNNEL IPV6_GRE IPV6_ILA IPV6_MIP6 IPV6_MROUTE IPV6_MROUTE_MULTIPLE_TABLES IPV6_MULTIPLE_TABLES IPV6_OPTIMISTIC_DAD IPV6_PIMSM_V2 IPV6_ROUTER_PREF IPV6_ROUTE_INFO IPV6_RPL_LWTUNNEL IPV6_SEG6_BPF IPV6_SEG6_HMAC IPV6_SEG6_LWTUNNEL IPV6_SIT_6RD IPV6_SUBTREES IPV6_TUNNEL IPV6_VTI IPVLAN IPVLAN_L3S IPVTAP IP_DCCP IP_DCCP_CCID3 IP_DCCP_TFRC_LIB IP_FIB_TRIE_STATS IP_MROUTE_MULTIPLE_TABLES IP_NF_ARPFILTER IP_NF_ARPTABLES IP_NF_ARP_MANGLE IP_NF_MATCH_AH IP_NF_MATCH_ECN IP_NF_MATCH_RPFILTER IP_NF_MATCH_TTL IP_NF_RAW IP_NF_SECURITY IP_NF_TARGET_ECN IP_NF_TARGET_NETMAP IP_NF_TARGET_REDIRECT IP_NF_TARGET_SYNPROXY IP_NF_TARGET_TTL IP_ROUTE_CLASSID IP_SCTP IP_SET IP_SET_BITMAP_IP IP_SET_BITMAP_IPMAC IP_SET_BITMAP_PORT IP_SET_HASH_IP IP_SET_HASH_IPMAC IP_SET_HASH_IPMARK IP_SET_HASH_IPPORT IP_SET_HASH_IPPORTIP IP_SET_HASH_IPPORTNET IP_SET_HASH_MAC IP_SET_HASH_NET IP_SET_HASH_NETIFACE IP_SET_HASH_NETNET IP_SET_HASH_NETPORT IP_SET_HASH_NETPORTNET IP_SET_LIST_SET IP_VS IP_VS_DH IP_VS_FO IP_VS_FTP IP_VS_IPV6 IP_VS_LBLC IP_VS_LBLCR IP_VS_LC IP_VS_MH IP_VS_NFCT IP_VS_NQ IP_VS_OVF IP_VS_PE_SIP IP_VS_PROTO_AH IP_VS_PROTO_AH_ESP IP_VS_PROTO_TCP IP_VS_PROTO_UDP IRQ_TIME_ACCOUNTING LAPB LCD_CLASS_DEVICE MAC802154 MEDIA_DIGITAL_TV_SUPPORT MEDIA_RADIO_SUPPORT MEDIA_SDR_SUPPORT MEDIA_SUPPORT MEDIA_TEST_SUPPORT MEDIA_USB_SUPPORT MEMORY_HOTPLUG MEMORY_HOTREMOVE MFD_DLN2 MFD_VIPERBOARD MPTCP MTD NETFILTER_ADVANCED NET_ACT_GACT NET_ACT_MIRRED NET_IPGRE_DEMUX NFT_FWD_NETDEV NF_TABLES NF_TABLES_NETDEV RADIO_ADAPTERS RADIO_SI4713 RAS RC_CORE RFKILL SND SOUND STAGING TRANSPARENT_HUGEPAGE VIDEO_DEV VIRTIO_FS WAN ZONE_DEVICE] disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG LOCKDEP], they are not needed testing current HEAD fdf0eaf11452d72945af31804e2a1048ee1b574c testing commit fdf0eaf11452d72945af31804e2a1048ee1b574c gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 9076ebdde892dbd284d58c966991327bd857571d78b787f9705a40493487b7fa run #0: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #1: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #2: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #3: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #4: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #5: crashed: KASAN: use-after-free Read in hfsplus_read_wrapper run #6: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #7: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #8: crashed: BUG: Bad rss-counter state run #9: crashed: BUG: Bad rss-counter state run #10: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #11: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #12: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #13: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #14: crashed: KASAN: slab-out-of-bounds Read in hfsplus_read_wrapper run #15: crashed: KASAN: slab-out-of-bounds Read in hfsplus_read_wrapper run #16: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #17: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #18: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #19: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper representative crash: KASAN: slab-use-after-free Read in hfsplus_read_wrapper, types: [KASAN] crash still not fixed/happens on the oldest tested release revisions tested: 8, total time: 2h13m44.866323506s (build: 1h36m3.367075479s, test: 34m51.713501891s) crash still not fixed on HEAD or HEAD had kernel test errors commit msg: Linux 6.5-rc2 crash: KASAN: slab-use-after-free Read in hfsplus_read_wrapper loop5: detected capacity change from 0 to 1024 ================================================================== BUG: KASAN: slab-use-after-free in hfsplus_read_wrapper+0xcc5/0xde0 fs/hfsplus/wrapper.c:225 Read of size 2 at addr ffff8881077adc00 by task syz-executor.5/4668 CPU: 1 PID: 4668 Comm: syz-executor.5 Not tainted 6.5.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x3d/0x60 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:364 [inline] print_report+0xc4/0x620 mm/kasan/report.c:475 kasan_report+0xda/0x110 mm/kasan/report.c:588 hfsplus_read_wrapper+0xcc5/0xde0 fs/hfsplus/wrapper.c:225 hfsplus_fill_super+0x331/0x1930 fs/hfsplus/super.c:413 mount_bdev+0x256/0x300 fs/super.c:1391 legacy_get_tree+0xfe/0x1f0 fs/fs_context.c:611 vfs_get_tree+0x82/0x210 fs/super.c:1519 do_new_mount fs/namespace.c:3335 [inline] path_mount+0x878/0x1a00 fs/namespace.c:3662 do_mount fs/namespace.c:3675 [inline] __do_sys_mount fs/namespace.c:3884 [inline] __se_sys_mount fs/namespace.c:3861 [inline] __x64_sys_mount+0x208/0x280 fs/namespace.c:3861 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x38/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f425c87e09a Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f425d580ee8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f425d580f80 RCX: 00007f425c87e09a RDX: 0000000020000000 RSI: 0000000020000640 RDI: 00007f425d580f40 RBP: 0000000020000000 R08: 00007f425d580f80 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000640 R13: 00007f425d580f40 R14: 00000000000005d3 R15: 0000000020000680 The buggy address belongs to the object at ffff8881077adc00 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 0 bytes inside of freed 512-byte region [ffff8881077adc00, ffff8881077ade00) The buggy address belongs to the physical page: page:ffffea00041deb40 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ad flags: 0x100000000000200(slab|node=0|zone=2) page_type: 0x4() raw: 0100000000000200 ffff888100040600 ffffea00040faf10 ffffea00041ded50 raw: 0000000000000000 ffff8881077ad000 0000000100000004 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2420c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_COMP|__GFP_THISNODE), pid 453, tgid 453 (kworker/u4:1), ts 4008338963, free_ts 4006952874 set_page_owner include/linux/page_owner.h:31 [inline] post_alloc_hook+0x281/0x2f0 mm/page_alloc.c:1570 prep_new_page mm/page_alloc.c:1577 [inline] get_page_from_freelist+0x1131/0x3d90 mm/page_alloc.c:3221 __alloc_pages+0x1d0/0x470 mm/page_alloc.c:4477 __alloc_pages_node include/linux/gfp.h:237 [inline] kmem_getpages mm/slab.c:1356 [inline] cache_grow_begin+0x7c/0x330 mm/slab.c:2550 cache_alloc_refill+0x286/0x350 mm/slab.c:2923 ____cache_alloc mm/slab.c:2999 [inline] ____cache_alloc mm/slab.c:2982 [inline] __do_cache_alloc mm/slab.c:3182 [inline] slab_alloc_node mm/slab.c:3230 [inline] __kmem_cache_alloc_node+0x383/0x3d0 mm/slab.c:3521 kmalloc_trace+0x25/0xb0 mm/slab_common.c:1076 kmalloc include/linux/slab.h:582 [inline] kzalloc include/linux/slab.h:703 [inline] alloc_bprm+0x4c/0x9c0 fs/exec.c:1513 kernel_execve+0x83/0x450 fs/exec.c:1988 call_usermodehelper_exec_async+0x232/0x440 kernel/umh.c:110 ret_from_fork+0x2c/0x70 arch/x86/kernel/process.c:145 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:296 page last free stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1161 [inline] free_unref_page_prepare+0x5ac/0xcf0 mm/page_alloc.c:2348 free_unref_page+0x33/0x350 mm/page_alloc.c:2443 mm_free_pgd kernel/fork.c:803 [inline] __mmdrop+0x51/0x310 kernel/fork.c:921 free_bprm+0x11a/0x3a0 fs/exec.c:1491 kernel_execve+0x32c/0x450 fs/exec.c:2025 call_usermodehelper_exec_async+0x232/0x440 kernel/umh.c:110 ret_from_fork+0x2c/0x70 arch/x86/kernel/process.c:145 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:296 Memory state around the buggy address: ffff8881077adb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff8881077adb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff8881077adc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff8881077adc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8881077add00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ==================================================================