ci starts bisection 2024-06-10 06:49:25.948589868 +0000 UTC m=+218443.169657520 bisecting cause commit starting from d35b2284e966c0bef3e2182a5c5ea02177dd32e4 building syzkaller on 82c05ab8ae0b7da9a799b45753b4b14f3369d790 ensuring issue is reproducible on original commit d35b2284e966c0bef3e2182a5c5ea02177dd32e4 testing commit d35b2284e966c0bef3e2182a5c5ea02177dd32e4 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 741bc0bda8351dbc146eed6fd5a1eb92ac961b36b2bd11ba309a4c3af7721cf5 run #0: crashed: KASAN: use-after-free Read in finish_fault run #1: crashed: KASAN: slab-use-after-free Read in finish_fault run #2: crashed: KASAN: slab-use-after-free Read in finish_fault run #3: crashed: KASAN: slab-use-after-free Read in finish_fault run #4: crashed: KASAN: slab-use-after-free Read in finish_fault run #5: crashed: KASAN: slab-use-after-free Read in finish_fault run #6: crashed: KASAN: slab-use-after-free Read in finish_fault run #7: crashed: KASAN: slab-use-after-free Read in finish_fault run #8: crashed: KASAN: use-after-free Read in finish_fault run #9: crashed: KASAN: use-after-free Read in finish_fault run #10: crashed: KASAN: slab-use-after-free Read in finish_fault run #11: crashed: KASAN: slab-use-after-free Read in finish_fault run #12: crashed: KASAN: slab-use-after-free Read in finish_fault run #13: crashed: BUG: Bad rss-counter state run #14: crashed: KASAN: use-after-free Read in finish_fault run #15: crashed: kernel BUG in filemap_unaccount_folio run #16: crashed: KASAN: slab-use-after-free Read in finish_fault run #17: crashed: KASAN: slab-use-after-free Read in finish_fault run #18: crashed: BUG: Bad rss-counter state run #19: crashed: KASAN: slab-use-after-free Read in finish_fault representative crash: KASAN: use-after-free Read in finish_fault, types: [KASAN] check whether we can drop unnecessary instrumentation disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit d35b2284e966c0bef3e2182a5c5ea02177dd32e4 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 6db6928d4d14c036769ee20b05346709971af3fba72804a784bdc9b89a5c42b6 run #0: crashed: KASAN: use-after-free Read in finish_fault run #1: crashed: KASAN: slab-use-after-free Read in finish_fault run #2: crashed: KASAN: slab-use-after-free Read in finish_fault run #3: crashed: invalid opcode in filemap_unaccount_folio run #4: crashed: KASAN: slab-use-after-free Read in finish_fault run #5: crashed: KASAN: slab-use-after-free Read in finish_fault run #6: crashed: KASAN: slab-use-after-free Read in finish_fault run #7: crashed: KASAN: slab-use-after-free Read in finish_fault run #8: crashed: KASAN: slab-use-after-free Read in finish_fault run #9: crashed: KASAN: use-after-free Read in finish_fault representative crash: KASAN: use-after-free Read in finish_fault, types: [KASAN] the bug reproduces without the instrumentation disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed kconfig minimization: base=3976 full=8053 leaves diff=2030 split chunks (needed=false): <2030> split chunk #0 of len 2030 into 5 parts testing without sub-chunk 1/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit d35b2284e966c0bef3e2182a5c5ea02177dd32e4 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e077de698ed0758335ccd184a552bdc649a340b43135ad079ba9b8c1a8002504 run #0: crashed: KASAN: slab-use-after-free Read in finish_fault run #1: crashed: KASAN: slab-use-after-free Read in finish_fault run #2: crashed: KASAN: slab-use-after-free Read in finish_fault run #3: crashed: KASAN: slab-use-after-free Read in finish_fault run #4: crashed: BUG: Bad rss-counter state run #5: crashed: KASAN: slab-out-of-bounds Read in finish_fault run #6: crashed: invalid opcode in filemap_unaccount_folio run #7: crashed: BUG: Bad rss-counter state run #8: crashed: KASAN: slab-use-after-free Read in finish_fault run #9: crashed: KASAN: slab-use-after-free Read in finish_fault representative crash: KASAN: slab-use-after-free Read in finish_fault, types: [KASAN UNKNOWN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit d35b2284e966c0bef3e2182a5c5ea02177dd32e4 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 388de2d45eb1b06ca06b4ae98165158f8369aaa45e9568ab362399f7ab78ebf6 run #0: crashed: KASAN: slab-use-after-free Read in finish_fault run #1: crashed: KASAN: slab-use-after-free Read in finish_fault run #2: crashed: KASAN: slab-use-after-free Read in finish_fault run #3: crashed: KASAN: slab-use-after-free Read in finish_fault run #4: crashed: KASAN: slab-use-after-free Read in finish_fault run #5: crashed: KASAN: use-after-free Read in finish_fault run #6: crashed: BUG: Bad rss-counter state run #7: crashed: KASAN: slab-use-after-free Read in finish_fault run #8: crashed: KASAN: slab-use-after-free Read in finish_fault run #9: crashed: KASAN: slab-use-after-free Read in finish_fault representative crash: KASAN: slab-use-after-free Read in finish_fault, types: [KASAN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit d35b2284e966c0bef3e2182a5c5ea02177dd32e4 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 21f6a5c54cf8665444fc2bc51a135e106ce271c06da86fae4fc1bcc6d3e67f27 all runs: crashed: KASAN: slab-use-after-free Read in finish_fault representative crash: KASAN: slab-use-after-free Read in finish_fault, types: [KASAN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG LOCKDEP], they are not needed testing commit d35b2284e966c0bef3e2182a5c5ea02177dd32e4 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 0dab916c7c4732af2379db3f0bc3c8efab5809f0dc33c687e50b0ac1ff3d36a0 all runs: OK false negative chance: 0.000 testing without sub-chunk 5/5 disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit d35b2284e966c0bef3e2182a5c5ea02177dd32e4 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: aaa570e004065da3e23a888dd134226e7e97ec9eedeef7ef5251052a22bbc19a run #0: crashed: KASAN: slab-use-after-free Read in finish_fault run #1: crashed: KASAN: slab-use-after-free Read in finish_fault run #2: crashed: KASAN: slab-use-after-free Read in finish_fault run #3: crashed: KASAN: slab-use-after-free Read in finish_fault run #4: crashed: BUG: Bad rss-counter state run #5: crashed: KASAN: slab-use-after-free Read in finish_fault run #6: crashed: KASAN: slab-use-after-free Read in finish_fault run #7: crashed: KASAN: slab-use-after-free Read in finish_fault run #8: crashed: KASAN: slab-use-after-free Read in finish_fault run #9: crashed: KASAN: slab-use-after-free Read in finish_fault representative crash: KASAN: slab-use-after-free Read in finish_fault, types: [KASAN] the chunk can be dropped minimized to 406 configs; suspects: [AF_RXRPC ARCH_ENABLE_MEMORY_HOTREMOVE ATM AX25 CFG80211 CMA DAX DLM DVB_CORE ENCRYPTED_KEYS EXTCON GENEVE GPIOLIB HAMRADIO HAVE_CLK HID_SENSOR_HUB HID_SMARTJOYPLUS HID_THRUSTMASTER IIO INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_IPOIB INFINIBAND_USER_ACCESS INFINIBAND_VIRT_DMA INPUT_TABLET INPUT_TOUCHSCREEN IP_SCTP IRQ_TIME_ACCOUNTING L2TP LIBNVDIMM MEDIA_COMMON_OPTIONS MEDIA_DIGITAL_TV_SUPPORT MEDIA_RADIO_SUPPORT MEDIA_SDR_SUPPORT MEDIA_SUPPORT MEDIA_USB_SUPPORT MEMORY_HOTPLUG MEMORY_HOTREMOVE MFD_DLN2 MFD_RETU MMC MTD MTD_UBI NETFILTER_ADVANCED NETFILTER_CONNCOUNT NET_IPGRE NET_IPGRE_DEMUX NFS_V4_1 NF_CONNTRACK_SNMP NF_NAT_H323 NF_NAT_OVS NF_NAT_PPTP NF_NAT_REDIRECT NF_NAT_SNMP_BASIC NF_NAT_TFTP NF_SOCKET_IPV4 NF_SOCKET_IPV6 NF_TPROXY_IPV4 NF_TPROXY_IPV6 NILFS2_FS NLMON NLS_CODEPAGE_1250 NLS_CODEPAGE_1251 NLS_CODEPAGE_737 NLS_CODEPAGE_775 NLS_CODEPAGE_850 NLS_CODEPAGE_852 NLS_CODEPAGE_855 NLS_CODEPAGE_857 NLS_CODEPAGE_860 NLS_CODEPAGE_861 NLS_CODEPAGE_862 NLS_CODEPAGE_863 NLS_CODEPAGE_864 NLS_CODEPAGE_865 NLS_CODEPAGE_866 NLS_CODEPAGE_869 NLS_CODEPAGE_874 NLS_CODEPAGE_932 NLS_CODEPAGE_936 NLS_CODEPAGE_949 NLS_CODEPAGE_950 NLS_ISO8859_13 NLS_ISO8859_14 NLS_ISO8859_15 NLS_ISO8859_2 NLS_ISO8859_3 NLS_ISO8859_4 NLS_ISO8859_5 NLS_ISO8859_6 NLS_ISO8859_7 NLS_ISO8859_8 NLS_ISO8859_9 NLS_KOI8_R NLS_KOI8_U NLS_MAC_CELTIC NLS_MAC_CENTEURO NLS_MAC_CROATIAN NLS_MAC_CYRILLIC NLS_MAC_GAELIC NLS_MAC_GREEK NLS_MAC_ICELAND NLS_MAC_INUIT NLS_MAC_ROMAN NLS_MAC_ROMANIAN NLS_MAC_TURKISH NLS_UCS2_UTILS NOZOMI NTFS3_FS NTFS3_FS_POSIX_ACL NTFS3_LZX_XPRESS NULL_TTY NUMA_BALANCING NUMA_BALANCING_DEFAULT_ENABLED NUMA_EMU NUMA_KEEP_MEMINFO NVDIMM_DAX NVDIMM_KEYS NVDIMM_PFN NVME_CORE NVME_FABRICS NVME_FC NVME_MULTIPATH NVME_RDMA NVME_TARGET NVME_TARGET_FC NVME_TARGET_FCLOOP NVME_TARGET_LOOP NVME_TARGET_RDMA NVME_TARGET_TCP NVME_TCP N_GSM N_HDLC OCFS2_DEBUG_FS OCFS2_FS OCFS2_FS_O2CB OCFS2_FS_STATS OCFS2_FS_USERSPACE_CLUSTER OF_GPIO OF_PMEM OMFS_FS OPENVSWITCH OPENVSWITCH_GENEVE OPENVSWITCH_GRE OPENVSWITCH_VXLAN ORANGEFS_FS OSF_PARTITION OVERLAY_FS OVERLAY_FS_DEBUG OVERLAY_FS_INDEX OVERLAY_FS_REDIRECT_ALWAYS_FOLLOW OVERLAY_FS_REDIRECT_DIR PACKET_DIAG PAGE_IDLE_FLAG PAGE_POOL PAGE_REPORTING PAHOLE_HAS_BTF_TAG PAHOLE_HAS_LANG_EXCLUDE PAHOLE_HAS_SPLIT_BTF PARPORT PARPORT_NOT_PC PARTITION_ADVANCED PCCARD PCCARD_NONSTATIC PCIEAER PCI_ENDPOINT PCI_IOV PCMCIA PCMCIA_LOAD_CIS PERCPU_STATS PERSISTENT_KEYRINGS PHONET PHYLINK PHY_CPCAP_USB PHY_QCOM_USB_HS PHY_QCOM_USB_HSIC PHY_SAMSUNG_USB2 PHY_TUSB1210 PKCS7_TEST_KEY PKCS8_PRIVATE_KEY_PARSER PM_CLK PNFS_BLOCK PNFS_FILE_LAYOUT PNFS_FLEXFILE_LAYOUT PPP PPPOATM PPPOE PPPOE_HASH_BITS_4 PPPOL2TP PPP_ASYNC PPP_BSDCOMP PPP_DEFLATE PPP_FILTER PPP_MPPE PPP_MULTILINK PPP_SYNC_TTY PPTP PREEMPT PREEMPT_NOTIFIERS PROC_CHILDREN PSI PSTORE PSTORE_COMPRESS QCOM_QMI_HELPERS QNX4FS_FS QNX6FS_FS QRTR QRTR_TUN R8712U RADIO_ADAPTERS RADIO_SHARK RADIO_SHARK2 RADIO_TEA575X RAID6_PQ RAID_ATTRS RC_ATI_REMOTE RC_CORE RC_DEVICES RDMA_RXE RDMA_SIW RDS RDS_RDMA RDS_TCP READ_ONLY_THP_FOR_FS REALTEK_AUTOPM REED_SOLOMON REED_SOLOMON_DEC8 REGMAP REGMAP_I2C REGMAP_IRQ REGMAP_MMIO REGMAP_SPI REGULATOR REGULATOR_TWL4030 REISERFS_FS REISERFS_FS_POSIX_ACL REISERFS_FS_SECURITY REISERFS_FS_XATTR REISERFS_PROC_INFO RESET_CONTROLLER RFKILL RFKILL_INPUT RFKILL_LEDS RMI4_2D_SENSOR RMI4_CORE RMI4_F03 RMI4_F03_SERIO RMI4_F11 RMI4_F12 RMI4_F30 ROMFS_BACKED_BY_BOTH ROMFS_FS ROMFS_ON_BLOCK ROMFS_ON_MTD ROSE RTC_DRV_HID_SENSOR_TIME RXKAD SCHED_CORE SCREEN_INFO SCSI_FC_ATTRS SCSI_HPSA SCSI_ISCSI_ATTRS SCSI_LOGGING SCSI_NETLINK SCSI_SAS_ATA SCSI_SAS_ATTRS SCSI_SAS_LIBSAS SCSI_SCAN_ASYNC SCSI_SRP_ATTRS SCTP_COOKIE_HMAC_MD5 SCTP_COOKIE_HMAC_SHA1 SCTP_DEFAULT_COOKIE_HMAC_MD5 SECONDARY_TRUSTED_KEYRING SECURITY_INFINIBAND SECURITY_NETWORK_XFRM SERIAL_DEV_BUS SERIAL_DEV_CTRL_TTYPORT SERIAL_MCTRL_GPIO SGI_PARTITION SIGNATURE SIGNED_PE_FILE_VERIFICATION SKB_DECRYPTED SLHC SLIP SLIP_COMPRESSED SLIP_MODE_SLIP6 SLIP_SMART SMARTJOYPLUS_FF SMBFS SMC SMC_DIAG SMSC_PHY SMS_SIANO_MDTV SMS_SIANO_RC SMS_USB_DRV SND SND_ALOOP SND_BCD2000 SND_CTL_FAST_LOOKUP SND_CTL_LED SND_DEBUG SND_DMA_SGBUF SND_DRIVERS SND_DUMMY SND_DYNAMIC_MINORS SND_HDA SND_HDA_CODEC_ANALOG SND_HDA_CODEC_CA0110 SND_HDA_CODEC_CA0132 SND_HDA_CODEC_CIRRUS SND_HDA_CODEC_CMEDIA SND_HDA_CODEC_CONEXANT SND_HDA_CODEC_HDMI SND_HDA_CODEC_REALTEK SND_HDA_CODEC_SI3054 SND_HDA_CODEC_SIGMATEL SND_HDA_CODEC_VIA SND_HDA_COMPONENT SND_HDA_CORE SND_HDA_GENERIC SND_HDA_GENERIC_LEDS SND_HDA_HWDEP SND_HDA_I915 SND_HDA_INPUT_BEEP SND_HDA_INTEL SND_HDA_PATCH_LOADER SND_HDA_RECONFIG SND_HDA_SCODEC_COMPONENT SND_HRTIMER SND_HWDEP SND_INTEL_DSP_CONFIG SND_INTEL_NHLT SND_INTEL_SOUNDWIRE_ACPI SND_JACK SND_JACK_INPUT_DEV SND_MIXER_OSS SND_OSSEMUL SND_PCI SND_PCM SND_PCMCIA SND_PCM_OSS SND_PCM_OSS_PLUGINS SND_PCM_TIMER SND_PCM_XRUN_DEBUG SND_PROC_FS SND_RAWMIDI SND_SEQUENCER SND_SEQUENCER_OSS SND_SEQ_DEVICE SND_SEQ_DUMMY SND_SEQ_HRTIMER_DEFAULT SND_SEQ_MIDI SND_SEQ_MIDI_EVENT SND_SEQ_VIRMIDI SND_SOC SND_SOC_I2C_AND_SPI SND_SUPPORT_OLD_API SND_TIMER SND_USB SND_USB_6FIRE SND_USB_AUDIO SND_USB_AUDIO_USE_MEDIA_CONTROLLER SND_USB_CAIAQ SND_USB_CAIAQ_INPUT SND_USB_HIFACE SND_USB_LINE6 SND_USB_POD SND_USB_PODHD SND_USB_TONEPORT SND_USB_UA101 SND_USB_US122L SND_USB_USX2Y SND_USB_VARIAX SND_VERBOSE_PROCFS SND_VIRMIDI SND_VIRTIO SND_VMASTER SND_X86 SOCK_VALIDATE_XMIT SOFTLOCKUP_DETECTOR_INTR_STORM SOLARIS_X86_PARTITION SONY_FF SOUND SOUNDWIRE SOUND_OSS_CORE SOUND_OSS_CORE_PRECLAIM SPI SPI_DLN2 SPI_DYNAMIC SPI_MASTER SQUASHFS SQUASHFS_4K_DEVBLK_SIZE SQUASHFS_COMPILE_DECOMP_SINGLE SQUASHFS_DECOMP_SINGLE SQUASHFS_FILE_DIRECT SQUASHFS_LZ4 SQUASHFS_LZO SQUASHFS_XATTR SQUASHFS_XZ SQUASHFS_ZLIB SQUASHFS_ZSTD SSB SSB_PCIHOST_POSSIBLE SSB_PCMCIAHOST_POSSIBLE SSB_SDIOHOST_POSSIBLE STAGING STP STREAM_PARSER SUNRPC_BACKCHANNEL SUN_PARTITION SW_SYNC SYSFB SYSV68_PARTITION SYSV_FS TABLET_USB_ACECAD TABLET_USB_AIPTEK TABLET_USB_HANWANG TABLET_USB_KBTAB TABLET_USB_PEGASUS TAHVO_USB TAHVO_USB_HOST_BY_DEFAULT TASKS_TRACE_RCU TCG_CRB TCG_TIS TCG_TIS_CORE TCG_TPM TCG_TPM2_HMAC TCP_CONG_BBR TCP_CONG_BIC TCP_CONG_CDG TCP_CONG_DCTCP TCP_CONG_HSTCP TCP_CONG_HTCP TCP_CONG_HYBLA TCP_CONG_ILLINOIS TCP_CONG_LP TCP_CONG_NV TCP_CONG_SCALABLE TCP_CONG_VEGAS TCP_CONG_VENO TCP_CONG_WESTWOOD TCP_CONG_YEAH TEXTSEARCH TEXTSEARCH_BM TEXTSEARCH_FSM TEXTSEARCH_KMP THERMAL_NETLINK THP_SWAP THRUSTMASTER_FF TIPC TIPC_CRYPTO TIPC_DIAG TIPC_MEDIA_IB TIPC_MEDIA_UDP TLS TLS_TOE TMPFS_QUOTA TOUCHSCREEN_SUR40 TOUCHSCREEN_USB_3M TOUCHSCREEN_USB_COMPOSITE TOUCHSCREEN_USB_DMC_TSC10 TOUCHSCREEN_USB_E2I TOUCHSCREEN_USB_EASYTOUCH TOUCHSCREEN_USB_EGALAX TOUCHSCREEN_USB_ELO TOUCHSCREEN_USB_ETT_TC45USB TOUCHSCREEN_USB_ETURBO TOUCHSCREEN_USB_GENERAL_TOUCH TOUCHSCREEN_USB_GOTOP TOUCHSCREEN_USB_GUNZE TOUCHSCREEN_USB_IDEALTEK TOUCHSCREEN_USB_IRTOUCH TOUCHSCREEN_USB_ITM TOUCHSCREEN_USB_JASTEC TOUCHSCREEN_USB_NEXIO TOUCHSCREEN_USB_PANJIT TOUCHSCREEN_USB_ZYTRONIC TRANSPARENT_HUGEPAGE TRANSPARENT_HUGEPAGE_MADVISE TTPCI_EEPROM TTY_PRINTK TUN_VNET_CROSS_LE TWL4030_CORE TYPEC TYPEC_FUSB302 TYPEC_TCPCI TYPEC_TCPM TYPEC_TPS6598X TYPEC_UCSI UBIFS_ATIME_SUPPORT UBIFS_FS UBIFS_FS_ADVANCED_COMPR UBIFS_FS_LZO UBIFS_FS_SECURITY UBIFS_FS_XATTR UBIFS_FS_ZLIB UBIFS_FS_ZSTD UCSI_ACPI UDF_FS UDMABUF UFS_FS UFS_FS_WRITE UHID ULTRIX_PARTITION UNICODE UNIXWARE_DISKLABEL UNIX_DIAG USB4 USB4_NET USBIP_CORE USBIP_HOST USBIP_VHCI_HCD USBIP_VUDC USBPCWATCHDOG USB_ACM USB_ADUTUX USB_AIRSPY USB_ALI_M5632 USB_AN2720 USB_APPLEDISPLAY USB_ARMLINUX USB_BDC_UDC USB_BELKIN USB_C67X00_HCD USB_CATC USB_CDC_PHONET USB_CHAOSKEY USB_CHIPIDEA USB_CHIPIDEA_HOST USB_DWC2 USB_GADGET USB_MUSB_HDRC USB_NET_CDC_SUBSET USB_ROLE_SWITCH USB_STORAGE_REALTEK USB_ULPI_BUS USB_USBNET VIDEO_DEV VXLAN WIRELESS WLAN ZONE_DEVICE] disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG LOCKDEP], they are not needed picked [v6.9 v6.8 v6.7 v6.5 v6.3 v6.1 v5.19 v5.17 v5.14 v5.11 v5.8 v5.5 v5.2 v4.20 v4.19] out of 32 release tags testing release v6.9 testing commit a38297e3fb012ddfa7ce0321a7e5a8daeb1872b6 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 9eaaba1bb77a5f323d86856d5406fd4a4b4f3fb8f2fcd11d1f63e0afdb741a70 all runs: OK false negative chance: 0.000 # git bisect start d35b2284e966c0bef3e2182a5c5ea02177dd32e4 a38297e3fb012ddfa7ce0321a7e5a8daeb1872b6 Bisecting: 8652 revisions left to test after this (roughly 13 steps) [0cc6f45cecb46cefe89c17ec816dc8cd58a2229a] Merge tag 'iommu-updates-v6.10' of git://git.kernel.org/pub/scm/linux/kernel/git/joro/iommu testing commit 0cc6f45cecb46cefe89c17ec816dc8cd58a2229a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e3fcecf9e46df9c54bff2f47a33a515da3a074ed57048b3a730df4cf0d49cad1 all runs: OK false negative chance: 0.000 # git bisect good 0cc6f45cecb46cefe89c17ec816dc8cd58a2229a Bisecting: 4322 revisions left to test after this (roughly 12 steps) [41d298d8522566eda31fe8ece0ad874c4ad7b70f] Merge branch 'mm-hotfixes-unstable' of git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm testing commit 41d298d8522566eda31fe8ece0ad874c4ad7b70f gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 6f990a0cbeabe369ec9e50a6bf82b7eff055552a8bafaafe875d4c2ffc44d267 all runs: OK false negative chance: 0.000 # git bisect good 41d298d8522566eda31fe8ece0ad874c4ad7b70f Bisecting: 2157 revisions left to test after this (roughly 11 steps) [4c0356b62aad206e81edb1104b4bfd48f37086ff] Merge branch 'nand/next' of git://git.kernel.org/pub/scm/linux/kernel/git/mtd/linux.git testing commit 4c0356b62aad206e81edb1104b4bfd48f37086ff gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 6c14877b1fd35cc0cd26e8d6c986cdcfa10d671bea080eeaebc87ce4cfc388a2 run #0: crashed: KASAN: slab-use-after-free Read in finish_fault run #1: crashed: KASAN: slab-use-after-free Read in finish_fault run #2: crashed: BUG: Bad rss-counter state run #3: crashed: KASAN: slab-use-after-free Read in finish_fault run #4: crashed: KASAN: slab-use-after-free Read in finish_fault run #5: crashed: KASAN: slab-use-after-free Read in finish_fault run #6: crashed: BUG: Bad rss-counter state run #7: crashed: KASAN: slab-out-of-bounds Read in finish_fault run #8: crashed: KASAN: slab-use-after-free Read in finish_fault run #9: crashed: KASAN: use-after-free Read in finish_fault representative crash: KASAN: slab-use-after-free Read in finish_fault, types: [KASAN] # git bisect bad 4c0356b62aad206e81edb1104b4bfd48f37086ff Bisecting: 1154 revisions left to test after this (roughly 10 steps) [7e102d9068da58acdc7c13f9b5c3e7d33de8db93] Merge branch 'for-next' of git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux.git testing commit 7e102d9068da58acdc7c13f9b5c3e7d33de8db93 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 856d932c01dac66a5e70b5808015ea99aa61a7f3d567f9666be470f048a94e91 run #0: crashed: KASAN: slab-use-after-free Read in finish_fault run #1: crashed: BUG: Bad rss-counter state run #2: crashed: KASAN: slab-use-after-free Read in finish_fault run #3: crashed: invalid opcode in filemap_unaccount_folio run #4: crashed: KASAN: slab-use-after-free Read in finish_fault run #5: crashed: KASAN: slab-use-after-free Read in finish_fault run #6: crashed: KASAN: slab-use-after-free Read in finish_fault run #7: crashed: KASAN: slab-use-after-free Read in finish_fault run #8: crashed: KASAN: unknown-crash Read in __schedule run #9: crashed: KASAN: slab-use-after-free Read in finish_fault representative crash: KASAN: slab-use-after-free Read in finish_fault, types: [KASAN] # git bisect bad 7e102d9068da58acdc7c13f9b5c3e7d33de8db93 Bisecting: 507 revisions left to test after this (roughly 9 steps) [c02aec2ee1749d6d872bb8d0098e97205e1aee36] Merge branch 'for-next' of git://git.kernel.org/pub/scm/linux/kernel/git/soc/soc.git testing commit c02aec2ee1749d6d872bb8d0098e97205e1aee36 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 80654dc6856cb78a1d64136f781dce59d5203ca772f52be452c2381e2994d419 run #0: crashed: KASAN: slab-use-after-free Read in finish_fault run #1: crashed: BUG: Bad rss-counter state run #2: crashed: KASAN: slab-use-after-free Read in finish_fault run #3: crashed: KASAN: slab-use-after-free Read in finish_fault run #4: crashed: BUG: Bad rss-counter state run #5: crashed: KASAN: use-after-free Read in finish_fault run #6: crashed: KASAN: slab-use-after-free Read in finish_fault run #7: crashed: KASAN: slab-use-after-free Read in finish_fault run #8: crashed: KASAN: slab-use-after-free Read in finish_fault run #9: crashed: BUG: Bad rss-counter state representative crash: KASAN: slab-use-after-free Read in finish_fault, types: [KASAN UNKNOWN] # git bisect bad c02aec2ee1749d6d872bb8d0098e97205e1aee36 Bisecting: 262 revisions left to test after this (roughly 8 steps) [6ec8e62a9eab8f2a9e9ba51d9164c18a9117c766] Merge branch 'for-linux-next-fixes' of https://gitlab.freedesktop.org/drm/misc/kernel.git testing commit 6ec8e62a9eab8f2a9e9ba51d9164c18a9117c766 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 4c44983294eabf8032d41663806e874248598539654d6d509dc0139e27fe5905 all runs: OK false negative chance: 0.000 # git bisect good 6ec8e62a9eab8f2a9e9ba51d9164c18a9117c766 Bisecting: 131 revisions left to test after this (roughly 7 steps) [a5a608afb99ed2f1bbd7f4cd8937c2c7f4c5fe69] mm: remove page_maybe_dma_pinned() testing commit a5a608afb99ed2f1bbd7f4cd8937c2c7f4c5fe69 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 5bbdd7eccfd4687df48c69fe245c2f3e583ce871f38fccc1f7a4962f3e3ae2e1 all runs: OK false negative chance: 0.000 # git bisect good a5a608afb99ed2f1bbd7f4cd8937c2c7f4c5fe69 Bisecting: 77 revisions left to test after this (roughly 6 steps) [245e5db4adaf92f46dfaa59893b59caad044edb8] lib/list_test: add the missing MODULE_DESCRIPTION() macro testing commit 245e5db4adaf92f46dfaa59893b59caad044edb8 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 2e9178a7da687246ef41287c824a79f64c0d37d9780a5340a4a7676099dd1253 all runs: OK false negative chance: 0.000 # git bisect good 245e5db4adaf92f46dfaa59893b59caad044edb8 Bisecting: 33 revisions left to test after this (roughly 5 steps) [16a94f9847391d6bcb7e6b80c5a61131ce9e1f04] Merge branch 'perf-tools-next' of git://git.kernel.org/pub/scm/linux/kernel/git/perf/perf-tools-next.git testing commit 16a94f9847391d6bcb7e6b80c5a61131ce9e1f04 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 442065729f63b737cd13ba534c02b8741436ac66efff666fda848c9f9f56b563 run #0: crashed: KASAN: slab-use-after-free Read in finish_fault run #1: crashed: KASAN: slab-use-after-free Read in finish_fault run #2: crashed: KASAN: slab-use-after-free Read in finish_fault run #3: crashed: KASAN: slab-use-after-free Read in finish_fault run #4: crashed: KASAN: slab-out-of-bounds Read in finish_fault run #5: crashed: KASAN: slab-use-after-free Read in finish_fault run #6: crashed: KASAN: slab-use-after-free Read in finish_fault run #7: crashed: invalid opcode in filemap_unaccount_folio run #8: crashed: KASAN: slab-use-after-free Read in finish_fault run #9: crashed: KASAN: slab-use-after-free Read in finish_fault representative crash: KASAN: slab-use-after-free Read in finish_fault, types: [KASAN] # git bisect bad 16a94f9847391d6bcb7e6b80c5a61131ce9e1f04 Bisecting: 21 revisions left to test after this (roughly 5 steps) [702f1d326bc5ded4ad9aa8f7ced5be4e70210f66] lib: test_hmm: add missing MODULE_DESCRIPTION() macro testing commit 702f1d326bc5ded4ad9aa8f7ced5be4e70210f66 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e5914d044460fc960309c7143c8b6b2e4486069858de61ee192d771dd3a5c96d run #0: crashed: KASAN: use-after-free Read in finish_fault run #1: crashed: KASAN: slab-use-after-free Read in finish_fault run #2: crashed: BUG: Bad rss-counter state run #3: crashed: KASAN: slab-use-after-free Read in finish_fault run #4: crashed: KASAN: slab-use-after-free Read in finish_fault run #5: crashed: KASAN: slab-use-after-free Read in finish_fault run #6: crashed: KASAN: slab-use-after-free Read in finish_fault run #7: crashed: KASAN: use-after-free Read in finish_fault run #8: crashed: KASAN: slab-use-after-free Read in finish_fault run #9: crashed: KASAN: slab-use-after-free Read in finish_fault representative crash: KASAN: use-after-free Read in finish_fault, types: [KASAN] # git bisect bad 702f1d326bc5ded4ad9aa8f7ced5be4e70210f66 Bisecting: 10 revisions left to test after this (roughly 4 steps) [f14396786c866c97169a6b01ddff1dab4d5b5334] mm: move memory_failure_queue() into copy_mc_[user]_highpage() testing commit f14396786c866c97169a6b01ddff1dab4d5b5334 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 626482c431ff50d3df91ec363f505af3de326b6ab08e0335a8c72788538d6fd2 run #0: crashed: KASAN: slab-use-after-free Read in finish_fault run #1: crashed: KASAN: slab-use-after-free Read in finish_fault run #2: crashed: KASAN: slab-use-after-free Read in finish_fault run #3: crashed: BUG: Bad rss-counter state run #4: crashed: KASAN: slab-use-after-free Read in finish_fault run #5: crashed: KASAN: slab-use-after-free Read in finish_fault run #6: crashed: KASAN: slab-use-after-free Read in finish_fault run #7: crashed: KASAN: slab-use-after-free Read in finish_fault run #8: crashed: KASAN: slab-use-after-free Read in finish_fault run #9: crashed: KASAN: slab-use-after-free Read in finish_fault representative crash: KASAN: slab-use-after-free Read in finish_fault, types: [KASAN] # git bisect bad f14396786c866c97169a6b01ddff1dab4d5b5334 Bisecting: 5 revisions left to test after this (roughly 3 steps) [d4a801d04c73574027ec3f1caa577f1ff8573f30] mm: shmem: add THP validation for PMD-mapped THP related statistics testing commit d4a801d04c73574027ec3f1caa577f1ff8573f30 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: f1223bbb052e30c1ce1bb9933f3d3a450e3c7b14ea3676047fb6af108bcfaf8d run #0: crashed: KASAN: slab-use-after-free Read in finish_fault run #1: crashed: KASAN: slab-use-after-free Read in finish_fault run #2: crashed: KASAN: slab-use-after-free Read in finish_fault run #3: crashed: KASAN: use-after-free Read in finish_fault run #4: crashed: KASAN: slab-use-after-free Read in finish_fault run #5: crashed: KASAN: slab-use-after-free Read in finish_fault run #6: crashed: KASAN: slab-use-after-free Read in finish_fault run #7: crashed: KASAN: slab-use-after-free Read in finish_fault run #8: crashed: KASAN: slab-use-after-free Read in finish_fault run #9: crashed: KASAN: slab-use-after-free Read in finish_fault representative crash: KASAN: slab-use-after-free Read in finish_fault, types: [KASAN] # git bisect bad d4a801d04c73574027ec3f1caa577f1ff8573f30 Bisecting: 2 revisions left to test after this (roughly 1 step) [ff8af5ce8d0f73d9743428a4f2bf2edc9cf8fa68] mm: remove page_mkclean() testing commit ff8af5ce8d0f73d9743428a4f2bf2edc9cf8fa68 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 28131fae77dae81593ffeda9c62390084ef89983f4e7b6fe27df120596dffb4e all runs: OK false negative chance: 0.000 # git bisect good ff8af5ce8d0f73d9743428a4f2bf2edc9cf8fa68 Bisecting: 0 revisions left to test after this (roughly 1 step) [980548469db257a44e93b0586515e13c5716bac1] mm-memory-extend-finish_fault-to-support-large-folio-fix testing commit 980548469db257a44e93b0586515e13c5716bac1 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: d66454ab0cf6f82b6ed1ddc9dd5aa44d40f91b754b6716a90afaf22b3ec4aa6a run #0: crashed: BUG: Bad rss-counter state run #1: crashed: KASAN: slab-use-after-free Read in finish_fault run #2: crashed: KASAN: slab-use-after-free Read in finish_fault run #3: crashed: KASAN: slab-use-after-free Read in finish_fault run #4: crashed: KASAN: slab-use-after-free Read in finish_fault run #5: crashed: KASAN: slab-use-after-free Read in finish_fault run #6: crashed: BUG: Bad rss-counter state run #7: crashed: BUG: Bad rss-counter state run #8: crashed: KASAN: slab-use-after-free Read in finish_fault run #9: crashed: KASAN: slab-use-after-free Read in finish_fault representative crash: KASAN: slab-use-after-free Read in finish_fault, types: [KASAN UNKNOWN] # git bisect bad 980548469db257a44e93b0586515e13c5716bac1 Bisecting: 0 revisions left to test after this (roughly 0 steps) [1c05047ad01693ad92bdf8347fad3b5c2b25e8bb] mm: memory: extend finish_fault() to support large folio testing commit 1c05047ad01693ad92bdf8347fad3b5c2b25e8bb gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 21300077cdb29c8fc8b42261c539deb0fe896acf923d334d4185b4e1c1d5a18b run #0: crashed: KASAN: slab-use-after-free Read in finish_fault run #1: crashed: KASAN: slab-use-after-free Read in finish_fault run #2: crashed: BUG: Bad rss-counter state run #3: crashed: invalid opcode in filemap_unaccount_folio run #4: crashed: KASAN: slab-use-after-free Read in finish_fault run #5: crashed: KASAN: slab-use-after-free Read in finish_fault run #6: crashed: KASAN: slab-use-after-free Read in finish_fault run #7: crashed: KASAN: slab-use-after-free Read in finish_fault run #8: crashed: KASAN: slab-use-after-free Read in finish_fault run #9: crashed: BUG: Bad rss-counter state representative crash: KASAN: slab-use-after-free Read in finish_fault, types: [KASAN UNKNOWN] # git bisect bad 1c05047ad01693ad92bdf8347fad3b5c2b25e8bb 1c05047ad01693ad92bdf8347fad3b5c2b25e8bb is the first bad commit commit 1c05047ad01693ad92bdf8347fad3b5c2b25e8bb Author: Baolin Wang Date: Tue Jun 4 18:17:45 2024 +0800 mm: memory: extend finish_fault() to support large folio Patch series "add mTHP support for anonymous shmem", v4. Anonymous pages have already been supported for multi-size (mTHP) allocation through commit 19eaf44954df, that can allow THP to be configured through the sysfs interface located at '/sys/kernel/mm/transparent_hugepage/hugepage-XXkb/enabled'. However, the anonymous shmem will ignore the anonymous mTHP rule configured through the sysfs interface, and can only use the PMD-mapped THP, that is not reasonable. Many implement anonymous page sharing through mmap(MAP_SHARED | MAP_ANONYMOUS), especially in database usage scenarios, therefore, users expect to apply an unified mTHP strategy for anonymous pages, also including the anonymous shared pages, in order to enjoy the benefits of mTHP. For example, lower latency than PMD-mapped THP, smaller memory bloat than PMD-mapped THP, contiguous PTEs on ARM architecture to reduce TLB miss etc. As discussed in the bi-weekly MM meeting[1], the mTHP controls should control all of shmem, not only anonymous shmem, but support will be added iteratively. Therefore, this patch set starts with support for anonymous shmem. The primary strategy is similar to supporting anonymous mTHP. Introduce a new interface '/mm/transparent_hugepage/hugepage-XXkb/shmem_enabled', which can have almost the same values as the top-level '/sys/kernel/mm/transparent_hugepage/shmem_enabled', with adding a new additional "inherit" option and dropping the testing options 'force' and 'deny'. By default all sizes will be set to "never" except PMD size, which is set to "inherit". This ensures backward compatibility with the anonymous shmem enabled of the top level, meanwhile also allows independent control of anonymous shmem enabled for each mTHP. Use the page fault latency tool to measure the performance of 1G anonymous shmem with 32 threads on my machine environment with: ARM64 Architecture, 32 cores, 125G memory: base: mm-unstable user-time sys_time faults_per_sec_per_cpu faults_per_sec 0.04s 3.10s 83516.416 2669684.890 mm-unstable + patchset, anon shmem mTHP disabled user-time sys_time faults_per_sec_per_cpu faults_per_sec 0.02s 3.14s 82936.359 2630746.027 mm-unstable + patchset, anon shmem 64K mTHP enabled user-time sys_time faults_per_sec_per_cpu faults_per_sec 0.08s 0.31s 678630.231 17082522.495 From the data above, it is observed that the patchset has a minimal impact when mTHP is not enabled (some fluctuations observed during testing). When enabling 64K mTHP, there is a significant improvement of the page fault latency. [1] https://lore.kernel.org/all/f1783ff0-65bd-4b2b-8952-52b6822a0835@redhat.com/ This patch (of 6): Add large folio mapping establishment support for finish_fault() as a preparation, to support multi-size THP allocation of anonymous shmem pages in the following patches. Keep the same behavior (per-page fault) for non-anon shmem to avoid inflating the RSS unintentionally, and we can discuss what size of mapping to build when extending mTHP to control non-anon shmem in the future. Link: https://lkml.kernel.org/r/cover.1717495894.git.baolin.wang@linux.alibaba.com Link: https://lkml.kernel.org/r/bee11bfd9157e60aaea6db033a4af7c13c982c82.1717495894.git.baolin.wang@linux.alibaba.com Signed-off-by: Baolin Wang Cc: Daniel Gomez Cc: David Hildenbrand Cc: "Huang, Ying" Cc: Hugh Dickins Cc: Kefeng Wang Cc: Lance Yang Cc: Matthew Wilcox (Oracle) Cc: Pankaj Raghav Cc: Ryan Roberts Cc: Yang Shi Cc: Zi Yan Cc: Barry Song Signed-off-by: Andrew Morton mm/memory.c | 57 +++++++++++++++++++++++++++++++++++++++++++++++---------- 1 file changed, 47 insertions(+), 10 deletions(-) accumulated error probability: 0.00 culprit signature: 21300077cdb29c8fc8b42261c539deb0fe896acf923d334d4185b4e1c1d5a18b parent signature: 28131fae77dae81593ffeda9c62390084ef89983f4e7b6fe27df120596dffb4e revisions tested: 23, total time: 7h35m47.380124631s (build: 4h33m17.186202184s, test: 2h43m54.352272689s) first bad commit: 1c05047ad01693ad92bdf8347fad3b5c2b25e8bb mm: memory: extend finish_fault() to support large folio recipients (to): ["akpm@linux-foundation.org" "akpm@linux-foundation.org" "baolin.wang@linux.alibaba.com" "linux-mm@kvack.org"] recipients (cc): ["linux-kernel@vger.kernel.org"] crash: KASAN: slab-use-after-free Read in finish_fault ================================================================== BUG: KASAN: slab-use-after-free in ptep_get include/linux/pgtable.h:317 [inline] BUG: KASAN: slab-use-after-free in ptep_get_lockless include/linux/pgtable.h:581 [inline] BUG: KASAN: slab-use-after-free in pte_range_none mm/memory.c:4407 [inline] BUG: KASAN: slab-use-after-free in finish_fault+0x8b9/0xe90 mm/memory.c:4903 Read of size 8 at addr ffff88807d3e6000 by task syz-executor.4/5327 CPU: 1 PID: 5327 Comm: syz-executor.4 Not tainted 6.10.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x108/0x280 lib/dump_stack.c:114 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 kasan_report+0x143/0x180 mm/kasan/report.c:601 ptep_get include/linux/pgtable.h:317 [inline] ptep_get_lockless include/linux/pgtable.h:581 [inline] pte_range_none mm/memory.c:4407 [inline] finish_fault+0x8b9/0xe90 mm/memory.c:4903 do_read_fault mm/memory.c:5050 [inline] do_fault mm/memory.c:5176 [inline] do_pte_missing mm/memory.c:3950 [inline] handle_pte_fault mm/memory.c:5500 [inline] __handle_mm_fault+0x142c/0x5b30 mm/memory.c:5643 handle_mm_fault+0x122/0x470 mm/memory.c:5808 faultin_page mm/gup.c:1339 [inline] __get_user_pages+0x74f/0x1180 mm/gup.c:1638 populate_vma_page_range+0x1bc/0x260 mm/gup.c:2078 __mm_populate+0x21c/0x380 mm/gup.c:2181 mm_populate include/linux/mm.h:3441 [inline] __do_sys_remap_file_pages mm/mmap.c:3177 [inline] __se_sys_remap_file_pages+0x681/0x850 mm/mmap.c:3103 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x170 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f7fdb67cf69 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f7fdc4790c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000d8 RAX: ffffffffffffffda RBX: 00007f7fdb7b4050 RCX: 00007f7fdb67cf69 RDX: 0000000000000000 RSI: 0000000000200000 RDI: 00000000202ec000 RBP: 00007f7fdb6da6fe R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000006 R14: 00007f7fdb7b4050 R15: 00007ffdd5234cb8 Allocated by task 4924: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 unpoison_slab_object mm/kasan/common.c:312 [inline] __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:338 kasan_slab_alloc include/linux/kasan.h:201 [inline] slab_post_alloc_hook mm/slub.c:3941 [inline] slab_alloc_node mm/slub.c:4001 [inline] kmem_cache_alloc_noprof+0x12b/0x350 mm/slub.c:4008 vma_lock_alloc kernel/fork.c:441 [inline] vm_area_dup+0x5b/0x160 kernel/fork.c:494 __split_vma+0xfe/0xa30 mm/mmap.c:2435 do_vmi_align_munmap+0x32a/0x13c0 mm/mmap.c:2633 do_vmi_munmap+0x1c4/0x230 mm/mmap.c:2800 mmap_region+0x607/0x19a0 mm/mmap.c:2851 do_mmap+0x6b6/0xc20 mm/mmap.c:1438 vm_mmap_pgoff+0x1aa/0x320 mm/util.c:573 ksys_mmap_pgoff+0x2d2/0x3f0 mm/mmap.c:1484 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x170 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 4924: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579 poison_slab_object+0xe0/0x150 mm/kasan/common.c:240 __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2196 [inline] slab_free mm/slub.c:4437 [inline] kmem_cache_free+0x12c/0x3b0 mm/slub.c:4512 vma_lock_free kernel/fork.c:453 [inline] __vm_area_free+0x66/0x80 kernel/fork.c:509 remove_vma mm/mmap.c:187 [inline] exit_mmap+0x51d/0x950 mm/mmap.c:3406 __mmput+0x9b/0x2d0 kernel/fork.c:1346 exit_mm+0x114/0x1b0 kernel/exit.c:565 do_exit+0x7d5/0x2550 kernel/exit.c:861 do_group_exit+0x1ba/0x280 kernel/exit.c:1023 __do_sys_exit_group kernel/exit.c:1034 [inline] __se_sys_exit_group kernel/exit.c:1032 [inline] __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1032 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x170 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f The buggy address belongs to the object at ffff88807d3e6000 which belongs to the cache vma_lock of size 152 The buggy address is located 0 bytes inside of freed 152-byte region [ffff88807d3e6000, ffff88807d3e6098) The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88807d3e6798 pfn:0x7d3e6 memcg:ffff8880158d5801 flags: 0xfff00000000200(workingset|node=0|zone=1|lastcpupid=0x7ff) page_type: 0xfdffffff(slab) raw: 00fff00000000200 ffff88800a2dbc80 ffffea00005c8d50 ffffea0001f3e210 raw: ffff88807d3e6798 0000000000120005 00000001fdffffff ffff8880158d5801 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x152cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 1968, tgid 1968 (modprobe), ts 27069492018, free_ts 27069464461 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x10f/0x130 mm/page_alloc.c:1470 prep_new_page mm/page_alloc.c:1478 [inline] get_page_from_freelist+0x2c3f/0x2cf0 mm/page_alloc.c:3421 __alloc_pages_noprof+0x256/0x670 mm/page_alloc.c:4679 __alloc_pages_node_noprof include/linux/gfp.h:269 [inline] alloc_pages_node_noprof include/linux/gfp.h:296 [inline] alloc_slab_page+0x5f/0x120 mm/slub.c:2265 allocate_slab+0x5d/0x290 mm/slub.c:2428 new_slab mm/slub.c:2481 [inline] ___slab_alloc+0xa7f/0x11d0 mm/slub.c:3667 __slab_alloc mm/slub.c:3757 [inline] __slab_alloc_node mm/slub.c:3810 [inline] slab_alloc_node mm/slub.c:3989 [inline] kmem_cache_alloc_noprof+0x1eb/0x350 mm/slub.c:4008 vma_lock_alloc kernel/fork.c:441 [inline] vm_area_alloc+0x109/0x1c0 kernel/fork.c:472 mmap_region+0xa36/0x19a0 mm/mmap.c:2914 do_mmap+0x6b6/0xc20 mm/mmap.c:1438 vm_mmap_pgoff+0x1aa/0x320 mm/util.c:573 elf_map fs/binfmt_elf.c:381 [inline] elf_load+0x11d/0x520 fs/binfmt_elf.c:408 load_elf_binary+0xd99/0x2390 fs/binfmt_elf.c:1132 search_binary_handler fs/exec.c:1797 [inline] exec_binprm fs/exec.c:1839 [inline] bprm_execve+0x891/0x12f0 fs/exec.c:1891 kernel_execve+0x532/0x610 fs/exec.c:2058 call_usermodehelper_exec_async+0x204/0x320 kernel/umh.c:110 page last free pid 1968 tgid 1968 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1089 [inline] free_unref_folios+0xd99/0x16d0 mm/page_alloc.c:2633 folios_put_refs+0x4cc/0x5b0 mm/swap.c:1020 free_pages_and_swap_cache+0x415/0x4e0 mm/swap_state.c:335 __tlb_batch_free_encoded_pages mm/mmu_gather.c:136 [inline] tlb_batch_pages_flush mm/mmu_gather.c:149 [inline] tlb_flush_mmu_free mm/mmu_gather.c:366 [inline] tlb_flush_mmu+0x2ad/0x4e0 mm/mmu_gather.c:373 tlb_finish_mmu+0xb6/0x1c0 mm/mmu_gather.c:465 shift_arg_pages fs/exec.c:750 [inline] setup_arg_pages+0xb44/0xda0 fs/exec.c:849 load_elf_binary+0xa59/0x2390 fs/binfmt_elf.c:1013 search_binary_handler fs/exec.c:1797 [inline] exec_binprm fs/exec.c:1839 [inline] bprm_execve+0x891/0x12f0 fs/exec.c:1891 kernel_execve+0x532/0x610 fs/exec.c:2058 call_usermodehelper_exec_async+0x204/0x320 kernel/umh.c:110 ret_from_fork+0x32/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Memory state around the buggy address: ffff88807d3e5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88807d3e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88807d3e6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff88807d3e6080: fb fb fb fc fc fc fc fc fc fc fc fa fb fb fb fb ffff88807d3e6100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc ==================================================================