ci starts bisection 2023-09-10 13:27:39.798398974 +0000 UTC m=+156113.731176663 bisecting cause commit starting from 99d99825fc075fd24b60cc9cf0fb1e20b9c16b0f building syzkaller on 696ea0d2f4fdaa17db929e152edba19bf7666d84 ensuring issue is reproducible on original commit 99d99825fc075fd24b60cc9cf0fb1e20b9c16b0f testing commit 99d99825fc075fd24b60cc9cf0fb1e20b9c16b0f gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 207e833d2313594adebfed0c91453c29ebf8284ce963597c7195c828892921d3 run #0: infra problem: create image operation failed: &{Code:QUOTA_EXCEEDED ErrorDetails:[0xc003e5c870] Location: Message:Quota 'N2D_CPUS' exceeded. Limit: 300.0 in region us-central1. ForceSendFields:[] NullFields:[]}. run #1: infra problem: create image operation failed: &{Code:QUOTA_EXCEEDED ErrorDetails:[0xc004b32460] Location: Message:Quota 'N2D_CPUS' exceeded. Limit: 300.0 in region us-central1. ForceSendFields:[] NullFields:[]}. run #2: infra problem: create image operation failed: &{Code:QUOTA_EXCEEDED ErrorDetails:[0xc003afcaf0] Location: Message:Quota 'N2D_CPUS' exceeded. Limit: 300.0 in region us-central1. ForceSendFields:[] NullFields:[]}. run #3: infra problem: create image operation failed: &{Code:QUOTA_EXCEEDED ErrorDetails:[0xc004b32730] Location: Message:Quota 'N2D_CPUS' exceeded. Limit: 300.0 in region us-central1. ForceSendFields:[] NullFields:[]}. run #4: infra problem: create image operation failed: &{Code:QUOTA_EXCEEDED ErrorDetails:[0xc003afce60] Location: Message:Quota 'N2D_CPUS' exceeded. Limit: 300.0 in region us-central1. ForceSendFields:[] NullFields:[]}. run #5: infra problem: create image operation failed: &{Code:QUOTA_EXCEEDED ErrorDetails:[0xc004b32820] Location: Message:Quota 'N2D_CPUS' exceeded. Limit: 300.0 in region us-central1. ForceSendFields:[] NullFields:[]}. run #6: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #7: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #8: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #9: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #10: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #11: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #12: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #13: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #14: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #15: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #16: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #17: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #18: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #19: crashed: KASAN: slab-use-after-free Write in __sco_sock_close representative crash: KASAN: slab-use-after-free Write in __sco_sock_close, types: [KASAN] check whether we can drop unnecessary instrumentation disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG LOCKDEP], they are not needed testing commit 99d99825fc075fd24b60cc9cf0fb1e20b9c16b0f gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e13ab002172cee56c9edc88fdc3b73390487e7c27871f4397ee313b2e5e8d94b all runs: crashed: KASAN: slab-use-after-free Write in __sco_sock_close representative crash: KASAN: slab-use-after-free Write in __sco_sock_close, types: [KASAN] the bug reproduces without the instrumentation disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed kconfig minimization: base=3883 full=7676 leaves diff=2016 split chunks (needed=false): <2016> split chunk #0 of len 2016 into 5 parts testing without sub-chunk 1/5 disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit 99d99825fc075fd24b60cc9cf0fb1e20b9c16b0f gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: bfacc295a6a1f2ec9fd3d00b940d8720b26f4749930d39de180f285a5204fcc6 all runs: OK false negative chance: 0.000 testing without sub-chunk 2/5 disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG LOCKDEP], they are not needed testing commit 99d99825fc075fd24b60cc9cf0fb1e20b9c16b0f gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: ef286ffa267c52599694b40aa5e8fa7de33b96f2e03d53985dffe0b163dc83ae all runs: crashed: KASAN: slab-use-after-free Write in __sco_sock_close representative crash: KASAN: slab-use-after-free Write in __sco_sock_close, types: [KASAN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG LOCKDEP], they are not needed testing commit 99d99825fc075fd24b60cc9cf0fb1e20b9c16b0f gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 4f99abea861898f8702c32dbefcf2def50ae9370837d2d3b3f68cf6e2540fbfe all runs: crashed: KASAN: slab-use-after-free Write in __sco_sock_close representative crash: KASAN: slab-use-after-free Write in __sco_sock_close, types: [KASAN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit 99d99825fc075fd24b60cc9cf0fb1e20b9c16b0f gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 35e9e82ca46d32b1f8824cca793476120ee3d92567f560a99046d73a2efc380e run #0: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #1: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #2: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #3: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #4: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #5: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #6: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #7: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #8: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #9: OK representative crash: KASAN: slab-use-after-free Write in __sco_sock_close, types: [KASAN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit 99d99825fc075fd24b60cc9cf0fb1e20b9c16b0f gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: f7ae959159c57117d6d0c45955cc960a940e02e37cd07678bc83c37b3a8982c3 run #0: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #1: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #2: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #3: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #4: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #5: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #6: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #7: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #8: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #9: OK representative crash: KASAN: slab-use-after-free Write in __sco_sock_close, types: [KASAN] the chunk can be dropped minimized to 404 configs; suspects: [6LOWPAN 6LOWPAN_GHC_EXT_HDR_DEST 6LOWPAN_GHC_EXT_HDR_FRAG 6LOWPAN_GHC_EXT_HDR_HOP 6LOWPAN_GHC_EXT_HDR_ROUTE 6LOWPAN_GHC_ICMPV6 6LOWPAN_GHC_UDP 6LOWPAN_NHC 6LOWPAN_NHC_DEST 6LOWPAN_NHC_FRAGMENT 6LOWPAN_NHC_HOP 6LOWPAN_NHC_IPV6 6LOWPAN_NHC_MOBILITY 6LOWPAN_NHC_ROUTING 6LOWPAN_NHC_UDP 6PACK 842_COMPRESS 842_DECOMPRESS 9P_FSCACHE 9P_FS_POSIX_ACL 9P_FS_SECURITY ACORN_PARTITION ACORN_PARTITION_ADFS ACORN_PARTITION_CUMANA ACORN_PARTITION_EESOX ACORN_PARTITION_ICS ACORN_PARTITION_POWERTEC ACORN_PARTITION_RISCIX ACPI_NFIT ACPI_PLATFORM_PROFILE ADDRESS_MASKING ADFS_FS AFFS_FS AFS_FS AFS_FSCACHE AF_KCM AF_RXRPC AF_RXRPC_IPV6 AIX_PARTITION AMIGA_PARTITION ANDROID_BINDERFS ANDROID_BINDER_IPC ANON_VMA_NAME APERTURE_HELPERS AR5523 ARCH_ENABLE_MEMORY_HOTREMOVE ARCH_ENABLE_THP_MIGRATION ARCH_SUPPORTS_CRASH_DUMP ARCH_SUPPORTS_CRASH_HOTPLUG ARCH_SUPPORTS_KEXEC ARCH_SUPPORTS_KEXEC_BZIMAGE_VERIFY_SIG ARCH_SUPPORTS_KEXEC_FILE ARCH_SUPPORTS_KEXEC_JUMP ARCH_SUPPORTS_KEXEC_SIG ARCH_SUPPORTS_KEXEC_SIG_FORCE ARCH_WANT_OPTIMIZE_DAX_VMEMMAP ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP ARCH_WANT_PMD_MKWRITE ASM_MODVERSIONS ASYNC_CORE ASYNC_MEMCPY ASYNC_PQ ASYNC_RAID6_RECOV ASYNC_TX_DMA ASYNC_XOR ATARI_PARTITION ATA_GENERIC ATA_OVER_ETH ATH10K ATH10K_CE ATH10K_PCI ATH10K_USB ATH11K ATH6KL ATH6KL_USB ATH9K ATH9K_AHB ATH9K_BTCOEX_SUPPORT ATH9K_CHANNEL_CONTEXT ATH9K_COMMON ATH9K_COMMON_DEBUG ATH9K_DEBUGFS ATH9K_DYNACK ATH9K_HTC ATH9K_HTC_DEBUGFS ATH9K_HW ATH9K_PCI ATH9K_PCOEM ATH9K_RFKILL ATH_COMMON ATM ATM_BR2684 ATM_CLIP ATM_DRIVERS ATM_LANE ATM_MPOA ATM_TCP AUXILIARY_BUS AX25 AX25_DAMA_SLAVE AX88796B_PHY BAREUDP BATMAN_ADV BATMAN_ADV_BATMAN_V BATMAN_ADV_BLA BATMAN_ADV_DAT BATMAN_ADV_MCAST BATMAN_ADV_NC BCACHE BCMA BCMA_HOST_PCI_POSSIBLE BEFS_FS BFQ_CGROUP_DEBUG BFQ_GROUP_IOSCHED BFS_FS BIG_KEYS BLK_CGROUP_PUNT_BIO BLK_CGROUP_RWSTAT BLK_DEBUG_FS_ZONED BLK_DEV_BSGLIB BLK_DEV_FD BLK_DEV_INTEGRITY BLK_DEV_INTEGRITY_T10 BLK_DEV_NBD BLK_DEV_NULL_BLK BLK_DEV_NULL_BLK_FAULT_INJECTION BLK_DEV_NVME BLK_DEV_PMEM BLK_DEV_RAM BLK_DEV_RNBD BLK_DEV_RNBD_CLIENT BLK_DEV_THROTTLING BLK_ICQ BLK_INLINE_ENCRYPTION BLK_INLINE_ENCRYPTION_FALLBACK BLK_WBT BLK_WBT_MQ BONDING BOOT_VESA_SUPPORT BPF_EVENTS BPF_JIT BPF_JIT_ALWAYS_ON BPF_JIT_DEFAULT_ON BPF_LSM BPF_PRELOAD BPF_PRELOAD_UMD BPF_STREAM_PARSER BPF_SYSCALL BPQETHER BRIDGE BRIDGE_CFM BRIDGE_EBT_802_3 BRIDGE_EBT_AMONG BRIDGE_EBT_ARP BRIDGE_EBT_ARPREPLY BRIDGE_EBT_BROUTE BRIDGE_EBT_DNAT BRIDGE_EBT_IP BRIDGE_EBT_IP6 BRIDGE_EBT_LIMIT BRIDGE_EBT_LOG BRIDGE_EBT_MARK BRIDGE_EBT_MARK_T BRIDGE_EBT_NFLOG BRIDGE_EBT_PKTTYPE BRIDGE_EBT_REDIRECT BRIDGE_EBT_SNAT BRIDGE_EBT_STP BRIDGE_EBT_T_FILTER BRIDGE_EBT_T_NAT BRIDGE_EBT_VLAN BRIDGE_IGMP_SNOOPING BRIDGE_MRP BRIDGE_NF_EBTABLES BRIDGE_VLAN_FILTERING BSD_DISKLABEL BSD_PROCESS_ACCT_V3 BT BTRFS_ASSERT BTRFS_FS BTRFS_FS_POSIX_ACL BTRFS_FS_REF_VERIFY BTT BT_6LOWPAN BT_ATH3K BT_BCM BT_BNEP BT_BNEP_MC_FILTER BT_BNEP_PROTO_FILTER BT_BREDR BT_CMTP BT_HCIBCM203X BT_HCIBFUSB BT_HCIBPA10X BT_HCIBTUSB BT_HCIBTUSB_BCM BT_HCIBTUSB_MTK BT_HCIBTUSB_POLL_SYNC BT_HCIBTUSB_RTL BT_HCIUART BT_HCIUART_3WIRE BT_HCIUART_AG6XX BT_HCIUART_BCSP BT_HCIUART_H4 BT_HCIUART_LL BT_HCIUART_MRVL BT_HCIUART_QCA BT_HCIUART_SERDEV BT_HCIVHCI BT_HIDP BT_HS BT_INTEL BT_LE BT_LEDS BT_LE_L2CAP_ECRED BT_MSFTEXT BT_MTK BT_QCA BT_RFCOMM BT_RFCOMM_TTY BT_RTL BUFFER_HEAD CACHEFILES CAIF CAIF_DEBUG CAIF_DRIVERS CAIF_NETDEV CAIF_TTY CAIF_USB CAIF_VIRTIO CAN CAN_8DEV_USB CAN_BCM CAN_CALC_BITTIMING CAN_DEV CAN_EMS_USB CAN_GS_USB CAN_GW CAN_IFI_CANFD CAN_ISOTP CAN_J1939 CAN_KVASER_USB CAN_MCBA_USB CAN_NETLINK CAN_PEAK_USB CAN_RAW CAN_RX_OFFLOAD CAN_SLCAN CAN_VCAN CAN_VXCAN CAPI_TRACE CARL9170 CARL9170_HWRNG CARL9170_LEDS CARL9170_WPC CEC_CORE CEPH_FS CEPH_FSCACHE CEPH_FS_POSIX_ACL CEPH_LIB CEPH_LIB_USE_DNS_RESOLVER CFG80211 CFG80211_CRDA_SUPPORT CFG80211_DEBUGFS CFG80211_DEFAULT_PS CFG80211_REQUIRE_SIGNED_REGDB CFG80211_USE_KERNEL_REGDB_KEYS CFG80211_WEXT CFS_BANDWIDTH CGROUP_BPF CHARGER_BQ24190 CHARGER_ISP1704 CHR_DEV_ST CIFS CIFS_ALLOW_INSECURE_LEGACY CIFS_DEBUG CIFS_DFS_UPCALL CIFS_FSCACHE CIFS_POSIX CIFS_SMB_DIRECT CIFS_SWN_UPCALL CIFS_UPCALL CIFS_XATTR CLS_U32_MARK CLS_U32_PERF CMA CMA_SIZE_SEL_MBYTES CMDLINE_PARTITION COMEDI COMEDI_DT9812 COMEDI_NI_USB6501 COMEDI_USBDUX COMEDI_USBDUXFAST COMEDI_USBDUXSIGMA COMEDI_USB_DRIVERS COMEDI_VMK80XX COMPAT_NETLINK_MESSAGES COUNTER CRAMFS CRAMFS_BLOCKDEV CRAMFS_MTD CRASH_HOTPLUG CRC4 CRC64 CRC64_ROCKSOFT CRC7 CRC8 CRC_ITU_T CRC_T10DIF CRYPTO_ADIANTUM CRYPTO_AEGIS128 CRYPTO_AEGIS128_AESNI_SSE2 CRYPTO_AES_NI_INTEL CRYPTO_AES_TI CRYPTO_ANSI_CPRNG CRYPTO_ANUBIS CRYPTO_ARC4 CRYPTO_ARCH_HAVE_LIB_BLAKE2S CRYPTO_ARCH_HAVE_LIB_CHACHA CRYPTO_ARCH_HAVE_LIB_CURVE25519 CRYPTO_ARCH_HAVE_LIB_POLY1305 CRYPTO_ARIA CRYPTO_ARIA_AESNI_AVX_X86_64 CRYPTO_BLAKE2B CRYPTO_BLAKE2S_X86 CRYPTO_BLOWFISH CRYPTO_BLOWFISH_COMMON CRYPTO_BLOWFISH_X86_64 CRYPTO_CAMELLIA CRYPTO_CAMELLIA_AESNI_AVX2_X86_64 CRYPTO_CAMELLIA_AESNI_AVX_X86_64 CRYPTO_CAMELLIA_X86_64 CRYPTO_CAST5 CRYPTO_CAST5_AVX_X86_64 CRYPTO_CAST6 CRYPTO_CAST6_AVX_X86_64 CRYPTO_CAST_COMMON CRYPTO_CFB CRYPTO_CHACHA20 CRYPTO_CHACHA20POLY1305 CRYPTO_CHACHA20_X86_64 CRYPTO_CRC32 CRYPTO_CRC32C_INTEL CRYPTO_CRC32_PCLMUL CRYPTO_CRC64_ROCKSOFT CRYPTO_CRCT10DIF CRYPTO_CRCT10DIF_PCLMUL CRYPTO_CRYPTD CRYPTO_CTS CRYPTO_CURVE25519 CRYPTO_CURVE25519_X86 CRYPTO_DEFLATE CRYPTO_DES CRYPTO_DES3_EDE_X86_64 CRYPTO_DEV_CCP CRYPTO_DEV_CCP_DD CRYPTO_DEV_PADLOCK CRYPTO_DEV_PADLOCK_AES CRYPTO_DEV_PADLOCK_SHA CRYPTO_DEV_QAT CRYPTO_DEV_QAT_C3XXX CRYPTO_DEV_QAT_C3XXXVF CRYPTO_DEV_QAT_C62X CRYPTO_DEV_QAT_C62XVF CRYPTO_DEV_QAT_DH895xCC CRYPTO_DEV_QAT_DH895xCCVF CRYPTO_DEV_VIRTIO CRYPTO_DH CRYPTO_DRBG_CTR CRYPTO_DRBG_HASH CRYPTO_ECB CRYPTO_ECC CRYPTO_ECDH CRYPTO_ECRDSA CRYPTO_ENGINE CRYPTO_ESSIV CRYPTO_FCRYPT CRYPTO_GHASH_CLMUL_NI_INTEL CRYPTO_HCTR2 CRYPTO_KDF800108_CTR CRYPTO_KEYWRAP CRYPTO_KHAZAD CRYPTO_KPP CRYPTO_LIB_ARC4 CRYPTO_LIB_CHACHA CRYPTO_LIB_CHACHA20POLY1305 CRYPTO_LIB_CHACHA_GENERIC CRYPTO_LIB_CURVE25519 CRYPTO_LIB_CURVE25519_GENERIC CRYPTO_LIB_DES CRYPTO_LIB_POLY1305 CRYPTO_LIB_POLY1305_GENERIC CRYPTO_LRW CRYPTO_MICHAEL_MIC CRYPTO_NHPOLY1305 CRYPTO_NHPOLY1305_AVX2 CRYPTO_NHPOLY1305_SSE2 CRYPTO_OFB CRYPTO_PCBC CRYPTO_PCRYPT CRYPTO_POLY1305 CRYPTO_POLY1305_X86_64 CRYPTO_POLYVAL CRYPTO_POLYVAL_CLMUL_NI CRYPTO_RMD160 CRYPTO_SEED CRYPTO_SERPENT CRYPTO_SERPENT_AVX2_X86_64 CRYPTO_SERPENT_AVX_X86_64 CRYPTO_SERPENT_SSE2_X86_64 CRYPTO_SHA1_SSSE3 CRYPTO_SHA256_SSSE3 CRYPTO_SHA512_SSSE3 CRYPTO_SIMD CRYPTO_SM2 CRYPTO_SM3 CRYPTO_SM3_AVX_X86_64 CRYPTO_SM4 CRYPTO_SM4_AESNI_AVX2_X86_64 CRYPTO_SM4_AESNI_AVX_X86_64 CRYPTO_SM4_GENERIC CRYPTO_STREEBOG CRYPTO_TEA CRYPTO_TWOFISH CRYPTO_TWOFISH_AVX_X86_64 CRYPTO_TWOFISH_COMMON CRYPTO_TWOFISH_X86_64 CRYPTO_TWOFISH_X86_64_3WAY CRYPTO_USER CRYPTO_USER_API CRYPTO_USER_API_AEAD CRYPTO_USER_API_ENABLE_OBSOLETE CRYPTO_USER_API_HASH CRYPTO_USER_API_RNG CRYPTO_USER_API_SKCIPHER CRYPTO_VMAC CRYPTO_WP512 CRYPTO_XCBC CRYPTO_XCTR CRYPTO_XTS CRYPTO_XXHASH CUSE CYPRESS_FIRMWARE DAMON DAMON_DBGFS DAMON_PADDR DAMON_RECLAIM DAMON_VADDR DAX DCA DCB DEFAULT_PFIFO_FAST DEVICE_MIGRATION DEVICE_PRIVATE DEV_COREDUMP DEV_DAX DIMLIB DLN2_ADC DMABUF_HEAPS DMABUF_HEAPS_CMA DMABUF_HEAPS_SYSTEM DMABUF_MOVE_NOTIFY DMA_CMA DMA_ENGINE_RAID DMA_NUMA_CMA DM_AUDIT DM_BIO_PRISON DM_BUFIO DM_CACHE DM_CACHE_SMQ DM_CLONE DM_CRYPT DM_FLAKEY DM_INTEGRITY DM_MULTIPATH DM_MULTIPATH_QL DM_MULTIPATH_ST DM_PERSISTENT_DATA DM_RAID DM_SNAPSHOT DM_THIN_PROVISIONING DM_UEVENT ENCRYPTED_KEYS EXTCON FSCACHE FUSE_FS GPIOLIB HAMRADIO IIO INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_RTRS_CLIENT IOSCHED_BFQ ISDN ISDN_CAPI LIBNVDIMM MAC80211 MAC80211_LEDS MEDIA_SUPPORT MEMORY_HOTPLUG MEMORY_HOTREMOVE MFD_DLN2 MTD NET_CLS_U32 NET_SCH_DEFAULT PARTITION_ADVANCED RFKILL SERIAL_DEV_BUS TLS TLS_DEVICE TRANSPARENT_HUGEPAGE TRUSTED_KEYS USB_GADGET USB_PHY VLAN_8021Q WANT_COMPAT_NETLINK_MESSAGES WEXT_CORE WIRELESS WIRELESS_EXT WLAN WLAN_VENDOR_ATH X86_X32_ABI ZONE_DEVICE] disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed picked [v6.5 v6.4 v6.3 v6.1 v5.19 v5.17 v5.15 v5.13 v5.10 v5.7 v5.4 v5.1 v4.19] out of 28 release tags testing release v6.5 testing commit 2dde18cd1d8fac735875f2e4987f11817cc0bc2c gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: cb272f74e02b25ee8d132211ca06caf79a753d969788ff3cf11da4fa7b09ccba all runs: OK false negative chance: 0.000 # git bisect start 99d99825fc075fd24b60cc9cf0fb1e20b9c16b0f 2dde18cd1d8fac735875f2e4987f11817cc0bc2c Bisecting: 4651 revisions left to test after this (roughly 12 steps) [adfd671676c922bada16477eb68b5eb5f065addc] Merge tag 'sysctl-6.6-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/mcgrof/linux testing commit adfd671676c922bada16477eb68b5eb5f065addc gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: a6e9d2f097054e4bb96743e445d8944cf13433c917ee36058793f0d1f971dcd5 all runs: crashed: KASAN: slab-use-after-free Write in __sco_sock_close representative crash: KASAN: slab-use-after-free Write in __sco_sock_close, types: [KASAN] # git bisect bad adfd671676c922bada16477eb68b5eb5f065addc Bisecting: 2617 revisions left to test after this (roughly 11 steps) [c873512ef3a39cc1a605b7a5ff2ad0a33d619aa8] Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net testing commit c873512ef3a39cc1a605b7a5ff2ad0a33d619aa8 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 2d61882178cfa1072e1dd391b5c28b0681cb128ffca94444f561b86c54ea3ed5 all runs: crashed: KASAN: slab-use-after-free Write in __sco_sock_close representative crash: KASAN: slab-use-after-free Write in __sco_sock_close, types: [KASAN] # git bisect bad c873512ef3a39cc1a605b7a5ff2ad0a33d619aa8 Bisecting: 1002 revisions left to test after this (roughly 10 steps) [6e97ba552b8d3dd074a28b8600740b8bed42267b] tcp: set TCP_DEFER_ACCEPT locklessly testing commit 6e97ba552b8d3dd074a28b8600740b8bed42267b gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 10037186fac5b3947a855a161b2728eae8addc8aa53b7a518b0abee47caa8064 all runs: OK false negative chance: 0.000 # git bisect good 6e97ba552b8d3dd074a28b8600740b8bed42267b Bisecting: 500 revisions left to test after this (roughly 9 steps) [85c786340a65eb059183a5c3c6fab8664e1f6e8a] Merge branch 'vcap_get_rule-return-value' testing commit 85c786340a65eb059183a5c3c6fab8664e1f6e8a gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: f9f6b0824367717c419ae543b4978b8cd121e839d74b32fdd0b460659d0f1d13 all runs: OK false negative chance: 0.000 # git bisect good 85c786340a65eb059183a5c3c6fab8664e1f6e8a Bisecting: 224 revisions left to test after this (roughly 8 steps) [1fa6ffad12753ea49e05f8ee1bc7e40684bdaca7] Merge tag 'wireless-next-2023-08-25' of git://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless-next testing commit 1fa6ffad12753ea49e05f8ee1bc7e40684bdaca7 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 56d37e06f6984053004759e5edaaf72231dae54ad2ac8b7ed43210dccb4aeb30 all runs: crashed: KASAN: slab-use-after-free Write in __sco_sock_close representative crash: KASAN: slab-use-after-free Write in __sco_sock_close, types: [KASAN] # git bisect bad 1fa6ffad12753ea49e05f8ee1bc7e40684bdaca7 Bisecting: 137 revisions left to test after this (roughly 7 steps) [7866b9faf0a8c20de41f3d08fb5cae9bdcf7756f] Bluetooth: btintel: Send new command for PPAG testing commit 7866b9faf0a8c20de41f3d08fb5cae9bdcf7756f gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 21b08b8ed637e3018c0f28965151f8d4757205476e0b46089686b6e3eec88e54 run #0: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #1: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #2: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #3: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #4: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #5: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #6: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #7: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #8: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #9: OK representative crash: KASAN: slab-use-after-free Write in __sco_sock_close, types: [KASAN] # git bisect bad 7866b9faf0a8c20de41f3d08fb5cae9bdcf7756f Bisecting: 68 revisions left to test after this (roughly 6 steps) [e855afd715656a9f25cf62fa68d99c33213b83b7] net/mlx5: Introduce mlx5_eswitch_load/unload_sf_vport() and use it from SF code testing commit e855afd715656a9f25cf62fa68d99c33213b83b7 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 5793eed94ed81f787652ba00ddcde918b60b180c6b291e3a69a196d66ae92488 all runs: OK false negative chance: 0.000 # git bisect good e855afd715656a9f25cf62fa68d99c33213b83b7 Bisecting: 31 revisions left to test after this (roughly 5 steps) [9f6708a668186dc5b38532fc1d1ff2f5311722d6] Merge tag 'mlx5-updates-2023-08-22' of git://git.kernel.org/pub/scm/linux/kernel/git/saeed/linux testing commit 9f6708a668186dc5b38532fc1d1ff2f5311722d6 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 374e9e0b236e88ef8daa7bca5c61f766583016fc1ad89ad18c13963ab812c12a all runs: OK false negative chance: 0.000 # git bisect good 9f6708a668186dc5b38532fc1d1ff2f5311722d6 Bisecting: 17 revisions left to test after this (roughly 4 steps) [58dbd6428a6819e55a3c52ec60126b5d00804a38] RDMA/mlx5: Handles RoCE MACsec steering rules addition and deletion testing commit 58dbd6428a6819e55a3c52ec60126b5d00804a38 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: f8910af7a5f5cde313f3756672e8f87c5e7a5936b57fb77516a481534fb0997f all runs: OK false negative chance: 0.000 # git bisect good 58dbd6428a6819e55a3c52ec60126b5d00804a38 Bisecting: 8 revisions left to test after this (roughly 3 steps) [94d9ba9f9888b748d4abd2aa1547af56ae85f772] Bluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync testing commit 94d9ba9f9888b748d4abd2aa1547af56ae85f772 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 42f1eecf0b1d261bd7c816487d2e59922c3134d71ae2b01672f2cc9b6cf5d7e4 run #0: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #1: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #2: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #3: crashed: KASAN: slab-use-after-free Write in sco_chan_del run #4: crashed: KASAN: slab-use-after-free Write in sco_chan_del run #5: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #6: crashed: KASAN: slab-use-after-free Write in sco_chan_del run #7: crashed: KASAN: slab-use-after-free Write in sco_chan_del run #8: crashed: KASAN: slab-use-after-free Write in __sco_sock_close run #9: crashed: KASAN: slab-use-after-free Write in sco_chan_del representative crash: KASAN: slab-use-after-free Write in __sco_sock_close, types: [KASAN] # git bisect bad 94d9ba9f9888b748d4abd2aa1547af56ae85f772 Bisecting: 4 revisions left to test after this (roughly 2 steps) [3c5066c6b0a5e21c36809647c06710ceb1eaddba] Merge branch 'mlx5-next' of https://git.kernel.org/pub/scm/linux/kernel/git/mellanox/linux testing commit 3c5066c6b0a5e21c36809647c06710ceb1eaddba gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: ab24c1126782de8c278a413b305e44d739a510d0033ee4971327798a465f44a3 all runs: OK false negative chance: 0.000 # git bisect good 3c5066c6b0a5e21c36809647c06710ceb1eaddba Bisecting: 2 revisions left to test after this (roughly 1 step) [7de05cb47134a3ac179f28f5363c36d9ac17c6c3] Bluetooth: btnxpuart: Remove check for CTS low after FW download testing commit 7de05cb47134a3ac179f28f5363c36d9ac17c6c3 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 380aca40a0e6d9b427a05ae69fa873e546fe6e22b35143a8ad44618ee59dca82 all runs: OK false negative chance: 0.000 # git bisect good 7de05cb47134a3ac179f28f5363c36d9ac17c6c3 Bisecting: 0 revisions left to test after this (roughly 1 step) [491f9eff276012f3036f5546198cdf4a9e268284] Bluetooth: btnxpuart: Improve inband Independent Reset handling testing commit 491f9eff276012f3036f5546198cdf4a9e268284 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 3130bb6897fd43f77c15a56692ba9a5e9453ea09520cdbc3cacc9e0da8aa5d3b all runs: OK false negative chance: 0.000 # git bisect good 491f9eff276012f3036f5546198cdf4a9e268284 94d9ba9f9888b748d4abd2aa1547af56ae85f772 is the first bad commit commit 94d9ba9f9888b748d4abd2aa1547af56ae85f772 Author: Luiz Augusto von Dentz Date: Wed Aug 9 16:49:33 2023 -0700 Bluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync Use-after-free can occur in hci_disconnect_all_sync if a connection is deleted by concurrent processing of a controller event. To prevent this the code now tries to iterate over the list backwards to ensure the links are cleanup before its parents, also it no longer relies on a cursor, instead it always uses the last element since hci_abort_conn_sync is guaranteed to call hci_conn_del. UAF crash log: ================================================================== BUG: KASAN: slab-use-after-free in hci_set_powered_sync (net/bluetooth/hci_sync.c:5424) [bluetooth] Read of size 8 at addr ffff888009d9c000 by task kworker/u9:0/124 CPU: 0 PID: 124 Comm: kworker/u9:0 Tainted: G W 6.5.0-rc1+ #10 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014 Workqueue: hci0 hci_cmd_sync_work [bluetooth] Call Trace: dump_stack_lvl+0x5b/0x90 print_report+0xcf/0x670 ? __virt_addr_valid+0xdd/0x160 ? hci_set_powered_sync+0x2c9/0x4a0 [bluetooth] kasan_report+0xa6/0xe0 ? hci_set_powered_sync+0x2c9/0x4a0 [bluetooth] ? __pfx_set_powered_sync+0x10/0x10 [bluetooth] hci_set_powered_sync+0x2c9/0x4a0 [bluetooth] ? __pfx_hci_set_powered_sync+0x10/0x10 [bluetooth] ? __pfx_lock_release+0x10/0x10 ? __pfx_set_powered_sync+0x10/0x10 [bluetooth] hci_cmd_sync_work+0x137/0x220 [bluetooth] process_one_work+0x526/0x9d0 ? __pfx_process_one_work+0x10/0x10 ? __pfx_do_raw_spin_lock+0x10/0x10 ? mark_held_locks+0x1a/0x90 worker_thread+0x92/0x630 ? __pfx_worker_thread+0x10/0x10 kthread+0x196/0x1e0 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x2c/0x50 Allocated by task 1782: kasan_save_stack+0x33/0x60 kasan_set_track+0x25/0x30 __kasan_kmalloc+0x8f/0xa0 hci_conn_add+0xa5/0xa80 [bluetooth] hci_bind_cis+0x881/0x9b0 [bluetooth] iso_connect_cis+0x121/0x520 [bluetooth] iso_sock_connect+0x3f6/0x790 [bluetooth] __sys_connect+0x109/0x130 __x64_sys_connect+0x40/0x50 do_syscall_64+0x60/0x90 entry_SYSCALL_64_after_hwframe+0x6e/0xd8 Freed by task 695: kasan_save_stack+0x33/0x60 kasan_set_track+0x25/0x30 kasan_save_free_info+0x2b/0x50 __kasan_slab_free+0x10a/0x180 __kmem_cache_free+0x14d/0x2e0 device_release+0x5d/0xf0 kobject_put+0xdf/0x270 hci_disconn_complete_evt+0x274/0x3a0 [bluetooth] hci_event_packet+0x579/0x7e0 [bluetooth] hci_rx_work+0x287/0xaa0 [bluetooth] process_one_work+0x526/0x9d0 worker_thread+0x92/0x630 kthread+0x196/0x1e0 ret_from_fork+0x2c/0x50 ================================================================== Fixes: 182ee45da083 ("Bluetooth: hci_sync: Rework hci_suspend_notifier") Signed-off-by: Pauli Virtanen Signed-off-by: Luiz Augusto von Dentz net/bluetooth/hci_sync.c | 55 ++++++++++++++++++++++++++++++------------------ 1 file changed, 35 insertions(+), 20 deletions(-) accumulated error probability: 0.00 culprit signature: 42f1eecf0b1d261bd7c816487d2e59922c3134d71ae2b01672f2cc9b6cf5d7e4 parent signature: 3130bb6897fd43f77c15a56692ba9a5e9453ea09520cdbc3cacc9e0da8aa5d3b revisions tested: 21, total time: 9h14m20.380493178s (build: 4h47m30.463327862s, test: 4h5m5.417955524s) first bad commit: 94d9ba9f9888b748d4abd2aa1547af56ae85f772 Bluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync recipients (to): ["johan.hedberg@gmail.com" "linux-bluetooth@vger.kernel.org" "luiz.dentz@gmail.com" "luiz.von.dentz@intel.com" "marcel@holtmann.org" "pav@iki.fi"] recipients (cc): ["linux-kernel@vger.kernel.org"] crash: KASAN: slab-use-after-free Write in __sco_sock_close ================================================================== BUG: KASAN: slab-use-after-free in instrument_atomic_read_write include/linux/instrumented.h:96 [inline] BUG: KASAN: slab-use-after-free in atomic_dec_and_test include/linux/atomic/atomic-instrumented.h:1375 [inline] BUG: KASAN: slab-use-after-free in hci_conn_drop include/net/bluetooth/hci_core.h:1497 [inline] BUG: KASAN: slab-use-after-free in __sco_sock_close+0x26e/0x5e0 net/bluetooth/sco.c:444 Write of size 4 at addr ffff8881681ec010 by task syz-executor.4/4365 CPU: 0 PID: 4365 Comm: syz-executor.4 Not tainted 6.5.0-rc7-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x3d/0x60 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:364 [inline] print_report+0xc4/0x620 mm/kasan/report.c:475 kasan_report+0xda/0x110 mm/kasan/report.c:588 check_region_inline mm/kasan/generic.c:181 [inline] kasan_check_range+0xef/0x190 mm/kasan/generic.c:187 instrument_atomic_read_write include/linux/instrumented.h:96 [inline] atomic_dec_and_test include/linux/atomic/atomic-instrumented.h:1375 [inline] hci_conn_drop include/net/bluetooth/hci_core.h:1497 [inline] __sco_sock_close+0x26e/0x5e0 net/bluetooth/sco.c:444 sco_sock_close net/bluetooth/sco.c:469 [inline] sco_sock_release+0x65/0x280 net/bluetooth/sco.c:1246 __sock_release+0x9b/0x250 net/socket.c:657 sock_close+0x13/0x20 net/socket.c:1399 __fput+0x339/0xa20 fs/file_table.c:384 task_work_run+0x114/0x1f0 kernel/task_work.c:179 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop kernel/entry/common.c:171 [inline] exit_to_user_mode_prepare+0x13f/0x150 kernel/entry/common.c:204 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline] syscall_exit_to_user_mode+0x16/0x40 kernel/entry/common.c:297 do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f63d647b9da Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24 RSP: 002b:00007ffc821ead90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00007f63d647b9da RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007f63d659d980 R08: 0000001b33760000 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000293 R12: 000000000000eef7 R13: ffffffffffffffff R14: 00007f63d6000000 R15: 000000000000ebb6 Allocated by task 4367: kasan_save_stack+0x33/0x50 mm/kasan/common.c:45 kasan_set_track+0x25/0x30 mm/kasan/common.c:52 ____kasan_kmalloc mm/kasan/common.c:374 [inline] __kasan_kmalloc+0xa2/0xb0 mm/kasan/common.c:383 kmalloc include/linux/slab.h:582 [inline] kzalloc include/linux/slab.h:703 [inline] hci_conn_add+0xad/0x14f0 net/bluetooth/hci_conn.c:952 hci_connect_sco+0x2be/0xb70 net/bluetooth/hci_conn.c:1672 sco_connect net/bluetooth/sco.c:266 [inline] sco_sock_connect+0x358/0x8e0 net/bluetooth/sco.c:591 __sys_connect+0xfd/0x120 net/socket.c:2047 __do_sys_connect net/socket.c:2057 [inline] __se_sys_connect net/socket.c:2054 [inline] __x64_sys_connect+0x6d/0xb0 net/socket.c:2054 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd Freed by task 1933: kasan_save_stack+0x33/0x50 mm/kasan/common.c:45 kasan_set_track+0x25/0x30 mm/kasan/common.c:52 kasan_save_free_info+0x2b/0x40 mm/kasan/generic.c:522 ____kasan_slab_free mm/kasan/common.c:236 [inline] ____kasan_slab_free+0x15e/0x1b0 mm/kasan/common.c:200 kasan_slab_free include/linux/kasan.h:162 [inline] slab_free_hook mm/slub.c:1792 [inline] slab_free_freelist_hook+0x10b/0x1e0 mm/slub.c:1818 slab_free mm/slub.c:3801 [inline] __kmem_cache_free+0xba/0x340 mm/slub.c:3814 device_release+0x97/0x1a0 drivers/base/core.c:2484 kobject_cleanup lib/kobject.c:682 [inline] kobject_release lib/kobject.c:713 [inline] kref_put include/linux/kref.h:65 [inline] kobject_put.part.0+0x167/0x400 lib/kobject.c:730 hci_abort_conn_sync+0x351/0x870 net/bluetooth/hci_sync.c:5417 hci_cmd_sync_work+0x173/0x340 net/bluetooth/hci_sync.c:306 process_one_work+0x922/0x1370 kernel/workqueue.c:2600 worker_thread+0xfb/0xe40 kernel/workqueue.c:2751 kthread+0x278/0x330 kernel/kthread.c:389 ret_from_fork+0x2c/0x70 arch/x86/kernel/process.c:145 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304 The buggy address belongs to the object at ffff8881681ec000 which belongs to the cache kmalloc-4k of size 4096 The buggy address is located 16 bytes inside of freed 4096-byte region [ffff8881681ec000, ffff8881681ed000) The buggy address belongs to the physical page: page:ffffea0005a07a00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1681e8 head:ffffea0005a07a00 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 flags: 0x100000000010200(slab|head|node=0|zone=2) page_type: 0xffffffff() raw: 0100000000010200 ffff888100042140 dead000000000122 0000000000000000 raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 4365, tgid 4365 (syz-executor.4), ts 60365206214, free_ts 3470163381 set_page_owner include/linux/page_owner.h:31 [inline] post_alloc_hook+0x281/0x2f0 mm/page_alloc.c:1570 prep_new_page mm/page_alloc.c:1577 [inline] get_page_from_freelist+0x1131/0x3d90 mm/page_alloc.c:3221 __alloc_pages+0x1d0/0x470 mm/page_alloc.c:4477 alloc_slab_page mm/slub.c:1862 [inline] allocate_slab+0x24e/0x360 mm/slub.c:2009 new_slab mm/slub.c:2062 [inline] ___slab_alloc+0x7a7/0x1000 mm/slub.c:3215 __slab_alloc.constprop.0+0x4d/0x90 mm/slub.c:3314 __slab_alloc_node mm/slub.c:3367 [inline] slab_alloc_node mm/slub.c:3460 [inline] __kmem_cache_alloc_node+0x143/0x390 mm/slub.c:3509 __do_kmalloc_node mm/slab_common.c:984 [inline] __kmalloc+0x4c/0x160 mm/slab_common.c:998 kmalloc include/linux/slab.h:586 [inline] tomoyo_realpath_from_path+0xaf/0x7a0 security/tomoyo/realpath.c:251 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_perm+0x230/0x350 security/tomoyo/file.c:822 tomoyo_path_symlink+0x7f/0xd0 security/tomoyo/tomoyo.c:211 security_path_symlink+0xd6/0x120 security/security.c:1747 do_symlinkat+0xe3/0x280 fs/namei.c:4501 __do_sys_symlinkat fs/namei.c:4519 [inline] __se_sys_symlinkat fs/namei.c:4516 [inline] __x64_sys_symlinkat+0x92/0xb0 fs/namei.c:4516 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd page last free stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1161 [inline] free_unref_page_prepare+0x5ac/0xcf0 mm/page_alloc.c:2348 free_unref_page+0x33/0x350 mm/page_alloc.c:2443 free_contig_range+0xa1/0x150 mm/page_alloc.c:6395 destroy_args+0x4f4/0x6b0 mm/debug_vm_pgtable.c:1029 debug_vm_pgtable+0x19f9/0x2c50 mm/debug_vm_pgtable.c:1410 do_one_initcall+0xcd/0x3c0 init/main.c:1232 do_initcall_level init/main.c:1294 [inline] do_initcalls init/main.c:1310 [inline] do_basic_setup init/main.c:1329 [inline] kernel_init_freeable+0x504/0x840 init/main.c:1546 kernel_init+0x1a/0x1c0 init/main.c:1437 ret_from_fork+0x2c/0x70 arch/x86/kernel/process.c:145 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304 Memory state around the buggy address: ffff8881681ebf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff8881681ebf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff8881681ec000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff8881681ec080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8881681ec100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ==================================================================