ci starts bisection 2023-05-28 15:19:07.547999627 +0000 UTC m=+171848.329168294 bisecting fixing commit since 49c13ed0316d55d73f1c81c66a7e2abd743f9ae6 building syzkaller on e2556bc3d5922d083190922a5f66f1db91687492 ensuring issue is reproducible on original commit 49c13ed0316d55d73f1c81c66a7e2abd743f9ae6 testing commit 49c13ed0316d55d73f1c81c66a7e2abd743f9ae6 gcc compiler: Debian clang version 15.0.7, GNU ld (GNU Binutils for Debian) 2.35.2 kernel signature: 6d67e70a523087745950183c98830b147af83dd1f6246e7ab6ef5d831d4b918f run #0: crashed: INFO: rcu detected stall in corrupted run #1: crashed: INFO: rcu detected stall in corrupted run #2: crashed: INFO: rcu detected stall in corrupted run #3: crashed: INFO: rcu detected stall in corrupted run #4: crashed: INFO: rcu detected stall in corrupted run #5: crashed: INFO: rcu detected stall in corrupted run #6: crashed: INFO: rcu detected stall in corrupted run #7: crashed: INFO: rcu detected stall in corrupted run #8: crashed: INFO: rcu detected stall in corrupted run #9: crashed: INFO: rcu detected stall in corrupted run #10: crashed: INFO: rcu detected stall in corrupted run #11: crashed: INFO: rcu detected stall in corrupted run #12: crashed: WARNING: locking bug in ntfs_fill_super run #13: OK run #14: OK run #15: crashed: WARNING: locking bug in writeback_single_inode run #16: OK run #17: OK run #18: OK run #19: OK testing current HEAD 7877cb91f1081754a1487c144d85dc0d2e2e7fc4 testing commit 7877cb91f1081754a1487c144d85dc0d2e2e7fc4 gcc compiler: Debian clang version 15.0.7, GNU ld (GNU Binutils for Debian) 2.35.2 kernel signature: e5398f1d1dff5cb7e8e4703c77840b415ecf253c36063a29af16d66713a46355 run #0: basic kernel testing failed: BUG: program execution failed: executor NUM: exit status NUM run #1: basic kernel testing failed: BUG: program execution failed: executor NUM: failed to write control pipe: write |NUM: broken pipe run #2: crashed: KASAN: out-of-bounds Write in end_buffer_read_sync run #3: crashed: KASAN: out-of-bounds Write in end_buffer_read_sync run #4: crashed: KASAN: out-of-bounds Write in end_buffer_read_sync run #5: crashed: KASAN: stack-out-of-bounds Write in ntfs_fill_super run #6: crashed: KASAN: out-of-bounds Write in end_buffer_read_sync run #7: crashed: KASAN: out-of-bounds Write in end_buffer_read_sync run #8: crashed: KASAN: out-of-bounds Write in end_buffer_read_sync run #9: crashed: KASAN: out-of-bounds Write in end_buffer_read_sync crash still not fixed/happens on the oldest tested release revisions tested: 2, total time: 32m39.225123475s (build: 15m46.349426935s, test: 15m49.728935121s) crash still not fixed on HEAD or HEAD had kernel test errors commit msg: Linux 6.4-rc4 crash: KASAN: out-of-bounds Write in end_buffer_read_sync ================================================================== BUG: KASAN: out-of-bounds in end_buffer_read_sync+0x89/0x90 Write of size 4 at addr ffffc9000b127800 by task ksoftirqd/1/21 CPU: 1 PID: 21 Comm: ksoftirqd/1 Not tainted 6.4.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 Call Trace: dump_stack_lvl+0x167/0x220 print_report+0x163/0x540 kasan_report+0x176/0x1b0 kasan_check_range+0x283/0x290 end_buffer_read_sync+0x89/0x90 end_bio_bh_io_sync+0x8d/0xe0 blk_update_request+0x3fb/0x1080 blk_mq_end_request+0x48/0x260 blk_done_softirq+0x83/0x120 __do_softirq+0x2ab/0x908 run_ksoftirqd+0xc5/0x120 smpboot_thread_fn+0x534/0x890 kthread+0x276/0x2f0 ret_from_fork+0x1f/0x30 The buggy address belongs to the virtual mapping at [ffffc9000b120000, ffffc9000b129000) created by: copy_process+0x40a/0x3c40 The buggy address belongs to the physical page: page:ffffea00009a14c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x26853 memcg:ffff888145d7ca82 flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: 0xffffffff() raw: 00fff00000000000 0000000000000000 dead000000000122 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff ffff888145d7ca82 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x102dc2(GFP_HIGHUSER|__GFP_NOWARN|__GFP_ZERO), pid 10261, tgid 10261 (syz-executor.5), ts 292787256756, free_ts 292694500182 get_page_from_freelist+0x321c/0x33a0 __alloc_pages+0x255/0x670 __vmalloc_node_range+0x7cc/0x10d0 dup_task_struct+0x5c3/0x720 copy_process+0x40a/0x3c40 kernel_clone+0x19a/0x5f0 __x64_sys_clone+0x253/0x2a0 do_syscall_64+0x41/0xc0 entry_SYSCALL_64_after_hwframe+0x63/0xcd page last free stack trace: free_unref_page_prepare+0x8fe/0xa10 free_unref_page_list+0x596/0x830 release_pages+0x1a0f/0x1bc0 tlb_flush_mmu+0xe9/0x1e0 tlb_finish_mmu+0xb6/0x1c0 exit_mmap+0x351/0x890 __mmput+0xcb/0x300 exit_mm+0x1de/0x290 do_exit+0x4f2/0x1d10 do_group_exit+0x1b9/0x280 get_signal+0x1233/0x12e0 arch_do_signal_or_restart+0x91/0x670 exit_to_user_mode_loop+0x6a/0x100 exit_to_user_mode_prepare+0xb1/0x140 syscall_exit_to_user_mode+0x64/0x280 do_syscall_64+0x4d/0xc0 Memory state around the buggy address: ffffc9000b127700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffc9000b127780: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 >ffffc9000b127800: 00 00 00 00 00 00 00 f2 f2 f2 f2 f2 00 f2 f2 f2 ^ ffffc9000b127880: 01 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 ffffc9000b127900: 00 00 00 00 f1 f1 f1 f1 00 f3 f3 f3 00 00 00 00 ==================================================================