ci starts bisection 2024-09-15 22:51:20.627275693 +0000 UTC m=+78798.633621197 bisecting fixing commit since 7367539ad4b0f8f9b396baf02110962333719a48 building syzkaller on 610f2a54d02f8cf4f2454c03bf679b602e6e59b6 ensuring issue is reproducible on original commit 7367539ad4b0f8f9b396baf02110962333719a48 testing commit 7367539ad4b0f8f9b396baf02110962333719a48 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: a9af6bfa79235124292a6bd0e217fc87d871599b6f1b59a8d7eba043edb3d741 run #0: crashed: KASAN: use-after-free Read in poly1305_update_arch run #1: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #2: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #3: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #4: crashed: KASAN: use-after-free Read in poly1305_update_arch run #5: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #6: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #7: crashed: KASAN: use-after-free Read in poly1305_update_arch run #8: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #9: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #10: crashed: KASAN: use-after-free Read in poly1305_update_arch run #11: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #12: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #13: crashed: KASAN: use-after-free Read in poly1305_update_arch run #14: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #15: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #16: crashed: KASAN: use-after-free Read in poly1305_update_arch run #17: crashed: KASAN: use-after-free Read in poly1305_update_arch run #18: crashed: KASAN: use-after-free Read in poly1305_update_arch run #19: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch representative crash: KASAN: use-after-free Read in poly1305_update_arch, types: [KASAN] check whether we can drop unnecessary instrumentation disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit 7367539ad4b0f8f9b396baf02110962333719a48 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 384cb78a72800674966290fae15274068f658a891f0ac38512da743dd1723118 run #0: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #1: crashed: KASAN: use-after-free Read in poly1305_update_arch run #2: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #3: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #4: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #5: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #6: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #7: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #8: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #9: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch representative crash: KASAN: slab-use-after-free Read in poly1305_update_arch, types: [KASAN] the bug reproduces without the instrumentation disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG LOCKDEP], they are not needed kconfig minimization: base=4045 full=8007 leaves diff=2001 split chunks (needed=false): <2001> split chunk #0 of len 2001 into 5 parts testing without sub-chunk 1/5 disabling configs for [LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit 7367539ad4b0f8f9b396baf02110962333719a48 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 84d0312c5c8dc16cd98e281e881b97cfb32fb67c0e9b45fa54496c9d0ce77a90 all runs: OK false negative chance: 0.000 testing without sub-chunk 2/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit 7367539ad4b0f8f9b396baf02110962333719a48 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e27cee1b1fb8f5082c4d1716df91d08595ae642e1c4b2329d59bb7e2ffc434bf run #0: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #1: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #2: crashed: KASAN: use-after-free Read in poly1305_update_arch run #3: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #4: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #5: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #6: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #7: crashed: KASAN: use-after-free Read in poly1305_update_arch run #8: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #9: crashed: KASAN: use-after-free Read in poly1305_update_arch representative crash: KASAN: slab-use-after-free Read in poly1305_update_arch, types: [KASAN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit 7367539ad4b0f8f9b396baf02110962333719a48 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: ad4f2998c9c357c1972020cd91699283064d9f925d3872a95a5ec6902d5d333c run #0: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #1: crashed: KASAN: use-after-free Read in poly1305_update_arch run #2: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #3: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #4: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #5: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #6: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #7: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #8: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #9: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch representative crash: KASAN: slab-out-of-bounds Read in poly1305_update_arch, types: [KASAN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG LOCKDEP], they are not needed testing commit 7367539ad4b0f8f9b396baf02110962333719a48 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: c95a7f05ff3105111747f72d63020607d54d2515d44ce316746acbf563895a79 run #0: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #1: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #2: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #3: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #4: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #5: crashed: KASAN: use-after-free Read in poly1305_update_arch run #6: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #7: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #8: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #9: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch representative crash: KASAN: slab-use-after-free Read in poly1305_update_arch, types: [KASAN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit 7367539ad4b0f8f9b396baf02110962333719a48 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e46b4f982cac643820518247b1c5fcdc33a22d340ad5f9395005f79a72456435 run #0: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #1: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #2: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #3: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #4: crashed: KASAN: use-after-free Read in poly1305_update_arch run #5: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #6: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #7: crashed: KASAN: use-after-free Read in poly1305_update_arch run #8: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #9: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch representative crash: KASAN: slab-use-after-free Read in poly1305_update_arch, types: [KASAN] the chunk can be dropped minimized to 401 configs; suspects: [6LOWPAN 6LOWPAN_GHC_EXT_HDR_DEST 6LOWPAN_GHC_EXT_HDR_FRAG 6LOWPAN_GHC_EXT_HDR_HOP 6LOWPAN_GHC_EXT_HDR_ROUTE 6LOWPAN_GHC_ICMPV6 6LOWPAN_GHC_UDP 6LOWPAN_NHC 6LOWPAN_NHC_DEST 6LOWPAN_NHC_FRAGMENT 6LOWPAN_NHC_HOP 6LOWPAN_NHC_IPV6 6LOWPAN_NHC_MOBILITY 6LOWPAN_NHC_ROUTING 6LOWPAN_NHC_UDP 6PACK 842_COMPRESS 842_DECOMPRESS 9P_FSCACHE 9P_FS_POSIX_ACL 9P_FS_SECURITY ACORN_PARTITION ACORN_PARTITION_ADFS ACORN_PARTITION_CUMANA ACORN_PARTITION_EESOX ACORN_PARTITION_ICS ACORN_PARTITION_POWERTEC ACORN_PARTITION_RISCIX ACPI_NFIT ACPI_PLATFORM_PROFILE ADDRESS_MASKING ADFS_FS AFFS_FS AFS_FS AFS_FSCACHE AF_KCM AF_RXRPC AF_RXRPC_IPV6 AIX_PARTITION AMIGA_PARTITION ANDROID_BINDERFS ANDROID_BINDER_IPC ANON_VMA_NAME APERTURE_HELPERS AR5523 ARCH_ENABLE_MEMORY_HOTREMOVE ARCH_ENABLE_THP_MIGRATION ARCH_USES_PG_UNCACHED ARCH_WANT_PMD_MKWRITE ASM_MODVERSIONS ASYNC_CORE ASYNC_MEMCPY ASYNC_PQ ASYNC_RAID6_RECOV ASYNC_TX_DMA ASYNC_XOR ATARI_PARTITION ATA_GENERIC ATA_OVER_ETH ATH10K ATH10K_CE ATH10K_PCI ATH10K_USB ATH11K ATH6KL ATH6KL_USB ATH9K ATH9K_AHB ATH9K_BTCOEX_SUPPORT ATH9K_CHANNEL_CONTEXT ATH9K_COMMON ATH9K_COMMON_DEBUG ATH9K_DEBUGFS ATH9K_DYNACK ATH9K_HTC ATH9K_HTC_DEBUGFS ATH9K_HW ATH9K_PCI ATH9K_PCOEM ATH9K_RFKILL ATH_COMMON ATM ATM_BR2684 ATM_CLIP ATM_DRIVERS ATM_LANE ATM_MPOA ATM_TCP AUXILIARY_BUS AX25 AX25_DAMA_SLAVE AX88796B_PHY BAREUDP BASE_FULL BATMAN_ADV BATMAN_ADV_BATMAN_V BATMAN_ADV_BLA BATMAN_ADV_DAT BATMAN_ADV_MCAST BATMAN_ADV_NC BCACHE BCACHEFS_DEBUG BCACHEFS_ERASURE_CODING BCACHEFS_FS BCACHEFS_POSIX_ACL BCACHEFS_QUOTA BCACHEFS_SIX_OPTIMISTIC_SPIN BCMA BCMA_HOST_PCI_POSSIBLE BEFS_FS BFQ_CGROUP_DEBUG BFQ_GROUP_IOSCHED BFS_FS BIG_KEYS BLK_CGROUP_PUNT_BIO BLK_CGROUP_RWSTAT BLK_DEBUG_FS_ZONED BLK_DEV_BSGLIB BLK_DEV_INTEGRITY BLK_DEV_INTEGRITY_T10 BLK_DEV_NBD BLK_DEV_NULL_BLK BLK_DEV_NULL_BLK_FAULT_INJECTION BLK_DEV_NVME BLK_DEV_PMEM BLK_DEV_RAM BLK_DEV_RNBD BLK_DEV_RNBD_CLIENT BLK_DEV_THROTTLING BLK_DEV_ZONED BLK_ICQ BLK_INLINE_ENCRYPTION BLK_INLINE_ENCRYPTION_FALLBACK BLK_WBT BLK_WBT_MQ BONDING BOOT_VESA_SUPPORT BPF_EVENTS BPF_JIT BPF_JIT_ALWAYS_ON BPF_JIT_DEFAULT_ON BPF_LSM BPF_PRELOAD BPF_PRELOAD_UMD BPF_STREAM_PARSER BPF_SYSCALL BPQETHER BRIDGE BRIDGE_CFM BRIDGE_EBT_802_3 BRIDGE_EBT_AMONG BRIDGE_EBT_ARP BRIDGE_EBT_ARPREPLY BRIDGE_EBT_BROUTE BRIDGE_EBT_DNAT BRIDGE_EBT_IP BRIDGE_EBT_IP6 BRIDGE_EBT_LIMIT BRIDGE_EBT_LOG BRIDGE_EBT_MARK BRIDGE_EBT_MARK_T BRIDGE_EBT_NFLOG BRIDGE_EBT_PKTTYPE BRIDGE_EBT_REDIRECT BRIDGE_EBT_SNAT BRIDGE_EBT_STP BRIDGE_EBT_T_FILTER BRIDGE_EBT_T_NAT BRIDGE_EBT_VLAN BRIDGE_IGMP_SNOOPING BRIDGE_MRP BRIDGE_NF_EBTABLES BRIDGE_NF_EBTABLES_LEGACY BRIDGE_VLAN_FILTERING BSD_DISKLABEL BSD_PROCESS_ACCT_V3 BT BTRFS_ASSERT BTRFS_FS BTRFS_FS_POSIX_ACL BTRFS_FS_REF_VERIFY BTT BT_6LOWPAN BT_ATH3K BT_BCM BT_BNEP BT_BNEP_MC_FILTER BT_BNEP_PROTO_FILTER BT_BREDR BT_CMTP BT_HCIBCM203X BT_HCIBFUSB BT_HCIBPA10X BT_HCIBTUSB BT_HCIBTUSB_BCM BT_HCIBTUSB_MTK BT_HCIBTUSB_POLL_SYNC BT_HCIBTUSB_RTL BT_HCIUART BT_HCIUART_3WIRE BT_HCIUART_AG6XX BT_HCIUART_BCSP BT_HCIUART_H4 BT_HCIUART_LL BT_HCIUART_MRVL BT_HCIUART_QCA BT_HCIUART_SERDEV BT_HCIVHCI BT_HIDP BT_INTEL BT_LE BT_LEDS BT_LE_L2CAP_ECRED BT_MRVL BT_MRVL_SDIO BT_MSFTEXT BT_MTK BT_QCA BT_RFCOMM BT_RFCOMM_TTY BT_RTL CACHEFILES CAIF CAIF_DEBUG CAIF_DRIVERS CAIF_NETDEV CAIF_TTY CAIF_USB CAIF_VIRTIO CAN CAN_8DEV_USB CAN_BCM CAN_CALC_BITTIMING CAN_DEV CAN_EMS_USB CAN_GS_USB CAN_GW CAN_IFI_CANFD CAN_ISOTP CAN_J1939 CAN_KVASER_USB CAN_MCBA_USB CAN_NETLINK CAN_PEAK_USB CAN_RAW CAN_RX_OFFLOAD CAN_SLCAN CAN_VCAN CAN_VXCAN CAPI_TRACE CARL9170 CARL9170_HWRNG CARL9170_LEDS CARL9170_WPC CEC_CORE CEPH_FS CEPH_FSCACHE CEPH_FS_POSIX_ACL CEPH_LIB CEPH_LIB_USE_DNS_RESOLVER CFG80211 CFG80211_CRDA_SUPPORT CFG80211_DEBUGFS CFG80211_DEFAULT_PS CFG80211_REQUIRE_SIGNED_REGDB CFG80211_USE_KERNEL_REGDB_KEYS CFG80211_WEXT CFS_BANDWIDTH CGROUP_BPF CHARGER_BQ24190 CHARGER_ISP1704 CHR_DEV_ST CIFS CIFS_ALLOW_INSECURE_LEGACY CIFS_DEBUG CIFS_DFS_UPCALL CIFS_FSCACHE CIFS_POSIX CIFS_SMB_DIRECT CIFS_SWN_UPCALL CIFS_UPCALL CIFS_XATTR CLOSURES CLS_U32_MARK CLS_U32_PERF CMA CMA_SIZE_SEL_MBYTES CMDLINE_PARTITION COMEDI COMEDI_DT9812 COMEDI_NI_USB6501 COMEDI_USBDUX COMEDI_USBDUXFAST COMEDI_USBDUXSIGMA COMEDI_USB_DRIVERS COMEDI_VMK80XX COMPAT_NETLINK_MESSAGES COUNTER CRAMFS CRAMFS_BLOCKDEV CRAMFS_MTD CRC4 CRC64 CRC64_ROCKSOFT CRC7 CRC8 CRC_ITU_T CRC_T10DIF CRYPTO_ADIANTUM CRYPTO_AEGIS128 CRYPTO_AEGIS128_AESNI_SSE2 CRYPTO_AES_NI_INTEL CRYPTO_AES_TI CRYPTO_ANSI_CPRNG CRYPTO_ANUBIS CRYPTO_ARC4 CRYPTO_ARCH_HAVE_LIB_BLAKE2S CRYPTO_ARCH_HAVE_LIB_CHACHA CRYPTO_ARCH_HAVE_LIB_CURVE25519 CRYPTO_ARCH_HAVE_LIB_POLY1305 CRYPTO_ARIA CRYPTO_ARIA_AESNI_AVX_X86_64 CRYPTO_BLAKE2B CRYPTO_BLAKE2S_X86 CRYPTO_BLOWFISH CRYPTO_BLOWFISH_COMMON CRYPTO_BLOWFISH_X86_64 CRYPTO_CAMELLIA CRYPTO_CAMELLIA_AESNI_AVX2_X86_64 CRYPTO_CAMELLIA_AESNI_AVX_X86_64 CRYPTO_CAMELLIA_X86_64 CRYPTO_CAST5 CRYPTO_CAST5_AVX_X86_64 CRYPTO_CAST6 CRYPTO_CAST6_AVX_X86_64 CRYPTO_CAST_COMMON CRYPTO_CHACHA20POLY1305 CRYPTO_CHACHA20_X86_64 CRYPTO_CRC32 CRYPTO_CRC32C_INTEL CRYPTO_CRC32_PCLMUL CRYPTO_CRC64_ROCKSOFT CRYPTO_CRCT10DIF CRYPTO_CRCT10DIF_PCLMUL CRYPTO_CRYPTD CRYPTO_CURVE25519 CRYPTO_CURVE25519_X86 CRYPTO_DEFLATE CRYPTO_DES CRYPTO_DES3_EDE_X86_64 CRYPTO_DEV_CCP CRYPTO_DEV_CCP_DD CRYPTO_DEV_PADLOCK CRYPTO_DEV_PADLOCK_AES CRYPTO_DEV_PADLOCK_SHA CRYPTO_DEV_QAT CRYPTO_DEV_QAT_C3XXX CRYPTO_DEV_QAT_C3XXXVF CRYPTO_DEV_QAT_C62X CRYPTO_DEV_QAT_C62XVF CRYPTO_DEV_QAT_DH895xCC CRYPTO_DEV_QAT_DH895xCCVF CRYPTO_DEV_VIRTIO CRYPTO_DH CRYPTO_DRBG_CTR CRYPTO_DRBG_HASH CRYPTO_ECDH CRYPTO_ECRDSA CRYPTO_ENGINE CRYPTO_ESSIV CRYPTO_FCRYPT CRYPTO_GHASH_CLMUL_NI_INTEL CRYPTO_HCTR2 CRYPTO_KDF800108_CTR CRYPTO_KEYWRAP CRYPTO_KHAZAD CRYPTO_KPP CRYPTO_LIB_ARC4 CRYPTO_LIB_CHACHA CRYPTO_LIB_CHACHA20POLY1305 CRYPTO_LIB_CURVE25519 CRYPTO_LIB_CURVE25519_GENERIC CRYPTO_LIB_POLY1305 CRYPTO_LIB_POLY1305_GENERIC CRYPTO_LRW CRYPTO_NHPOLY1305 CRYPTO_NHPOLY1305_AVX2 CRYPTO_NHPOLY1305_SSE2 CRYPTO_PCBC CRYPTO_PCRYPT CRYPTO_POLY1305 CRYPTO_POLY1305_X86_64 CRYPTO_POLYVAL CRYPTO_POLYVAL_CLMUL_NI CRYPTO_RMD160 CRYPTO_SEED CRYPTO_SERPENT CRYPTO_SERPENT_AVX2_X86_64 CRYPTO_SERPENT_AVX_X86_64 CRYPTO_SERPENT_SSE2_X86_64 CRYPTO_SHA1_SSSE3 CRYPTO_SHA256_SSSE3 CRYPTO_SHA512_SSSE3 CRYPTO_SIMD CRYPTO_SM2 CRYPTO_SM3_AVX_X86_64 CRYPTO_SM4_AESNI_AVX2_X86_64 CRYPTO_SM4_AESNI_AVX_X86_64 CRYPTO_STREEBOG CRYPTO_TEA CRYPTO_TWOFISH CRYPTO_TWOFISH_AVX_X86_64 CRYPTO_TWOFISH_COMMON CRYPTO_TWOFISH_X86_64 CRYPTO_TWOFISH_X86_64_3WAY CRYPTO_USER CRYPTO_USER_API CRYPTO_USER_API_AEAD CRYPTO_USER_API_ENABLE_OBSOLETE CRYPTO_USER_API_HASH CRYPTO_USER_API_RNG CRYPTO_USER_API_SKCIPHER CRYPTO_VMAC CRYPTO_WP512 CRYPTO_XCTR CRYPTO_XXHASH CUSE CYPRESS_FIRMWARE DAMON DAMON_PADDR DAMON_RECLAIM DAMON_VADDR DAX DCA DCB DEFAULT_PFIFO_FAST DEVICE_MIGRATION DEVICE_PRIVATE DEV_COREDUMP DEV_DAX DLN2_ADC DMABUF_HEAPS DMABUF_HEAPS_CMA DMABUF_HEAPS_SYSTEM DMABUF_MOVE_NOTIFY DMA_CMA DMA_ENGINE_RAID DMA_OPS DM_AUDIT DM_BIO_PRISON DM_BUFIO DM_CACHE DM_CACHE_SMQ DM_CLONE DM_CRYPT DM_FLAKEY DM_INTEGRITY DM_MULTIPATH DM_MULTIPATH_QL DM_MULTIPATH_ST DM_PERSISTENT_DATA DM_RAID DM_SNAPSHOT DM_THIN_PROVISIONING DM_UEVENT DM_VERITY DM_VERITY_FEC DM_WRITECACHE DM_ZONED DRAGONRISE_FF DRM DRM_BOCHS DRM_BUDDY DRM_CIRRUS_QEMU DRM_DEBUG_MM DRM_DISPLAY_DP_HELPER DRM_DISPLAY_HDCP_HELPER DRM_DISPLAY_HDMI_HELPER DRM_DISPLAY_HELPER DRM_DP_AUX_BUS DRM_FBDEV_EMULATION ENCRYPTED_KEYS EXTCON FSCACHE FUSE_FS GPIOLIB HAMRADIO HID_DRAGONRISE IIO INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_RTRS_CLIENT IOSCHED_BFQ ISDN ISDN_CAPI LIBNVDIMM MAC80211 MAC80211_DEBUGFS MAC80211_LEDS MEDIA_SUPPORT MEMORY_HOTPLUG MEMORY_HOTREMOVE MFD_DLN2 MMC MTD NET_CLS_U32 NET_SCH_DEFAULT PARTITION_ADVANCED RFKILL SERIAL_DEV_BUS TLS TLS_DEVICE TRANSPARENT_HUGEPAGE TRUSTED_KEYS USB_GADGET USB_PHY VLAN_8021Q WANT_COMPAT_NETLINK_MESSAGES WEXT_CORE WIRELESS WIRELESS_EXT WLAN WLAN_VENDOR_ATH X86_X32_ABI ZONE_DEVICE] disabling configs for [LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing current HEAD 98f7e32f20d28ec452afb208f9cffc08448a2652 testing commit 98f7e32f20d28ec452afb208f9cffc08448a2652 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 8a025de41ba88fe9093065eb844bda54d61def4dd7afd2c7da10bd0776f09353 run #0: crashed: KASAN: use-after-free Read in scatterwalk_copychunks run #1: crashed: KASAN: use-after-free Read in scatterwalk_copychunks run #2: crashed: KASAN: slab-use-after-free Read in scatterwalk_copychunks run #3: crashed: KASAN: use-after-free Read in scatterwalk_copychunks run #4: crashed: KASAN: use-after-free Read in scatterwalk_copychunks run #5: crashed: KASAN: slab-use-after-free Read in poly1305_update_arch run #6: crashed: KASAN: use-after-free Read in scatterwalk_copychunks run #7: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #8: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch run #9: crashed: KASAN: slab-out-of-bounds Read in poly1305_update_arch representative crash: KASAN: use-after-free Read in scatterwalk_copychunks, types: [KASAN] crash still not fixed/happens on the oldest tested release revisions tested: 8, total time: 2h0m58.822535533s (build: 1h20m50.044167045s, test: 34m26.11281457s) crash still not fixed or there were kernel test errors commit msg: Linux 6.11 crash: KASAN: use-after-free Read in scatterwalk_copychunks loop0: detected capacity change from 0 to 32768 bcachefs (loop0): starting version 1.7: mi_btree_bitmap opts=metadata_checksum=none,data_checksum=none,nojournal_transaction_names bcachefs (loop0): recovering from clean shutdown, journal seq 10 bcachefs (loop0): Doing compatible version upgrade from 1.7: mi_btree_bitmap to 1.12: rebalance_work_acct_fix running recovery passes: check_allocations ================================================================== BUG: KASAN: use-after-free in memcpy_dir crypto/scatterwalk.c:23 [inline] BUG: KASAN: use-after-free in scatterwalk_copychunks+0x168/0x410 crypto/scatterwalk.c:38 Read of size 40 at addr ffff88816b2e0000 by task syz-executor.0/2319 CPU: 0 UID: 0 PID: 2319 Comm: syz-executor.0 Not tainted 6.11.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call Trace: __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x108/0x280 lib/dump_stack.c:119 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 kasan_report+0x143/0x180 mm/kasan/report.c:601 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189 __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105 memcpy_dir crypto/scatterwalk.c:23 [inline] scatterwalk_copychunks+0x168/0x410 crypto/scatterwalk.c:38 skcipher_next_slow+0x315/0x410 crypto/skcipher.c:276 skcipher_walk_next+0x578/0xaa0 crypto/skcipher.c:361 chacha_simd_stream_xor+0x690/0xcb0 arch/x86/crypto/chacha_glue.c:192 do_encrypt_sg fs/bcachefs/checksum.c:109 [inline] do_encrypt+0x5e9/0x720 fs/bcachefs/checksum.c:129 bset_encrypt fs/bcachefs/btree_io.h:118 [inline] bch2_btree_node_read_done+0x1310/0x5320 fs/bcachefs/btree_io.c:1115 btree_node_read_work+0x647/0x1160 fs/bcachefs/btree_io.c:1323 bch2_btree_node_read+0x2001/0x2b70 fs/bcachefs/btree_io.c:1708 __bch2_btree_root_read fs/bcachefs/btree_io.c:1749 [inline] bch2_btree_root_read+0x2dd/0x870 fs/bcachefs/btree_io.c:1773 read_btree_roots+0x2bd/0x690 fs/bcachefs/recovery.c:523 bch2_fs_recovery+0x4079/0x6880 fs/bcachefs/recovery.c:851 bch2_fs_start+0x2d8/0x490 fs/bcachefs/super.c:1036 bch2_fs_get_tree+0x78f/0x1490 fs/bcachefs/fs.c:1954 vfs_get_tree+0x88/0x1a0 fs/super.c:1800 do_new_mount+0x21e/0x9b0 fs/namespace.c:3472 do_mount fs/namespace.c:3812 [inline] __do_sys_mount fs/namespace.c:4020 [inline] __se_sys_mount+0x23c/0x2d0 fs/namespace.c:3997 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x190 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f654a47f3aa Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f654b137ef8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f654b137f80 RCX: 00007f654a47f3aa RDX: 0000000020011a00 RSI: 0000000020011a40 RDI: 00007f654b137f40 RBP: 0000000020011a00 R08: 00007f654b137f80 R09: 0000000001200014 R10: 0000000001200014 R11: 0000000000000246 R12: 0000000020011a40 R13: 00007f654b137f40 R14: 00000000000119f9 R15: 0000000020000100 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x16b2e0 flags: 0x100000000000000(node=0|zone=2) page_type: 0xbfffffff(buddy) raw: 0100000000000000 ffffea0005a97808 ffff88823fff8f88 0000000000000000 raw: 0000000000000000 0000000000000005 00000000bfffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 5, migratetype Unmovable, gfp_mask 0x152cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 2319, tgid 2318 (syz-executor.0), ts 54269916639, free_ts 54331534095 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x10f/0x130 mm/page_alloc.c:1500 prep_new_page mm/page_alloc.c:1508 [inline] get_page_from_freelist+0x3712/0x3820 mm/page_alloc.c:3446 __alloc_pages_noprof+0x256/0x670 mm/page_alloc.c:4702 __alloc_pages_node_noprof include/linux/gfp.h:269 [inline] alloc_pages_node_noprof include/linux/gfp.h:296 [inline] ___kmalloc_large_node+0x8a/0x180 mm/slub.c:4107 __kmalloc_large_node_noprof+0x17/0xc0 mm/slub.c:4134 __do_kmalloc_node mm/slub.c:4150 [inline] __kmalloc_node_noprof+0x2ec/0x470 mm/slub.c:4168 __kvmalloc_node_noprof+0x42/0xf0 mm/util.c:650 btree_node_data_alloc fs/bcachefs/btree_cache.c:105 [inline] __bch2_btree_node_mem_alloc+0x256/0x500 fs/bcachefs/btree_cache.c:150 bch2_fs_btree_cache_init+0x4ad/0x590 fs/bcachefs/btree_cache.c:560 bch2_fs_alloc fs/bcachefs/super.c:917 [inline] bch2_fs_open+0x220f/0x2980 fs/bcachefs/super.c:2115 bch2_fs_get_tree+0x6ad/0x1490 fs/bcachefs/fs.c:1941 vfs_get_tree+0x88/0x1a0 fs/super.c:1800 do_new_mount+0x21e/0x9b0 fs/namespace.c:3472 do_mount fs/namespace.c:3812 [inline] __do_sys_mount fs/namespace.c:4020 [inline] __se_sys_mount+0x23c/0x2d0 fs/namespace.c:3997 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x190 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f page last free pid 2319 tgid 2318 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1101 [inline] __free_pages_ok+0x991/0xab0 mm/page_alloc.c:1221 __folio_put+0x21b/0x320 mm/swap.c:128 folio_put include/linux/mm.h:1490 [inline] free_large_kmalloc+0xb5/0x170 mm/slub.c:4569 kfree+0x1a1/0x310 mm/slub.c:4592 btree_bounce_free fs/bcachefs/btree_io.c:112 [inline] bch2_btree_node_read_done+0x337c/0x5320 fs/bcachefs/btree_io.c:1209 btree_node_read_work+0x647/0x1160 fs/bcachefs/btree_io.c:1323 bch2_btree_node_read+0x2001/0x2b70 fs/bcachefs/btree_io.c:1708 __bch2_btree_root_read fs/bcachefs/btree_io.c:1749 [inline] bch2_btree_root_read+0x2dd/0x870 fs/bcachefs/btree_io.c:1773 read_btree_roots+0x2bd/0x690 fs/bcachefs/recovery.c:523 bch2_fs_recovery+0x4079/0x6880 fs/bcachefs/recovery.c:851 bch2_fs_start+0x2d8/0x490 fs/bcachefs/super.c:1036 bch2_fs_get_tree+0x78f/0x1490 fs/bcachefs/fs.c:1954 vfs_get_tree+0x88/0x1a0 fs/super.c:1800 do_new_mount+0x21e/0x9b0 fs/namespace.c:3472 do_mount fs/namespace.c:3812 [inline] __do_sys_mount fs/namespace.c:4020 [inline] __se_sys_mount+0x23c/0x2d0 fs/namespace.c:3997 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x190 arch/x86/entry/common.c:83 Memory state around the buggy address: ffff88816b2dff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88816b2dff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88816b2e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88816b2e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88816b2e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================