ci2 starts bisection 2023-11-04 13:28:39.559786113 +0000 UTC m=+66366.465224949 bisecting fixing commit since a27512601c2d65569fdd5a843246dc8da96b6408 building syzkaller on 0b6a67ac4b0dc26f43030c5edd01c9175f13b784 ensuring issue is reproducible on original commit a27512601c2d65569fdd5a843246dc8da96b6408 testing commit a27512601c2d65569fdd5a843246dc8da96b6408 gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 8738dc0b2409b638ff5fbe06bc6b3ba016b8c19dbea9b4d15157f100d6f70612 all runs: crashed: KASAN: out-of-bounds Read in ext4_xattr_set_entry representative crash: KASAN: out-of-bounds Read in ext4_xattr_set_entry, types: [KASAN] check whether we can drop unnecessary instrumentation disabling configs for [LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit a27512601c2d65569fdd5a843246dc8da96b6408 gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: daedbc93a915206c31cad1fa1bda234ddd2549dfa770a0a5dac289e130d609bf all runs: crashed: KASAN: out-of-bounds Read in ext4_xattr_set_entry representative crash: KASAN: out-of-bounds Read in ext4_xattr_set_entry, types: [KASAN] the bug reproduces without the instrumentation disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed kconfig minimization: base=4789 full=6024 leaves diff=238 split chunks (needed=false): <238> split chunk #0 of len 238 into 5 parts testing without sub-chunk 1/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit a27512601c2d65569fdd5a843246dc8da96b6408 gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 0d53f9fce68a0e18c17dc164874de0638375f38bde965bcaa6a9bb5c42796fbc all runs: crashed: KASAN: out-of-bounds Read in ext4_xattr_set_entry representative crash: KASAN: out-of-bounds Read in ext4_xattr_set_entry, types: [KASAN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit a27512601c2d65569fdd5a843246dc8da96b6408 gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: a2b95a7b1d9b3809c036b8d456213a19fee118f7e7630a15a97e99d589701f86 all runs: crashed: KASAN: out-of-bounds Read in ext4_xattr_set_entry representative crash: KASAN: out-of-bounds Read in ext4_xattr_set_entry, types: [KASAN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit a27512601c2d65569fdd5a843246dc8da96b6408 gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: fa24beed0b530b33e0a1a7c2882ce88b552edae0219ffcabff9519ddd1c844a4 all runs: crashed: KASAN: out-of-bounds Read in ext4_xattr_set_entry representative crash: KASAN: out-of-bounds Read in ext4_xattr_set_entry, types: [KASAN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit a27512601c2d65569fdd5a843246dc8da96b6408 gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 67d9279294c7c2260102c7f010f93773357a9ff2da547152d992f1c4aefa0bbb all runs: crashed: KASAN: out-of-bounds Read in ext4_xattr_set_entry representative crash: KASAN: out-of-bounds Read in ext4_xattr_set_entry, types: [KASAN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit a27512601c2d65569fdd5a843246dc8da96b6408 gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 failed building a27512601c2d65569fdd5a843246dc8da96b6408: net/socket.c:1109: undefined reference to `wext_handle_ioctl' net/socket.c:3378: undefined reference to `compat_wext_handle_ioctl' net/core/net-procfs.c:346: undefined reference to `wext_proc_exit' net/core/net-procfs.c:330: undefined reference to `wext_proc_init' minimized to 46 configs; suspects: [HID_ZEROPLUS USB_NET_GL620A USB_NET_MCS7830 USB_NET_NET1080 USB_NET_PLUSB USB_NET_RNDIS_HOST USB_NET_SMSC75XX USB_NET_SMSC95XX USB_NET_SR9700 USB_NET_SR9800 USB_NET_ZAURUS USB_OHCI_HCD USB_OHCI_HCD_PCI USB_OHCI_HCD_PLATFORM USB_OTG USB_OTG_FSM USB_PRINTER USB_SERIAL USB_SERIAL_FTDI_SIO USB_SERIAL_GENERIC USB_SERIAL_PL2303 USB_STORAGE_ALAUDA USB_STORAGE_CYPRESS_ATACB USB_STORAGE_DATAFAB USB_STORAGE_FREECOM USB_STORAGE_ISD200 USB_STORAGE_JUMPSHOT USB_STORAGE_KARMA USB_STORAGE_ONETOUCH USB_STORAGE_SDDR09 USB_STORAGE_SDDR55 USB_STORAGE_USBAT USB_TRANCEVIBRATOR USB_U_AUDIO USB_U_ETHER USB_U_SERIAL USB_WDM WLAN WLAN_VENDOR_ATH WLAN_VENDOR_ATMEL WLAN_VENDOR_BROADCOM WLAN_VENDOR_INTERSIL WLAN_VENDOR_MARVELL WLAN_VENDOR_MEDIATEK WLAN_VENDOR_MICROCHIP WLAN_VENDOR_RALINK WLAN_VENDOR_REALTEK WLAN_VENDOR_RSI WLAN_VENDOR_ZYDAS X86_X32 ZEROPLUS_FF] disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing current HEAD d30b996835c08018a70dd52c588ba15de1c8378b testing commit d30b996835c08018a70dd52c588ba15de1c8378b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e4c954219f9dacb83e8b3114b5d2b1aad78aad82d11b9a1f62dec0ea9c09fb74 all runs: crashed: KASAN: out-of-bounds Read in ext4_xattr_set_entry representative crash: KASAN: out-of-bounds Read in ext4_xattr_set_entry, types: [KASAN] crash still not fixed/happens on the oldest tested release revisions tested: 7, total time: 1h6m49.531102533s (build: 15m5.248819418s, test: 50m10.397129581s) crash still not fixed or there were kernel test errors commit msg: Merge branch 'android13-5.10' into branch `android13-5.10-lts` crash: KASAN: out-of-bounds Read in ext4_xattr_set_entry ================================================================== BUG: KASAN: out-of-bounds in ext4_xattr_set_entry+0xe7b/0x3da0 fs/ext4/xattr.c:1747 Read of size 18446744073709551552 at addr ffff888121c312e8 by task syz-executor.0/1587 CPU: 0 PID: 1587 Comm: syz-executor.0 Not tainted 5.10.199-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack_lvl+0x81/0xac lib/dump_stack.c:118 print_address_description.constprop.0+0x24/0x160 mm/kasan/report.c:248 __kasan_report mm/kasan/report.c:435 [inline] kasan_report.cold+0x82/0xdb mm/kasan/report.c:452 check_region_inline mm/kasan/generic.c:183 [inline] kasan_check_range+0x148/0x190 mm/kasan/generic.c:189 memmove+0x24/0x60 mm/kasan/shadow.c:54 ext4_xattr_set_entry+0xe7b/0x3da0 fs/ext4/xattr.c:1747 ext4_xattr_ibody_set+0xfd/0x350 fs/ext4/xattr.c:2228 ext4_xattr_set_handle+0x7aa/0x10f0 fs/ext4/xattr.c:2385 ext4_xattr_set+0x151/0x310 fs/ext4/xattr.c:2498 ext4_xattr_trusted_set+0x1e/0x20 fs/ext4/xattr_trusted.c:37 __vfs_setxattr+0xe5/0x140 fs/xattr.c:177 __vfs_setxattr_noperm+0xeb/0x470 fs/xattr.c:208 __vfs_setxattr_locked+0x154/0x1e0 fs/xattr.c:266 vfs_setxattr+0x101/0x280 fs/xattr.c:283 setxattr+0x1aa/0x320 fs/xattr.c:548 path_setxattr+0x132/0x150 fs/xattr.c:567 __do_sys_setxattr fs/xattr.c:582 [inline] __se_sys_setxattr fs/xattr.c:578 [inline] __x64_sys_setxattr+0xbf/0x150 fs/xattr.c:578 do_syscall_64+0x32/0x80 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x61/0xc6 RIP: 0033:0x7effcf7eaae9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007effc6f8c0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc RAX: ffffffffffffffda RBX: 00007effcf90a050 RCX: 00007effcf7eaae9 RDX: 0000000000000000 RSI: 0000000020000240 RDI: 00000000200002c0 RBP: 00007effcf83647a R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007effcf90a050 R15: 00007ffd61e4e5e8 The buggy address belongs to the page: page:ffffea0004870c40 refcount:2 mapcount:0 mapping:ffff888108eaf590 index:0x2 pfn:0x121c31 aops:def_blk_aops ino:0 flags: 0x4000000000002036(referenced|uptodate|lru|active|private) raw: 4000000000002036 ffffea00048725c8 ffff88811cc6f030 ffff888108eaf590 raw: 0000000000000002 ffff8881220071f8 00000002ffffffff ffff88811cc86000 page dumped because: kasan: bad access detected page->mem_cgroup:ffff88811cc86000 page_owner tracks the page as allocated page last allocated via order 0, migratetype Movable, gfp_mask 0x108c48(GFP_NOFS|__GFP_NOFAIL|__GFP_HARDWALL|__GFP_MOVABLE), pid 1584, ts 67289892836, free_ts 67188730153 set_page_owner include/linux/page_owner.h:35 [inline] post_alloc_hook mm/page_alloc.c:2456 [inline] prep_new_page mm/page_alloc.c:2462 [inline] get_page_from_freelist+0x1fee/0x2ad0 mm/page_alloc.c:4254 __alloc_pages_nodemask+0x2ae/0x2360 mm/page_alloc.c:5346 __alloc_pages include/linux/gfp.h:544 [inline] __alloc_pages_node include/linux/gfp.h:557 [inline] alloc_pages_node include/linux/gfp.h:571 [inline] alloc_pages include/linux/gfp.h:590 [inline] __page_cache_alloc include/linux/pagemap.h:290 [inline] pagecache_get_page+0x169/0x6f0 mm/filemap.c:1848 find_or_create_page include/linux/pagemap.h:402 [inline] grow_dev_page fs/buffer.c:976 [inline] grow_buffers fs/buffer.c:1045 [inline] __getblk_slow+0x1ad/0x580 fs/buffer.c:1072 __getblk_gfp+0x3d/0x50 fs/buffer.c:1370 sb_getblk include/linux/buffer_head.h:361 [inline] __ext4_get_inode_loc+0x44d/0x1070 fs/ext4/inode.c:4431 __ext4_get_inode_loc_noinmem+0xaf/0x150 fs/ext4/inode.c:4541 __ext4_iget+0x2f0/0x5b20 fs/ext4/inode.c:4766 ext4_orphan_get+0x1f4/0x770 fs/ext4/ialloc.c:1391 ext4_orphan_cleanup fs/ext4/super.c:3083 [inline] ext4_fill_super+0x7757/0xb7d0 fs/ext4/super.c:5075 mount_bdev+0x2b7/0x390 fs/super.c:1429 ext4_mount+0x10/0x20 fs/ext4/super.c:6626 legacy_get_tree+0xf5/0x1d0 fs/fs_context.c:593 vfs_get_tree+0x81/0x1b0 fs/super.c:1559 do_new_mount fs/namespace.c:2899 [inline] path_mount+0x49a/0x1da0 fs/namespace.c:3229 do_mount fs/namespace.c:3242 [inline] __do_sys_mount fs/namespace.c:3450 [inline] __se_sys_mount fs/namespace.c:3427 [inline] __x64_sys_mount+0x20e/0x280 fs/namespace.c:3427 page last free stack trace: reset_page_owner include/linux/page_owner.h:28 [inline] free_pages_prepare mm/page_alloc.c:1349 [inline] free_pcp_prepare+0x1a7/0x230 mm/page_alloc.c:1421 free_unref_page_prepare mm/page_alloc.c:3336 [inline] free_unref_page_list+0x18a/0xae0 mm/page_alloc.c:3443 release_pages+0x374/0xb00 mm/swap.c:1103 pagevec_lru_move_fn mm/swap.c:235 [inline] __pagevec_lru_add mm/swap.c:1217 [inline] lru_cache_add+0x31c/0x3f0 mm/swap.c:533 add_to_page_cache_lru+0x169/0x260 mm/filemap.c:964 pagecache_get_page+0x1d5/0x6f0 mm/filemap.c:1859 grab_cache_page_write_begin+0x49/0x80 mm/filemap.c:3459 block_write_begin+0x24/0x120 fs/buffer.c:2147 blkdev_write_begin+0x1e/0x20 fs/block_dev.c:660 generic_perform_write+0x202/0x4a0 mm/filemap.c:3509 __generic_file_write_iter+0x309/0x540 mm/filemap.c:3638 blkdev_write_iter+0x222/0x500 fs/block_dev.c:1929 call_write_iter include/linux/fs.h:1976 [inline] new_sync_write+0x358/0x6d0 fs/read_write.c:518 vfs_write+0x4e1/0x750 fs/read_write.c:605 ksys_write+0x111/0x210 fs/read_write.c:658 __do_sys_write fs/read_write.c:670 [inline] __se_sys_write fs/read_write.c:667 [inline] __x64_sys_write+0x6e/0xb0 fs/read_write.c:667 Memory state around the buggy address: ffff888121c31180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888121c31200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff888121c31280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff888121c31300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888121c31380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== EXT4-fs warning (device loop0): ext4_update_dynamic_rev:1044: updating to rev 1 because of new feature flag, running e2fsck is recommended