ci2 starts bisection 2023-12-11 13:50:48.838219219 +0000 UTC m=+310605.944140559 bisecting fixing commit since fa74641fb6b93a19ccb50579886ecc98320230f9 building syzkaller on 4bce1a3e705a8b62de8194bdb28f5eef89c8feec ensuring issue is reproducible on original commit fa74641fb6b93a19ccb50579886ecc98320230f9 testing commit fa74641fb6b93a19ccb50579886ecc98320230f9 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: ab8fde7427cc30427a057c6139473d02dcfe68726d2fdaeb5c403cb48554f4f8 run #0: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #1: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #2: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #3: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #4: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #5: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #6: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #7: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #8: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #9: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #10: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #11: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #12: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #13: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #14: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #15: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #16: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #17: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #18: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #19: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock representative crash: KASAN: use-after-free Read in ext4_convert_inline_data_nolock, types: [KASAN] check whether we can drop unnecessary instrumentation disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit fa74641fb6b93a19ccb50579886ecc98320230f9 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 770d3a834f204912c312a8d79d2794a908fcb93f6da2b7f6b68cdfff654d5f34 run #0: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #1: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #2: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #3: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #4: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #5: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #6: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #7: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #8: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #9: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock representative crash: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock, types: [KASAN] the bug reproduces without the instrumentation disabling configs for [LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG], they are not needed kconfig minimization: base=3820 full=7524 leaves diff=1994 split chunks (needed=false): <1994> split chunk #0 of len 1994 into 5 parts testing without sub-chunk 1/5 disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit fa74641fb6b93a19ccb50579886ecc98320230f9 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 5bdbd815dadc9cb21d7756680572ebe40afe610e06f1a8a29631f37348a2ef25 run #0: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #1: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #2: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #3: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #4: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #5: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #6: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #7: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #8: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #9: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock representative crash: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock, types: [KASAN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit fa74641fb6b93a19ccb50579886ecc98320230f9 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 733f78c32308466ff9a50580187b9d36b38721efcdb87ecf02ff38bc0c4cfd63 run #0: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #1: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #2: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #3: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #4: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #5: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #6: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #7: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #8: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #9: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock representative crash: KASAN: use-after-free Read in ext4_convert_inline_data_nolock, types: [KASAN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG LOCKDEP], they are not needed testing commit fa74641fb6b93a19ccb50579886ecc98320230f9 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 21b026528644bfee1b38fe2ca9153bf60e154af73bb9972ac206241109c114cb run #0: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #1: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #2: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #3: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #4: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #5: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #6: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #7: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #8: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #9: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock representative crash: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock, types: [KASAN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit fa74641fb6b93a19ccb50579886ecc98320230f9 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 94298e715beb68cfb01631e6a95c16c6a00b8b7422a08f0aed80f2e655dc357d run #0: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #1: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #2: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #3: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #4: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #5: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #6: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #7: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #8: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #9: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock representative crash: KASAN: use-after-free Read in ext4_convert_inline_data_nolock, types: [KASAN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit fa74641fb6b93a19ccb50579886ecc98320230f9 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 86447e044b4211efa3741cd65231cd20c99650aba38c3cf3dd1822393e8771ff run #0: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #1: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #2: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #3: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #4: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #5: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #6: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #7: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #8: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #9: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock representative crash: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock, types: [KASAN] the chunk can be dropped disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing current HEAD e7cddbb41b63252ddb5b7f8247da5d0b24adfac5 testing commit e7cddbb41b63252ddb5b7f8247da5d0b24adfac5 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: cea284b5fffb51f76ea55915cd2b302cac2410693957ea7a3977a36908d39399 run #0: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #1: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #2: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #3: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #4: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #5: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #6: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #7: crashed: KASAN: slab-out-of-bounds Read in ext4_convert_inline_data_nolock run #8: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock run #9: crashed: KASAN: use-after-free Read in ext4_convert_inline_data_nolock representative crash: KASAN: use-after-free Read in ext4_convert_inline_data_nolock, types: [KASAN] crash still not fixed/happens on the oldest tested release revisions tested: 8, total time: 1h26m18.048605068s (build: 33m20.161051516s, test: 50m11.933545898s) crash still not fixed or there were kernel test errors commit msg: Linux 6.1.67 crash: KASAN: use-after-free Read in ext4_convert_inline_data_nolock loop0: detected capacity change from 0 to 2048 EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. ================================================================== BUG: KASAN: use-after-free in ext4_read_inline_data fs/ext4/inline.c:210 [inline] BUG: KASAN: use-after-free in ext4_convert_inline_data_nolock+0x282/0xc10 fs/ext4/inline.c:1216 Read of size 20 at addr ffff888118f3c1a3 by task syz-executor.0/1500 CPU: 1 PID: 1500 Comm: syz-executor.0 Not tainted 6.1.67-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xf4/0x251 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:284 [inline] print_report+0x15f/0x4f0 mm/kasan/report.c:395 kasan_report+0x136/0x160 mm/kasan/report.c:495 kasan_check_range+0x27f/0x290 mm/kasan/generic.c:189 memcpy+0x25/0x60 mm/kasan/shadow.c:65 ext4_read_inline_data fs/ext4/inline.c:210 [inline] ext4_convert_inline_data_nolock+0x282/0xc10 fs/ext4/inline.c:1216 ext4_convert_inline_data+0x3b8/0x4d0 fs/ext4/inline.c:2077 ext4_fallocate+0x136/0x1790 fs/ext4/extents.c:4702 vfs_fallocate+0x30c/0x3d0 fs/open.c:323 ksys_fallocate fs/open.c:346 [inline] __do_sys_fallocate fs/open.c:354 [inline] __se_sys_fallocate fs/open.c:352 [inline] __x64_sys_fallocate+0xa6/0xd0 fs/open.c:352 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f306393b959 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f30634be0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000011d RAX: ffffffffffffffda RBX: 00007f3063a5af80 RCX: 00007f306393b959 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007f3063997c88 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000008000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000006 R14: 00007f3063a5af80 R15: 00007fff7fd8f0e8 Allocated by task 1406: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4b/0x70 mm/kasan/common.c:52 ____kasan_kmalloc mm/kasan/common.c:374 [inline] __kasan_kmalloc+0x97/0xb0 mm/kasan/common.c:383 kmalloc include/linux/slab.h:553 [inline] kzalloc include/linux/slab.h:689 [inline] tomoyo_environ security/tomoyo/domain.c:633 [inline] tomoyo_find_next_domain+0xd1b/0x16e0 security/tomoyo/domain.c:879 tomoyo_bprm_check_security+0xf2/0x120 security/tomoyo/tomoyo.c:101 security_bprm_check+0x23/0x70 security/security.c:869 search_binary_handler fs/exec.c:1721 [inline] exec_binprm fs/exec.c:1774 [inline] bprm_execve+0x740/0x1210 fs/exec.c:1843 kernel_execve+0x53b/0x610 fs/exec.c:2008 call_usermodehelper_exec_async+0x1fc/0x310 kernel/umh.c:113 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 Freed by task 1406: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4b/0x70 mm/kasan/common.c:52 kasan_save_free_info+0x27/0x40 mm/kasan/generic.c:516 ____kasan_slab_free+0x122/0x1e0 mm/kasan/common.c:236 kasan_slab_free include/linux/kasan.h:177 [inline] slab_free_hook mm/slub.c:1724 [inline] slab_free_freelist_hook mm/slub.c:1750 [inline] slab_free mm/slub.c:3661 [inline] __kmem_cache_free+0x2b4/0x470 mm/slub.c:3674 tomoyo_environ security/tomoyo/domain.c:688 [inline] tomoyo_find_next_domain+0x1279/0x16e0 security/tomoyo/domain.c:879 tomoyo_bprm_check_security+0xf2/0x120 security/tomoyo/tomoyo.c:101 security_bprm_check+0x23/0x70 security/security.c:869 search_binary_handler fs/exec.c:1721 [inline] exec_binprm fs/exec.c:1774 [inline] bprm_execve+0x740/0x1210 fs/exec.c:1843 kernel_execve+0x53b/0x610 fs/exec.c:2008 call_usermodehelper_exec_async+0x1fc/0x310 kernel/umh.c:113 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 The buggy address belongs to the object at ffff888118f3c000 which belongs to the cache kmalloc-4k of size 4096 The buggy address is located 419 bytes inside of 4096-byte region [ffff888118f3c000, ffff888118f3d000) The buggy address belongs to the physical page: page:ffffea000463ce00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118f38 head:ffffea000463ce00 order:3 compound_mapcount:0 compound_pincount:0 flags: 0x200000000010200(slab|head|node=0|zone=2) raw: 0200000000010200 dead000000000100 dead000000000122 ffff888100042140 raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 367, tgid 367 (udevd), ts 5031288492, free_ts 0 set_page_owner include/linux/page_owner.h:31 [inline] post_alloc_hook+0x286/0x2b0 mm/page_alloc.c:2513 prep_new_page mm/page_alloc.c:2520 [inline] get_page_from_freelist+0x2ba7/0x2de0 mm/page_alloc.c:4279 __alloc_pages+0x251/0x640 mm/page_alloc.c:5545 alloc_slab_page+0x6a/0x150 mm/slub.c:1794 allocate_slab mm/slub.c:1939 [inline] new_slab+0x70/0x250 mm/slub.c:1992 ___slab_alloc+0x9df/0xe70 mm/slub.c:3180 __slab_alloc mm/slub.c:3279 [inline] slab_alloc_node mm/slub.c:3364 [inline] __kmem_cache_alloc_node+0x195/0x250 mm/slub.c:3437 __do_kmalloc_node mm/slab_common.c:954 [inline] __kmalloc+0x95/0x1c0 mm/slab_common.c:968 kmalloc include/linux/slab.h:558 [inline] tomoyo_realpath_from_path+0xdc/0x4e0 security/tomoyo/realpath.c:251 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_check_open_permission+0x242/0x950 security/tomoyo/file.c:771 security_file_open+0x23/0x80 security/security.c:1663 do_dentry_open+0x299/0xd20 fs/open.c:869 do_open fs/namei.c:3558 [inline] path_openat+0x1e59/0x2410 fs/namei.c:3715 do_filp_open+0x226/0x430 fs/namei.c:3742 do_sys_openat2+0x10b/0x420 fs/open.c:1318 do_sys_open fs/open.c:1334 [inline] __do_sys_openat fs/open.c:1350 [inline] __se_sys_openat fs/open.c:1345 [inline] __x64_sys_openat+0x209/0x250 fs/open.c:1345 page_owner free stack trace missing Memory state around the buggy address: ffff888118f3c080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff888118f3c100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff888118f3c180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff888118f3c200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff888118f3c280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ==================================================================