ci starts bisection 2024-09-26 11:31:23.517454053 +0000 UTC m=+32336.904341979 bisecting fixing commit since 48cf398f15fc3b2af11c78fed548355d3b66ca11 building syzkaller on af24b0505c748561efb50f1d03c824d6642f6c0b ensuring issue is reproducible on original commit 48cf398f15fc3b2af11c78fed548355d3b66ca11 testing commit 48cf398f15fc3b2af11c78fed548355d3b66ca11 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: fa19a53efb43e9aa75133042b32a18f7a205c599056be318e1e37863bfce6743 run #0: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #1: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #2: crashed: possible deadlock in console_flush_all run #3: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #4: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #5: crashed: general protection fault in pids_release run #6: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #7: crashed: possible deadlock in console_flush_all run #8: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #9: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #10: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #11: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #12: crashed: general protection fault in refill_obj_stock run #13: crashed: possible deadlock in console_flush_all run #14: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #15: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #16: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #17: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #18: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #19: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper representative crash: KASAN: slab-use-after-free Read in hfsplus_read_wrapper, types: [KASAN] check whether we can drop unnecessary instrumentation disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit 48cf398f15fc3b2af11c78fed548355d3b66ca11 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: b167b82643c5d9c84b7a88fd5c5c53bd07a65df7fba11996d33871f4663326e6 run #0: crashed: general protection fault in strrchr run #1: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #2: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #3: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #4: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #5: crashed: general protection fault in __find_rr_leaf run #6: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #7: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #8: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #9: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper representative crash: KASAN: slab-use-after-free Read in hfsplus_read_wrapper, types: [KASAN] the bug reproduces without the instrumentation disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed kconfig minimization: base=4047 full=8008 leaves diff=2003 split chunks (needed=false): <2003> split chunk #0 of len 2003 into 5 parts testing without sub-chunk 1/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit 48cf398f15fc3b2af11c78fed548355d3b66ca11 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 75c3fc41d26045819c81a6aba38847227abe47cd1b05cdfb0832b87a639928c6 run #0: crashed: general protection fault in strrchr run #1: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #2: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #3: crashed: general protection fault in refill_obj_stock run #4: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #5: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #6: crashed: general protection fault in rt6_fill_node run #7: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #8: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #9: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper representative crash: KASAN: slab-use-after-free Read in hfsplus_read_wrapper, types: [KASAN UNKNOWN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit 48cf398f15fc3b2af11c78fed548355d3b66ca11 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 55a0205df4ea9583199144f875f26602eebfb58c1c30460adeee4eb35c8e1e40 all runs: OK false negative chance: 0.000 testing without sub-chunk 3/5 disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit 48cf398f15fc3b2af11c78fed548355d3b66ca11 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: de483c57ae5d02515c7b60ad9a479b523038fdef5ae8e92cf87136bdd880214c run #0: crashed: general protection fault in bio_uninit run #1: crashed: general protection fault in refill_obj_stock run #2: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #3: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #4: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #5: crashed: general protection fault in do_epoll_wait run #6: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #7: crashed: general protection fault in bio_uninit run #8: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #9: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper representative crash: KASAN: slab-use-after-free Read in hfsplus_read_wrapper, types: [KASAN UNKNOWN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit 48cf398f15fc3b2af11c78fed548355d3b66ca11 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 648ab90b649342241e79989d25afd34edae397ffc16bc4bff5c94c4ce6964df4 run #0: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #1: crashed: general protection fault in ipv6_chk_mcast_addr run #2: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #3: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #4: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #5: crashed: general protection fault in pick_eevdf run #6: crashed: general protection fault in refill_obj_stock run #7: crashed: general protection fault in bio_uninit run #8: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #9: crashed: general protection fault in xt_find_table_lock representative crash: KASAN: slab-use-after-free Read in hfsplus_read_wrapper, types: [KASAN UNKNOWN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit 48cf398f15fc3b2af11c78fed548355d3b66ca11 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: a71fe766002d98bcccb0a10f9b1d24db2e8ec6eb8c38f0d917fc4f2c338581fe run #0: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #1: crashed: general protection fault in bio_uninit run #2: crashed: general protection fault in bio_uninit run #3: crashed: general protection fault in bio_uninit run #4: crashed: general protection fault in bio_uninit run #5: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #6: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #7: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #8: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper run #9: crashed: KASAN: slab-use-after-free Read in hfsplus_read_wrapper representative crash: KASAN: slab-use-after-free Read in hfsplus_read_wrapper, types: [KASAN UNKNOWN] the chunk can be dropped minimized to 401 configs; suspects: [6LOWPAN ARCH_ENABLE_MEMORY_HOTREMOVE ASUS_WMI CC_HAS_ASM_GOTO_OUTPUT CMA COMMON_CLK DAX DLM DRM DRM_BRIDGE DRM_FBDEV_EMULATION DRM_GEM_SHMEM_HELPER DRM_I915 DRM_I915_CAPTURE_ERROR DRM_I915_COMPRESS_ERROR DRM_I915_USERPTR DRM_KMS_HELPER DRM_MIPI_DSI DRM_PANEL DRM_PANEL_BRIDGE DRM_PANEL_EDP DRM_PANEL_ORIENTATION_QUIRKS DRM_SIMPLEDRM DRM_TTM DRM_TTM_HELPER DRM_UDL DRM_VGEM DRM_VIRTIO_GPU DRM_VIRTIO_GPU_KMS DRM_VKMS DRM_VMWGFX DRM_VRAM_HELPER DUMMY DVB_AF9013 DVB_AF9033 DVB_AS102 DVB_AS102_FE DVB_B2C2_FLEXCOP DVB_B2C2_FLEXCOP_USB DVB_CORE DVB_DIB3000MB DVB_DIB3000MC DVB_EC100 DVB_GP8PSK_FE DVB_RTL2830 DVB_RTL2832 DVB_RTL2832_SDR DVB_TEST_DRIVERS DVB_TTUSB_BUDGET DVB_TTUSB_DEC DVB_USB DVB_USB_A800 DVB_USB_AF9005 DVB_USB_AF9005_REMOTE DVB_USB_AF9015 DVB_USB_AF9035 DVB_USB_ANYSEE DVB_USB_AU6610 DVB_USB_AZ6007 DVB_USB_AZ6027 DVB_USB_CE6230 DVB_USB_CINERGY_T2 DVB_USB_CXUSB DVB_USB_DIB0700 DVB_USB_DIB3000MC DVB_USB_DIBUSB_MB DVB_USB_DIBUSB_MC DVB_USB_DIGITV DVB_USB_DTT200U DVB_USB_DTV5100 DVB_USB_DVBSKY DVB_USB_DW2102 DVB_USB_EC168 DVB_USB_GL861 DVB_USB_GP8PSK DVB_USB_LME2510 DVB_USB_M920X DVB_USB_MXL111SF DVB_USB_NOVA_T_USB2 DVB_USB_OPERA1 DVB_USB_PCTV452E DVB_USB_RTL28XXU DVB_USB_TECHNISAT_USB2 DVB_USB_TTUSB2 DVB_USB_UMT_010 DVB_USB_V2 DVB_USB_VP702X DVB_USB_VP7045 DVB_USB_ZD1301 DVB_VIDTV DVB_ZL10353 ECRYPT_FS ECRYPT_FS_MESSAGING EDAC EEPROM_93CX6 EFS_FS ENCRYPTED_KEYS EQUALIZER EROFS_FS EROFS_FS_POSIX_ACL EROFS_FS_SECURITY EROFS_FS_XATTR EROFS_FS_ZIP EVM EVM_ADD_XATTRS EVM_ATTR_FSUUID EXFAT_FS EXPORTFS_BLOCK_OPS EXT3_FS EXT3_FS_POSIX_ACL EXT3_FS_SECURITY EXTCON EXTCON_INTEL_CHT_WC F2FS_CHECK_FS F2FS_FAULT_INJECTION F2FS_FS F2FS_FS_COMPRESSION F2FS_FS_LZ4 F2FS_FS_LZ4HC F2FS_FS_LZO F2FS_FS_LZORLE F2FS_FS_POSIX_ACL F2FS_FS_SECURITY F2FS_FS_XATTR F2FS_FS_ZSTD F2FS_STAT_FS FANOTIFY FANOTIFY_ACCESS_PERMISSIONS FB FB_CFB_COPYAREA FB_CFB_FILLRECT FB_CFB_IMAGEBLIT FB_CORE FB_DEFERRED_IO FB_IOMEM_FOPS FB_IOMEM_HELPERS FB_NOTIFY FB_SYSMEM_FOPS FB_SYSMEM_HELPERS FB_SYSMEM_HELPERS_DEFERRED FB_SYS_COPYAREA FB_SYS_FILLRECT FB_SYS_IMAGEBLIT FB_TILEBLITTING FB_VESA FB_VGA16 FB_VIRTUAL FDDI FIREWIRE FIREWIRE_NET FIREWIRE_OHCI FIREWIRE_SBP2 FONT_8x16 FONT_8x8 FONT_SUPPORT FRAMEBUFFER_CONSOLE FRAMEBUFFER_CONSOLE_DETECT_PRIMARY FRAMEBUFFER_CONSOLE_ROTATION FS_DAX FS_DAX_PMD FS_ENCRYPTION FS_ENCRYPTION_ALGS FS_STACK FS_VERITY FS_VERITY_BUILTIN_SIGNATURES FTL FUSE_DAX FUSE_FS FW_LOADER_COMPRESS FW_LOADER_PAGED_BUF FW_LOADER_SYSFS FW_LOADER_USER_HELPER FW_LOADER_USER_HELPER_FALLBACK GACT_PROB GARP GCC_ASM_GOTO_OUTPUT_WORKAROUND GENERIC_PHY GET_FREE_REGION GFS2_FS GFS2_FS_LOCKING_DLM GOOGLE_COREBOOT_TABLE GOOGLE_FIRMWARE GOOGLE_MEMCONSOLE GOOGLE_MEMCONSOLE_COREBOOT GOOGLE_VPD GPIOLIB GPIOLIB_IRQCHIP GPIO_ACPI GPIO_DLN2 GPIO_VIPERBOARD GREENASIA_FF GREYBUS GREYBUS_BRIDGED_PHY GREYBUS_ES2 GREYBUS_HID GREYBUS_USB GTP GUEST_PERF_EVENTS GVE HAVE_ARCH_NODE_DEV_GROUP HAVE_ARCH_USERFAULTFD_MINOR HAVE_ARCH_USERFAULTFD_WP HAVE_BOOTMEM_INFO_NODE HAVE_CLK_PREPARE HAVE_FAST_GUP HAVE_KVM_CPU_RELAX_INTERCEPT HAVE_KVM_DIRTY_RING HAVE_KVM_DIRTY_RING_ACQ_REL HAVE_KVM_DIRTY_RING_TSO HAVE_KVM_IRQCHIP HAVE_KVM_IRQ_BYPASS HAVE_KVM_IRQ_ROUTING HAVE_KVM_MSI HAVE_KVM_NO_POLL HAVE_KVM_PFNCACHE HAVE_KVM_PM_NOTIFIER HAVE_KVM_READONLY_MEM HAVE_SCHED_AVG_IRQ HDLC HDLC_CISCO HDLC_FR HDLC_PPP HDLC_RAW HDLC_RAW_ETH HDLC_X25 HDMI HFSPLUS_FS HFS_FS HID_ACCUTOUCH HID_ACRUX HID_ACRUX_FF HID_ALPS HID_APPLEIR HID_ASUS HID_AUREAL HID_BATTERY_STRENGTH HID_BETOP_FF HID_CMEDIA HID_CORSAIR HID_CP2112 HID_ELECOM HID_ELO HID_EMS_FF HID_GEMBIRD HID_GFRM HID_GREENASIA HID_GT683R HID_HOLTEK HID_ICADE HID_KEYTOUCH HID_KYE HID_LCPOWER HID_LED HID_LENOVO HID_LOGITECH_DJ HID_LOGITECH_HIDPP HID_MAGICMOUSE HID_MAYFLASH HID_MULTITOUCH HID_NTI HID_ORTEK HID_PENMOUNT HID_PICOLCD HID_PICOLCD_BACKLIGHT HID_PICOLCD_CIR HID_PICOLCD_FB HID_PICOLCD_LCD HID_PICOLCD_LEDS HID_PLANTRONICS HID_PRIMAX HID_PRODIKEYS HID_RETRODE HID_RMI HID_ROCCAT HID_SAITEK HID_SENSOR_ACCEL_3D HID_SENSOR_ALS HID_SENSOR_CUSTOM_SENSOR HID_SENSOR_DEVICE_ROTATION HID_SENSOR_GYRO_3D HID_SENSOR_HUB HID_SENSOR_HUMIDITY HID_SENSOR_IIO_COMMON HID_SENSOR_IIO_TRIGGER HID_SENSOR_INCLINOMETER_3D HID_SENSOR_MAGNETOMETER_3D HID_SENSOR_PRESS HID_SENSOR_PROX HID_SENSOR_TEMP HID_SPEEDLINK HID_STEELSERIES HID_THINGM HID_TIVO HID_TWINHAN HID_UCLOGIC HID_UDRAW_PS3 HID_WACOM HID_WALTOP HID_WIIMOTE HID_XINMO HID_ZYDACRON HMM_MIRROR HOLTEK_FF HOTPLUG_PCI_PCIE HPET_MMAP HPET_MMAP_DEFAULT HPFS_FS I2C_ALGOBIT I2C_CHARDEV I2C_DESIGNWARE_CORE I2C_DESIGNWARE_PLATFORM I2C_DIOLAN_U2C I2C_DLN2 I2C_MUX I2C_MUX_REG I2C_ROBOTFUZZ_OSIF I2C_SI4713 I2C_SLAVE I2C_SLAVE_EEPROM I2C_TINY_USB I2C_VIPERBOARD IEEE802154 IEEE802154_6LOWPAN IEEE802154_ATUSB IEEE802154_DRIVERS IEEE802154_HWSIM IEEE802154_NL802154_EXPERIMENTAL IEEE802154_SOCKET IFB IIO IIO_BUFFER IIO_KFIFO_BUF IIO_TRIGGER IIO_TRIGGERED_BUFFER IKCONFIG IKCONFIG_PROC IMA IMA_DEFAULT_HASH_SHA256 IMA_LSM_RULES IMA_MEASURE_ASYMMETRIC_KEYS IMA_NG_TEMPLATE IMA_QUEUE_EARLY_BOOT_KEYS IMA_READ_POLICY IMA_WRITE_POLICY INET6_ESPINTCP INET6_ESP_OFFLOAD INET6_IPCOMP INET6_TUNNEL INET6_XFRM_TUNNEL INET_AH INET_DCCP_DIAG INET_DIAG INET_DIAG_DESTROY INET_ESP INET_ESPINTCP INET_ESP_OFFLOAD INET_IPCOMP INET_MPTCP_DIAG INET_RAW_DIAG INET_SCTP_DIAG INET_TCP_DIAG INET_UDP_DIAG INET_XFRM_TUNNEL INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_ADDR_TRANS_CONFIGFS INFINIBAND_IPOIB INFINIBAND_IPOIB_CM INFINIBAND_IPOIB_DEBUG INFINIBAND_ISER INFINIBAND_ON_DEMAND_PAGING INFINIBAND_RTRS INFINIBAND_SRP INFINIBAND_USER_ACCESS INFINIBAND_USER_MAD INFINIBAND_USER_MEM INPUT_ATI_REMOTE2 INPUT_CM109 INPUT_IMS_PCU INPUT_JOYDEV INPUT_KEYSPAN_REMOTE INPUT_LEDS INPUT_MOUSEDEV INPUT_MOUSEDEV_PSAUX INPUT_POWERMATE INPUT_UINPUT INPUT_YEALINK INTEGRITY INTEGRITY_ASYMMETRIC_KEYS INTEGRITY_AUDIT INTEGRITY_SIGNATURE INTEGRITY_TRUSTED_KEYRING INTEL_IDMA64 INTEL_IOATDMA INTEL_IOMMU_DEFAULT_ON INTEL_IOMMU_SVM INTEL_ISH_HID INTEL_SOC_PMIC_CHTWC INTERVAL_TREE_SPAN_ITER IOMMUFD IOMMUFD_DRIVER IOMMUFD_TEST IP6_NF_MATCH_AH IP6_NF_MATCH_EUI64 IP6_NF_MATCH_FRAG IP6_NF_MATCH_HL IP6_NF_MATCH_MH IP6_NF_MATCH_OPTS IP6_NF_MATCH_RPFILTER IP6_NF_MATCH_RT IP6_NF_MATCH_SRH IP6_NF_NAT IP6_NF_RAW IP6_NF_SECURITY IP6_NF_TARGET_HL IP6_NF_TARGET_MASQUERADE IP6_NF_TARGET_NPT IP6_NF_TARGET_SYNPROXY IPV6_FOU IPV6_FOU_TUNNEL IPV6_GRE IPV6_ILA IPV6_MIP6 IPV6_MROUTE IPV6_MROUTE_MULTIPLE_TABLES IPV6_MULTIPLE_TABLES IPV6_OPTIMISTIC_DAD IPV6_PIMSM_V2 IPV6_ROUTER_PREF IPV6_ROUTE_INFO IPV6_RPL_LWTUNNEL IPV6_SEG6_BPF IPV6_SEG6_HMAC IPV6_SEG6_LWTUNNEL IPV6_SIT_6RD IPV6_SUBTREES IPV6_TUNNEL IPV6_VTI IPVLAN IPVLAN_L3S IPVTAP IP_DCCP IP_DCCP_CCID3 IP_DCCP_TFRC_LIB IP_FIB_TRIE_STATS IP_MROUTE_MULTIPLE_TABLES IP_NF_ARPFILTER IP_NF_ARPTABLES IP_NF_ARP_MANGLE IP_NF_MATCH_AH IP_NF_MATCH_ECN IP_NF_MATCH_RPFILTER IP_NF_MATCH_TTL IP_NF_RAW IP_NF_SECURITY IP_NF_TARGET_ECN IP_NF_TARGET_NETMAP IP_NF_TARGET_REDIRECT IP_NF_TARGET_SYNPROXY IP_NF_TARGET_TTL IP_ROUTE_CLASSID IP_SCTP IP_SET IP_SET_BITMAP_IP IP_SET_BITMAP_IPMAC IP_SET_BITMAP_PORT IP_SET_HASH_IP IP_SET_HASH_IPMAC IP_SET_HASH_IPMARK IP_SET_HASH_IPPORT IP_SET_HASH_IPPORTIP IP_SET_HASH_IPPORTNET IP_SET_HASH_MAC IP_SET_HASH_NET IP_SET_HASH_NETIFACE IP_SET_HASH_NETNET IP_SET_HASH_NETPORT IP_SET_HASH_NETPORTNET IP_SET_LIST_SET IP_VS IP_VS_DH IP_VS_FO IP_VS_FTP IP_VS_IPV6 IP_VS_LBLC IP_VS_LBLCR IP_VS_LC IP_VS_MH IP_VS_NFCT IP_VS_NQ IP_VS_OVF IP_VS_PE_SIP IP_VS_PROTO_AH IP_VS_PROTO_AH_ESP IP_VS_PROTO_ESP IP_VS_PROTO_TCP IP_VS_PROTO_UDP IRQ_TIME_ACCOUNTING LAPB LCD_CLASS_DEVICE MAC802154 MEDIA_DIGITAL_TV_SUPPORT MEDIA_RADIO_SUPPORT MEDIA_SDR_SUPPORT MEDIA_SUPPORT MEDIA_TEST_SUPPORT MEDIA_USB_SUPPORT MEMORY_HOTPLUG MEMORY_HOTREMOVE MFD_DLN2 MFD_VIPERBOARD MPTCP MTD NETFILTER_ADVANCED NET_ACT_GACT NET_ACT_MIRRED NET_IPGRE_DEMUX NFT_COMPAT NFT_COMPAT_ARP NFT_FWD_NETDEV NF_TABLES NF_TABLES_ARP NF_TABLES_NETDEV RADIO_ADAPTERS RADIO_SI4713 RAS RC_CORE RFKILL SND SOUND STAGING TRANSPARENT_HUGEPAGE VIDEO_DEV VIRTIO_FS WAN ZONE_DEVICE] disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing current HEAD 11a299a7933e03c83818b431e6a1c53ad387423d testing commit 11a299a7933e03c83818b431e6a1c53ad387423d gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e0669e8d60aaba7faab5f3ee8cdbb7bf218b15f393435e444a2dde269d4070f4 all runs: crashed: KASAN: slab-out-of-bounds Read in generic_perform_write representative crash: KASAN: slab-out-of-bounds Read in generic_perform_write, types: [KASAN] crash still not fixed/happens on the oldest tested release revisions tested: 8, total time: 1h44m59.672323417s (build: 58m46.833181749s, test: 41m44.66034565s) crash still not fixed or there were kernel test errors commit msg: Merge tag 'for-6.12/block-20240925' of git://git.kernel.dk/linux crash: KASAN: slab-out-of-bounds Read in generic_perform_write ================================================================== BUG: KASAN: slab-out-of-bounds in memcpy_from_iter lib/iov_iter.c:73 [inline] BUG: KASAN: slab-out-of-bounds in iterate_bvec include/linux/iov_iter.h:123 [inline] BUG: KASAN: slab-out-of-bounds in iterate_and_advance2 include/linux/iov_iter.h:304 [inline] BUG: KASAN: slab-out-of-bounds in iterate_and_advance include/linux/iov_iter.h:328 [inline] BUG: KASAN: slab-out-of-bounds in __copy_from_iter lib/iov_iter.c:249 [inline] BUG: KASAN: slab-out-of-bounds in copy_page_from_iter_atomic+0x923/0x1530 lib/iov_iter.c:481 Read of size 2048 at addr ffff88817b491400 by task kworker/u8:6/1182 CPU: 1 UID: 0 PID: 1182 Comm: kworker/u8:6 Not tainted 6.11.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: loop0 loop_workfn Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x5a/0x90 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:377 [inline] print_report+0xc3/0x620 mm/kasan/report.c:488 kasan_report+0xd9/0x110 mm/kasan/report.c:601 check_region_inline mm/kasan/generic.c:183 [inline] kasan_check_range+0xef/0x1a0 mm/kasan/generic.c:189 __asan_memcpy+0x23/0x60 mm/kasan/shadow.c:105 memcpy_from_iter lib/iov_iter.c:73 [inline] iterate_bvec include/linux/iov_iter.h:123 [inline] iterate_and_advance2 include/linux/iov_iter.h:304 [inline] iterate_and_advance include/linux/iov_iter.h:328 [inline] __copy_from_iter lib/iov_iter.c:249 [inline] copy_page_from_iter_atomic+0x923/0x1530 lib/iov_iter.c:481 copy_folio_from_iter_atomic include/linux/uio.h:201 [inline] generic_perform_write+0x3b7/0x840 mm/filemap.c:4062 shmem_file_write_iter+0xd3/0x100 mm/shmem.c:3221 do_iter_readv_writev+0x397/0x710 fs/read_write.c:834 vfs_iter_write+0x16a/0x7c0 fs/read_write.c:988 lo_write_bvec drivers/block/loop.c:243 [inline] lo_write_simple drivers/block/loop.c:264 [inline] do_req_filebacked drivers/block/loop.c:511 [inline] loop_handle_cmd drivers/block/loop.c:1910 [inline] loop_process_work+0xc3a/0x19e0 drivers/block/loop.c:1945 process_one_work+0x7c4/0x1640 kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x6b1/0x1040 kernel/workqueue.c:3391 kthread+0x277/0x330 kernel/kthread.c:389 ret_from_fork+0x2f/0x70 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Allocated by task 4756: kasan_save_stack+0x33/0x60 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:257 [inline] __do_kmalloc_node mm/slub.c:4265 [inline] __kmalloc_noprof+0x1d5/0x450 mm/slub.c:4277 kmalloc_noprof include/linux/slab.h:882 [inline] hfsplus_read_wrapper+0x2de/0xdb0 fs/hfsplus/wrapper.c:179 hfsplus_fill_super+0x331/0x1940 fs/hfsplus/super.c:419 mount_bdev+0x189/0x260 fs/super.c:1679 legacy_get_tree+0x105/0x200 fs/fs_context.c:662 vfs_get_tree+0x88/0x240 fs/super.c:1800 do_new_mount fs/namespace.c:3507 [inline] path_mount+0x8ea/0x1a70 fs/namespace.c:3834 do_mount fs/namespace.c:3847 [inline] __do_sys_mount fs/namespace.c:4055 [inline] __se_sys_mount fs/namespace.c:4032 [inline] __x64_sys_mount+0x209/0x280 fs/namespace.c:4032 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x6d/0x170 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f The buggy address belongs to the object at ffff88817b491400 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 0 bytes inside of allocated 512-byte region [ffff88817b491400, ffff88817b491600) The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x17b490 head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 flags: 0x100000000000040(head|node=0|zone=2) page_type: f5(slab) raw: 0100000000000040 ffff888100041c80 dead000000000122 0000000000000000 raw: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000 head: 0100000000000040 ffff888100041c80 dead000000000122 0000000000000000 head: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000 head: 0100000000000002 ffffea0005ed2401 ffffffffffffffff 0000000000000000 head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 4620, tgid 4620 (udevd), ts 74146897518, free_ts 74056564882 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x283/0x300 mm/page_alloc.c:1537 prep_new_page mm/page_alloc.c:1545 [inline] get_page_from_freelist+0x131b/0x4660 mm/page_alloc.c:3457 __alloc_pages_noprof+0x1cf/0x4b0 mm/page_alloc.c:4733 alloc_pages_mpol_noprof+0x17b/0x4a0 mm/mempolicy.c:2265 alloc_slab_page mm/slub.c:2413 [inline] allocate_slab+0x251/0x390 mm/slub.c:2579 new_slab mm/slub.c:2632 [inline] ___slab_alloc+0xc2a/0x13f0 mm/slub.c:3819 __slab_alloc.constprop.0+0x4d/0x90 mm/slub.c:3909 __slab_alloc_node mm/slub.c:3962 [inline] slab_alloc_node mm/slub.c:4123 [inline] __kmalloc_cache_noprof+0x324/0x370 mm/slub.c:4291 kmalloc_noprof include/linux/slab.h:878 [inline] kzalloc_noprof include/linux/slab.h:1014 [inline] kernfs_fop_open+0x25c/0xda0 fs/kernfs/file.c:623 do_dentry_open+0x448/0x1090 fs/open.c:958 vfs_open+0x7d/0x350 fs/open.c:1088 do_open fs/namei.c:3774 [inline] path_openat+0x1a30/0x2b10 fs/namei.c:3933 do_filp_open+0x1ba/0x400 fs/namei.c:3960 do_sys_openat2+0x133/0x170 fs/open.c:1415 do_sys_open fs/open.c:1430 [inline] __do_sys_openat fs/open.c:1446 [inline] __se_sys_openat fs/open.c:1441 [inline] __x64_sys_openat+0x134/0x1d0 fs/open.c:1441 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x6d/0x170 arch/x86/entry/common.c:83 page last free pid 4744 tgid 4744 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1108 [inline] free_unref_page+0x633/0xe20 mm/page_alloc.c:2638 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x4e/0x120 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x184/0x1b0 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x69/0x90 mm/kasan/common.c:329 kasan_slab_alloc include/linux/kasan.h:247 [inline] slab_post_alloc_hook mm/slub.c:4086 [inline] slab_alloc_node mm/slub.c:4135 [inline] kmem_cache_alloc_noprof+0x121/0x350 mm/slub.c:4142 getname_flags.part.0+0x45/0x4a0 fs/namei.c:139 user_path_at+0x1c/0x50 fs/namei.c:3015 __do_sys_chdir fs/open.c:561 [inline] __se_sys_chdir fs/open.c:555 [inline] __x64_sys_chdir+0xb0/0x200 fs/open.c:555 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x6d/0x170 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Memory state around the buggy address: ffff88817b491500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88817b491580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88817b491600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff88817b491680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff88817b491700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ==================================================================