ci2 starts bisection 2025-03-29 21:54:19.528426587 +0000 UTC m=+17609.201021572 bisecting fixing commit since d1a25a6a4b3ba9648f8aa7656fd9b320ef167faf building syzkaller on 4c6ac32f33aa00c680c8f4656d1fbf2887f390f1 ensuring issue is reproducible on original commit d1a25a6a4b3ba9648f8aa7656fd9b320ef167faf testing commit d1a25a6a4b3ba9648f8aa7656fd9b320ef167faf gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 75c66f2ce18f5b1ef5ea336c89db1b25f213243827a5aa0a22c91759be706d79 all runs: crashed: KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_list_reinsert representative crash: KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_list_reinsert, types: [KASAN] check whether we can drop unnecessary instrumentation disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit d1a25a6a4b3ba9648f8aa7656fd9b320ef167faf gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: c5c8fb00ad21f2d472120cd4731a86953d179615815d4c806d894a36071c7349 all runs: crashed: KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_list_reinsert representative crash: KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_list_reinsert, types: [KASAN] the bug reproduces without the instrumentation disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed kconfig minimization: base=4920 full=6215 leaves diff=253 split chunks (needed=false): <253> split chunk #0 of len 253 into 5 parts testing without sub-chunk 1/5 disabling configs for [LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit d1a25a6a4b3ba9648f8aa7656fd9b320ef167faf gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: a5272746269d3adf83e06fec057929e7d8c6e3572f3a572d3aafa14532415824 all runs: crashed: KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_list_reinsert representative crash: KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_list_reinsert, types: [KASAN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit d1a25a6a4b3ba9648f8aa7656fd9b320ef167faf gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: d6bb78ce2398d3d4f5332f1c5bfe29a5291dd04d624dd0beb204303906d4c750 all runs: crashed: KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_list_reinsert representative crash: KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_list_reinsert, types: [KASAN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit d1a25a6a4b3ba9648f8aa7656fd9b320ef167faf gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 3d8309885b50ee8de93522b3b92c17395810f8e583de46ea4e61ac9dc1545e51 all runs: crashed: KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_list_reinsert representative crash: KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_list_reinsert, types: [KASAN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit d1a25a6a4b3ba9648f8aa7656fd9b320ef167faf gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: f414440d67232f5a1296a517ebce01a4d088dca4848a5abf9c034445575e8898 all runs: crashed: KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_list_reinsert representative crash: KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_list_reinsert, types: [KASAN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit d1a25a6a4b3ba9648f8aa7656fd9b320ef167faf gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 failed building d1a25a6a4b3ba9648f8aa7656fd9b320ef167faf: net/socket.c:1191: undefined reference to `wext_handle_ioctl' net/socket.c:3390: undefined reference to `compat_wext_handle_ioctl' net/core/net-procfs.c:343: undefined reference to `wext_proc_exit' net/core/net-procfs.c:327: undefined reference to `wext_proc_init' minimized to 49 configs; suspects: [HID_ZEROPLUS USB_NET_CDC_SUBSET USB_NET_CDC_SUBSET_ENABLE USB_NET_DM9601 USB_NET_GL620A USB_NET_MCS7830 USB_NET_NET1080 USB_NET_PLUSB USB_NET_RNDIS_HOST USB_NET_SMSC75XX USB_NET_SMSC95XX USB_NET_SR9700 USB_NET_SR9800 USB_NET_ZAURUS USB_OHCI_HCD USB_OHCI_HCD_PCI USB_OHCI_HCD_PLATFORM USB_OTG USB_OTG_FSM USB_PRINTER USB_SERIAL USB_SERIAL_FTDI_SIO USB_SERIAL_GENERIC USB_SERIAL_PL2303 USB_STORAGE_ALAUDA USB_STORAGE_CYPRESS_ATACB USB_STORAGE_DATAFAB USB_STORAGE_FREECOM USB_STORAGE_ISD200 USB_STORAGE_JUMPSHOT USB_STORAGE_KARMA USB_STORAGE_ONETOUCH USB_STORAGE_SDDR09 USB_STORAGE_SDDR55 USB_STORAGE_USBAT USB_TRANCEVIBRATOR USB_U_AUDIO USB_U_ETHER USB_U_SERIAL USB_WDM USB_XHCI_PCI_RENESAS WLAN WLAN_VENDOR_ATH WLAN_VENDOR_ATMEL WLAN_VENDOR_BROADCOM WLAN_VENDOR_INTERSIL WLAN_VENDOR_MARVELL WLAN_VENDOR_MEDIATEK WLAN_VENDOR_MICROCHIP WLAN_VENDOR_RALINK WLAN_VENDOR_REALTEK WLAN_VENDOR_RSI WLAN_VENDOR_ZYDAS X86_X32 ZEROPLUS_FF] disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing current HEAD 5e1b899f19c3d900664c1ca05c4714c24647d82b testing commit 5e1b899f19c3d900664c1ca05c4714c24647d82b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: b08e00eac875a9c68ebe4bfe36e5ab7881848b03516af8a0c15e31a2546639d3 all runs: crashed: KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_list_reinsert representative crash: KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_list_reinsert, types: [KASAN] crash still not fixed/happens on the oldest tested release revisions tested: 7, total time: 1h3m35.770338865s (build: 31m20.88620211s, test: 29m50.097052192s) crash still not fixed or there were kernel test errors commit msg: FROMGIT: f2fs: fix scheduling while atomic in decompression path crash: KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_list_reinsert ================================================================== BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert.constprop.0+0x3e4/0x560 net/xfrm/xfrm_policy.c:853 Read of size 1 at addr ffff888112fdb3f8 by task syz.2.16/455 CPU: 0 PID: 455 Comm: syz.2.16 Not tainted 5.15.178-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x38/0x49 lib/dump_stack.c:106 print_address_description.constprop.0+0x24/0x160 mm/kasan/report.c:248 __kasan_report mm/kasan/report.c:427 [inline] kasan_report.cold+0x82/0xdb mm/kasan/report.c:444 __asan_report_load1_noabort+0x14/0x20 mm/kasan/report_generic.c:306 xfrm_policy_inexact_list_reinsert.constprop.0+0x3e4/0x560 net/xfrm/xfrm_policy.c:853 xfrm_policy_inexact_node_merge net/xfrm/xfrm_policy.c:985 [inline] xfrm_policy_inexact_insert_node.constprop.0+0x392/0xb40 net/xfrm/xfrm_policy.c:1041 xfrm_policy_inexact_alloc_chain.isra.0+0x2a2/0x620 net/xfrm/xfrm_policy.c:1157 xfrm_policy_inexact_insert+0x63/0xb50 net/xfrm/xfrm_policy.c:1200 xfrm_policy_insert+0x468/0x770 net/xfrm/xfrm_policy.c:1583 xfrm_add_policy+0x3bf/0x830 net/xfrm/xfrm_user.c:1832 xfrm_user_rcv_msg+0x2d9/0x850 net/xfrm/xfrm_user.c:2981 netlink_rcv_skb+0x133/0x3c0 net/netlink/af_netlink.c:2493 xfrm_netlink_rcv+0x68/0x90 net/xfrm/xfrm_user.c:3003 netlink_unicast_kernel net/netlink/af_netlink.c:1315 [inline] netlink_unicast+0x4f8/0x810 net/netlink/af_netlink.c:1341 netlink_sendmsg+0x810/0xd10 net/netlink/af_netlink.c:1909 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg+0xb5/0xf0 net/socket.c:716 ____sys_sendmsg+0x694/0x990 net/socket.c:2436 ___sys_sendmsg+0xfc/0x190 net/socket.c:2490 __sys_sendmsg+0xc3/0x160 net/socket.c:2519 __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __x64_sys_sendmsg+0x73/0xb0 net/socket.c:2526 x64_sys_call+0x840/0x990 arch/x86/include/generated/asm/syscalls_64.h:47 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x33/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7f8354cf6da9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f8354769038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f8354f0ffa0 RCX: 00007f8354cf6da9 RDX: 0000000000004000 RSI: 0000000020000580 RDI: 0000000000000005 RBP: 00007f8354d782a0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f8354f0ffa0 R15: 00007ffef21db3e8 Allocated by task 455: kasan_save_stack+0x26/0x50 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:45 [inline] set_alloc_info mm/kasan/common.c:433 [inline] ____kasan_kmalloc mm/kasan/common.c:512 [inline] ____kasan_kmalloc mm/kasan/common.c:471 [inline] __kasan_kmalloc+0xae/0xe0 mm/kasan/common.c:521 kasan_kmalloc include/linux/kasan.h:227 [inline] __kmalloc+0x2e6/0x550 mm/slub.c:4431 kmalloc include/linux/slab.h:608 [inline] sk_prot_alloc+0xf9/0x2d0 net/core/sock.c:1868 sk_alloc+0x2c/0x520 net/core/sock.c:1925 pfkey_create+0x111/0x600 net/key/af_key.c:152 __sock_create+0x1c8/0x490 net/socket.c:1486 sock_create net/socket.c:1542 [inline] __sys_socket+0xdd/0x1d0 net/socket.c:1584 __do_sys_socket net/socket.c:1593 [inline] __se_sys_socket net/socket.c:1591 [inline] __x64_sys_socket+0x6e/0xb0 net/socket.c:1591 x64_sys_call+0x863/0x990 arch/x86/include/generated/asm/syscalls_64.h:42 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x33/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 The buggy address belongs to the object at ffff888112fdb000 which belongs to the cache kmalloc-1k of size 1024 The buggy address is located 1016 bytes inside of 1024-byte region [ffff888112fdb000, ffff888112fdb400) The buggy address belongs to the page: page:ffffea00044bf600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x112fd8 head:ffffea00044bf600 order:3 compound_mapcount:0 compound_pincount:0 flags: 0x4000000000010200(slab|head|zone=1) raw: 4000000000010200 0000000000000000 dead000000000122 ffff888100043080 raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d2a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 338, ts 53539860986, free_ts 53437407664 set_page_owner include/linux/page_owner.h:33 [inline] post_alloc_hook mm/page_alloc.c:2605 [inline] prep_new_page+0x1a2/0x310 mm/page_alloc.c:2611 get_page_from_freelist+0x1ce2/0x30a0 mm/page_alloc.c:4485 __alloc_pages+0x2d5/0x2620 mm/page_alloc.c:5780 __alloc_pages_node include/linux/gfp.h:591 [inline] alloc_pages_node include/linux/gfp.h:605 [inline] alloc_pages include/linux/gfp.h:618 [inline] alloc_slab_page mm/slub.c:1793 [inline] allocate_slab+0x39d/0x530 mm/slub.c:1932 new_slab mm/slub.c:1995 [inline] ___slab_alloc.constprop.0+0x3ca/0x890 mm/slub.c:3028 __slab_alloc.constprop.0+0x42/0x80 mm/slub.c:3115 slab_alloc_node mm/slub.c:3206 [inline] slab_alloc mm/slub.c:3250 [inline] __kmalloc_track_caller+0x501/0x540 mm/slub.c:4949 kmalloc_reserve net/core/skbuff.c:357 [inline] __alloc_skb+0x8b/0x250 net/core/skbuff.c:428 alloc_skb include/linux/skbuff.h:1183 [inline] wg_socket_send_buffer_to_peer+0x31/0x190 drivers/net/wireguard/socket.c:192 wg_packet_send_handshake_initiation+0x1d8/0x210 drivers/net/wireguard/send.c:40 wg_packet_handshake_send_worker+0x15/0x30 drivers/net/wireguard/send.c:51 process_one_work+0x62c/0xec0 kernel/workqueue.c:2325 worker_thread+0x48e/0xdb0 kernel/workqueue.c:2472 kthread+0x324/0x3e0 kernel/kthread.c:337 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 page last free stack trace: reset_page_owner include/linux/page_owner.h:26 [inline] free_pages_prepare mm/page_alloc.c:1472 [inline] free_pcp_prepare+0x1b6/0x4c0 mm/page_alloc.c:1544 free_unref_page_prepare mm/page_alloc.c:3534 [inline] free_unref_page+0x84/0x760 mm/page_alloc.c:3616 free_the_page mm/page_alloc.c:805 [inline] __free_pages+0xd7/0xf0 mm/page_alloc.c:5856 __free_slab+0xdb/0x1c0 mm/slub.c:2020 free_slab mm/slub.c:2035 [inline] discard_slab+0x2b/0x40 mm/slub.c:2041 __unfreeze_partials+0x1e2/0x230 mm/slub.c:2527 put_cpu_partial+0x96/0xb0 mm/slub.c:2607 __slab_free+0x21e/0x4d0 mm/slub.c:3390 do_slab_free mm/slub.c:3509 [inline] ___cache_free+0x1ee/0x230 mm/slub.c:3530 qlink_free mm/kasan/quarantine.c:157 [inline] qlist_free_all+0x6e/0x150 mm/kasan/quarantine.c:176 kasan_quarantine_reduce+0x15f/0x1c0 mm/kasan/quarantine.c:283 __kasan_slab_alloc+0xaa/0xc0 mm/kasan/common.c:443 kasan_slab_alloc include/linux/kasan.h:217 [inline] slab_post_alloc_hook mm/slab.h:550 [inline] slab_alloc_node mm/slub.c:3240 [inline] slab_alloc mm/slub.c:3250 [inline] kmem_cache_alloc+0x179/0x4d0 mm/slub.c:3255 kmem_cache_alloc_node include/linux/slab.h:474 [inline] __alloc_skb+0x14b/0x250 net/core/skbuff.c:416 alloc_skb include/linux/skbuff.h:1183 [inline] netlink_alloc_large_skb net/netlink/af_netlink.c:1187 [inline] netlink_sendmsg+0x89f/0xd10 net/netlink/af_netlink.c:1884 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg+0xb5/0xf0 net/socket.c:716 Memory state around the buggy address: ffff888112fdb280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888112fdb300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff888112fdb380: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc ^ ffff888112fdb400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff888112fdb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ==================================================================