ci2 starts bisection 2025-10-05 08:13:38.126796432 +0000 UTC m=+245699.767852451 bisecting fixing commit since c79648372d02944bf4a54d87e3901db05d0ac82e building syzkaller on 0c1d6ded3570097468e0af306043c121b2ded6a8 ensuring issue is reproducible on original commit c79648372d02944bf4a54d87e3901db05d0ac82e testing commit c79648372d02944bf4a54d87e3901db05d0ac82e gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: a4c0cb1e48e0bccd4d629b538fb5b781351d2c424c51213f7b0f31e7c6d02fed run #0: crashed: KASAN: use-after-free Read in __lock_sock run #1: crashed: WARNING: ODEBUG bug in __sk_destruct run #2: crashed: KASAN: use-after-free Read in __lock_sock run #3: crashed: KASAN: use-after-free Read in __lock_sock run #4: crashed: KASAN: use-after-free Read in __lock_sock run #5: crashed: KASAN: use-after-free Read in __lock_sock run #6: crashed: KASAN: use-after-free Read in __lock_sock run #7: crashed: KASAN: use-after-free Read in __lock_sock run #8: crashed: KASAN: use-after-free Read in __lock_sock run #9: crashed: KASAN: use-after-free Read in __lock_sock run #10: crashed: KASAN: use-after-free Read in __lock_sock run #11: crashed: KASAN: use-after-free Read in __lock_sock run #12: crashed: KASAN: use-after-free Read in __lock_sock run #13: crashed: KASAN: use-after-free Read in __lock_sock run #14: crashed: KASAN: use-after-free Read in __lock_sock run #15: crashed: KASAN: use-after-free Read in __lock_sock run #16: crashed: KASAN: use-after-free Read in __lock_sock run #17: crashed: KASAN: use-after-free Read in __lock_sock run #18: crashed: KASAN: use-after-free Read in __lock_sock run #19: crashed: KASAN: use-after-free Read in __lock_sock representative crash: KASAN: use-after-free Read in __lock_sock, types: [KASAN-USE-AFTER-FREE-READ] check whether we can drop unnecessary instrumentation disabling configs for [hang memleak ubsan bug_or_warning locking atomic_sleep], they are not needed testing commit c79648372d02944bf4a54d87e3901db05d0ac82e gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: da75b59493035f27556ec7544b8070b9722dd65220daab9b9dff50410e7faa20 run #0: crashed: KASAN: use-after-free Read in __lock_sock run #1: crashed: KASAN: use-after-free Read in worker_thread run #2: crashed: KASAN: use-after-free Read in release_sock run #3: crashed: KASAN: use-after-free Read in __lock_sock run #4: crashed: KASAN: use-after-free Read in __lock_sock run #5: crashed: KASAN: use-after-free Read in __lock_sock run #6: crashed: KASAN: use-after-free Read in __lock_sock run #7: crashed: KASAN: use-after-free Read in __lock_sock run #8: crashed: KASAN: use-after-free Read in __lock_sock run #9: crashed: KASAN: use-after-free Read in __lock_sock representative crash: KASAN: use-after-free Read in __lock_sock, types: [KASAN-USE-AFTER-FREE-READ] the bug reproduces without the instrumentation disabling configs for [locking atomic_sleep hang memleak ubsan bug_or_warning], they are not needed kconfig minimization: base=3707 full=7423 leaves diff=2099 split chunks (needed=false): <2099> split chunk #0 of len 2099 into 5 parts testing without sub-chunk 1/5 disabling configs for [hang memleak ubsan bug_or_warning locking atomic_sleep], they are not needed testing commit c79648372d02944bf4a54d87e3901db05d0ac82e gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 62874bcb5a6606ef7395976f0e967f7860502ab0911fcaa68796555d7c613901 all runs: OK false negative chance: 0.000 testing without sub-chunk 2/5 disabling configs for [ubsan bug_or_warning locking atomic_sleep hang memleak], they are not needed testing commit c79648372d02944bf4a54d87e3901db05d0ac82e gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 638d38ed31d53b0b455b0fd097cf610d78aacfca1c54528af91d0986870381d2 all runs: crashed: KASAN: use-after-free Read in __lock_sock representative crash: KASAN: use-after-free Read in __lock_sock, types: [KASAN-USE-AFTER-FREE-READ] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [locking atomic_sleep hang memleak ubsan bug_or_warning], they are not needed testing commit c79648372d02944bf4a54d87e3901db05d0ac82e gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 05e15448dddd801e5fa0110cccf1bc143bc38be8c65e0b9effc1bc29633a93bd all runs: crashed: KASAN: use-after-free Read in __lock_sock representative crash: KASAN: use-after-free Read in __lock_sock, types: [KASAN-USE-AFTER-FREE-READ] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [locking atomic_sleep hang memleak ubsan bug_or_warning], they are not needed testing commit c79648372d02944bf4a54d87e3901db05d0ac82e gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 8eab473ec32af321c956a79b90723e74f2e7263a6d2a2580205df4625eb9ce72 run #0: crashed: KASAN: use-after-free Read in worker_thread run #1: crashed: KASAN: use-after-free Read in worker_thread run #2: crashed: KASAN: use-after-free Write in lock_sock_nested run #3: crashed: KASAN: use-after-free Read in __lock_sock run #4: crashed: KASAN: use-after-free Read in lock_sock_nested run #5: crashed: KASAN: use-after-free Read in release_sock run #6: OK run #7: OK run #8: OK run #9: crashed: KASAN: use-after-free Read in __lock_sock representative crash: KASAN: use-after-free Read in worker_thread, types: [KASAN-USE-AFTER-FREE-READ] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [locking atomic_sleep hang memleak ubsan bug_or_warning], they are not needed testing commit c79648372d02944bf4a54d87e3901db05d0ac82e gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: f67f9f533c989e8576703635fbbdb095d80e57064dfac7f0c41ab68452b9313d run #0: crashed: KASAN: use-after-free Read in release_sock run #1: crashed: KASAN: use-after-free Read in lock_sock_nested run #2: crashed: KASAN: use-after-free Read in __lock_sock run #3: crashed: KASAN: use-after-free Read in __lock_sock run #4: crashed: KASAN: use-after-free Read in __lock_sock run #5: crashed: KASAN: use-after-free Read in __lock_sock run #6: OK run #7: crashed: KASAN: use-after-free Write in lock_sock_nested run #8: OK run #9: crashed: KASAN: use-after-free Read in __lock_sock representative crash: KASAN: use-after-free Read in release_sock, types: [KASAN-USE-AFTER-FREE-READ] the chunk can be dropped minimized to 420 configs; suspects: [6LOWPAN 6LOWPAN_GHC_EXT_HDR_DEST 6LOWPAN_GHC_EXT_HDR_FRAG 6LOWPAN_GHC_EXT_HDR_HOP 6LOWPAN_GHC_EXT_HDR_ROUTE 6LOWPAN_GHC_ICMPV6 6LOWPAN_GHC_UDP 6LOWPAN_NHC 6LOWPAN_NHC_DEST 6LOWPAN_NHC_FRAGMENT 6LOWPAN_NHC_HOP 6LOWPAN_NHC_IPV6 6LOWPAN_NHC_MOBILITY 6LOWPAN_NHC_ROUTING 6LOWPAN_NHC_UDP 6PACK 842_COMPRESS 842_DECOMPRESS 9P_FSCACHE 9P_FS_POSIX_ACL 9P_FS_SECURITY ACORN_PARTITION ACORN_PARTITION_ADFS ACORN_PARTITION_CUMANA ACORN_PARTITION_EESOX ACORN_PARTITION_ICS ACORN_PARTITION_POWERTEC ACORN_PARTITION_RISCIX ACPI_NFIT ACPI_PLATFORM_PROFILE ADFS_FS AFFS_FS AFS_FS AFS_FSCACHE AF_KCM AF_RXRPC AF_RXRPC_IPV6 AIX_PARTITION AMD_SFH_HID AMIGA_PARTITION ANDROID ANDROID_BINDERFS ANDROID_BINDER_IPC APPLE_MFI_FASTCHARGE AR5523 ARCH_ENABLE_THP_MIGRATION ASHMEM ASM_MODVERSIONS ASN1_ENCODER ASYNC_CORE ASYNC_MEMCPY ASYNC_PQ ASYNC_RAID6_RECOV ASYNC_TX_DMA ASYNC_XOR ATARI_PARTITION ATA_GENERIC ATA_OVER_ETH ATH10K ATH10K_CE ATH10K_PCI ATH10K_USB ATH11K ATH6KL ATH6KL_USB ATH9K ATH9K_AHB ATH9K_BTCOEX_SUPPORT ATH9K_CHANNEL_CONTEXT ATH9K_COMMON ATH9K_COMMON_DEBUG ATH9K_COMMON_SPECTRAL ATH9K_DEBUGFS ATH9K_DYNACK ATH9K_HTC ATH9K_HTC_DEBUGFS ATH9K_HW ATH9K_PCI ATH9K_PCOEM ATH9K_RFKILL ATH_COMMON ATM ATM_BR2684 ATM_CLIP ATM_DRIVERS ATM_LANE ATM_MPOA ATM_TCP AX25 AX25_DAMA_SLAVE AX88796B_PHY BAREUDP BATMAN_ADV BATMAN_ADV_BATMAN_V BATMAN_ADV_BLA BATMAN_ADV_DAT BATMAN_ADV_MCAST BATMAN_ADV_NC BCACHE BCMA BCMA_HOST_PCI_POSSIBLE BEFS_FS BFQ_CGROUP_DEBUG BFQ_GROUP_IOSCHED BFS_FS BIG_KEYS BLK_CGROUP BLK_CGROUP_IOCOST BLK_CGROUP_IOLATENCY BLK_CGROUP_RWSTAT BLK_DEBUG_FS_ZONED BLK_DEV_BSGLIB BLK_DEV_CRYPTOLOOP BLK_DEV_INTEGRITY BLK_DEV_INTEGRITY_T10 BLK_DEV_NBD BLK_DEV_NULL_BLK BLK_DEV_NULL_BLK_FAULT_INJECTION BLK_DEV_NVME BLK_DEV_PMEM BLK_DEV_RAM BLK_DEV_RNBD BLK_DEV_RNBD_CLIENT BLK_DEV_THROTTLING BLK_INLINE_ENCRYPTION BLK_INLINE_ENCRYPTION_FALLBACK BLK_MQ_RDMA BLK_RQ_ALLOC_TIME BLK_WBT BLK_WBT_MQ BLOCK_LEGACY_AUTOLOAD BONDING BPF_EVENTS BPF_JIT BPF_JIT_ALWAYS_ON BPF_JIT_DEFAULT_ON BPF_LSM BPF_PRELOAD BPF_PRELOAD_UMD BPF_SYSCALL BPQETHER BRIDGE BRIDGE_CFM BRIDGE_EBT_802_3 BRIDGE_EBT_AMONG BRIDGE_EBT_ARP BRIDGE_EBT_ARPREPLY BRIDGE_EBT_BROUTE BRIDGE_EBT_DNAT BRIDGE_EBT_IP BRIDGE_EBT_IP6 BRIDGE_EBT_LIMIT BRIDGE_EBT_LOG BRIDGE_EBT_MARK BRIDGE_EBT_MARK_T BRIDGE_EBT_NFLOG BRIDGE_EBT_PKTTYPE BRIDGE_EBT_REDIRECT BRIDGE_EBT_SNAT BRIDGE_EBT_STP BRIDGE_EBT_T_FILTER BRIDGE_EBT_T_NAT BRIDGE_EBT_VLAN BRIDGE_IGMP_SNOOPING BRIDGE_MRP BRIDGE_NF_EBTABLES BRIDGE_VLAN_FILTERING BSD_DISKLABEL BSD_PROCESS_ACCT_V3 BT BTRFS_ASSERT BTRFS_FS BTRFS_FS_POSIX_ACL BTRFS_FS_REF_VERIFY BTT BT_6LOWPAN BT_ATH3K BT_BCM BT_BNEP BT_BNEP_MC_FILTER BT_BNEP_PROTO_FILTER BT_BREDR BT_CMTP BT_HCIBCM203X BT_HCIBFUSB BT_HCIBPA10X BT_HCIBTUSB BT_HCIBTUSB_AUTOSUSPEND BT_HCIBTUSB_BCM BT_HCIBTUSB_MTK BT_HCIBTUSB_RTL BT_HCIUART BT_HCIUART_3WIRE BT_HCIUART_AG6XX BT_HCIUART_BCSP BT_HCIUART_H4 BT_HCIUART_LL BT_HCIUART_MRVL BT_HCIUART_QCA BT_HCIUART_SERDEV BT_HCIVHCI BT_HIDP BT_HS BT_INTEL BT_LE BT_LEDS BT_MSFTEXT BT_QCA BT_RFCOMM BT_RFCOMM_TTY BT_RTL CACHEFILES CAIF CAIF_DEBUG CAIF_DRIVERS CAIF_NETDEV CAIF_TTY CAIF_USB CAIF_VIRTIO CAN CAN_8DEV_USB CAN_BCM CAN_CALC_BITTIMING CAN_DEV CAN_EMS_USB CAN_ESD_USB2 CAN_ETAS_ES58X CAN_GS_USB CAN_GW CAN_IFI_CANFD CAN_ISOTP CAN_J1939 CAN_KVASER_USB CAN_MCBA_USB CAN_PEAK_USB CAN_RAW CAN_SLCAN CAN_UCAN CAN_VCAN CAN_VXCAN CAPI_TRACE CARL9170 CARL9170_HWRNG CARL9170_LEDS CARL9170_WPC CEC_CORE CEPH_FS CEPH_FSCACHE CEPH_FS_POSIX_ACL CEPH_LIB CEPH_LIB_USE_DNS_RESOLVER CFG80211 CFG80211_CRDA_SUPPORT CFG80211_DEBUGFS CFG80211_DEFAULT_PS CFG80211_REQUIRE_SIGNED_REGDB CFG80211_USE_KERNEL_REGDB_KEYS CFG80211_WEXT CFS_BANDWIDTH CGROUP_DEVICE CGROUP_HUGETLB CGROUP_NET_CLASSID CGROUP_NET_PRIO CGROUP_PERF CGROUP_RDMA CGROUP_WRITEBACK CHARGER_ISP1704 CHR_DEV_ST CIFS CIFS_ALLOW_INSECURE_LEGACY CIFS_DEBUG CIFS_DFS_UPCALL CIFS_FSCACHE CIFS_POSIX CIFS_SMB_DIRECT CIFS_SWN_UPCALL CIFS_UPCALL CIFS_XATTR CLS_U32_MARK CLS_U32_PERF CMA CMA_SIZE_SEL_MBYTES CMDLINE_PARTITION COMEDI COMEDI_8254 COMEDI_8255 COMEDI_8255_PCI COMEDI_8255_SA COMEDI_ADL_PCI9118 COMEDI_ADQ12B COMEDI_AIO_AIO12_8 COMEDI_AIO_IIRO_16 COMEDI_AMPLC_DIO200 COMEDI_AMPLC_DIO200_ISA COMEDI_AMPLC_PC236 COMEDI_AMPLC_PC236_ISA COMEDI_AMPLC_PC263_ISA COMEDI_BOND COMEDI_C6XDIGIO COMEDI_DAC02 COMEDI_DAS08 COMEDI_DAS08_ISA COMEDI_DAS16M1 COMEDI_DAS1800 COMEDI_DAS6402 COMEDI_DAS800 COMEDI_DMM32AT COMEDI_DT2801 COMEDI_DT2811 COMEDI_DT2814 COMEDI_DT2815 COMEDI_DT2817 COMEDI_DT282X COMEDI_DT9812 COMEDI_FL512 COMEDI_ISADMA COMEDI_ISA_DRIVERS COMEDI_KCOMEDILIB COMEDI_MISC_DRIVERS COMEDI_MPC624 COMEDI_MULTIQ3 COMEDI_NI_ATMIO16D COMEDI_NI_AT_A2150 COMEDI_NI_AT_AO COMEDI_NI_DAQ_700_CS COMEDI_NI_LABPC COMEDI_NI_LABPC_CS COMEDI_NI_LABPC_ISA COMEDI_NI_LABPC_ISADMA COMEDI_NI_LABPC_PCI COMEDI_NI_USB6501 COMEDI_PARPORT COMEDI_PCI_DRIVERS COMEDI_PCL711 COMEDI_PCL724 COMEDI_PCL726 COMEDI_PCL730 COMEDI_PCL812 COMEDI_PCL816 COMEDI_PCL818 COMEDI_PCM3724 COMEDI_PCMAD COMEDI_PCMCIA_DRIVERS COMEDI_PCMDA12 COMEDI_PCMMIO COMEDI_PCMUIO COMEDI_RTI800 COMEDI_RTI802 COMEDI_S526 COMEDI_TEST COMEDI_USBDUX COMEDI_USBDUXFAST COMEDI_USBDUXSIGMA COMEDI_USB_DRIVERS COMEDI_VMK80XX COMPAT_NETLINK_MESSAGES COUNTER CRAMFS CRAMFS_BLOCKDEV CRAMFS_MTD CRC4 CRC64 CRC7 CRC8 CRC_ITU_T CRC_T10DIF CRYPTO_ADIANTUM CRYPTO_AEGIS128 CRYPTO_AEGIS128_AESNI_SSE2 CRYPTO_AES_NI_INTEL CRYPTO_AES_TI CRYPTO_ANSI_CPRNG CRYPTO_ANUBIS CRYPTO_ARC4 CRYPTO_ARCH_HAVE_LIB_BLAKE2S CRYPTO_ARCH_HAVE_LIB_CHACHA CRYPTO_ARCH_HAVE_LIB_CURVE25519 CRYPTO_ARCH_HAVE_LIB_POLY1305 CRYPTO_BLAKE2B CRYPTO_BLAKE2S_X86 CRYPTO_BLOWFISH CRYPTO_BLOWFISH_COMMON CRYPTO_BLOWFISH_X86_64 CRYPTO_CAMELLIA CRYPTO_CAMELLIA_AESNI_AVX2_X86_64 CRYPTO_CAMELLIA_AESNI_AVX_X86_64 CRYPTO_CAMELLIA_X86_64 CRYPTO_CAST5 CRYPTO_CAST5_AVX_X86_64 CRYPTO_CAST6 CRYPTO_CAST6_AVX_X86_64 CRYPTO_CAST_COMMON CRYPTO_CHACHA20 CRYPTO_CHACHA20POLY1305 CRYPTO_CHACHA20_X86_64 CRYPTO_CRC32 CRYPTO_CRC32C_INTEL CRYPTO_CRC32_PCLMUL CRYPTO_CRCT10DIF CRYPTO_CRCT10DIF_PCLMUL CRYPTO_CRYPTD CRYPTO_CTS CRYPTO_CURVE25519 CRYPTO_CURVE25519_X86 CRYPTO_DEFLATE CRYPTO_DES CRYPTO_DES3_EDE_X86_64 CRYPTO_DEV_CCP CRYPTO_DEV_CCP_DD CRYPTO_DEV_PADLOCK CRYPTO_DEV_PADLOCK_AES CRYPTO_DEV_PADLOCK_SHA CRYPTO_DEV_QAT CRYPTO_DEV_QAT_C3XXX CRYPTO_DEV_QAT_C3XXXVF CRYPTO_DEV_QAT_C62X CRYPTO_DEV_QAT_C62XVF CRYPTO_DEV_QAT_DH895xCC CRYPTO_DEV_QAT_DH895xCCVF CRYPTO_DEV_VIRTIO CRYPTO_DH CRYPTO_DRBG_CTR CRYPTO_DRBG_HASH CRYPTO_ECB CRYPTO_ECC CRYPTO_ECDH CRYPTO_ECRDSA CRYPTO_ENGINE CRYPTO_ESSIV CRYPTO_FCRYPT CRYPTO_GHASH_CLMUL_NI_INTEL CRYPTO_KEYWRAP CRYPTO_KHAZAD CRYPTO_KPP CRYPTO_LIB_ARC4 CRYPTO_LIB_CHACHA CRYPTO_LIB_CHACHA20POLY1305 CRYPTO_LIB_CHACHA_GENERIC CRYPTO_LIB_CURVE25519 CRYPTO_LIB_CURVE25519_GENERIC CRYPTO_LIB_DES CRYPTO_LIB_POLY1305 CRYPTO_LIB_POLY1305_GENERIC CRYPTO_LIB_SM4 CRYPTO_LRW CRYPTO_MICHAEL_MIC CRYPTO_NHPOLY1305 CRYPTO_NHPOLY1305_AVX2 CRYPTO_NHPOLY1305_SSE2 CRYPTO_PCBC CRYPTO_PCRYPT CRYPTO_POLY1305 CRYPTO_POLY1305_X86_64 CRYPTO_RMD160 CRYPTO_SEED CRYPTO_SERPENT CRYPTO_SERPENT_AVX2_X86_64 CRYPTO_SERPENT_AVX_X86_64 CRYPTO_SERPENT_SSE2_X86_64 CRYPTO_SHA1_SSSE3 CRYPTO_SHA256_SSSE3 CRYPTO_SHA3 CRYPTO_SHA512_SSSE3 CRYPTO_SIMD CRYPTO_SM2 CRYPTO_SM3 CRYPTO_SM4 CRYPTO_STREEBOG CRYPTO_TEA CRYPTO_TWOFISH CRYPTO_TWOFISH_AVX_X86_64 CRYPTO_TWOFISH_COMMON CRYPTO_TWOFISH_X86_64 CRYPTO_TWOFISH_X86_64_3WAY CRYPTO_USER CRYPTO_USER_API CRYPTO_USER_API_AEAD CRYPTO_USER_API_ENABLE_OBSOLETE CRYPTO_USER_API_HASH CRYPTO_USER_API_RNG CRYPTO_USER_API_SKCIPHER CRYPTO_VMAC CRYPTO_WP512 CRYPTO_XCBC CRYPTO_XTS CRYPTO_XXHASH CUSE CYPRESS_FIRMWARE DAMON DAMON_DBGFS DAMON_VADDR DCA DCB DEBUG_PREEMPT DMA_CMA FSCACHE FUSE_FS HAMRADIO INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_RTRS_CLIENT IOSCHED_BFQ ISDN ISDN_CAPI LIBNVDIMM MAC80211 MAC80211_LEDS MEDIA_SUPPORT MTD NET_CLS_U32 PARTITION_ADVANCED PCCARD PCMCIA PREEMPTION RFKILL SERIAL_DEV_BUS STAGING TLS TLS_DEVICE USB_GADGET USB_PHY VLAN_8021Q WANT_COMPAT_NETLINK_MESSAGES WEXT_CORE WIRELESS WIRELESS_EXT WLAN WLAN_VENDOR_ATH] disabling configs for [locking atomic_sleep hang memleak ubsan bug_or_warning], they are not needed testing current HEAD 29e53a5b1c4f144301ee36a907e8b03d7733f0b0 testing commit 29e53a5b1c4f144301ee36a907e8b03d7733f0b0 gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 8249e00a57c1a761dc9fda4e82f820a170eab96da2f3832eb8d93346b2e4a4b7 run #0: crashed: KASAN: use-after-free Read in worker_thread run #1: crashed: KASAN: use-after-free Read in worker_thread run #2: crashed: KASAN: use-after-free Read in worker_thread run #3: crashed: KASAN: use-after-free Read in __lock_sock run #4: crashed: KASAN: use-after-free Read in __lock_sock run #5: crashed: KASAN: use-after-free Read in __lock_sock run #6: crashed: KASAN: use-after-free Read in __lock_sock run #7: crashed: KASAN: use-after-free Read in lock_sock_nested run #8: crashed: KASAN: use-after-free Read in lock_sock_nested run #9: crashed: KASAN: use-after-free Read in __lock_sock representative crash: KASAN: use-after-free Read in worker_thread, types: [KASAN-USE-AFTER-FREE-READ] crash still not fixed/happens on the oldest tested release revisions tested: 8, total time: 2h37m55.699638701s (build: 1h0m33.311314231s, test: 1h34m44.440354375s) crash still not fixed or there were kernel test errors commit msg: Linux 5.15.194 crash: KASAN: use-after-free Read in worker_thread ================================================================== BUG: KASAN: use-after-free in worker_thread+0xb51/0xdd0 kernel/workqueue.c:2455 Read of size 8 at addr ffff88810d1546e8 by task kworker/u4:2/135 CPU: 0 PID: 135 Comm: kworker/u4:2 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 Workqueue: 0x0 (kstrp) Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x41/0x5e lib/dump_stack.c:106 print_address_description.constprop.0.cold+0x6c/0x309 mm/kasan/report.c:248 __kasan_report mm/kasan/report.c:434 [inline] kasan_report.cold+0x83/0xdf mm/kasan/report.c:451 worker_thread+0xb51/0xdd0 kernel/workqueue.c:2455 kthread+0x2f8/0x3b0 kernel/kthread.c:334 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 Allocated by task 2800: kasan_save_stack+0x1b/0x40 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:434 [inline] __kasan_slab_alloc+0x61/0x80 mm/kasan/common.c:467 kasan_slab_alloc include/linux/kasan.h:254 [inline] slab_post_alloc_hook mm/slab.h:519 [inline] slab_alloc_node mm/slub.c:3225 [inline] slab_alloc mm/slub.c:3233 [inline] kmem_cache_alloc+0x211/0x310 mm/slub.c:3238 sk_prot_alloc+0x51/0x200 net/core/sock.c:1860 sk_alloc+0x27/0x560 net/core/sock.c:1922 kcm_clone net/kcm/kcmsock.c:1641 [inline] kcm_ioctl+0x628/0x1130 net/kcm/kcmsock.c:1686 sock_do_ioctl+0xc9/0x1c0 net/socket.c:1140 sock_ioctl+0x278/0x4f0 net/socket.c:1257 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x11f/0x190 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x33/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 Freed by task 2801: kasan_save_stack+0x1b/0x40 mm/kasan/common.c:38 kasan_set_track+0x1c/0x30 mm/kasan/common.c:46 kasan_set_free_info+0x20/0x30 mm/kasan/generic.c:360 ____kasan_slab_free mm/kasan/common.c:366 [inline] ____kasan_slab_free mm/kasan/common.c:328 [inline] __kasan_slab_free+0xe0/0x110 mm/kasan/common.c:374 kasan_slab_free include/linux/kasan.h:230 [inline] slab_free_hook mm/slub.c:1710 [inline] slab_free_freelist_hook mm/slub.c:1736 [inline] slab_free mm/slub.c:3504 [inline] kmem_cache_free+0x7e/0x450 mm/slub.c:3520 sk_prot_free net/core/sock.c:1903 [inline] __sk_destruct+0x40d/0x5c0 net/core/sock.c:1991 kcm_release+0x431/0x790 net/kcm/kcmsock.c:1861 __sock_release+0xbb/0x270 net/socket.c:649 sock_close+0xf/0x20 net/socket.c:1336 __fput+0x1b4/0x8e0 fs/file_table.c:311 task_work_run+0xb8/0x140 kernel/task_work.c:188 tracehook_notify_resume include/linux/tracehook.h:189 [inline] exit_to_user_mode_loop kernel/entry/common.c:181 [inline] exit_to_user_mode_prepare+0x195/0x1a0 kernel/entry/common.c:214 __syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline] syscall_exit_to_user_mode+0x12/0x30 kernel/entry/common.c:307 do_syscall_64+0x40/0x80 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x66/0xd0 Last potentially related work creation: kasan_save_stack+0x1b/0x40 mm/kasan/common.c:38 kasan_record_aux_stack+0xc5/0xf0 mm/kasan/generic.c:348 insert_work+0x45/0x380 kernel/workqueue.c:1366 __queue_work+0x520/0xbd0 kernel/workqueue.c:1532 queue_work_on+0x52/0x70 kernel/workqueue.c:1559 queue_work include/linux/workqueue.h:512 [inline] kcm_unattach+0xad5/0x1250 net/kcm/kcmsock.c:1550 kcm_unattach_ioctl net/kcm/kcmsock.c:1607 [inline] kcm_ioctl+0x83a/0x1130 net/kcm/kcmsock.c:1674 sock_do_ioctl+0xc9/0x1c0 net/socket.c:1140 sock_ioctl+0x278/0x4f0 net/socket.c:1257 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x11f/0x190 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x33/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 Second to last potentially related work creation: kasan_save_stack+0x1b/0x40 mm/kasan/common.c:38 kasan_record_aux_stack+0xc5/0xf0 mm/kasan/generic.c:348 insert_work+0x45/0x380 kernel/workqueue.c:1366 __queue_work+0x520/0xbd0 kernel/workqueue.c:1532 queue_work_on+0x52/0x70 kernel/workqueue.c:1559 kcm_attach net/kcm/kcmsock.c:1430 [inline] kcm_attach_ioctl net/kcm/kcmsock.c:1458 [inline] kcm_ioctl+0xc5a/0x1130 net/kcm/kcmsock.c:1664 sock_do_ioctl+0xc9/0x1c0 net/socket.c:1140 sock_ioctl+0x278/0x4f0 net/socket.c:1257 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x11f/0x190 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x33/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 The buggy address belongs to the object at ffff88810d154140 which belongs to the cache KCM of size 1728 The buggy address is located 1448 bytes inside of 1728-byte region [ffff88810d154140, ffff88810d154800) The buggy address belongs to the page: page:ffffea0004345400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10d150 head:ffffea0004345400 order:3 compound_mapcount:0 compound_pincount:0 memcg:ffff888108798901 flags: 0x200000000010200(slab|head|node=0|zone=2) raw: 0200000000010200 0000000000000000 dead000000000122 ffff88810e231780 raw: 0000000000000000 0000000080110011 00000001ffffffff ffff888108798901 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 2764, ts 66725884056, free_ts 66654793111 prep_new_page mm/page_alloc.c:2426 [inline] get_page_from_freelist+0x141f/0x3a80 mm/page_alloc.c:4192 __alloc_pages+0x1b2/0x420 mm/page_alloc.c:5487 alloc_slab_page mm/slub.c:1780 [inline] allocate_slab+0x2eb/0x430 mm/slub.c:1917 new_slab mm/slub.c:1980 [inline] ___slab_alloc+0xb1c/0xf80 mm/slub.c:3013 __slab_alloc mm/slub.c:3100 [inline] slab_alloc_node mm/slub.c:3191 [inline] slab_alloc mm/slub.c:3233 [inline] kmem_cache_alloc+0x2d7/0x310 mm/slub.c:3238 sk_prot_alloc+0x51/0x200 net/core/sock.c:1860 sk_alloc+0x27/0x560 net/core/sock.c:1922 kcm_clone net/kcm/kcmsock.c:1641 [inline] kcm_ioctl+0x628/0x1130 net/kcm/kcmsock.c:1686 sock_do_ioctl+0xc9/0x1c0 net/socket.c:1140 sock_ioctl+0x278/0x4f0 net/socket.c:1257 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x11f/0x190 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x33/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 page last free stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1340 [inline] free_pcp_prepare+0x34e/0x730 mm/page_alloc.c:1391 free_unref_page_prepare mm/page_alloc.c:3317 [inline] free_unref_page+0x19/0x4b0 mm/page_alloc.c:3396 __unfreeze_partials+0x27d/0x2a0 mm/slub.c:2512 qlink_free mm/kasan/quarantine.c:157 [inline] qlist_free_all+0x68/0x110 mm/kasan/quarantine.c:176 kasan_quarantine_reduce+0x180/0x1f0 mm/kasan/quarantine.c:283 __kasan_slab_alloc+0x73/0x80 mm/kasan/common.c:444 kasan_slab_alloc include/linux/kasan.h:254 [inline] slab_post_alloc_hook mm/slab.h:519 [inline] slab_alloc_node mm/slub.c:3225 [inline] slab_alloc mm/slub.c:3233 [inline] kmem_cache_alloc_trace+0x212/0x310 mm/slub.c:3250 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] kernfs_fop_open+0x279/0xc50 fs/kernfs/file.c:628 do_dentry_open+0x45e/0xfc0 fs/open.c:826 do_open fs/namei.c:3608 [inline] path_openat+0x1542/0x2360 fs/namei.c:3742 do_filp_open+0x199/0x3d0 fs/namei.c:3769 do_sys_openat2+0x11e/0x400 fs/open.c:1253 do_sys_open fs/open.c:1269 [inline] __do_sys_openat fs/open.c:1285 [inline] __se_sys_openat fs/open.c:1280 [inline] __x64_sys_openat+0x11b/0x1d0 fs/open.c:1280 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x33/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 Memory state around the buggy address: ffff88810d154580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff88810d154600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff88810d154680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff88810d154700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff88810d154780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ==================================================================