ci2 starts bisection 2024-10-01 04:43:21.444513664 +0000 UTC m=+61097.488066541 bisecting fixing commit since 3feee789f44683df0030028bc3536a4f043b04cd building syzkaller on 79d68adabef23664d6fbd2cc314a7fef90391ccd ensuring issue is reproducible on original commit 3feee789f44683df0030028bc3536a4f043b04cd testing commit 3feee789f44683df0030028bc3536a4f043b04cd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: affed2541f79bb60b08459d761b24fd2b93b96367b9dc9a5d3e6b2aca67b44f7 run #0: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #1: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #2: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #3: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #4: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #5: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #6: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #7: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #8: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #9: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #10: crashed: KASAN: slab-out-of-bounds Read in ext4_xattr_delete_inode run #11: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #12: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #13: crashed: KASAN: slab-out-of-bounds Read in ext4_xattr_delete_inode run #14: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #15: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #16: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #17: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #18: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #19: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode representative crash: KASAN: use-after-free Read in ext4_xattr_delete_inode, types: [KASAN] check whether we can drop unnecessary instrumentation disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit 3feee789f44683df0030028bc3536a4f043b04cd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: f02bb00bbd201b115e07d8210e7091371a5e4adb2c8c4549c53122917562a108 all runs: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode representative crash: KASAN: use-after-free Read in ext4_xattr_delete_inode, types: [KASAN] the bug reproduces without the instrumentation disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed kconfig minimization: base=4789 full=6018 leaves diff=240 split chunks (needed=false): <240> split chunk #0 of len 240 into 5 parts testing without sub-chunk 1/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit 3feee789f44683df0030028bc3536a4f043b04cd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 231079bb820b8bb4bea066643e102e25546e987dd6163c6880c61391128394c3 run #0: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #1: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #2: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #3: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #4: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #5: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #6: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #7: crashed: KASAN: slab-out-of-bounds Read in ext4_xattr_delete_inode run #8: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode run #9: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode representative crash: KASAN: use-after-free Read in ext4_xattr_delete_inode, types: [KASAN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit 3feee789f44683df0030028bc3536a4f043b04cd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: baed73d4991eb8a461ec361535fd98c702148a216feb4746677f40efda70af64 all runs: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode representative crash: KASAN: use-after-free Read in ext4_xattr_delete_inode, types: [KASAN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit 3feee789f44683df0030028bc3536a4f043b04cd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: d71d145cd618f9a79efa93855d6c8b633fb71c1ed11bd813d73031e41f3516b9 all runs: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode representative crash: KASAN: use-after-free Read in ext4_xattr_delete_inode, types: [KASAN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit 3feee789f44683df0030028bc3536a4f043b04cd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 0ff26388b002d509207282730323ec60ab387f89b59418881e561daac95c45a4 all runs: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode representative crash: KASAN: use-after-free Read in ext4_xattr_delete_inode, types: [KASAN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit 3feee789f44683df0030028bc3536a4f043b04cd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 failed building 3feee789f44683df0030028bc3536a4f043b04cd: net/socket.c:1128: undefined reference to `wext_handle_ioctl' net/socket.c:3397: undefined reference to `compat_wext_handle_ioctl' net/core/net-procfs.c:346: undefined reference to `wext_proc_exit' net/core/net-procfs.c:330: undefined reference to `wext_proc_init' minimized to 48 configs; suspects: [HID_ZEROPLUS USB_NET_CDC_SUBSET USB_NET_CDC_SUBSET_ENABLE USB_NET_DM9601 USB_NET_GL620A USB_NET_MCS7830 USB_NET_NET1080 USB_NET_PLUSB USB_NET_RNDIS_HOST USB_NET_SMSC75XX USB_NET_SMSC95XX USB_NET_SR9700 USB_NET_SR9800 USB_NET_ZAURUS USB_OHCI_HCD USB_OHCI_HCD_PCI USB_OHCI_HCD_PLATFORM USB_OTG USB_OTG_FSM USB_PRINTER USB_SERIAL USB_SERIAL_FTDI_SIO USB_SERIAL_GENERIC USB_SERIAL_PL2303 USB_STORAGE_ALAUDA USB_STORAGE_CYPRESS_ATACB USB_STORAGE_DATAFAB USB_STORAGE_FREECOM USB_STORAGE_ISD200 USB_STORAGE_JUMPSHOT USB_STORAGE_KARMA USB_STORAGE_ONETOUCH USB_STORAGE_SDDR09 USB_STORAGE_SDDR55 USB_STORAGE_USBAT USB_TRANCEVIBRATOR USB_U_AUDIO USB_U_ETHER USB_U_SERIAL USB_WDM WLAN WLAN_VENDOR_ATH WLAN_VENDOR_ATMEL WLAN_VENDOR_BROADCOM WLAN_VENDOR_INTERSIL WLAN_VENDOR_MARVELL WLAN_VENDOR_MEDIATEK WLAN_VENDOR_MICROCHIP WLAN_VENDOR_RALINK WLAN_VENDOR_REALTEK WLAN_VENDOR_RSI WLAN_VENDOR_ZYDAS X86_X32 ZEROPLUS_FF] disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing current HEAD 8d23314f588a573519ab88c332e94c927f870810 testing commit 8d23314f588a573519ab88c332e94c927f870810 gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 6899b8d464ce39672b3d4b2f67c83ae4051ad955b7da363afdd0ee7adb241923 all runs: crashed: KASAN: use-after-free Read in ext4_xattr_delete_inode representative crash: KASAN: use-after-free Read in ext4_xattr_delete_inode, types: [KASAN] crash still not fixed/happens on the oldest tested release revisions tested: 7, total time: 57m7.667914761s (build: 23m25.455216546s, test: 31m45.983384491s) crash still not fixed or there were kernel test errors commit msg: Merge 5.10.225 into android13-5.10-lts crash: KASAN: use-after-free Read in ext4_xattr_delete_inode ================================================================== BUG: KASAN: use-after-free in ext4_xattr_delete_inode+0xddd/0xe30 fs/ext4/xattr.c:2900 Read of size 4 at addr ffff88810fa9b000 by task syz-executor/464 CPU: 1 PID: 464 Comm: syz-executor Not tainted 5.10.225-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack_lvl+0x81/0xac lib/dump_stack.c:118 print_address_description.constprop.0+0x24/0x160 mm/kasan/report.c:248 __kasan_report mm/kasan/report.c:435 [inline] kasan_report.cold+0x82/0xdb mm/kasan/report.c:452 __asan_report_load4_noabort+0x14/0x20 mm/kasan/report_generic.c:308 ext4_xattr_delete_inode+0xddd/0xe30 fs/ext4/xattr.c:2900 ext4_evict_inode+0x823/0x1670 fs/ext4/inode.c:300 evict+0x372/0x940 fs/inode.c:612 iput_final fs/inode.c:1732 [inline] iput.part.0+0x33b/0x640 fs/inode.c:1758 iput+0x3f/0x50 fs/inode.c:1748 d_delete_notify include/linux/fsnotify.h:267 [inline] vfs_rmdir.part.0+0x303/0x3e0 fs/namei.c:3865 vfs_rmdir fs/namei.c:3838 [inline] do_rmdir+0x2b4/0x3a0 fs/namei.c:3912 __do_sys_unlinkat fs/namei.c:4076 [inline] __se_sys_unlinkat fs/namei.c:4070 [inline] __x64_sys_unlinkat+0xab/0xe0 fs/namei.c:4070 do_syscall_64+0x32/0x80 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7f9aff6b8257 Code: 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 07 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffd604ea408 EFLAGS: 00000207 ORIG_RAX: 0000000000000107 RAX: ffffffffffffffda RBX: 0000000000000065 RCX: 00007f9aff6b8257 RDX: 0000000000000200 RSI: 00007ffd604eb5b0 RDI: 00000000ffffff9c RBP: 00007f9aff726515 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000100 R11: 0000000000000207 R12: 00007ffd604eb5b0 R13: 00007f9aff726515 R14: 000000000000e419 R15: 000000000000e419 Allocated by task 0: kasan_save_stack+0x26/0x50 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:45 [inline] set_alloc_info mm/kasan/common.c:430 [inline] ____kasan_kmalloc mm/kasan/common.c:509 [inline] ____kasan_kmalloc mm/kasan/common.c:468 [inline] __kasan_kmalloc+0xae/0xe0 mm/kasan/common.c:518 kasan_kmalloc include/linux/kasan.h:254 [inline] kmem_cache_alloc_trace+0xa9/0x500 mm/slub.c:2974 kmalloc include/linux/slab.h:552 [inline] dst_cow_metrics_generic+0x48/0x180 net/core/dst.c:201 dst_metrics_write_ptr include/net/dst.h:117 [inline] dst_metric_set include/net/dst.h:178 [inline] icmp6_dst_alloc+0x4ea/0x6f0 net/ipv6/route.c:3177 mld_sendpack+0x52a/0xae0 net/ipv6/mcast.c:1665 mld_send_cr net/ipv6/mcast.c:1972 [inline] mld_ifc_timer_expire+0x4a5/0xc50 net/ipv6/mcast.c:2471 call_timer_fn+0x2b/0x190 kernel/time/timer.c:1450 expire_timers kernel/time/timer.c:1495 [inline] __run_timers.part.0+0x45c/0x840 kernel/time/timer.c:1789 __run_timers kernel/time/timer.c:1767 [inline] run_timer_softirq+0x9c/0x180 kernel/time/timer.c:1802 __do_softirq+0x1bc/0x5f3 kernel/softirq.c:309 Freed by task 18: kasan_save_stack+0x26/0x50 mm/kasan/common.c:38 kasan_set_track+0x25/0x30 mm/kasan/common.c:45 kasan_set_free_info+0x24/0x40 mm/kasan/generic.c:370 ____kasan_slab_free mm/kasan/common.c:362 [inline] ____kasan_slab_free mm/kasan/common.c:324 [inline] __kasan_slab_free+0x111/0x150 mm/kasan/common.c:370 kasan_slab_free include/linux/kasan.h:220 [inline] slab_free_hook mm/slub.c:1595 [inline] slab_free_freelist_hook+0x9b/0x1a0 mm/slub.c:1621 slab_free mm/slub.c:3203 [inline] kfree+0xc2/0x4e0 mm/slub.c:4191 ip_dst_metrics_put include/net/ip.h:513 [inline] ip6_dst_destroy+0x148/0x1a0 net/ipv6/route.c:358 dst_destroy+0xe0/0x2d0 net/core/dst.c:120 dst_destroy_rcu+0xd/0x10 net/core/dst.c:142 rcu_do_batch+0x34e/0xb90 kernel/rcu/tree.c:2494 rcu_core+0x3fa/0xa40 kernel/rcu/tree.c:2735 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2748 __do_softirq+0x1bc/0x5f3 kernel/softirq.c:309 The buggy address belongs to the object at ffff88810fa9b000 which belongs to the cache kmalloc-96 of size 96 The buggy address is located 0 bytes inside of 96-byte region [ffff88810fa9b000, ffff88810fa9b060) The buggy address belongs to the page: page:ffffea00043ea6c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10fa9b flags: 0x4000000000000200(slab) raw: 4000000000000200 dead000000000100 dead000000000122 ffff888100043680 raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 469, ts 58200264929, free_ts 58124296102 set_page_owner include/linux/page_owner.h:35 [inline] post_alloc_hook mm/page_alloc.c:2456 [inline] prep_new_page mm/page_alloc.c:2462 [inline] get_page_from_freelist+0x1fee/0x2ad0 mm/page_alloc.c:4254 __alloc_pages_nodemask+0x2ae/0x23d0 mm/page_alloc.c:5348 __alloc_pages include/linux/gfp.h:544 [inline] __alloc_pages_node include/linux/gfp.h:557 [inline] alloc_pages_node include/linux/gfp.h:571 [inline] alloc_pages include/linux/gfp.h:590 [inline] alloc_slab_page mm/slub.c:1665 [inline] allocate_slab+0x30f/0x460 mm/slub.c:1808 new_slab mm/slub.c:1869 [inline] new_slab_objects mm/slub.c:2627 [inline] ___slab_alloc.constprop.0+0x32b/0x730 mm/slub.c:2791 __slab_alloc mm/slub.c:2831 [inline] slab_alloc_node mm/slub.c:2913 [inline] slab_alloc mm/slub.c:2955 [inline] __kmalloc+0x32d/0x360 mm/slub.c:4029 kmalloc_array include/linux/slab.h:592 [inline] kcalloc include/linux/slab.h:603 [inline] cache_random_seq_create+0x73/0x180 mm/slab_common.c:894 init_cache_random_seq+0x35/0x80 mm/slub.c:1686 kmem_cache_open mm/slub.c:3889 [inline] __kmem_cache_create+0xed/0x4b0 mm/slub.c:4503 create_cache mm/slab_common.c:258 [inline] kmem_cache_create_usercopy+0x128/0x2b0 mm/slab_common.c:353 kmem_cache_create+0x11/0x20 mm/slab_common.c:411 ext4_groupinfo_create_slab fs/ext4/mballoc.c:2916 [inline] ext4_mb_init+0x98b/0x1490 fs/ext4/mballoc.c:2955 ext4_fill_super+0x6947/0xb7d0 fs/ext4/super.c:4995 mount_bdev+0x2b7/0x390 fs/super.c:1440 ext4_mount+0x10/0x20 fs/ext4/super.c:6638 legacy_get_tree+0xf5/0x1d0 fs/fs_context.c:593 vfs_get_tree+0x81/0x1b0 fs/super.c:1570 page last free stack trace: reset_page_owner include/linux/page_owner.h:28 [inline] free_pages_prepare mm/page_alloc.c:1349 [inline] __free_pages_ok+0x44b/0x840 mm/page_alloc.c:1629 free_the_page mm/page_alloc.c:5409 [inline] __free_pages+0xda/0xf0 mm/page_alloc.c:5418 __free_slab+0xde/0x1d0 mm/slub.c:1894 free_slab mm/slub.c:1909 [inline] discard_slab+0x2b/0x40 mm/slub.c:1915 unfreeze_partials+0x1e1/0x240 mm/slub.c:2410 put_cpu_partial+0xce/0x120 mm/slub.c:2446 __slab_free+0x23f/0x560 mm/slub.c:3095 do_slab_free mm/slub.c:3191 [inline] ___cache_free+0x255/0x2b0 mm/slub.c:3210 qlink_free mm/kasan/quarantine.c:157 [inline] qlist_free_all+0x71/0x150 mm/kasan/quarantine.c:176 kasan_quarantine_reduce+0x15f/0x1c0 mm/kasan/quarantine.c:283 __kasan_slab_alloc+0xaa/0xc0 mm/kasan/common.c:440 kasan_slab_alloc include/linux/kasan.h:244 [inline] slab_post_alloc_hook mm/slab.h:583 [inline] slab_alloc_node mm/slub.c:2947 [inline] slab_alloc mm/slub.c:2955 [inline] kmem_cache_alloc+0x15d/0x4f0 mm/slub.c:2960 kmem_cache_alloc_node include/linux/slab.h:423 [inline] __alloc_skb+0x41/0x4d0 net/core/skbuff.c:200 alloc_skb include/linux/skbuff.h:1126 [inline] netlink_alloc_large_skb net/netlink/af_netlink.c:1194 [inline] netlink_sendmsg+0x8a4/0xd10 net/netlink/af_netlink.c:1891 sock_sendmsg_nosec net/socket.c:652 [inline] __sock_sendmsg+0xb5/0xf0 net/socket.c:664 __sys_sendto+0x1e3/0x2f0 net/socket.c:2006 Memory state around the buggy address: ffff88810fa9af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88810fa9af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88810fa9b000: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc ^ ffff88810fa9b080: 00 00 00 00 00 00 00 00 00 06 fc fc fc fc fc fc ffff88810fa9b100: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc ==================================================================