ci starts bisection 2024-11-27 02:47:02.369989151 +0000 UTC m=+3131.154598509 bisecting cause commit starting from 2c22dc1ee3a1d1c50bee5f0f71ebffa86c33e172 building syzkaller on 11dbc2540722df00e9c113b3e27c5ea707844273 ensuring issue is reproducible on original commit 2c22dc1ee3a1d1c50bee5f0f71ebffa86c33e172 testing commit 2c22dc1ee3a1d1c50bee5f0f71ebffa86c33e172 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 2b7ce431b15c429e5186581ce2cf71892c54f58812a9775109b77c229a9a4259 run #0: crashed: WARNING in hci_conn_timeout run #1: crashed: WARNING in hci_conn_timeout run #2: crashed: WARNING in hci_conn_timeout run #3: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #4: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #5: crashed: KASAN: slab-use-after-free Read in __timer_delete run #6: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #7: crashed: KASAN: slab-use-after-free Read in __timer_delete run #8: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #9: crashed: KASAN: slab-use-after-free Read in __timer_delete run #10: crashed: WARNING in hci_conn_timeout run #11: crashed: WARNING in hci_conn_timeout run #12: crashed: KASAN: slab-use-after-free Read in sco_conn_hold_unless_zero run #13: crashed: KASAN: slab-use-after-free Read in __timer_delete run #14: crashed: KASAN: slab-use-after-free Read in __timer_delete run #15: crashed: WARNING in hci_conn_timeout run #16: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #17: crashed: KASAN: slab-use-after-free Read in __timer_delete run #18: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #19: crashed: KASAN: slab-use-after-free Read in __timer_delete representative crash: KASAN: slab-use-after-free Read in sco_sock_connect, types: [KASAN] check whether we can drop unnecessary instrumentation disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit 2c22dc1ee3a1d1c50bee5f0f71ebffa86c33e172 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 694d4248d1e24382553a7f9d3f499c0128ee1f16184f208c47a7e01b133e55d1 run #0: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #1: crashed: KASAN: slab-use-after-free Read in __timer_delete run #2: crashed: KASAN: slab-use-after-free Read in __timer_delete run #3: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #4: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #5: crashed: KASAN: slab-use-after-free Write in sco_conn_hold_unless_zero run #6: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #7: crashed: KASAN: slab-use-after-free Read in __timer_delete run #8: crashed: KASAN: slab-use-after-free Read in __timer_delete run #9: crashed: KASAN: slab-use-after-free Read in __timer_delete representative crash: KASAN: slab-use-after-free Read in sco_sock_connect, types: [KASAN] the bug reproduces without the instrumentation disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed kconfig minimization: base=4037 full=8226 leaves diff=2125 split chunks (needed=false): <2125> split chunk #0 of len 2125 into 5 parts testing without sub-chunk 1/5 disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit 2c22dc1ee3a1d1c50bee5f0f71ebffa86c33e172 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 839d52d014acd935fd42e2215b79ed92de6c5d958e0e39b68f524c767f9125fe all runs: OK false negative chance: 0.000 testing without sub-chunk 2/5 disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG LOCKDEP], they are not needed testing commit 2c22dc1ee3a1d1c50bee5f0f71ebffa86c33e172 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 4dbe7ef66233e81d5ee28752e64317939d1f4bf78d97a88f9c90a09a081ad9ef run #0: crashed: KASAN: slab-use-after-free Read in __timer_delete run #1: crashed: KASAN: slab-use-after-free Read in __timer_delete run #2: crashed: KASAN: slab-use-after-free Read in __timer_delete run #3: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #4: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #5: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #6: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #7: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #8: crashed: KASAN: slab-use-after-free Read in __timer_delete run #9: OK representative crash: KASAN: slab-use-after-free Read in __timer_delete, types: [KASAN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit 2c22dc1ee3a1d1c50bee5f0f71ebffa86c33e172 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: c2fd99db9885cabc016e3ed897cfb46391f1fbd7137703636c248095a2c42a0a run #0: crashed: KASAN: slab-use-after-free Read in __timer_delete run #1: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #2: crashed: KASAN: slab-use-after-free Read in __timer_delete run #3: crashed: KASAN: slab-use-after-free Read in __timer_delete run #4: crashed: KASAN: slab-use-after-free Read in __timer_delete run #5: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #6: crashed: KASAN: slab-use-after-free Read in __timer_delete run #7: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #8: crashed: KASAN: slab-use-after-free Read in __timer_delete run #9: crashed: KASAN: slab-use-after-free Read in sco_sock_connect representative crash: KASAN: slab-use-after-free Read in __timer_delete, types: [KASAN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit 2c22dc1ee3a1d1c50bee5f0f71ebffa86c33e172 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: a325acfc4572924968cb057b201ef7c1eefd7121dd3448aa14e02fb76f84da65 run #0: crashed: KASAN: slab-use-after-free Read in __timer_delete run #1: crashed: KASAN: slab-use-after-free Read in __timer_delete run #2: crashed: KASAN: slab-use-after-free Read in __timer_delete run #3: crashed: KASAN: slab-use-after-free Read in __timer_delete run #4: crashed: KASAN: slab-use-after-free Read in __timer_delete run #5: crashed: KASAN: slab-use-after-free Read in __timer_delete run #6: crashed: KASAN: slab-use-after-free Read in __timer_delete run #7: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #8: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #9: crashed: KASAN: slab-use-after-free Read in __timer_delete representative crash: KASAN: slab-use-after-free Read in __timer_delete, types: [KASAN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit 2c22dc1ee3a1d1c50bee5f0f71ebffa86c33e172 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 9cb00e6b11656da2c9a540ab2756c604dc7faadc5e3ec55b46a2141503e6d1a8 run #0: crashed: KASAN: slab-use-after-free Read in __timer_delete run #1: crashed: KASAN: slab-use-after-free Read in __timer_delete run #2: crashed: KASAN: slab-use-after-free Read in __timer_delete run #3: crashed: KASAN: slab-use-after-free Read in __timer_delete run #4: crashed: KASAN: slab-use-after-free Read in __timer_delete run #5: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #6: crashed: KASAN: slab-use-after-free Read in __timer_delete run #7: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #8: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #9: OK representative crash: KASAN: slab-use-after-free Read in __timer_delete, types: [KASAN] the chunk can be dropped minimized to 425 configs; suspects: [6LOWPAN 6LOWPAN_GHC_EXT_HDR_DEST 6LOWPAN_GHC_EXT_HDR_FRAG 6LOWPAN_GHC_EXT_HDR_HOP 6LOWPAN_GHC_EXT_HDR_ROUTE 6LOWPAN_GHC_ICMPV6 6LOWPAN_GHC_UDP 6LOWPAN_NHC 6LOWPAN_NHC_DEST 6LOWPAN_NHC_FRAGMENT 6LOWPAN_NHC_HOP 6LOWPAN_NHC_IPV6 6LOWPAN_NHC_MOBILITY 6LOWPAN_NHC_ROUTING 6LOWPAN_NHC_UDP 6PACK 842_COMPRESS 842_DECOMPRESS 9P_FSCACHE 9P_FS_POSIX_ACL 9P_FS_SECURITY ACORN_PARTITION ACORN_PARTITION_ADFS ACORN_PARTITION_CUMANA ACORN_PARTITION_EESOX ACORN_PARTITION_ICS ACORN_PARTITION_POWERTEC ACORN_PARTITION_RISCIX ACPI_EC ACPI_NFIT ACPI_NHLT ACPI_PLATFORM_PROFILE ADFS_FS AFFS_FS AFS_FS AFS_FSCACHE AF_KCM AF_RXRPC AF_RXRPC_IPV6 AIX_PARTITION AMD_SFH_HID AMIGA_PARTITION ANDROID_BINDERFS ANDROID_BINDER_IPC ANON_VMA_NAME APERTURE_HELPERS APPLE_MFI_FASTCHARGE AR5523 ARCH_DEFAULT_CRASH_DUMP ARCH_ENABLE_MEMORY_HOTREMOVE ARCH_ENABLE_THP_MIGRATION ARCH_HAS_EXECMEM_ROX ARCH_HAS_PREEMPT_LAZY ARCH_HAS_USER_SHADOW_STACK ARCH_SUPPORTS_HUGE_PFNMAP ARCH_SUPPORTS_PMD_PFNMAP ARCH_SUPPORTS_PUD_PFNMAP ARCH_SUPPORTS_RT ARCH_WANT_PMD_MKWRITE ASM_MODVERSIONS ASUS_TF103C_DOCK ASYNC_CORE ASYNC_MEMCPY ASYNC_PQ ASYNC_RAID6_RECOV ASYNC_TX_DMA ASYNC_XOR ATARI_PARTITION ATA_GENERIC ATA_OVER_ETH ATH10K ATH10K_CE ATH10K_LEDS ATH10K_PCI ATH10K_USB ATH11K ATH6KL ATH6KL_USB ATH9K ATH9K_AHB ATH9K_BTCOEX_SUPPORT ATH9K_CHANNEL_CONTEXT ATH9K_COMMON ATH9K_COMMON_DEBUG ATH9K_COMMON_SPECTRAL ATH9K_DEBUGFS ATH9K_DYNACK ATH9K_HTC ATH9K_HTC_DEBUGFS ATH9K_HW ATH9K_PCI ATH9K_PCOEM ATH9K_RFKILL ATH_COMMON ATM ATM_BR2684 ATM_CLIP ATM_DRIVERS ATM_LANE ATM_MPOA ATM_TCP AUXILIARY_BUS AX25 AX25_DAMA_SLAVE AX88796B_PHY BAREUDP BATMAN_ADV BATMAN_ADV_BATMAN_V BATMAN_ADV_BLA BATMAN_ADV_DAT BATMAN_ADV_MCAST BATMAN_ADV_NC BCACHE BCACHEFS_DEBUG BCACHEFS_ERASURE_CODING BCACHEFS_FS BCACHEFS_POSIX_ACL BCACHEFS_QUOTA BCACHEFS_SIX_OPTIMISTIC_SPIN BCMA BCMA_HOST_PCI_POSSIBLE BEFS_FS BFQ_CGROUP_DEBUG BFQ_GROUP_IOSCHED BFS_FS BIG_KEYS BLK_CGROUP_PUNT_BIO BLK_CGROUP_RWSTAT BLK_DEV_BSGLIB BLK_DEV_INTEGRITY BLK_DEV_NBD BLK_DEV_NULL_BLK BLK_DEV_NULL_BLK_FAULT_INJECTION BLK_DEV_NVME BLK_DEV_PMEM BLK_DEV_RAM BLK_DEV_RNBD BLK_DEV_RNBD_CLIENT BLK_DEV_THROTTLING BLK_DEV_ZONED BLK_ICQ BLK_INLINE_ENCRYPTION BLK_INLINE_ENCRYPTION_FALLBACK BLK_WBT BLK_WBT_MQ BONDING BOOT_VESA_SUPPORT BPF_EVENTS BPF_JIT BPF_JIT_ALWAYS_ON BPF_JIT_DEFAULT_ON BPF_LSM BPF_PRELOAD BPF_PRELOAD_UMD BPF_STREAM_PARSER BPF_SYSCALL BPQETHER BRIDGE BRIDGE_CFM BRIDGE_EBT_802_3 BRIDGE_EBT_AMONG BRIDGE_EBT_ARP BRIDGE_EBT_ARPREPLY BRIDGE_EBT_BROUTE BRIDGE_EBT_DNAT BRIDGE_EBT_IP BRIDGE_EBT_IP6 BRIDGE_EBT_LIMIT BRIDGE_EBT_LOG BRIDGE_EBT_MARK BRIDGE_EBT_MARK_T BRIDGE_EBT_NFLOG BRIDGE_EBT_PKTTYPE BRIDGE_EBT_REDIRECT BRIDGE_EBT_SNAT BRIDGE_EBT_STP BRIDGE_EBT_T_FILTER BRIDGE_EBT_T_NAT BRIDGE_EBT_VLAN BRIDGE_IGMP_SNOOPING BRIDGE_MRP BRIDGE_NF_EBTABLES BRIDGE_NF_EBTABLES_LEGACY BRIDGE_VLAN_FILTERING BSD_DISKLABEL BSD_PROCESS_ACCT_V3 BT BTRFS_ASSERT BTRFS_FS BTRFS_FS_POSIX_ACL BTRFS_FS_REF_VERIFY BTT BT_6LOWPAN BT_ATH3K BT_BCM BT_BNEP BT_BNEP_MC_FILTER BT_BNEP_PROTO_FILTER BT_BREDR BT_HCIBCM203X BT_HCIBFUSB BT_HCIBPA10X BT_HCIBTUSB BT_HCIBTUSB_AUTOSUSPEND BT_HCIBTUSB_BCM BT_HCIBTUSB_MTK BT_HCIBTUSB_POLL_SYNC BT_HCIBTUSB_RTL BT_HCIUART BT_HCIUART_3WIRE BT_HCIUART_AG6XX BT_HCIUART_BCSP BT_HCIUART_H4 BT_HCIUART_LL BT_HCIUART_MRVL BT_HCIUART_QCA BT_HCIUART_SERDEV BT_HCIVHCI BT_INTEL BT_LE BT_LEDS BT_LE_L2CAP_ECRED BT_MRVL BT_MRVL_SDIO BT_MSFTEXT BT_MTK BT_MTKSDIO BT_MTKUART BT_QCA BT_RFCOMM BT_RFCOMM_TTY BT_RTL CACHEFILES CAIF CAIF_DEBUG CAIF_DRIVERS CAIF_NETDEV CAIF_TTY CAIF_USB CAIF_VIRTIO CAN CAN_8DEV_USB CAN_BCM CAN_CALC_BITTIMING CAN_DEV CAN_EMS_USB CAN_ESD_USB CAN_ETAS_ES58X CAN_F81604 CAN_GS_USB CAN_GW CAN_IFI_CANFD CAN_ISOTP CAN_J1939 CAN_KVASER_USB CAN_MCBA_USB CAN_NETLINK CAN_PEAK_USB CAN_RAW CAN_RX_OFFLOAD CAN_SLCAN CAN_UCAN CAN_VCAN CAN_VXCAN CARL9170 CARL9170_HWRNG CARL9170_LEDS CARL9170_WPC CEC_CORE CEPH_FS CEPH_FSCACHE CEPH_FS_POSIX_ACL CEPH_LIB CEPH_LIB_USE_DNS_RESOLVER CFG80211 CFG80211_CRDA_SUPPORT CFG80211_DEBUGFS CFG80211_DEFAULT_PS CFG80211_REQUIRE_SIGNED_REGDB CFG80211_USE_KERNEL_REGDB_KEYS CFG80211_WEXT CFS_BANDWIDTH CGROUP_BPF CHARGER_ISP1704 CHR_DEV_ST CIFS CIFS_ALLOW_INSECURE_LEGACY CIFS_DEBUG CIFS_DFS_UPCALL CIFS_FSCACHE CIFS_POSIX CIFS_SMB_DIRECT CIFS_SWN_UPCALL CIFS_UPCALL CIFS_XATTR CLOSURES CLS_U32_MARK CLS_U32_PERF CMA CMA_SIZE_SEL_MAX CMDLINE_PARTITION COMEDI COMEDI_DT9812 COMEDI_NI_USB6501 COMEDI_USBDUX COMEDI_USBDUXFAST COMEDI_USBDUXSIGMA COMEDI_USB_DRIVERS COMEDI_VMK80XX COMPAT_NETLINK_MESSAGES COUNTER CRAMFS CRAMFS_BLOCKDEV CRAMFS_MTD CRC4 CRC64 CRC64_ROCKSOFT CRC7 CRC8 CRC_ITU_T CRC_T10DIF CRYPTO_842 CRYPTO_ADIANTUM CRYPTO_AEGIS128 CRYPTO_AEGIS128_AESNI_SSE2 CRYPTO_AES_NI_INTEL CRYPTO_AES_TI CRYPTO_ANSI_CPRNG CRYPTO_ANUBIS CRYPTO_ARC4 CRYPTO_ARCH_HAVE_LIB_BLAKE2S CRYPTO_ARCH_HAVE_LIB_CHACHA CRYPTO_ARCH_HAVE_LIB_CURVE25519 CRYPTO_ARCH_HAVE_LIB_POLY1305 CRYPTO_ARIA CRYPTO_ARIA_AESNI_AVX_X86_64 CRYPTO_BLAKE2B CRYPTO_BLAKE2S_X86 CRYPTO_BLOWFISH CRYPTO_BLOWFISH_COMMON CRYPTO_BLOWFISH_X86_64 CRYPTO_CAMELLIA CRYPTO_CAMELLIA_AESNI_AVX2_X86_64 CRYPTO_CAMELLIA_AESNI_AVX_X86_64 CRYPTO_CAMELLIA_X86_64 CRYPTO_CAST5 CRYPTO_CAST5_AVX_X86_64 CRYPTO_CAST6 CRYPTO_CAST6_AVX_X86_64 CRYPTO_CAST_COMMON CRYPTO_CHACHA20POLY1305 CRYPTO_CHACHA20_X86_64 CRYPTO_CRC32 CRYPTO_CRC32C_INTEL CRYPTO_CRC32_PCLMUL CRYPTO_CRC64_ROCKSOFT CRYPTO_CRCT10DIF CRYPTO_CRCT10DIF_PCLMUL CRYPTO_CRYPTD CRYPTO_CURVE25519 CRYPTO_CURVE25519_X86 CRYPTO_DEFLATE CRYPTO_DES CRYPTO_DES3_EDE_X86_64 CRYPTO_DEV_CCP CRYPTO_DEV_CCP_DD CRYPTO_DEV_PADLOCK CRYPTO_DEV_PADLOCK_AES CRYPTO_DEV_PADLOCK_SHA CRYPTO_DEV_QAT CRYPTO_DEV_QAT_C3XXX CRYPTO_DEV_QAT_C3XXXVF CRYPTO_DEV_QAT_C62X CRYPTO_DEV_QAT_C62XVF CRYPTO_DEV_QAT_DH895xCC CRYPTO_DEV_QAT_DH895xCCVF CRYPTO_DEV_VIRTIO CRYPTO_DH CRYPTO_DRBG_CTR CRYPTO_DRBG_HASH CRYPTO_ECDH CRYPTO_ECRDSA CRYPTO_ENGINE CRYPTO_ESSIV CRYPTO_FCRYPT CRYPTO_GHASH_CLMUL_NI_INTEL CRYPTO_HCTR2 CRYPTO_KDF800108_CTR CRYPTO_KEYWRAP CRYPTO_KHAZAD CRYPTO_KPP CRYPTO_LIB_ARC4 CRYPTO_LIB_CHACHA CRYPTO_LIB_CHACHA20POLY1305 CRYPTO_LIB_CURVE25519 CRYPTO_LIB_CURVE25519_GENERIC CRYPTO_LIB_POLY1305 CRYPTO_LIB_POLY1305_GENERIC CRYPTO_LRW CRYPTO_LZ4 CRYPTO_LZ4HC CRYPTO_NHPOLY1305 CRYPTO_NHPOLY1305_AVX2 CRYPTO_NHPOLY1305_SSE2 CRYPTO_PCBC CRYPTO_PCRYPT CRYPTO_POLY1305 CRYPTO_POLY1305_X86_64 CRYPTO_POLYVAL CRYPTO_POLYVAL_CLMUL_NI CRYPTO_RMD160 CRYPTO_SEED CRYPTO_SERPENT CRYPTO_SERPENT_AVX2_X86_64 CRYPTO_SERPENT_AVX_X86_64 CRYPTO_SERPENT_SSE2_X86_64 CRYPTO_SHA1_SSSE3 CRYPTO_SHA256_SSSE3 CRYPTO_SHA512_SSSE3 CRYPTO_SIMD CRYPTO_SM3_AVX_X86_64 CRYPTO_SM4_AESNI_AVX2_X86_64 CRYPTO_SM4_AESNI_AVX_X86_64 CRYPTO_STREEBOG CRYPTO_TEA CRYPTO_TWOFISH CRYPTO_TWOFISH_AVX_X86_64 CRYPTO_TWOFISH_COMMON CRYPTO_TWOFISH_X86_64 CRYPTO_TWOFISH_X86_64_3WAY CRYPTO_USER CRYPTO_USER_API CRYPTO_USER_API_AEAD CRYPTO_USER_API_ENABLE_OBSOLETE CRYPTO_USER_API_HASH CRYPTO_USER_API_RNG CRYPTO_USER_API_SKCIPHER CRYPTO_VMAC CRYPTO_WP512 CRYPTO_XCTR CRYPTO_XXHASH CRYPTO_ZSTD CUSE CYPRESS_FIRMWARE DAMON DAMON_PADDR DAMON_RECLAIM DAMON_VADDR DAX DCA DCB DEFAULT_CODEL DEVICE_MIGRATION DEVICE_PRIVATE DEV_COREDUMP DEV_DAX DLN2_ADC DMABUF_HEAPS DMABUF_HEAPS_CMA DMABUF_HEAPS_SYSTEM DMABUF_MOVE_NOTIFY DMA_CMA DMA_ENGINE_RAID DM_AUDIT DM_BIO_PRISON DM_BUFIO DM_CACHE DM_CACHE_SMQ DM_CLONE DM_CRYPT DM_FLAKEY DM_INTEGRITY DM_MULTIPATH DM_MULTIPATH_QL DM_MULTIPATH_ST DM_PERSISTENT_DATA DM_RAID DM_SNAPSHOT DM_THIN_PROVISIONING DM_UEVENT DM_VERITY DM_VERITY_FEC DM_WRITECACHE DM_ZONED DRAGONRISE_FF DRM DRM_AUX_BRIDGE DRM_BOCHS DRM_BRIDGE DRM_BUDDY DRM_CIRRUS_QEMU DRM_CLIENT DRM_CLIENT_LIB DRM_CLIENT_SELECTION DRM_CLIENT_SETUP DRM_DEBUG_MM DRM_DISPLAY_DP_AUX_BUS DRM_DISPLAY_DP_HELPER DRM_DISPLAY_DSC_HELPER DRM_DISPLAY_HDCP_HELPER DRM_DISPLAY_HDMI_HELPER DRM_DISPLAY_HELPER DRM_FBDEV_EMULATION DRM_GEM_SHMEM_HELPER DRM_GM12U320 DRM_GUD DRM_I915 DRM_I915_CAPTURE_ERROR DRM_I915_COMPRESS_ERROR DRM_I915_USERPTR DRM_KMS_HELPER ENCRYPTED_KEYS FSCACHE FUSE_FS GPIOLIB HAMRADIO HID_DRAGONRISE IIO INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_RTRS_CLIENT IOSCHED_BFQ LIBNVDIMM MAC80211 MAC80211_DEBUGFS MAC80211_LEDS MEDIA_SUPPORT MEMORY_HOTPLUG MEMORY_HOTREMOVE MFD_DLN2 MMC MTD NET_CLS_U32 NET_SCH_DEFAULT PARTITION_ADVANCED RFKILL SERIAL_DEV_BUS TLS TLS_DEVICE TRANSPARENT_HUGEPAGE TRUSTED_KEYS USB_GADGET USB_PHY VLAN_8021Q WANT_COMPAT_NETLINK_MESSAGES WEXT_CORE WIRELESS WIRELESS_EXT WLAN WLAN_VENDOR_ATH X86_X32_ABI ZONE_DEVICE] disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed picked [v6.12 v6.11 v6.10 v6.8 v6.6 v6.4 v6.2 v6.0 v5.17 v5.14 v5.11 v5.8 v5.5 v5.2 v4.20 v4.19] out of 35 release tags testing release v6.12 testing commit adc218676eef25575469234709c2d87185ca223a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 8d72911a35d8fc5d96fc01d8565d020be6ff969b319011c7a829c545f9cb71bb all runs: OK false negative chance: 0.000 # git bisect start 2c22dc1ee3a1d1c50bee5f0f71ebffa86c33e172 adc218676eef25575469234709c2d87185ca223a Bisecting: 3954 revisions left to test after this (roughly 12 steps) [fcc79e1714e8c2b8e216dc3149812edd37884eef] Merge tag 'net-next-6.13' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next testing commit fcc79e1714e8c2b8e216dc3149812edd37884eef gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e1f790d5248f6fe96496c09043e33b658761584ca5d431ccd7921b5b1add2211 run #0: crashed: KASAN: slab-use-after-free Read in __timer_delete run #1: crashed: KASAN: slab-use-after-free Read in __timer_delete run #2: crashed: KASAN: slab-use-after-free Read in __timer_delete run #3: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #4: crashed: KASAN: slab-use-after-free Read in __timer_delete run #5: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #6: crashed: KASAN: slab-use-after-free Read in __timer_delete run #7: crashed: KASAN: slab-use-after-free Read in __timer_delete run #8: OK run #9: OK representative crash: KASAN: slab-use-after-free Read in __timer_delete, types: [KASAN] # git bisect bad fcc79e1714e8c2b8e216dc3149812edd37884eef Bisecting: 2734 revisions left to test after this (roughly 12 steps) [79caa6c88ac484111b24488eb9fe1c86a3d18016] Merge tag 'asm-generic-3.13' of git://git.kernel.org/pub/scm/linux/kernel/git/arnd/asm-generic testing commit 79caa6c88ac484111b24488eb9fe1c86a3d18016 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: c1750caa9a27b20133fe93238bbc8f35266a52ad7f408ec1d4b06275a7c8b7f4 all runs: OK false negative chance: 0.000 # git bisect good 79caa6c88ac484111b24488eb9fe1c86a3d18016 Bisecting: 1356 revisions left to test after this (roughly 11 steps) [5c46638540f0874ab3f5a52fbe9de33973fda508] Merge tag 'wireless-next-2024-11-13' of git://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless-next testing commit 5c46638540f0874ab3f5a52fbe9de33973fda508 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 9fbf4e6a5e18f0662afbbda822570f5dbae00d3f36c59a249ac2969fff30e877 all runs: OK false negative chance: 0.000 # git bisect good 5c46638540f0874ab3f5a52fbe9de33973fda508 Bisecting: 677 revisions left to test after this (roughly 9 steps) [06fc642c538e5b294c60d5b45c914feca1a8ab77] Merge tag 'v6.13-rockchip-dts32-2' of https://git.kernel.org/pub/scm/linux/kernel/git/mmind/linux-rockchip into soc/dt testing commit 06fc642c538e5b294c60d5b45c914feca1a8ab77 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 96ad79ca2dee1c9542662508a43574d6a7f59ea3c34247e604b0624c2a465046 all runs: OK false negative chance: 0.000 # git bisect good 06fc642c538e5b294c60d5b45c914feca1a8ab77 Bisecting: 267 revisions left to test after this (roughly 8 steps) [6e95ef0258ff4ee23ae3b06bf6b00b33dbbd5ef7] Merge tag 'bpf-next-6.13' of git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next testing commit 6e95ef0258ff4ee23ae3b06bf6b00b33dbbd5ef7 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 3f513c22081fc406bf18bbbef9d035b0b7b58b89a5d047d88e15e640c83194b3 all runs: OK false negative chance: 0.000 # git bisect good 6e95ef0258ff4ee23ae3b06bf6b00b33dbbd5ef7 Bisecting: 133 revisions left to test after this (roughly 7 steps) [e51edeaf3506654ebd62c16e0ddf58da271b5200] net/netlink: Correct the comment on netlink message max cap testing commit e51edeaf3506654ebd62c16e0ddf58da271b5200 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 951268720dfeeb64515ce90d8f1f1509b77dd3bf4d0701b9659284b283cd8406 run #0: crashed: KASAN: slab-use-after-free Read in __timer_delete run #1: crashed: KASAN: slab-use-after-free Read in __timer_delete run #2: crashed: KASAN: slab-use-after-free Read in __timer_delete run #3: crashed: KASAN: slab-use-after-free Read in __timer_delete run #4: crashed: KASAN: slab-use-after-free Read in __timer_delete run #5: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #6: crashed: KASAN: slab-use-after-free Read in __timer_delete run #7: crashed: KASAN: slab-use-after-free Read in __timer_delete run #8: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #9: OK representative crash: KASAN: slab-use-after-free Read in __timer_delete, types: [KASAN] # git bisect bad e51edeaf3506654ebd62c16e0ddf58da271b5200 Bisecting: 66 revisions left to test after this (roughly 6 steps) [2de33a21a136ccfcf5ebd956537eec0637e067d3] Bluetooth: hci_bcm: Use the devm_clk_get_optional() helper testing commit 2de33a21a136ccfcf5ebd956537eec0637e067d3 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: c45bb61ffcc2f885e07b41923f7e4918915c863e0d7e12f5f4a684a1ccfe01d0 run #0: crashed: KASAN: slab-use-after-free Read in __timer_delete run #1: crashed: KASAN: slab-use-after-free Read in __timer_delete run #2: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #3: crashed: KASAN: slab-use-after-free Read in __timer_delete run #4: crashed: KASAN: slab-use-after-free Read in __timer_delete run #5: crashed: KASAN: slab-use-after-free Read in __timer_delete run #6: crashed: KASAN: slab-use-after-free Read in __timer_delete run #7: crashed: KASAN: slab-use-after-free Read in __timer_delete run #8: crashed: KASAN: slab-use-after-free Read in __timer_delete run #9: OK representative crash: KASAN: slab-use-after-free Read in __timer_delete, types: [KASAN] # git bisect bad 2de33a21a136ccfcf5ebd956537eec0637e067d3 Bisecting: 33 revisions left to test after this (roughly 5 steps) [a94bc93a305bdcb20cc62978c334cace932b1be0] Bluetooth: btusb: Add USB HW IDs for MT7920/MT7925 testing commit a94bc93a305bdcb20cc62978c334cace932b1be0 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: a052d9912a96cb56f40e0fd0d0e81cda7dffb55be41d78ef12d1c251c718c346 all runs: OK false negative chance: 0.000 # git bisect good a94bc93a305bdcb20cc62978c334cace932b1be0 Bisecting: 16 revisions left to test after this (roughly 4 steps) [677a55ba11a82c2835550a82324cec5fcb2f9e2d] Bluetooth: Set quirks for ATS2851 testing commit 677a55ba11a82c2835550a82324cec5fcb2f9e2d gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: fea4943f0f27ef84ebffeb49438d03746417ad0804b0c2435ad2629d2176c404 all runs: OK false negative chance: 0.000 # git bisect good 677a55ba11a82c2835550a82324cec5fcb2f9e2d Bisecting: 8 revisions left to test after this (roughly 3 steps) [42ecf1947135110ea08abeaca39741636f9a2285] Bluetooth: ISO: Do not emit LE BIG Create Sync if previous is pending testing commit 42ecf1947135110ea08abeaca39741636f9a2285 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 9b853bcb9ad2d138bbb2467401c0f37221ef29cb50c446b9eea0aff8a0eadc67 all runs: OK false negative chance: 0.000 # git bisect good 42ecf1947135110ea08abeaca39741636f9a2285 Bisecting: 4 revisions left to test after this (roughly 2 steps) [96e7c4273560be4744ba8c444bc6969745315251] Bluetooth: HCI: Add IPC(11) bus type testing commit 96e7c4273560be4744ba8c444bc6969745315251 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e130bdc8e7aaee0d7eb323cfa9c9c3b96eb15dfe6204c8687ca9df306dff39ad all runs: OK false negative chance: 0.000 # git bisect good 96e7c4273560be4744ba8c444bc6969745315251 Bisecting: 2 revisions left to test after this (roughly 1 step) [dc26097bdb864a0d5955b9a25e43376ffc1af99b] Bluetooth: ISO: Use kref to track lifetime of iso_conn testing commit dc26097bdb864a0d5955b9a25e43376ffc1af99b gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: fc1821c2ce7deb9ebe8253bedf1d5650319716a47a362775cdde4165602aa318 all runs: crashed: KASAN: slab-use-after-free Read in __timer_delete representative crash: KASAN: slab-use-after-free Read in __timer_delete, types: [KASAN] # git bisect bad dc26097bdb864a0d5955b9a25e43376ffc1af99b Bisecting: 0 revisions left to test after this (roughly 0 steps) [e6720779ae612a14ac4ba7fe4fd5b27d900d932c] Bluetooth: SCO: Use kref to track lifetime of sco_conn testing commit e6720779ae612a14ac4ba7fe4fd5b27d900d932c gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 5b1233799b2f06ffc4cf6b30a483070b635079c82888740c163b2485399f8a2a run #0: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #1: crashed: KASAN: slab-use-after-free Read in __timer_delete run #2: crashed: KASAN: slab-use-after-free Read in __timer_delete run #3: crashed: KASAN: slab-use-after-free Read in __timer_delete run #4: crashed: KASAN: slab-use-after-free Read in __timer_delete run #5: crashed: KASAN: slab-use-after-free Read in __timer_delete run #6: crashed: KASAN: slab-use-after-free Read in sco_sock_connect run #7: crashed: KASAN: slab-use-after-free Read in __timer_delete run #8: crashed: KASAN: slab-use-after-free Read in __timer_delete run #9: OK representative crash: KASAN: slab-use-after-free Read in sco_sock_connect, types: [KASAN] # git bisect bad e6720779ae612a14ac4ba7fe4fd5b27d900d932c e6720779ae612a14ac4ba7fe4fd5b27d900d932c is the first bad commit commit e6720779ae612a14ac4ba7fe4fd5b27d900d932c Author: Luiz Augusto von Dentz Date: Tue Oct 1 15:46:10 2024 -0400 Bluetooth: SCO: Use kref to track lifetime of sco_conn This make use of kref to keep track of reference of sco_conn which allows better tracking of its lifetime with usage of things like kref_get_unless_zero in a similar way as used in l2cap_chan. In addition to it remove call to sco_sock_set_timer on __sco_sock_close since at that point it is useless to set a timer as the sk will be freed there is nothing to be done in sco_sock_timeout. Signed-off-by: Luiz Augusto von Dentz net/bluetooth/sco.c | 99 ++++++++++++++++++++++++++++++++++++++--------------- 1 file changed, 71 insertions(+), 28 deletions(-) accumulated error probability: 0.00 culprit signature: 5b1233799b2f06ffc4cf6b30a483070b635079c82888740c163b2485399f8a2a parent signature: e130bdc8e7aaee0d7eb323cfa9c9c3b96eb15dfe6204c8687ca9df306dff39ad revisions tested: 21, total time: 7h12m56.637320313s (build: 2h50m3.935717402s, test: 3h59m25.289709734s) first bad commit: e6720779ae612a14ac4ba7fe4fd5b27d900d932c Bluetooth: SCO: Use kref to track lifetime of sco_conn recipients (to): ["johan.hedberg@gmail.com" "linux-bluetooth@vger.kernel.org" "luiz.dentz@gmail.com" "luiz.von.dentz@intel.com" "marcel@holtmann.org"] recipients (cc): ["linux-kernel@vger.kernel.org"] crash: KASAN: slab-use-after-free Read in sco_sock_connect ================================================================== BUG: KASAN: slab-use-after-free in __lock_acquire+0x7c/0xc70 kernel/locking/lockdep.c:5065 Read of size 8 at addr ffff88811321b020 by task syz.1.1186/7527 CPU: 0 UID: 0 PID: 7527 Comm: syz.1.1186 Not tainted 6.12.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x108/0x280 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 kasan_report+0x143/0x180 mm/kasan/report.c:601 __lock_acquire+0x7c/0xc70 kernel/locking/lockdep.c:5065 lock_acquire+0x1a9/0x3a0 kernel/locking/lockdep.c:5825 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] sco_chan_add net/bluetooth/sco.c:292 [inline] sco_connect net/bluetooth/sco.c:345 [inline] sco_sock_connect+0x260/0x820 net/bluetooth/sco.c:645 __sys_connect_file net/socket.c:2073 [inline] __sys_connect+0x30d/0x380 net/socket.c:2090 __do_sys_connect net/socket.c:2100 [inline] __se_sys_connect net/socket.c:2097 [inline] __x64_sys_connect+0x75/0x90 net/socket.c:2097 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x190 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f680277e819 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f68034f9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 00007f6802935fa0 RCX: 00007f680277e819 RDX: 0000000000000008 RSI: 0000000020000000 RDI: 0000000000000005 RBP: 00007f68027f175e R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f6802935fa0 R15: 00007fff8059d288 Allocated by task 7513: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:257 [inline] __kmalloc_cache_noprof+0x19e/0x360 mm/slub.c:4295 kmalloc_noprof include/linux/slab.h:878 [inline] kzalloc_noprof include/linux/slab.h:1014 [inline] sco_conn_add+0xce/0x320 net/bluetooth/sco.c:199 sco_connect net/bluetooth/sco.c:336 [inline] sco_sock_connect+0x242/0x820 net/bluetooth/sco.c:645 __sys_connect_file net/socket.c:2073 [inline] __sys_connect+0x30d/0x380 net/socket.c:2090 __do_sys_connect net/socket.c:2100 [inline] __se_sys_connect net/socket.c:2097 [inline] __x64_sys_connect+0x75/0x90 net/socket.c:2097 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x190 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 7527: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:230 [inline] slab_free_hook mm/slub.c:2342 [inline] slab_free mm/slub.c:4579 [inline] kfree+0x186/0x3e0 mm/slub.c:4727 sco_conn_add+0x96/0x320 net/bluetooth/sco.c:195 sco_connect net/bluetooth/sco.c:336 [inline] sco_sock_connect+0x242/0x820 net/bluetooth/sco.c:645 __sys_connect_file net/socket.c:2073 [inline] __sys_connect+0x30d/0x380 net/socket.c:2090 __do_sys_connect net/socket.c:2100 [inline] __se_sys_connect net/socket.c:2097 [inline] __x64_sys_connect+0x75/0x90 net/socket.c:2097 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x190 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f The buggy address belongs to the object at ffff88811321b000 which belongs to the cache kmalloc-256 of size 256 The buggy address is located 32 bytes inside of freed 256-byte region [ffff88811321b000, ffff88811321b100) The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11321a head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 anon flags: 0x100000000000040(head|node=0|zone=2) page_type: f5(slab) raw: 0100000000000040 ffff888100041b40 ffffea0005d3c080 dead000000000003 raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 head: 0100000000000040 ffff888100041b40 ffffea0005d3c080 dead000000000003 head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 head: 0100000000000001 ffffea00044c8681 ffffffffffffffff 0000000000000000 head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 1, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1, tgid 1 (swapper/0), ts 6551002086, free_ts 4747367799 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x10f/0x130 mm/page_alloc.c:1537 prep_new_page mm/page_alloc.c:1545 [inline] get_page_from_freelist+0x42ac/0x4480 mm/page_alloc.c:3457 __alloc_pages_noprof+0x256/0x650 mm/page_alloc.c:4733 alloc_pages_mpol_noprof+0x289/0x4e0 mm/mempolicy.c:2265 alloc_slab_page+0x6a/0x140 mm/slub.c:2412 allocate_slab+0x5d/0x290 mm/slub.c:2578 new_slab mm/slub.c:2631 [inline] ___slab_alloc+0xa7f/0x11e0 mm/slub.c:3818 __slab_alloc mm/slub.c:3908 [inline] __slab_alloc_node mm/slub.c:3961 [inline] slab_alloc_node mm/slub.c:4122 [inline] __do_kmalloc_node mm/slub.c:4263 [inline] __kmalloc_noprof+0x25a/0x440 mm/slub.c:4276 kmalloc_noprof include/linux/slab.h:882 [inline] mpi_alloc_limb_space lib/crypto/mpi/mpiutil.c:64 [inline] mpi_alloc+0x6b/0x110 lib/crypto/mpi/mpiutil.c:39 mpi_read_raw_data+0xd8/0xa20 lib/crypto/mpi/mpicoder.c:57 rsa_set_pub_key+0x37f/0x5e0 crypto/rsa.c:287 crypto_akcipher_set_pub_key include/crypto/akcipher.h:407 [inline] pkcs1pad_set_pub_key+0xc1/0x1c0 crypto/rsa-pkcs1pad.c:138 public_key_verify_signature+0x41f/0x6f0 crypto/asymmetric_keys/public_key.c:443 x509_check_for_self_signed+0x2a5/0x370 crypto/asymmetric_keys/x509_public_key.c:125 x509_cert_parse+0x5d2/0x6f0 crypto/asymmetric_keys/x509_cert_parser.c:129 x509_key_preparse+0x60/0x630 crypto/asymmetric_keys/x509_public_key.c:157 page last free pid 43 tgid 43 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1108 [inline] free_unref_page+0xaa5/0xc80 mm/page_alloc.c:2638 vfree+0x10e/0x210 mm/vmalloc.c:3361 delayed_vfree_work+0x3c/0x70 mm/vmalloc.c:3282 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x8e8/0x1360 kernel/workqueue.c:3310 worker_thread+0x868/0xc70 kernel/workqueue.c:3391 kthread+0x268/0x2c0 kernel/kthread.c:389 ret_from_fork+0x32/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Memory state around the buggy address: ffff88811321af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff88811321af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff88811321b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff88811321b080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff88811321b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ==================================================================