ci starts bisection 2024-07-03 05:37:14.471136511 +0000 UTC m=+22658.589043303 bisecting fixing commit since 480e035fc4c714fb5536e64ab9db04fedc89e910 building syzkaller on 7a239ce75709b01083336e0f2f44aa8a01734543 ensuring issue is reproducible on original commit 480e035fc4c714fb5536e64ab9db04fedc89e910 testing commit 480e035fc4c714fb5536e64ab9db04fedc89e910 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 4d418c0ce45403feb6e6fc19e63c074746dec1d5bd14a7c9b807ded6ea1f6685 all runs: crashed: KASAN: slab-use-after-free Read in advance_sched representative crash: KASAN: slab-use-after-free Read in advance_sched, types: [KASAN] check whether we can drop unnecessary instrumentation disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit 480e035fc4c714fb5536e64ab9db04fedc89e910 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: b868b0a9c67063657c304941dbce835021f76d371271d58f55b4461088204cb1 run #0: crashed: KASAN: slab-use-after-free Read in advance_sched run #1: crashed: KASAN: slab-use-after-free Read in advance_sched run #2: crashed: KASAN: slab-use-after-free Read in advance_sched run #3: crashed: KASAN: slab-use-after-free Read in advance_sched run #4: crashed: KASAN: slab-use-after-free Read in advance_sched run #5: crashed: KASAN: slab-use-after-free Read in taprio_dump run #6: crashed: KASAN: slab-use-after-free Read in taprio_dump run #7: crashed: KASAN: slab-use-after-free Read in advance_sched run #8: crashed: KASAN: slab-use-after-free Read in taprio_dump run #9: crashed: KASAN: slab-use-after-free Read in advance_sched representative crash: KASAN: slab-use-after-free Read in advance_sched, types: [KASAN] the bug reproduces without the instrumentation disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed kconfig minimization: base=3998 full=7986 leaves diff=2011 split chunks (needed=false): <2011> split chunk #0 of len 2011 into 5 parts testing without sub-chunk 1/5 disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG LOCKDEP], they are not needed testing commit 480e035fc4c714fb5536e64ab9db04fedc89e910 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e454af66682009e5fd16e7da0a96d1c4112e1c30f55f6cad4f06c333b6a02d91 run #0: crashed: KASAN: slab-use-after-free Read in advance_sched run #1: crashed: KASAN: slab-use-after-free Read in advance_sched run #2: crashed: KASAN: slab-use-after-free Read in taprio_dump run #3: crashed: KASAN: slab-use-after-free Read in taprio_dump run #4: crashed: KASAN: slab-use-after-free Read in taprio_dump run #5: crashed: KASAN: slab-use-after-free Read in taprio_dump run #6: crashed: KASAN: slab-use-after-free Read in taprio_dump run #7: crashed: KASAN: slab-use-after-free Read in advance_sched run #8: crashed: KASAN: slab-use-after-free Read in taprio_dump run #9: crashed: KASAN: slab-use-after-free Read in taprio_dump representative crash: KASAN: slab-use-after-free Read in advance_sched, types: [KASAN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit 480e035fc4c714fb5536e64ab9db04fedc89e910 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 324aeb118da5afb68153e2814bdc61cad6916e3c3b9adb8d4218318c450c6e57 run #0: crashed: KASAN: slab-use-after-free Read in taprio_dump run #1: crashed: KASAN: slab-use-after-free Read in taprio_dump run #2: crashed: KASAN: slab-use-after-free Read in advance_sched run #3: crashed: KASAN: slab-use-after-free Read in taprio_dump run #4: crashed: KASAN: slab-use-after-free Read in taprio_dump run #5: crashed: KASAN: slab-use-after-free Read in taprio_dump run #6: crashed: KASAN: slab-use-after-free Read in advance_sched run #7: crashed: KASAN: slab-use-after-free Read in taprio_dump run #8: crashed: KASAN: slab-use-after-free Read in taprio_dump run #9: crashed: KASAN: slab-use-after-free Read in taprio_dump representative crash: KASAN: slab-use-after-free Read in taprio_dump, types: [KASAN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit 480e035fc4c714fb5536e64ab9db04fedc89e910 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: c1ddd5d89030aab093c1100edd6ecf01a0054db01e547b190d327cb619d55e71 all runs: OK false negative chance: 0.000 testing without sub-chunk 4/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit 480e035fc4c714fb5536e64ab9db04fedc89e910 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 1341bb8b338b0c68ecc1decbde2d7f4fb7c8c739d322081660a3f68b30f571c2 run #0: crashed: KASAN: slab-use-after-free Read in taprio_dump run #1: crashed: KASAN: slab-use-after-free Read in taprio_dump run #2: crashed: KASAN: slab-use-after-free Read in advance_sched run #3: crashed: KASAN: slab-use-after-free Read in taprio_dump run #4: crashed: KASAN: slab-use-after-free Read in taprio_dump run #5: crashed: KASAN: slab-use-after-free Read in taprio_dump run #6: crashed: KASAN: slab-use-after-free Read in taprio_dump run #7: crashed: KASAN: slab-use-after-free Read in taprio_dump run #8: crashed: KASAN: slab-use-after-free Read in taprio_dump run #9: crashed: KASAN: slab-use-after-free Read in taprio_dump representative crash: KASAN: slab-use-after-free Read in taprio_dump, types: [KASAN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit 480e035fc4c714fb5536e64ab9db04fedc89e910 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: fb04863ab03619d98a2c469afcdc7a52e71fb03de3ea86a532c37fdb96f5dd18 run #0: crashed: KASAN: slab-use-after-free Read in advance_sched run #1: crashed: KASAN: slab-use-after-free Read in advance_sched run #2: crashed: KASAN: slab-use-after-free Read in advance_sched run #3: crashed: KASAN: slab-use-after-free Read in taprio_dump run #4: crashed: KASAN: slab-use-after-free Read in advance_sched run #5: crashed: KASAN: slab-use-after-free Read in taprio_dump run #6: crashed: KASAN: slab-use-after-free Read in taprio_dump run #7: crashed: KASAN: slab-use-after-free Read in taprio_dump run #8: crashed: KASAN: slab-use-after-free Read in taprio_dump run #9: crashed: KASAN: slab-use-after-free Read in advance_sched representative crash: KASAN: slab-use-after-free Read in advance_sched, types: [KASAN] the chunk can be dropped minimized to 403 configs; suspects: [AX25 BRIDGE BRIDGE_NETFILTER CAN CFG80211 CHECKPOINT_RESTORE DVB_CORE FB_CORE HAMRADIO HAVE_KVM HSR IMA IMA_APPRAISE IMA_APPRAISE_MODSIG INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_USER_ACCESS INPUT_JOYSTICK INPUT_MOUSE INTEGRITY INTEGRITY_ASYMMETRIC_KEYS INTEGRITY_SIGNATURE IP6_NF_RAW IPV6_MULTIPLE_TABLES IP_NF_RAW IP_SET IP_VS IP_VS_PROTO_AH IP_VS_PROTO_AH_ESP IP_VS_PROTO_ESP IP_VS_PROTO_SCTP IP_VS_RR IP_VS_SED IP_VS_SH IP_VS_TWOS IP_VS_WLC IP_VS_WRR IRQ_BYPASS_MANAGER IRQ_POLL IR_IGORPLUGUSB IR_IGUANA IR_IMON IR_MCEUSB IR_REDRAT3 IR_STREAMZAP IR_TTUSBIR ISDN ISDN_CAPI_MIDDLEWARE JFFS2_CMODE_PRIORITY JFFS2_COMPRESSION_OPTIONS JFFS2_FS JFFS2_FS_POSIX_ACL JFFS2_FS_SECURITY JFFS2_FS_WRITEBUFFER JFFS2_FS_XATTR JFFS2_LZO JFFS2_RTIME JFFS2_RUBIN JFFS2_SUMMARY JFFS2_ZLIB JFS_DEBUG JFS_FS JFS_POSIX_ACL JFS_SECURITY JOYSTICK_IFORCE JOYSTICK_IFORCE_USB JOYSTICK_XPAD JOYSTICK_XPAD_FF JOYSTICK_XPAD_LEDS KARMA_PARTITION KCOV KCOV_ENABLE_COMPARISONS KCOV_INSTRUMENT_ALL KEYS_REQUEST_CACHE KEY_DH_OPERATIONS KEY_NOTIFICATIONS KSM KVM KVM_AMD KVM_ASYNC_PF KVM_COMMON KVM_COMPAT KVM_GENERIC_DIRTYLOG_READ_PROTECT KVM_GENERIC_HARDWARE_ENABLING KVM_GENERIC_MEMORY_ATTRIBUTES KVM_GENERIC_MMU_NOTIFIER KVM_GENERIC_PRIVATE_MEM KVM_HYPERV KVM_MMIO KVM_PRIVATE_MEM KVM_PROVE_MMU KVM_SW_PROTECTED_VM KVM_VFIO KVM_XEN KVM_XFER_TO_GUEST_WORK L2TP L2TP_ETH L2TP_IP L2TP_V3 LAPB LAPBETHER LDM_PARTITION LEDS_TRIGGER_AUDIO LEGACY_PTYS LIBCRC32C LIBNVDIMM LINEAR_RANGES LLC LLC2 LOGIG940_FF LOGIRUMBLEPAD2_FF LOGO LOGO_LINUX_MONO LOGO_LINUX_VGA16 LPC_ICH LRU_GEN LRU_GEN_ENABLED LRU_GEN_WALKS_MMU LWTUNNEL LWTUNNEL_BPF LZ4HC_COMPRESS LZ4_COMPRESS MAC80211 MAC80211_HAS_RC MAC80211_HWSIM MAC80211_MESH MAC80211_RC_DEFAULT_MINSTREL MAC80211_RC_MINSTREL MACSEC MACVLAN MACVTAP MAC_PARTITION MAPPING_DIRTY_HELPERS MD_RAID0 MD_RAID1 MD_RAID10 MD_RAID456 MEDIA_ANALOG_TV_SUPPORT MEDIA_ATTACH MEDIA_CONTROLLER MEDIA_CONTROLLER_DVB MEDIA_DIGITAL_TV_SUPPORT MEDIA_RADIO_SUPPORT MEDIA_SDR_SUPPORT MEDIA_SUPPORT MEDIA_SUPPORT_FILTER MEDIA_TUNER MEDIA_TUNER_MSI001 MEMORY_BALLOON MEMORY_HOTPLUG MEMORY_HOTPLUG_DEFAULT_ONLINE MEMORY_ISOLATION MEMREGION MEMSTICK MEMSTICK_REALTEK_USB MEM_SOFT_DIRTY MFD_CORE MFD_SYSCON MHI_BUS MHI_WWAN_CTRL MHP_MEMMAP_ON_MEMORY MICROCHIP_PHY MINIX_FS MINIX_SUBPARTITION MISC_RTSX MISC_RTSX_USB MISDN MISDN_DSP MISDN_HFCUSB MISDN_L1OIP MKISS MLX4_CORE MLX4_INFINIBAND MMC MMC_REALTEK_USB MMC_USHC MMC_VUB300 MODULE_SIG_SHA256 MODULE_SRCVERSION_ALL MODVERSIONS MOST MOUSE_APPLETOUCH MOUSE_BCM5974 MOUSE_PS2 MOUSE_PS2_ALPS MOUSE_PS2_BYD MOUSE_PS2_CYPRESS MOUSE_PS2_FOCALTECH MOUSE_PS2_LIFEBOOK MOUSE_PS2_LOGIPS2PP MOUSE_PS2_SMBUS MOUSE_PS2_SYNAPTICS MOUSE_PS2_SYNAPTICS_SMBUS MOUSE_PS2_TRACKPOINT MOUSE_SYNAPTICS_USB MPLS MPLS_IPTUNNEL MPLS_ROUTING MPTCP MPTCP_IPV6 MRP MTD MTD_BLKDEVS MTD_BLOCK MTD_BLOCK2MTD MTD_CFI_I1 MTD_CFI_I2 MTD_MAP_BANK_WIDTH_1 MTD_MAP_BANK_WIDTH_2 MTD_MAP_BANK_WIDTH_4 MTD_MTDRAM MTD_PHRAM MTD_SLRAM MUSB_PIO_ONLY ND_BTT ND_CLAIM ND_PFN NETDEVSIM NETFILTER_ADVANCED NETFILTER_BPF_LINK NETFILTER_FAMILY_ARP NETFILTER_FAMILY_BRIDGE NETFILTER_NETLINK_ACCT NETFILTER_NETLINK_GLUE_CT NETFILTER_NETLINK_OSF NETFILTER_NETLINK_QUEUE NETFILTER_SYNPROXY NETFILTER_XTABLES_COMPAT NETFILTER_XT_CONNMARK NETFILTER_XT_MATCH_BPF NETFILTER_XT_MATCH_CGROUP NETFILTER_XT_MATCH_CLUSTER NETFILTER_XT_MATCH_COMMENT NETFILTER_XT_MATCH_CONNBYTES NETFILTER_XT_MATCH_CONNLABEL NETFILTER_XT_MATCH_CONNLIMIT NETFILTER_XT_MATCH_CONNMARK NETFILTER_XT_MATCH_CPU NETFILTER_XT_MATCH_DCCP NETFILTER_XT_MATCH_DEVGROUP NETFILTER_XT_MATCH_DSCP NETFILTER_XT_MATCH_ECN NETFILTER_XT_MATCH_ESP NETFILTER_XT_MATCH_HASHLIMIT NETFILTER_XT_MATCH_HELPER NETFILTER_XT_MATCH_HL NETFILTER_XT_MATCH_IPCOMP NETFILTER_XT_MATCH_IPRANGE NETFILTER_XT_MATCH_IPVS NETFILTER_XT_MATCH_L2TP NETFILTER_XT_MATCH_LENGTH NETFILTER_XT_MATCH_LIMIT NETFILTER_XT_MATCH_MAC NETFILTER_XT_MATCH_MARK NETFILTER_XT_MATCH_MULTIPORT NETFILTER_XT_MATCH_NFACCT NETFILTER_XT_MATCH_OSF NETFILTER_XT_MATCH_OWNER NETFILTER_XT_MATCH_PHYSDEV NETFILTER_XT_MATCH_PKTTYPE NETFILTER_XT_MATCH_QUOTA NETFILTER_XT_MATCH_RATEEST NETFILTER_XT_MATCH_REALM NETFILTER_XT_MATCH_RECENT NETFILTER_XT_MATCH_SCTP NETFILTER_XT_MATCH_SOCKET NETFILTER_XT_MATCH_STATISTIC NETFILTER_XT_MATCH_STRING NETFILTER_XT_MATCH_TCPMSS NETFILTER_XT_MATCH_TIME NETFILTER_XT_MATCH_U32 NETFILTER_XT_SET NETFILTER_XT_TARGET_AUDIT NETFILTER_XT_TARGET_CHECKSUM NETFILTER_XT_TARGET_CLASSIFY NETFILTER_XT_TARGET_CONNMARK NETFILTER_XT_TARGET_CT NETFILTER_XT_TARGET_DSCP NETFILTER_XT_TARGET_HL NETFILTER_XT_TARGET_HMARK NETFILTER_XT_TARGET_IDLETIMER NETFILTER_XT_TARGET_LED NETFILTER_XT_TARGET_MARK NETFILTER_XT_TARGET_NETMAP NETFILTER_XT_TARGET_NFQUEUE NETFILTER_XT_TARGET_NOTRACK NETFILTER_XT_TARGET_RATEEST NETFILTER_XT_TARGET_REDIRECT NETFILTER_XT_TARGET_TCPOPTSTRIP NETFILTER_XT_TARGET_TEE NETFILTER_XT_TARGET_TPROXY NETFILTER_XT_TARGET_TRACE NETLABEL NETLINK_DIAG NETROM NET_9P_RDMA NET_ACT_BPF NET_ACT_CONNMARK NET_ACT_CSUM NET_ACT_CT NET_ACT_CTINFO NET_ACT_GATE NET_ACT_IFE NET_ACT_MPLS NET_ACT_NAT NET_ACT_PEDIT NET_ACT_POLICE NET_ACT_SAMPLE NET_ACT_SIMP NET_ACT_SKBEDIT NET_ACT_SKBMOD NET_ACT_TUNNEL_KEY NET_ACT_VLAN NET_CLS_BASIC NET_CLS_BPF NET_CLS_FLOW NET_CLS_FLOWER NET_CLS_FW NET_CLS_MATCHALL NET_CLS_ROUTE4 NET_DEVLINK NET_DROP_MONITOR NET_DSA NET_DSA_TAG_BRCM NET_DSA_TAG_BRCM_COMMON NET_DSA_TAG_BRCM_PREPEND NET_DSA_TAG_MTK NET_DSA_TAG_QCA NET_DSA_TAG_RTL4_A NET_EMATCH_CANID NET_EMATCH_CMP NET_EMATCH_IPSET NET_EMATCH_IPT NET_EMATCH_META NET_EMATCH_NBYTE NET_EMATCH_TEXT NET_EMATCH_U32 NET_FC NET_FOU NET_FOU_IP_TUNNELS NET_IFE NET_IFE_SKBMARK NET_IFE_SKBPRIO NET_IFE_SKBTCINDEX NET_IPGRE NET_IPGRE_BROADCAST NET_IPGRE_DEMUX NET_IPIP NET_IPVTI NET_KEY NET_KEY_MIGRATE NET_L3_MASTER_DEV NET_MPLS_GSO NET_NCSI NET_NSH NET_REDIRECT NET_SCH_CAKE NET_SCH_CBS NET_SCH_CHOKE NET_SCH_CODEL NET_SCH_DRR NET_SCH_ETF NET_SCH_ETS NET_SCH_FQ NET_SCH_FQ_CODEL NET_SCH_FQ_PIE NET_SCH_GRED NET_SCH_HFSC NET_SCH_HHF NET_SCH_HTB NET_SCH_INGRESS NET_SCH_MQPRIO NET_SCH_MQPRIO_LIB NET_SCH_MULTIQ NET_SCH_NETEM NET_SCH_PIE NET_SCH_PLUG NET_SCH_PRIO NET_SCH_QFQ NET_SCH_RED NET_SCH_SFB NET_SCH_SFQ NET_SCH_SKBPRIO NET_SCH_TAPRIO NET_SCH_TBF NET_SCH_TEQL NET_SOCK_MSG NET_SWITCHDEV NET_TC_SKB_EXT NET_TEAM NET_TEAM_MODE_ACTIVEBACKUP NET_TEAM_MODE_BROADCAST NET_TEAM_MODE_LOADBALANCE NET_TEAM_MODE_RANDOM NET_TEAM_MODE_ROUNDROBIN NET_UDP_TUNNEL NET_VRF NFC NFC_DIGITAL NFC_FDP NFC_HCI NFC_MRVL NFC_MRVL_USB NFC_NCI NFC_NCI_UART NFC_PN533 NFC_PN533_USB NFC_PORT100 NFC_SHDLC NFC_SIM NFC_VIRTUAL_NCI NFSD NFSD_BLOCKLAYOUT NFSD_FLEXFILELAYOUT NFSD_PNFS NFSD_SCSILAYOUT NFSD_V3_ACL NFSD_V4 NFSD_V4_2_INTER_SSC NFSD_V4_SECURITY_LABEL NFS_FSCACHE NFS_V2 NFS_V4_1 NFS_V4_2 NFS_V4_2_READ_PLUS NFS_V4_2_SSC_HELPER NFS_V4_SECURITY_LABEL NFT_BRIDGE_META NFT_BRIDGE_REJECT NFT_COMPAT NFT_CONNLIMIT NFT_CT NFT_DUP_IPV4 NFT_DUP_IPV6 NFT_DUP_NETDEV NFT_FIB NFT_FIB_INET NFT_FIB_IPV4 NFT_FIB_IPV6 NFT_FIB_NETDEV NFT_FLOW_OFFLOAD NFT_HASH NFT_LIMIT NFT_LOG NFT_MASQ NFT_NAT NFT_NUMGEN NFT_OSF NFT_QUEUE NFT_QUOTA NFT_REDIR NFT_REJECT NFT_REJECT_INET NFT_REJECT_IPV4 NFT_REJECT_IPV6 NFT_REJECT_NETDEV NFT_SOCKET NFT_SYNPROXY NFT_TPROXY NFT_TUNNEL NFT_XFRM NF_CONNTRACK_AMANDA NF_CONNTRACK_BRIDGE NF_CONNTRACK_BROADCAST NF_CONNTRACK_EVENTS NF_CONNTRACK_H323 NF_CONNTRACK_LABELS NF_CONNTRACK_MARK NF_CONNTRACK_NETBIOS_NS NF_CONNTRACK_OVS NF_CONNTRACK_PPTP NF_CONNTRACK_SANE NF_CONNTRACK_SNMP NF_CONNTRACK_TFTP NF_CONNTRACK_TIMEOUT NF_CONNTRACK_TIMESTAMP NF_CONNTRACK_ZONES NF_CT_NETLINK_HELPER NF_CT_NETLINK_TIMEOUT NF_CT_PROTO_DCCP NF_CT_PROTO_GRE NF_CT_PROTO_SCTP NF_CT_PROTO_UDPLITE NF_DUP_IPV4 NF_DUP_IPV6 NF_DUP_NETDEV NF_FLOW_TABLE NF_FLOW_TABLE_INET NF_NAT_AMANDA NF_NAT_H323 NF_NAT_OVS NF_NAT_PPTP NF_NAT_REDIRECT NF_NAT_SNMP_BASIC NF_NAT_TFTP NF_SOCKET_IPV4 NF_SOCKET_IPV6 NF_TABLES NF_TABLES_BRIDGE NF_TABLES_INET NF_TABLES_IPV4 NF_TABLES_IPV6 NF_TABLES_NETDEV PARTITION_ADVANCED PSAMPLE RC_CORE RC_DEVICES RFKILL SPI USB_GADGET USB_MUSB_HDRC VIDEO_DEV WAN WATCH_QUEUE WIRELESS WLAN WWAN X25 X86_X32_ABI] disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing current HEAD e9d22f7a6655941fc8b2b942ed354ec780936b3e testing commit e9d22f7a6655941fc8b2b942ed354ec780936b3e gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 04d23e4087df0904bd57830b72768bc8ba18bc83b910955faa5a61f1ac67e6cc run #0: crashed: KASAN: slab-use-after-free Read in advance_sched run #1: crashed: KASAN: slab-use-after-free Read in advance_sched run #2: crashed: KASAN: slab-use-after-free Read in taprio_dump run #3: crashed: KASAN: slab-use-after-free Read in advance_sched run #4: crashed: KASAN: slab-use-after-free Read in taprio_dump run #5: crashed: KASAN: slab-use-after-free Read in taprio_dump run #6: crashed: KASAN: slab-use-after-free Read in advance_sched run #7: crashed: KASAN: slab-use-after-free Read in advance_sched run #8: crashed: KASAN: slab-use-after-free Read in advance_sched run #9: crashed: KASAN: slab-use-after-free Read in taprio_dump representative crash: KASAN: slab-use-after-free Read in advance_sched, types: [KASAN] crash still not fixed/happens on the oldest tested release revisions tested: 8, total time: 3h17m7.325695316s (build: 2h17m57.829661423s, test: 46m45.657544188s) crash still not fixed or there were kernel test errors commit msg: Merge tag 'linux_kselftest-fixes-6.10-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/shuah/linux-kselftest crash: KASAN: slab-use-after-free Read in advance_sched ================================================================== BUG: KASAN: slab-use-after-free in advance_sched+0xbea/0xc80 net/sched/sch_taprio.c:942 Read of size 8 at addr ffff88811bb04510 by task syz-executor.0/2894 CPU: 1 PID: 2894 Comm: syz-executor.0 Not tainted 6.10.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x231/0x330 lib/dump_stack.c:114 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 kasan_report+0x143/0x180 mm/kasan/report.c:601 advance_sched+0xbea/0xc80 net/sched/sch_taprio.c:942 __run_hrtimer kernel/time/hrtimer.c:1689 [inline] __hrtimer_run_queues+0x45b/0x9d0 kernel/time/hrtimer.c:1753 hrtimer_interrupt+0x393/0xe80 kernel/time/hrtimer.c:1815 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1032 [inline] __sysvec_apic_timer_interrupt+0xed/0x320 arch/x86/kernel/apic/apic.c:1049 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline] sysvec_apic_timer_interrupt+0x8d/0xb0 arch/x86/kernel/apic/apic.c:1043 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:unwind_next_frame+0x1d8e/0x2a00 arch/x86/kernel/unwind_orc.c:665 Code: 00 00 44 8b 75 00 44 89 f7 8b 9c 24 8c 00 00 00 89 de e8 25 bb 39 00 41 39 de 0f 85 c4 00 00 00 48 8b 44 24 58 42 80 3c 28 00 <74> 0a 48 8b 7c 24 50 e8 16 8a 7a 00 4c 8b 65 38 48 8d 7d 08 48 89 RSP: 0018:ffffc90002137788 EFLAGS: 00000246 RAX: 1ffff92000426f13 RBX: 0000000000000001 RCX: ffff88811fdf1c40 RDX: ffff88811fdf1c40 RSI: 0000000000000001 RDI: 0000000000000001 RBP: ffffc90002137860 R08: ffffffff81359eab R09: ffffffff81359a9f R10: 0000000000000003 R11: ffff88811fdf1c40 R12: ffffc90002137f50 R13: dffffc0000000000 R14: 0000000000000001 R15: 1ffff92000426f0c arch_stack_walk+0x151/0x1b0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:370 [inline] __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387 kasan_kmalloc include/linux/kasan.h:211 [inline] __do_kmalloc_node mm/slub.c:4123 [inline] kmalloc_node_track_caller_noprof+0x1fb/0x460 mm/slub.c:4143 kmemdup_noprof+0x2a/0x60 mm/util.c:131 shmem_symlink+0x22c/0x6a0 mm/shmem.c:3520 vfs_symlink+0x137/0x2e0 fs/namei.c:4495 do_symlinkat+0x222/0x3a0 fs/namei.c:4521 __do_sys_symlinkat fs/namei.c:4537 [inline] __se_sys_symlinkat fs/namei.c:4534 [inline] __x64_sys_symlinkat+0x99/0xb0 fs/namei.c:4534 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x1a0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f179146d527 Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 0a 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f17916bfd58 EFLAGS: 00000202 ORIG_RAX: 000000000000010a RAX: ffffffffffffffda RBX: 00007f17916bfe20 RCX: 00007f179146d527 RDX: 00007f17914ba526 RSI: 00000000ffffff9c RDI: 00007f17916bfe20 RBP: 0000000000000001 R08: 0000000000000017 R09: 00007f17916bfaa7 R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 Allocated by task 2867: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:370 [inline] __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387 kasan_kmalloc include/linux/kasan.h:211 [inline] kmalloc_trace_noprof+0x19e/0x360 mm/slub.c:4154 kmalloc_noprof include/linux/slab.h:660 [inline] kzalloc_noprof include/linux/slab.h:778 [inline] taprio_change+0xf31/0x3df0 net/sched/sch_taprio.c:1859 qdisc_change net/sched/sch_api.c:1417 [inline] tc_modify_qdisc+0x16b2/0x1a40 net/sched/sch_api.c:1747 rtnetlink_rcv_msg+0xaa4/0xf70 net/core/rtnetlink.c:6635 netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2564 netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline] netlink_unicast+0x7ba/0x950 net/netlink/af_netlink.c:1361 netlink_sendmsg+0x88c/0xc40 net/netlink/af_netlink.c:1905 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2585 ___sys_sendmsg+0x27a/0x310 net/socket.c:2639 __sys_sendmmsg+0x2a9/0x500 net/socket.c:2725 __do_sys_sendmmsg net/socket.c:2754 [inline] __se_sys_sendmmsg net/socket.c:2751 [inline] __x64_sys_sendmmsg+0xa0/0xb0 net/socket.c:2751 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x1a0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 23: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579 poison_slab_object+0xe0/0x150 mm/kasan/common.c:240 __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2196 [inline] slab_free mm/slub.c:4438 [inline] kfree+0x12f/0x310 mm/slub.c:4559 rcu_do_batch kernel/rcu/tree.c:2535 [inline] rcu_core+0xc3c/0x1470 kernel/rcu/tree.c:2809 handle_softirqs+0x1b7/0x570 kernel/softirq.c:554 run_ksoftirqd+0x28/0x40 kernel/softirq.c:928 smpboot_thread_fn+0x460/0x8e0 kernel/smpboot.c:164 kthread+0x290/0x300 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Last potentially related work creation: kasan_save_stack+0x3f/0x60 mm/kasan/common.c:47 __kasan_record_aux_stack+0xac/0xc0 mm/kasan/generic.c:541 __call_rcu_common kernel/rcu/tree.c:3072 [inline] call_rcu+0x159/0x8e0 kernel/rcu/tree.c:3176 taprio_change+0x229f/0x3df0 net/sched/sch_taprio.c:1968 qdisc_change net/sched/sch_api.c:1417 [inline] tc_modify_qdisc+0x16b2/0x1a40 net/sched/sch_api.c:1747 rtnetlink_rcv_msg+0xaa4/0xf70 net/core/rtnetlink.c:6635 netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2564 netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline] netlink_unicast+0x7ba/0x950 net/netlink/af_netlink.c:1361 netlink_sendmsg+0x88c/0xc40 net/netlink/af_netlink.c:1905 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2585 ___sys_sendmsg+0x27a/0x310 net/socket.c:2639 __sys_sendmmsg+0x2a9/0x500 net/socket.c:2725 __do_sys_sendmmsg net/socket.c:2754 [inline] __se_sys_sendmmsg net/socket.c:2751 [inline] __x64_sys_sendmmsg+0xa0/0xb0 net/socket.c:2751 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x1a0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f The buggy address belongs to the object at ffff88811bb04400 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 272 bytes inside of freed 512-byte region [ffff88811bb04400, ffff88811bb04600) The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11bb04 head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 flags: 0x200000000000040(head|node=0|zone=2) page_type: 0xffffefff(slab) raw: 0200000000000040 ffff888100041c80 ffffea000466f600 dead000000000002 raw: 0000000000000000 0000000000100010 00000001ffffefff 0000000000000000 head: 0200000000000040 ffff888100041c80 ffffea000466f600 dead000000000002 head: 0000000000000000 0000000000100010 00000001ffffefff 0000000000000000 head: 0200000000000002 ffffea00046ec101 ffffffffffffffff 0000000000000000 head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1698, tgid 1698 (udevd), ts 9853240588, free_ts 0 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x10f/0x130 mm/page_alloc.c:1473 prep_new_page mm/page_alloc.c:1481 [inline] get_page_from_freelist+0x37f4/0x3920 mm/page_alloc.c:3425 __alloc_pages_noprof+0x256/0x670 mm/page_alloc.c:4683 __alloc_pages_node_noprof include/linux/gfp.h:269 [inline] alloc_pages_node_noprof include/linux/gfp.h:296 [inline] alloc_slab_page+0x5f/0x120 mm/slub.c:2265 allocate_slab+0x5d/0x290 mm/slub.c:2428 new_slab mm/slub.c:2481 [inline] ___slab_alloc+0xa7f/0x11d0 mm/slub.c:3667 __slab_alloc mm/slub.c:3757 [inline] __slab_alloc_node mm/slub.c:3810 [inline] slab_alloc_node mm/slub.c:3990 [inline] kmalloc_trace_noprof+0x1fc/0x360 mm/slub.c:4149 kmalloc_noprof include/linux/slab.h:660 [inline] kzalloc_noprof include/linux/slab.h:778 [inline] kernfs_fop_open+0x3b3/0xc30 fs/kernfs/file.c:623 do_dentry_open+0x978/0x1360 fs/open.c:955 vfs_open+0x3e/0x330 fs/open.c:1086 do_open fs/namei.c:3654 [inline] path_openat+0x2b8d/0x3580 fs/namei.c:3813 do_filp_open+0x235/0x490 fs/namei.c:3840 do_sys_openat2+0x13e/0x1d0 fs/open.c:1413 do_sys_open fs/open.c:1428 [inline] __do_sys_openat fs/open.c:1444 [inline] __se_sys_openat fs/open.c:1439 [inline] __x64_sys_openat+0x247/0x2a0 fs/open.c:1439 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x1a0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f page_owner free stack trace missing Memory state around the buggy address: ffff88811bb04400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff88811bb04480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff88811bb04500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff88811bb04580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff88811bb04600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ================================================================== ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: 44 8b 75 00 mov 0x0(%rbp),%r14d 6: 44 89 f7 mov %r14d,%edi 9: 8b 9c 24 8c 00 00 00 mov 0x8c(%rsp),%ebx 10: 89 de mov %ebx,%esi 12: e8 25 bb 39 00 call 0x39bb3c 17: 41 39 de cmp %ebx,%r14d 1a: 0f 85 c4 00 00 00 jne 0xe4 20: 48 8b 44 24 58 mov 0x58(%rsp),%rax 25: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) * 2a: 74 0a je 0x36 <-- trapping instruction 2c: 48 8b 7c 24 50 mov 0x50(%rsp),%rdi 31: e8 16 8a 7a 00 call 0x7a8a4c 36: 4c 8b 65 38 mov 0x38(%rbp),%r12 3a: 48 8d 7d 08 lea 0x8(%rbp),%rdi 3e: 48 rex.W 3f: 89 .byte 0x89