ci2 starts bisection 2026-03-30 12:11:25.479855907 +0000 UTC m=+14412.374441533 bisecting fixing commit since dad37bbb13a8cb34a50620b396e22db5eff2dfdd building syzkaller on 43249bac5ea7329293dfc606828db9cdec2cb392 ensuring issue is reproducible on original commit dad37bbb13a8cb34a50620b396e22db5eff2dfdd testing commit dad37bbb13a8cb34a50620b396e22db5eff2dfdd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.44 kernel signature: c62e2a35b94661a0929b16ef4dc72028c5206aa5c9f3d4fe29def732b3f06f17 all runs: crashed: KASAN: use-after-free Read in lock_get_status representative crash: KASAN: use-after-free Read in lock_get_status, types: [KASAN-USE-AFTER-FREE-READ] check whether we can drop unnecessary instrumentation disabling configs for [memleak ubsan bug_or_warning locking atomic_sleep hang], they are not needed testing commit dad37bbb13a8cb34a50620b396e22db5eff2dfdd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.44 kernel signature: 2b8cebd374af23414f4731f9d927f299652981308478b50d04f589f497279a66 all runs: crashed: KASAN: use-after-free Read in lock_get_status representative crash: KASAN: use-after-free Read in lock_get_status, types: [KASAN-USE-AFTER-FREE-READ] the bug reproduces without the instrumentation disabling configs for [locking atomic_sleep hang memleak ubsan bug_or_warning], they are not needed kconfig minimization: base=4788 full=6025 leaves diff=248 split chunks (needed=false): <248> split chunk #0 of len 248 into 5 parts testing without sub-chunk 1/5 disabling configs for [hang memleak ubsan bug_or_warning locking atomic_sleep], they are not needed testing commit dad37bbb13a8cb34a50620b396e22db5eff2dfdd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.44 kernel signature: 130c28ccf566d0401e9c26a20b419e9f88631afa5e5febc31d2a061c81939eb4 all runs: crashed: KASAN: use-after-free Read in lock_get_status representative crash: KASAN: use-after-free Read in lock_get_status, types: [KASAN-USE-AFTER-FREE-READ] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [ubsan bug_or_warning locking atomic_sleep hang memleak], they are not needed testing commit dad37bbb13a8cb34a50620b396e22db5eff2dfdd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.44 kernel signature: c2f8c5eb110e1e50dfe239388a1a0f84018370d7eb24055ba5845fe94628742b all runs: crashed: KASAN: use-after-free Read in lock_get_status representative crash: KASAN: use-after-free Read in lock_get_status, types: [KASAN-USE-AFTER-FREE-READ] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [atomic_sleep hang memleak ubsan bug_or_warning locking], they are not needed testing commit dad37bbb13a8cb34a50620b396e22db5eff2dfdd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.44 kernel signature: 9b5d4b08131b64d5b241d430bb9f0b6ef3684b41f1ae63927fc316bbd1342a8f all runs: crashed: KASAN: use-after-free Read in lock_get_status representative crash: KASAN: use-after-free Read in lock_get_status, types: [KASAN-USE-AFTER-FREE-READ] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [hang memleak ubsan bug_or_warning locking atomic_sleep], they are not needed testing commit dad37bbb13a8cb34a50620b396e22db5eff2dfdd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.44 kernel signature: d0ecea624fbdfb9c771e08b6d93c13bc0b86666f1af96999eb606626e34f4e30 all runs: crashed: KASAN: use-after-free Read in lock_get_status representative crash: KASAN: use-after-free Read in lock_get_status, types: [KASAN-USE-AFTER-FREE-READ] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [locking atomic_sleep hang memleak ubsan bug_or_warning], they are not needed testing commit dad37bbb13a8cb34a50620b396e22db5eff2dfdd gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.44 failed building dad37bbb13a8cb34a50620b396e22db5eff2dfdd: net/socket.c:1128:(.text+0x1307): undefined reference to `wext_handle_ioctl' net/socket.c:3397:(.text+0x17c7): undefined reference to `compat_wext_handle_ioctl' net/core/net-procfs.c:346:(.text+0x33b): undefined reference to `wext_proc_exit' net/core/net-procfs.c:330:(.text+0x4e2): undefined reference to `wext_proc_init' minimized to 48 configs; suspects: [HID_ZEROPLUS USB_NET_CDC_SUBSET USB_NET_CDC_SUBSET_ENABLE USB_NET_DM9601 USB_NET_GL620A USB_NET_MCS7830 USB_NET_NET1080 USB_NET_PLUSB USB_NET_RNDIS_HOST USB_NET_SMSC75XX USB_NET_SMSC95XX USB_NET_SR9700 USB_NET_SR9800 USB_NET_ZAURUS USB_OHCI_HCD USB_OHCI_HCD_PCI USB_OHCI_HCD_PLATFORM USB_OTG USB_OTG_FSM USB_PRINTER USB_SERIAL USB_SERIAL_FTDI_SIO USB_SERIAL_GENERIC USB_SERIAL_PL2303 USB_STORAGE_ALAUDA USB_STORAGE_CYPRESS_ATACB USB_STORAGE_DATAFAB USB_STORAGE_FREECOM USB_STORAGE_ISD200 USB_STORAGE_JUMPSHOT USB_STORAGE_KARMA USB_STORAGE_ONETOUCH USB_STORAGE_SDDR09 USB_STORAGE_SDDR55 USB_STORAGE_USBAT USB_TRANCEVIBRATOR USB_U_AUDIO USB_U_ETHER USB_U_SERIAL USB_WDM USB_XHCI_PCI_RENESAS WLAN WLAN_VENDOR_ATH WLAN_VENDOR_ATMEL WLAN_VENDOR_BROADCOM WLAN_VENDOR_INTERSIL WLAN_VENDOR_MARVELL WLAN_VENDOR_MEDIATEK WLAN_VENDOR_MICROCHIP WLAN_VENDOR_RALINK WLAN_VENDOR_REALTEK WLAN_VENDOR_RSI WLAN_VENDOR_ZYDAS ZEROPLUS_FF] disabling configs for [atomic_sleep hang memleak ubsan bug_or_warning locking], they are not needed testing current HEAD cc0ae2abdc73d5432c9a86d8576c344c68a1e29c testing commit cc0ae2abdc73d5432c9a86d8576c344c68a1e29c gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.44 kernel signature: 0de0c096523ad9a9a8a2108e7400b65afdcb86a0aa608cca0a659e009842db3c all runs: crashed: KASAN: use-after-free Read in lock_get_status representative crash: KASAN: use-after-free Read in lock_get_status, types: [KASAN-USE-AFTER-FREE-READ] crash still not fixed/happens on the oldest tested release revisions tested: 7, total time: 53m6.053086198s (build: 18m0.33041614s, test: 33m39.430402834s) crash still not fixed or there were kernel test errors commit msg: Merge android13-5.10 into android13-5.10-lts crash: KASAN: use-after-free Read in lock_get_status ================================================================== BUG: KASAN: use-after-free in file_inode include/linux/fs.h:1343 [inline] BUG: KASAN: use-after-free in lock_get_status+0x6fd/0x7a0 fs/locks.c:2870 Read of size 8 at addr ffff8881156f9e20 by task syz.1.144/874 CPU: 0 PID: 874 Comm: syz.1.144 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack_lvl+0x81/0xac lib/dump_stack.c:118 print_address_description.constprop.0+0x24/0x160 mm/kasan/report.c:248 __kasan_report mm/kasan/report.c:435 [inline] kasan_report.cold+0x82/0xdb mm/kasan/report.c:452 __asan_report_load8_noabort+0x14/0x20 mm/kasan/report_generic.c:309 file_inode include/linux/fs.h:1343 [inline] lock_get_status+0x6fd/0x7a0 fs/locks.c:2870 locks_show+0x14a/0x240 fs/locks.c:2945 seq_read_iter+0x3fd/0x1020 fs/seq_file.c:230 proc_reg_read_iter+0x19d/0x260 fs/proc/inode.c:310 call_read_iter include/linux/fs.h:2060 [inline] new_sync_read+0x353/0x6d0 fs/read_write.c:415 vfs_read+0x2cf/0x430 fs/read_write.c:496 ksys_pread64 fs/read_write.c:686 [inline] __do_sys_pread64 fs/read_write.c:696 [inline] __se_sys_pread64 fs/read_write.c:693 [inline] __x64_sys_pread64+0x1b2/0x200 fs/read_write.c:693 do_syscall_64+0x32/0x50 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7f77f83c1799 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f77f8203028 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 RAX: ffffffffffffffda RBX: 00007f77f863b090 RCX: 00007f77f83c1799 RDX: 00000000000000d1 RSI: 00002000000024c0 RDI: 0000000000000000 RBP: 00007f77f8457bd9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f77f863b128 R14: 00007f77f863b090 R15: 00007ffd7e0f2548 Allocated by task 870: kasan_save_stack+0x26/0x50 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:45 [inline] set_alloc_info mm/kasan/common.c:430 [inline] __kasan_slab_alloc+0x94/0xc0 mm/kasan/common.c:463 kasan_slab_alloc include/linux/kasan.h:244 [inline] slab_post_alloc_hook mm/slab.h:580 [inline] slab_alloc_node mm/slub.c:2952 [inline] slab_alloc mm/slub.c:2960 [inline] kmem_cache_alloc+0x15d/0x4f0 mm/slub.c:2965 kmem_cache_zalloc include/linux/slab.h:657 [inline] __alloc_file+0x26/0x380 fs/file_table.c:101 alloc_empty_file+0x41/0xf0 fs/file_table.c:151 path_openat+0xf2/0x3950 fs/namei.c:3503 do_filp_open+0x193/0x3d0 fs/namei.c:3544 do_sys_openat2+0x135/0x810 fs/open.c:1219 do_sys_open fs/open.c:1235 [inline] __do_sys_openat fs/open.c:1251 [inline] __se_sys_openat fs/open.c:1246 [inline] __x64_sys_openat+0x124/0x200 fs/open.c:1246 do_syscall_64+0x32/0x50 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x61/0xcb Freed by task 12: kasan_save_stack+0x26/0x50 mm/kasan/common.c:38 kasan_set_track+0x25/0x30 mm/kasan/common.c:45 kasan_set_free_info+0x24/0x40 mm/kasan/generic.c:370 ____kasan_slab_free mm/kasan/common.c:362 [inline] ____kasan_slab_free mm/kasan/common.c:324 [inline] __kasan_slab_free+0x111/0x150 mm/kasan/common.c:370 kasan_slab_free include/linux/kasan.h:220 [inline] slab_free_hook mm/slub.c:1600 [inline] slab_free_freelist_hook+0x9b/0x1a0 mm/slub.c:1626 slab_free mm/slub.c:3208 [inline] kmem_cache_free+0x106/0x440 mm/slub.c:3224 file_free_rcu+0x59/0x70 fs/file_table.c:50 rcu_do_batch+0x34e/0xb90 kernel/rcu/tree.c:2494 rcu_core+0x3fa/0xa40 kernel/rcu/tree.c:2735 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2748 __do_softirq+0x1bc/0x5f3 kernel/softirq.c:309 Last potentially related work creation: kasan_save_stack+0x26/0x50 mm/kasan/common.c:38 __kasan_record_aux_stack+0xd8/0xf0 mm/kasan/generic.c:348 kasan_record_aux_stack_noalloc+0xb/0x10 mm/kasan/generic.c:358 __call_rcu kernel/rcu/tree.c:2980 [inline] call_rcu+0xe2/0x12d0 kernel/rcu/tree.c:3054 file_free fs/file_table.c:58 [inline] __fput+0x363/0x760 fs/file_table.c:299 ____fput+0x9/0x10 fs/file_table.c:314 task_work_run+0xc2/0x140 kernel/task_work.c:189 tracehook_notify_resume include/linux/tracehook.h:188 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x150/0x160 kernel/entry/common.c:199 syscall_exit_to_user_mode+0x27/0x160 kernel/entry/common.c:274 do_syscall_64+0x3f/0x50 arch/x86/entry/common.c:56 entry_SYSCALL_64_after_hwframe+0x61/0xcb Second to last potentially related work creation: kasan_save_stack+0x26/0x50 mm/kasan/common.c:38 __kasan_record_aux_stack+0xd8/0xf0 mm/kasan/generic.c:348 kasan_record_aux_stack+0xe/0x10 mm/kasan/generic.c:353 task_work_add+0x30/0x130 kernel/task_work.c:38 fput_many fs/file_table.c:342 [inline] fput_many+0xab/0x130 fs/file_table.c:335 fput+0xe/0x10 fs/file_table.c:358 fdput include/linux/file.h:47 [inline] __do_sys_fcntl fs/fcntl.c:468 [inline] __se_sys_fcntl fs/fcntl.c:450 [inline] __x64_sys_fcntl+0xfd/0x170 fs/fcntl.c:450 do_syscall_64+0x32/0x50 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x61/0xcb The buggy address belongs to the object at ffff8881156f9e00 which belongs to the cache filp of size 296 The buggy address is located 32 bytes inside of 296-byte region [ffff8881156f9e00, ffff8881156f9f28) The buggy address belongs to the page: page:ffffea000455be00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1156f8 head:ffffea000455be00 order:1 compound_mapcount:0 flags: 0x4000000000010200(slab|head) raw: 4000000000010200 dead000000000100 dead000000000122 ffff888100163800 raw: 0000000000000000 0000000000150015 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 1, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 449, ts 51554445578, free_ts 48438713993 set_page_owner include/linux/page_owner.h:35 [inline] post_alloc_hook mm/page_alloc.c:2456 [inline] prep_new_page mm/page_alloc.c:2462 [inline] get_page_from_freelist+0x1fee/0x2ad0 mm/page_alloc.c:4254 __alloc_pages_nodemask+0x2ae/0x2540 mm/page_alloc.c:5384 __alloc_pages include/linux/gfp.h:544 [inline] __alloc_pages_node include/linux/gfp.h:557 [inline] alloc_pages_node include/linux/gfp.h:571 [inline] alloc_pages include/linux/gfp.h:590 [inline] alloc_slab_page mm/slub.c:1670 [inline] allocate_slab+0x30f/0x460 mm/slub.c:1813 new_slab mm/slub.c:1874 [inline] new_slab_objects mm/slub.c:2632 [inline] ___slab_alloc.constprop.0+0x32b/0x730 mm/slub.c:2796 __slab_alloc mm/slub.c:2836 [inline] slab_alloc_node mm/slub.c:2918 [inline] slab_alloc mm/slub.c:2960 [inline] kmem_cache_alloc+0x491/0x4f0 mm/slub.c:2965 kmem_cache_zalloc include/linux/slab.h:657 [inline] __alloc_file+0x26/0x380 fs/file_table.c:101 alloc_empty_file+0x41/0xf0 fs/file_table.c:151 alloc_file+0x54/0x500 fs/file_table.c:193 alloc_file_pseudo+0x16c/0x250 fs/file_table.c:233 sock_alloc_file+0x42/0x170 net/socket.c:412 sock_map_fd net/socket.c:436 [inline] __sys_socket+0x108/0x1d0 net/socket.c:1533 __do_sys_socket net/socket.c:1538 [inline] __se_sys_socket net/socket.c:1536 [inline] __x64_sys_socket+0x6e/0xb0 net/socket.c:1536 do_syscall_64+0x32/0x50 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x61/0xcb page last free stack trace: reset_page_owner include/linux/page_owner.h:28 [inline] free_pages_prepare mm/page_alloc.c:1349 [inline] free_pcp_prepare+0x1a7/0x230 mm/page_alloc.c:1421 free_unref_page_prepare mm/page_alloc.c:3336 [inline] free_unref_page+0x19/0x270 mm/page_alloc.c:3391 free_the_page mm/page_alloc.c:5443 [inline] __free_pages+0xba/0xf0 mm/page_alloc.c:5454 __vunmap+0x4b7/0x7d0 mm/vmalloc.c:2307 free_work+0x51/0x70 mm/vmalloc.c:69 process_one_work+0x5f5/0xe40 kernel/workqueue.c:2301 worker_thread+0x402/0xcd0 kernel/workqueue.c:2447 kthread+0x345/0x420 kernel/kthread.c:313 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298 Memory state around the buggy address: ffff8881156f9d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8881156f9d80: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc >ffff8881156f9e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff8881156f9e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8881156f9f00: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc ==================================================================