syzbot


INFO: rcu detected stall in corrupted (4)

Status: upstream: reported C repro on 2020/09/04 18:49
Subsystems: net
[Documentation on labels]
Reported-by: syzbot+aa7d098bd6fa788fae8e@syzkaller.appspotmail.com
First crash: 1119d, last: 3d11h
Cause bisection: introduced by (bisect log) :
commit 5a781ccbd19e4664babcbe4b4ead7aa2b9283d22
Author: Vinicius Costa Gomes <vinicius.gomes@intel.com>
Date: Sat Sep 29 00:59:43 2018 +0000

  tc: Add support for configuring the taprio scheduler

Crash: no output from test machine (log)
Repro: C syz .config
  
Fix bisection the fix commit could be any of (bisect log):
  0f091e43310f netlabel: remove unused param from audit_log_format()
  a729b8e6ec3d Merge branch 'fixes-for-yt8511-phy-driver'
  
Discussions (1)
Title Replies (including bot) Last reply
INFO: rcu detected stall in corrupted (4) 2 (3) 2021/03/05 22:27
Similar bugs (12)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-6.1 INFO: rcu detected stall in corrupted origin:upstream C 43 15d 196d 0/3 upstream: reported C repro on 2023/03/13 04:03
android-414 INFO: rcu detected stall in corrupted C 3 1555d 1628d 0/1 public: reported C repro on 2019/04/10 16:04
android-49 INFO: rcu detected stall in corrupted C 27 1440d 1625d 0/3 public: reported C repro on 2019/04/14 00:00
upstream INFO: rcu detected stall in corrupted (3) kernel C done 1 1644d 1640d 0/25 closed as invalid on 2019/03/30 00:13
linux-4.14 INFO: rcu detected stall in corrupted (2) C error 4 1198d 1359d 0/1 upstream: reported C repro on 2020/01/04 08:54
upstream INFO: rcu detected stall in corrupted net syz 1 1952d 1952d 9/25 fixed on 2018/07/09 18:05
linux-4.14 INFO: rcu detected stall in corrupted C done 3 1473d 1494d 1/1 fixed on 2019/12/05 23:59
linux-4.19 INFO: rcu detected stall in corrupted C error 2 612d 1320d 0/1 upstream: reported C repro on 2020/02/13 05:06
upstream INFO: rcu detected stall in corrupted (2) kernel syz 1 1884d 1884d 0/25 closed as invalid on 2018/07/29 11:55
upstream BUG: workqueue lockup (5) C done 1255 37m 1349d 0/25 upstream: reported C repro on 2020/01/14 22:04
linux-4.14 BUG: soft lockup in corrupted C error 12 420d 904d 0/1 upstream: reported C repro on 2021/04/04 06:30
linux-4.19 BUG: soft lockup in corrupted C error 3 449d 637d 0/1 upstream: reported C repro on 2021/12/26 20:46
Fix bisection attempts (8)
Created Duration User Patch Repo Result
2021/05/31 08:09 28m bisect fix net-next-old job log (2)
2021/05/01 07:17 22m bisect fix net-next-old job log (0) log
2021/04/01 06:52 24m bisect fix net-next-old job log (0) log
2021/03/01 04:23 23m bisect fix net-next-old job log (0) log
2021/02/01 15:30 0m bisect fix net-next-old error job log (0)
2020/12/07 14:25 25m bisect fix net-next-old job log (0) log
2020/11/07 05:27 26m bisect fix net-next-old job log (0) log
2020/10/07 17:56 26m bisect fix net-next-old job log (0) log

Sample crash report:
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 	0-...!: (1 GPs behind) idle=859c/1/0x4000000000000000 softirq=15153/15158 fqs=1
rcu: 	(detected by 1, t=10506 jiffies, g=15109, q=97 ncpus=2)
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 23418 Comm: syz-executor276 Not tainted 6.6.0-rc2-syzkaller-00048-g42dc814987c1 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
RIP: 0010:check_wait_context kernel/locking/lockdep.c:4773 [inline]
RIP: 0010:__lock_acquire+0x50f/0x5de0 kernel/locking/lockdep.c:5086
Code: c4 a0 f2 9e 91 49 8d bc 24 c9 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 04 02 48 89 fa 83 e2 07 38 d0 <7f> 08 84 c0 0f 85 4d 3b 00 00 41 0f b6 b4 24 c9 00 00 00 45 84 ff
RSP: 0018:ffffc9000bab77e0 EFLAGS: 00000097
RAX: 0000000000000000 RBX: 00000000000001d6 RCX: ffffffff8168245e
RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff91a07149
RBP: 0000000000000001 R08: 0000000000000000 R09: fffffbfff233ddd7
R10: ffffffff919eeebf R11: ffffffff910c8c60 R12: ffffffff91a07080
R13: ffff88807a398af0 R14: 0000000000000000 R15: 0000000000000002
FS:  0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffcfd2a99c0 CR3: 000000000c976000 CR4: 0000000000350ef0
Call Trace:
 <NMI>
 </NMI>
 <TASK>
 lock_acquire kernel/locking/lockdep.c:5753 [inline]
 lock_acquire+0x1ae/0x510 kernel/locking/lockdep.c:5718
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
 _raw_spin_lock_irqsave+0x3a/0x50 kernel/locking/spinlock.c:162
 vga_put+0x31/0x100 drivers/pci/vgaarb.c:547
 vga_arb_release+0x264/0x500 drivers/pci/vgaarb.c:1459
 __fput+0x3f7/0xa70 fs/file_table.c:384
 task_work_run+0x14d/0x240 kernel/task_work.c:179
 exit_task_work include/linux/task_work.h:38 [inline]
 do_exit+0xa92/0x2a20 kernel/exit.c:874
 do_group_exit+0xd4/0x2a0 kernel/exit.c:1024
 get_signal+0x23ba/0x2790 kernel/signal.c:2892
 arch_do_signal_or_restart+0x90/0x7f0 arch/x86/kernel/signal.c:309
 exit_to_user_mode_loop kernel/entry/common.c:168 [inline]
 exit_to_user_mode_prepare+0x11f/0x240 kernel/entry/common.c:204
 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]
 syscall_exit_to_user_mode+0x1d/0x60 kernel/entry/common.c:296
 do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fa04a27e369
Code: Unable to access opcode bytes at 0x7fa04a27e33f.
RSP: 002b:00007fa04a21e238 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: fffffffffffffe00 RBX: 00007fa04a308318 RCX: 00007fa04a27e369
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fa04a308318
RBP: 00007fa04a308310 R08: 00007fa04a21e6c0 R09: 00007fa04a21e6c0
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa04a30831c
R13: 0000000000000000 R14: 00007ffcfd275250 R15: 00007ffcfd275338
 </TASK>
INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 1.146 msecs
rcu: rcu_preempt kthread starved for 10500 jiffies! g15109 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1
rcu: 	Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt     state:R  running task     stack:28768 pid:17    ppid:2      flags:0x00004000
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5382 [inline]
 __schedule+0xee1/0x5a10 kernel/sched/core.c:6695
 schedule+0xe7/0x1b0 kernel/sched/core.c:6771
 schedule_timeout+0x157/0x2c0 kernel/time/timer.c:2167
 rcu_gp_fqs_loop+0x1ec/0xa50 kernel/rcu/tree.c:1613
 rcu_gp_kthread+0x249/0x380 kernel/rcu/tree.c:1812
 kthread+0x33c/0x440 kernel/kthread.c:388
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304
 </TASK>
rcu: Stack dump where RCU GP kthread last ran:
CPU: 1 PID: 12 Comm: kworker/u4:1 Not tainted 6.6.0-rc2-syzkaller-00048-g42dc814987c1 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
Workqueue: events_unbound toggle_allocation_gate
RIP: 0010:csd_lock_wait kernel/smp.c:300 [inline]
RIP: 0010:smp_call_function_many_cond+0x4db/0x1570 kernel/smp.c:844
Code: 4d 48 b8 00 00 00 00 00 fc ff df 4d 89 fc 4c 89 fd 49 c1 ec 03 83 e5 07 49 01 c4 83 c5 03 e8 2c 8b 0b 00 f3 90 41 0f b6 04 24 <40> 38 c5 7c 08 84 c0 0f 85 3c 0e 00 00 8b 43 08 31 ff 83 e0 01 41
RSP: 0018:ffffc90000117920 EFLAGS: 00000293
RAX: 0000000000000000 RBX: ffff8880b9844180 RCX: 0000000000000000
RDX: ffff888016a7d940 RSI: ffffffff817c3b04 RDI: 0000000000000005
RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: ffffed1017308831
R13: 0000000000000001 R14: ffff8880b993d8c0 R15: ffff8880b9844188
FS:  0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fa04a2d49f8 CR3: 000000000c976000 CR4: 0000000000350ee0
Call Trace:
 <IRQ>
 </IRQ>
 <TASK>
 on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1012
 on_each_cpu include/linux/smp.h:71 [inline]
 text_poke_sync arch/x86/kernel/alternative.c:1998 [inline]
 text_poke_bp_batch+0x2ce/0x960 arch/x86/kernel/alternative.c:2208
 text_poke_flush arch/x86/kernel/alternative.c:2399 [inline]
 text_poke_flush arch/x86/kernel/alternative.c:2396 [inline]
 text_poke_finish+0x30/0x40 arch/x86/kernel/alternative.c:2406
 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146
 jump_label_update+0x32e/0x410 kernel/jump_label.c:829
 static_key_enable_cpuslocked+0x1b5/0x270 kernel/jump_label.c:205
 static_key_enable+0x1a/0x20 kernel/jump_label.c:218
 toggle_allocation_gate mm/kfence/core.c:830 [inline]
 toggle_allocation_gate+0xf4/0x250 mm/kfence/core.c:822
 process_one_work+0x884/0x15c0 kernel/workqueue.c:2630
 process_scheduled_works kernel/workqueue.c:2703 [inline]
 worker_thread+0x8b9/0x1290 kernel/workqueue.c:2784
 kthread+0x33c/0x440 kernel/kthread.c:388
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304
 </TASK>

Crashes (361):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2023/09/21 19:46 upstream 42dc814987c1 0b6a67ac .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in corrupted
2023/09/14 00:46 upstream 3669558bdf35 0b6a67ac .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in corrupted
2023/08/21 23:17 upstream f7757129e3de 6b415825 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in corrupted
2023/08/02 05:16 upstream 5d0c230f1de8 df07ffe8 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in corrupted
2023/07/24 15:29 upstream 6eaae1980760 06460670 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in corrupted
2023/07/24 06:03 upstream 269f4a4b85a1 27cbe77f .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in corrupted
2023/07/23 23:39 upstream c2782531397f 27cbe77f .config strace log report syz C [disk image] [vmlinux] [kernel image] ci2-upstream-fs INFO: rcu detected stall in corrupted
2023/07/17 19:36 upstream fdf0eaf11452 e5f10889 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in corrupted
2023/07/17 18:03 upstream fdf0eaf11452 e5f10889 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in corrupted
2023/07/16 13:28 upstream 831fe284d827 35d9ecc5 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in corrupted
2023/07/14 06:07 upstream eb26cbb1a754 55eda22f .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in corrupted
2023/04/02 11:06 upstream 00c7b5f4ddc5 f325deb0 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in corrupted
2023/03/05 18:33 upstream b01fe98d34f3 f8902b57 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in corrupted
2023/07/26 13:28 net 55cef78c244d 6756545c .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in corrupted
2023/07/17 20:50 net 4bdf79d686b4 e5f10889 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in corrupted
2023/07/16 20:53 net 0dd1805fe498 35d9ecc5 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in corrupted
2021/10/28 02:57 bpf 440ffcdd9db4 373bf66b .config console log report syz C ci-upstream-bpf-kasan-gce INFO: rcu detected stall in corrupted
2023/07/28 12:07 net-next 994650353cae 92476829 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in corrupted
2023/07/18 21:40 net-next d3750076d464 022df2bb .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in corrupted
2023/07/17 20:52 net-next 89e970ea7fba e5f10889 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in corrupted
2023/07/16 19:54 net-next 68af900072c1 35d9ecc5 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in corrupted
2023/08/04 15:26 linux-next bdffb18b5dd8 74621247 .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in corrupted
2023/07/21 12:18 linux-next ae867bc97b71 28847498 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in corrupted
2023/06/10 23:55 linux-next 715abedee4cd 7086cdb9 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in corrupted
2023/02/05 22:03 linux-next 4fafd96910ad be607b78 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in corrupted
2020/08/31 18:45 net-next-old 0f091e43310f d5a3ae1f .config console log report syz C ci-upstream-net-kasan-gce
2023/08/26 22:17 upstream 7d2f353b2682 03d9c195 .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in corrupted
2023/08/24 01:57 upstream a5e505a99ca7 4d7ae7ab .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in corrupted
2023/07/26 03:10 upstream af2e19389c2c 6756545c .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in corrupted
2023/02/22 08:47 upstream 4a7d37e824f5 42a4d508 .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in corrupted
2023/02/20 14:17 upstream c9c3395d5e3d bcdf85f8 .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in corrupted
2023/02/19 22:48 upstream 925cf0457d7e bcdf85f8 .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in corrupted
2023/02/19 05:38 upstream 38f8ccde04a3 bcdf85f8 .config strace log report syz [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in corrupted
2023/02/17 08:47 upstream 3ac88fa4605e 851bc19a .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in corrupted
2023/02/09 01:53 upstream 0983f6bf2bfc fc9c934e .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in corrupted
2023/02/09 01:53 upstream 0983f6bf2bfc fc9c934e .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in corrupted
2023/02/08 20:56 upstream 0983f6bf2bfc fc9c934e .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in corrupted
2023/02/08 04:42 upstream 05ecb680708a 15c3d445 .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in corrupted
2023/02/06 13:49 upstream d2d11f342b17 be607b78 .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in corrupted
2023/02/02 23:57 upstream 9f266ccaa2f5 16d19e30 .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in corrupted
2023/01/29 14:58 upstream c96618275234 9dfcf09c .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 INFO: rcu detected stall in corrupted
2023/02/17 09:01 net-old b20b8aec6ffc 851bc19a .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in corrupted
2023/02/05 13:44 net-old a05e7a67986c be607b78 .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in corrupted
2023/08/14 18:48 net-next 83b5f0253b1e 39990d51 .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in corrupted
2023/09/14 01:06 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes 8eb8fe67e2c8 0b6a67ac .config console log report syz [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 INFO: rcu detected stall in corrupted
2023/09/05 07:47 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes e0152e7481c6 0b6286dc .config console log report syz [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 INFO: rcu detected stall in corrupted
2023/09/04 17:49 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes e0152e7481c6 db3306a6 .config console log report syz [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 INFO: rcu detected stall in corrupted
2023/09/03 20:40 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes e0152e7481c6 696ea0d2 .config console log report syz [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 INFO: rcu detected stall in corrupted
2023/08/02 21:31 linux-next 626c67169f99 39a91c18 .config strace log report syz [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in corrupted
2023/05/30 00:14 linux-next 715abedee4cd cf184559 .config console log report syz [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in corrupted
2023/02/17 23:26 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2d3827b3f393 3e7039f4 .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 INFO: rcu detected stall in corrupted
2023/02/11 02:18 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2d3827b3f393 95871dcc .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 INFO: rcu detected stall in corrupted
2023/02/09 00:33 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci eaed33698e35 fc9c934e .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 INFO: rcu detected stall in corrupted
2023/02/05 09:53 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci ca72d58361ee be607b78 .config console log report syz [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 INFO: rcu detected stall in corrupted
2021/01/02 05:37 upstream eda809aef534 79264ae3 .config console log report syz ci-upstream-kasan-gce-root
* Struck through repros no longer work on HEAD.