syzbot


corrupted report (2)

Status: moderation: reported on 2018/04/11 09:52
Subsystems: kasan
[Documentation on labels]
Reported-by: syzbot+56275b6e83c2fb060948@syzkaller.appspotmail.com
First crash: 2306d, last: 24m
Similar bugs (16)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-5-10 corrupted report (2) 6 197d 275d 0/2 auto-obsoleted due to no activity on 2023/12/02 13:09
linux-4.19 corrupted report gfs2 sysv ext4 hfsplus 6619 378d 1803d 0/1 upstream: reported on 2019/04/11 04:14
android-414 corrupted report 5888 1569d 1804d 0/1 auto-closed as invalid on 2020/02/29 14:20
android-5-15 corrupted report 4 246d 328d 0/2 auto-obsoleted due to no activity on 2023/10/14 13:19
upstream corrupted report 29 2306d 2308d 0/26 closed as invalid on 2017/11/24 12:19
android-54 corrupted report 704065 now 1498d 0/2 upstream: reported on 2020/02/10 10:21
linux-4.4 corrupted report 12 1649d 1777d 0/1 auto-closed as invalid on 2020/01/10 12:28
linux-4.14 corrupted report cramfs 6026 378d 1802d 0/1 upstream: reported on 2019/04/12 21:21
android-6-1 corrupted report 15 3d21h 237d 0/2 premoderation: reported on 2023/07/25 23:06
android-5-10 corrupted report 289 676d 825d 0/2 auto-closed as invalid on 2022/07/11 05:59
android-49 corrupted report 567 2306d 2308d 0/3 closed as invalid on 2017/11/24 12:19
android-5-15 corrupted report (2) 1 107d 107d 0/2 auto-obsoleted due to no activity on 2024/03/01 04:17
linux-5.15 corrupted report 152 9d00h 372d 0/3 upstream: reported on 2023/03/12 22:30
android-49 corrupted report (2) 19181 1566d 1800d 0/3 auto-closed as invalid on 2020/03/03 12:39
linux-6.1 corrupted report 7968 17m 377d 0/3 upstream: reported on 2023/03/07 17:14
android-44 corrupted report 7075 1567d 1800d 0/2 auto-closed as invalid on 2020/03/02 23:26

Sample crash report:
================================
WARNING: inconsistent lock state
6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted
--------------------------------
inconsistent {HARDIRQ-ON-W} -> {IN-HARDIRQ-W} usage.
udevd/4513 [HC1[1]:SC0[0]:HE0:SE1] takes:
ffff88802983b948 (&timer->lock){?.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
ffff88802983b948 (&timer->lock){?.+.}-{2:2}, at: class_spinlock_constructor include/linux/spinlock.h:561 [inline]
ffff88802983b948 (&timer->lock){?.+.}-{2:2}, at: snd_hrtimer_callback+0x4d/0x420 sound/core/hrtimer.c:38
{HARDIRQ-ON-W} state was registered at:
  lock_acquire kernel/locking/lockdep.c:5754 [inline]
  lock_acquire+0x1b1/0x540 kernel/locking/lockdep.c:5719
  __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
  _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
  spin_lock include/linux/spinlock.h:351 [inline]
  class_spinlock_constructor include/linux/spinlock.h:561 [inline]
  snd_timer_close_locked+0x65/0xbd0 sound/core/timer.c:412
  snd_timer_close+0x8b/0xf0 sound/core/timer.c:464
  snd_seq_timer_close+0xa4/0x100 sound/core/seq/seq_timer.c:302
  queue_delete+0x49/0xa0 sound/core/seq/seq_queue.c:126
  snd_seq_queue_delete+0x45/0x60 sound/core/seq/seq_queue.c:188
  snd_seq_kernel_client_ctl+0x107/0x1c0 sound/core/seq/seq_clientmgr.c:2526
  delete_seq_queue.isra.0+0xc8/0x150 sound/core/seq/oss/seq_oss_init.c:371
  odev_release+0x52/0x80 sound/core/seq/oss/seq_oss.c:144
  __fput+0x270/0xb80 fs/file_table.c:422
  __fput_sync+0x47/0x50 fs/file_table.c:507
  __do_sys_close fs/open.c:1556 [inline]
  __se_sys_close fs/open.c:1541 [inline]
  __x64_sys_close+0x86/0x100 fs/open.c:1541
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xd2/0x260 arch/x86/entry/common.c:83
  entry_SYSCALL_64_after_hwframe+0x6d/0x75
irq event stamp: 1208126
hardirqs last  enabled at (1208125): [<ffffffff8207c3b9>] seqcount_lockdep_reader_access include/linux/seqlock.h:74 [inline]
hardirqs last  enabled at (1208125): [<ffffffff8207c3b9>] read_seqbegin include/linux/seqlock.h:772 [inline]
hardirqs last  enabled at (1208125): [<ffffffff8207c3b9>] read_seqbegin_or_lock include/linux/seqlock.h:1076 [inline]
hardirqs last  enabled at (1208125): [<ffffffff8207c3b9>] read_seqbegin_or_lock include/linux/seqlock.h:1073 [inline]
hardirqs last  enabled at (1208125): [<ffffffff8207c3b9>] prepend_path+0xba9/0xf50 fs/d_path.c:171
hardirqs last disabled at (1208126): [<ffffffff8ad239ae>] sysvec_apic_timer_interrupt+0xe/0xb0 arch/x86/kernel/apic/apic.c:1043
softirqs last  enabled at (1206784): [<ffffffff8ad63156>] softirq_handle_end kernel/softirq.c:400 [inline]
softirqs last  enabled at (1206784): [<ffffffff8ad63156>] __do_softirq+0x596/0x8de kernel/softirq.c:583
softirqs last disabled at (1206745): [<ffffffff8151a149>] invoke_softirq kernel/softirq.c:428 [inline]
softirqs last disabled at (1206745): [<ffffffff8151a149>] __irq_exit_rcu kernel/softirq.c:633 [inline]
softirqs last disabled at (1206745): [<ffffffff8151a149>] irq_exit_rcu+0xb9/0x120 kernel/softirq.c:645

other info that might help us debug this:
 Possible unsafe locking scenario:

       CPU0
       ----
  lock(&timer->lock);
  <Interrupt>
    lock(&timer->lock);

 *** DEADLOCK ***

1 lock held by udevd/4513:
 #0: ffffffff8e11e410 (tomoyo_ss){.+.+}-{0:0}, at: srcu_lock_acquire include/linux/srcu.h:116 [inline]
 #0: ffffffff8e11e410 (tomoyo_ss){.+.+}-{0:0}, at: srcu_read_lock include/linux/srcu.h:215 [inline]
 #0: ffffffff8e11e410 (tomoyo_ss){.+.+}-{0:0}, at: tomoyo_read_lock security/tomoyo/common.h:1108 [inline]
 #0: ffffffff8e11e410 (tomoyo_ss){.+.+}-{0:0}, at: tomoyo_check_open_permission+0x164/0x3b0 security/tomoyo/file.c:767

stack backtrace:
CPU: 0 PID: 4513 Comm: udevd Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Call Trace:
 <IRQ>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114
 print_usage_bug kernel/locking/lockdep.c:3971 [inline]
 valid_state kernel/locking/lockdep.c:4013 [inline]
 mark_lock_irq kernel/locking/lockdep.c:4216 [inline]
 mark_lock+0x923/0xc60 kernel/locking/lockdep.c:4678
 mark_usage kernel/locking/lockdep.c:4564 [inline]
 __lock_acquire+0x1359/0x3b30 kernel/locking/lockdep.c:5091
 lock_acquire kernel/locking/lockdep.c:5754 [inline]
 lock_acquire+0x1b1/0x540 kernel/locking/lockdep.c:5719
 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
 _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
 spin_lock include/linux/spinlock.h:351 [inline]
 class_spinlock_constructor include/linux/spinlock.h:561 [inline]
 snd_hrtimer_callback+0x4d/0x420 sound/core/hrtimer.c:38
 __run_hrtimer kernel/time/hrtimer.c:1692 [inline]
 __hrtimer_run_queues+0x20c/0xc20 kernel/time/hrtimer.c:1756
 hrtimer_interrupt+0x31b/0x800 kernel/time/hrtimer.c:1818
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1032 [inline]
 __sysvec_apic_timer_interrupt+0x10f/0x410 arch/x86/kernel/apic/apic.c:1049
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline]
 sysvec_apic_timer_interrupt+0x90/0xb0 arch/x86/kernel/apic/apic.c:1043
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:__should_failslab+0x25/0x110 mm/failslab.c:22
Code: 90 90 90 90 90 66 0f 1f 00 48 c7 c0 80 8b 69 94 53 48 89 fb 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 48 83 ec 08 80 3c 10 00 <0f> 85 bb 00 00 00 48 39 1d 2e d7 81 12 0f 84 93 00 00 00 f7 c6 00
RSP: 0018:ffffc9000347f6b0 EFLAGS: 00000246
RAX: 1ffffffff28d3170 RBX: ffff888015041640 RCX: 0000000000000001
RDX: dffffc0000000000 RSI: 0000000000000d40 RDI: ffff888015041640
RBP: ffffc9000347f720 R08: 0000000000000000 R09: fffffbfff1f3cdf2
R10: ffffffff8f9e6f97 R11: 0000000000000001 R12: ffff888015041640
R13: 0000000000000d40 R14: 0000000000000036 R15: ffffffff843ae1c0
 should_failslab+0x9/0x20 mm/slub.c:3732
 slab_pre_alloc_hook mm/slub.c:3748 [inline]
 slab_alloc_node mm/slub.c:3827 [inline]
 __do_kmalloc_node mm/slub.c:3965 [inline]
 __kmalloc+0xcf/0x440 mm/slub.c:3979
 kmalloc include/linux/slab.h:632 [inline]
 kzalloc include/linux/slab.h:749 [inline]
 tomoyo_encode2+0x100/0x3e0 security/tomoyo/realpath.c:45
 tomoyo_encode+0x29/0x50 security/tomoyo/realpath.c:80
 tomoyo_realpath_from_path+0x19d/0x720 security/tomoyo/realpath.c:283
 tomoyo_get_realpath security/tomoyo/file.c:151 [inline]
 tomoyo_check_open_permission+0x2a7/0x3b0 security/tomoyo/file.c:771
 tomoyo_file_open+0x71/0x90 security/tomoyo/tomoyo.c:334
 security_file_open+0x78/0x630 security/security.c:2955
 do_dentry_open+0x583/0x18c0 fs/open.c:942
 do_open fs/namei.c:3642 [inline]
 path_openat+0x1dfb/0x2990 fs/namei.c:3799
 do_filp_open+0x1dc/0x430 fs/namei.c:3826
 do_sys_openat2+0x17a/0x1e0 fs/open.c:1406
 do_sys_open fs/open.c:1421 [inline]
 __do_sys_openat fs/open.c:1437 [inline]
 __se_sys_openat fs/open.c:1432 [inline]
 __x64_sys_openat+0x175/0x210 fs/open.c:1432
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xd2/0x260 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7ff27ef1a477
Code: 10 00 00 00 44 8b 54 24 e0 48 89 44 24 c0 48 8d 44 24 d0 48 89 44 24 c8 44 89 c2 4c 89 ce bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 76 10 48 8b 15 82 69 0d 00 f7 d8 64 89 02 48 83
RSP: 002b:00007ffe332f56f8 EFLAGS: 00000287 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 0000556226a82300 RCX: 00007ff27ef1a477
RDX: 0000000000090800 RSI: 0000556226a7c5f0 RDI: 00000000ffffff9c
RBP: 0000556226aaa070 R08: 0000000000090800 R09: 0000556226a7c5f0
R10: 0000000000000000 R11: 0000000000000287 R12: 0000556226a7c5f0
R13: 00000000000000ff R14: 000055621112a1c4 R15: 0000000000000000
 </TASK>
----------------
Code disassembly (best guess):
   0:	90                   	nop
   1:	90                   	nop
   2:	90                   	nop
   3:	90                   	nop
   4:	90                   	nop
   5:	66 0f 1f 00          	nopw   (%rax)
   9:	48 c7 c0 80 8b 69 94 	mov    $0xffffffff94698b80,%rax
  10:	53                   	push   %rbx
  11:	48 89 fb             	mov    %rdi,%rbx
  14:	48 ba 00 00 00 00 00 	movabs $0xdffffc0000000000,%rdx
  1b:	fc ff df
  1e:	48 c1 e8 03          	shr    $0x3,%rax
  22:	48 83 ec 08          	sub    $0x8,%rsp
  26:	80 3c 10 00          	cmpb   $0x0,(%rax,%rdx,1)
* 2a:	0f 85 bb 00 00 00    	jne    0xeb <-- trapping instruction
  30:	48 39 1d 2e d7 81 12 	cmp    %rbx,0x1281d72e(%rip)        # 0x1281d765
  37:	0f 84 93 00 00 00    	je     0xd0
  3d:	f7                   	.byte 0xf7
  3e:	c6                   	.byte 0xc6

Crashes (459025):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/03/17 10:39 upstream fe46a7dd189e d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root corrupted report
2024/03/17 03:45 upstream fe46a7dd189e d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root corrupted report
2024/03/15 08:55 upstream 480e035fc4c7 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce corrupted report
2024/03/14 01:39 upstream 61387b8dcf1d f919f202 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root corrupted report
2024/03/10 09:39 upstream 005f6f34bd47 6ee49f2e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root corrupted report
2024/02/08 13:07 upstream 047371968ffc 6404acf9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-leak corrupted report
2024/02/05 16:48 upstream 54be6c6c5ae8 e23e8c20 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-kcsan-gce corrupted report
2023/12/27 10:02 upstream fbafc3e621c3 fb427a07 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kmsan-gce-root corrupted report
2024/03/07 21:24 upstream 135288b73cef 2b789849 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 corrupted report
2023/09/20 23:03 upstream 5d2f53532ecc 0b6a67ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kmsan-gce-386 corrupted report
2024/03/18 15:08 upstream f6cef5f8c37f fc090d20 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream corrupted report
2024/02/22 08:00 upstream 39133352cbed 345111b5 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 corrupted report
2024/02/16 08:46 upstream 4f5e5092fdbf 578f7538 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 corrupted report
2023/10/20 13:58 upstream ce55c22ec8b2 361b23dc .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm64-mte corrupted report
2023/08/15 17:16 upstream 91aa6c412d7f 39990d51 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs corrupted report
2023/07/13 22:11 upstream eb26cbb1a754 55eda22f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kmsan-gce corrupted report
2023/02/22 14:54 upstream 89f5349e0673 9f1e2cb3 .config console log report info ci-qemu2-arm64 corrupted report
2023/02/06 12:55 upstream d2d11f342b17 0a9c11b6 .config console log report info ci-qemu2-arm64-compat corrupted report
2024/03/19 02:12 bpf 0740b6427e90 baa80228 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce corrupted report
2024/03/18 22:17 bpf 0740b6427e90 baa80228 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce corrupted report
2024/03/18 17:35 bpf 0740b6427e90 baa80228 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce corrupted report
2024/03/18 16:34 bpf 0740b6427e90 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce corrupted report
2024/03/18 10:58 bpf 0740b6427e90 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce corrupted report
2024/03/18 05:04 bpf 0740b6427e90 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce corrupted report
2024/03/18 03:24 bpf 0740b6427e90 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce corrupted report
2024/03/18 02:12 bpf 0740b6427e90 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce corrupted report
2024/03/18 00:50 bpf 0740b6427e90 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce corrupted report
2024/03/17 23:40 bpf 0740b6427e90 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce corrupted report
2024/03/17 23:21 bpf 0740b6427e90 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce corrupted report
2024/03/17 19:00 bpf 0740b6427e90 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce corrupted report
2024/03/17 16:36 bpf 0740b6427e90 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce corrupted report
2024/03/17 07:42 bpf 0740b6427e90 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce corrupted report
2024/03/17 06:21 bpf 0740b6427e90 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce corrupted report
2024/03/17 04:34 bpf 0740b6427e90 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce corrupted report
2024/03/15 07:35 net e30cef001da2 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce corrupted report
2024/03/19 02:24 bpf-next 4c8644f86c85 baa80228 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/19 00:53 bpf-next 4c8644f86c85 baa80228 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/18 23:53 bpf-next 4c8644f86c85 baa80228 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/18 22:42 bpf-next 4c8644f86c85 baa80228 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/18 21:05 bpf-next 4c8644f86c85 baa80228 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/18 19:51 bpf-next 4c8644f86c85 baa80228 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/18 18:35 bpf-next 4c8644f86c85 baa80228 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/18 16:29 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/18 13:07 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/18 12:42 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/18 09:38 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/18 08:37 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/18 07:26 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/18 06:22 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/18 03:57 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/17 22:20 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/17 21:10 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/17 20:21 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/17 17:50 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/17 15:34 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/17 14:51 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/17 13:26 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/17 12:18 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/17 11:05 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/17 08:45 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/17 02:43 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/17 01:17 bpf-next 4c8644f86c85 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce corrupted report
2024/03/16 13:08 net-next 237bb5f7f7f5 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-net-next-test-gce corrupted report
2024/03/15 18:11 net-next 19c5c04d3178 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce corrupted report
2024/02/28 08:44 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git usb-testing a560a5672826 d367cbe5 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-usb corrupted report
2024/02/05 07:49 linux-next 23e11d031852 a67b2c42 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root corrupted report
2024/02/26 20:55 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 9abbc24128bc edd6a5e9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 corrupted report
2024/03/18 08:36 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes a11dd49dcb93 d615901c .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 corrupted report
2021/01/17 14:01 upstream 0da0a8a0a0e1 813be542 .config console log report info ci2-upstream-kcsan-gce
2018/04/07 12:40 upstream 3fd14cdcc05a 66f22a7f .config console log report ci-upstream-kasan-gce-root
* Struck through repros no longer work on HEAD.