ci2 starts bisection 2023-10-26 04:02:06.934971232 +0000 UTC m=+42086.721691667 bisecting fixing commit since 59b65efafe20d18e4d05e8b3f63445bc12cb2cda building syzkaller on 35d9ecc508aef508b67ee7986a7abb0864e74f8e ensuring issue is reproducible on original commit 59b65efafe20d18e4d05e8b3f63445bc12cb2cda testing commit 59b65efafe20d18e4d05e8b3f63445bc12cb2cda gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: baf525a4b9fa15b64d60f5ae9a874123d1bd82ee8c5f247f6ea085e1c49b33c1 run #0: crashed: general protection fault in fuse_atomic_open run #1: crashed: general protection fault in fuse_atomic_open run #2: crashed: general protection fault in fuse_atomic_open run #3: crashed: general protection fault in fuse_atomic_open run #4: crashed: general protection fault in fuse_atomic_open run #5: crashed: general protection fault in fuse_atomic_open run #6: crashed: general protection fault in fuse_atomic_open run #7: crashed: general protection fault in fuse_atomic_open run #8: crashed: general protection fault in fuse_atomic_open run #9: crashed: general protection fault in fuse_atomic_open run #10: crashed: general protection fault in fuse_atomic_open run #11: crashed: general protection fault in fuse_atomic_open run #12: crashed: general protection fault in fuse_atomic_open run #13: crashed: general protection fault in fuse_atomic_open run #14: crashed: general protection fault in fuse_atomic_open run #15: crashed: general protection fault in fuse_atomic_open run #16: crashed: general protection fault in fuse_atomic_open run #17: crashed: general protection fault in fuse_atomic_open run #18: boot failed: can't ssh into the instance run #19: boot failed: can't ssh into the instance representative crash: general protection fault in fuse_atomic_open, types: [UNKNOWN] check whether we can drop unnecessary instrumentation disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG KASAN], they are not needed testing commit 59b65efafe20d18e4d05e8b3f63445bc12cb2cda gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: b8ca32841886407b3fd3cc856953c78cd8d23d6e04e3de24e7d09db57a32a2ee all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in fuse_atomic_open representative crash: BUG: unable to handle kernel NULL pointer dereference in fuse_atomic_open, types: [UNKNOWN] the bug reproduces without the instrumentation disabling configs for [LEAK UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP HANG], they are not needed kconfig minimization: base=4789 full=6022 leaves diff=237 split chunks (needed=false): <237> split chunk #0 of len 237 into 5 parts testing without sub-chunk 1/5 disabling configs for [HANG LEAK UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP], they are not needed testing commit 59b65efafe20d18e4d05e8b3f63445bc12cb2cda gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: b4e4854bf19f32f82def92da9f3476e96edc69e464b2248bd1bc2d55d8fa146a all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in fuse_atomic_open representative crash: BUG: unable to handle kernel NULL pointer dereference in fuse_atomic_open, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [BUG KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit 59b65efafe20d18e4d05e8b3f63445bc12cb2cda gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: c0c7a840fa3085cfc748a40a9623b5a7a7e17e39df73ac192d23ba42f46cbcea all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in fuse_atomic_open representative crash: BUG: unable to handle kernel NULL pointer dereference in fuse_atomic_open, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [LEAK UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit 59b65efafe20d18e4d05e8b3f63445bc12cb2cda gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 2ba0309d9c3f81e3f5701865a755f4708ae693938d6b2f0aa33475109b11279c all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in fuse_atomic_open representative crash: BUG: unable to handle kernel NULL pointer dereference in fuse_atomic_open, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [BUG KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit 59b65efafe20d18e4d05e8b3f63445bc12cb2cda gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 1311d80b2d3a7df8f03b1a15874dda4c0bf9b759faf780448ef0557b9728f38b all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in fuse_atomic_open representative crash: BUG: unable to handle kernel NULL pointer dereference in fuse_atomic_open, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [LEAK UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit 59b65efafe20d18e4d05e8b3f63445bc12cb2cda gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 failed building 59b65efafe20d18e4d05e8b3f63445bc12cb2cda: net/socket.c:1109: undefined reference to `wext_handle_ioctl' net/socket.c:3378: undefined reference to `compat_wext_handle_ioctl' net/core/net-procfs.c:346: undefined reference to `wext_proc_exit' net/core/net-procfs.c:330: undefined reference to `wext_proc_init' minimized to 45 configs; suspects: [HID_ZEROPLUS USB_NET_MCS7830 USB_NET_NET1080 USB_NET_PLUSB USB_NET_RNDIS_HOST USB_NET_SMSC75XX USB_NET_SMSC95XX USB_NET_SR9700 USB_NET_SR9800 USB_NET_ZAURUS USB_OHCI_HCD USB_OHCI_HCD_PCI USB_OHCI_HCD_PLATFORM USB_OTG USB_OTG_FSM USB_PRINTER USB_SERIAL USB_SERIAL_FTDI_SIO USB_SERIAL_GENERIC USB_SERIAL_PL2303 USB_STORAGE_ALAUDA USB_STORAGE_CYPRESS_ATACB USB_STORAGE_DATAFAB USB_STORAGE_FREECOM USB_STORAGE_ISD200 USB_STORAGE_JUMPSHOT USB_STORAGE_KARMA USB_STORAGE_ONETOUCH USB_STORAGE_SDDR09 USB_STORAGE_SDDR55 USB_STORAGE_USBAT USB_TRANCEVIBRATOR USB_U_AUDIO USB_U_ETHER USB_U_SERIAL USB_WDM WLAN WLAN_VENDOR_ATH WLAN_VENDOR_ATMEL WLAN_VENDOR_BROADCOM WLAN_VENDOR_INTERSIL WLAN_VENDOR_MARVELL WLAN_VENDOR_MEDIATEK WLAN_VENDOR_MICROCHIP WLAN_VENDOR_RALINK WLAN_VENDOR_REALTEK WLAN_VENDOR_RSI WLAN_VENDOR_ZYDAS X86_X32 ZEROPLUS_FF] disabling configs for [UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing current HEAD a568188d538c556c8989ec62b3865cbfff8d6b3b testing commit a568188d538c556c8989ec62b3865cbfff8d6b3b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 01e14b62e30845b32811218c74809c30a3159415d01e82d6d9abc126a9e524a2 all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in fuse_atomic_open representative crash: BUG: unable to handle kernel NULL pointer dereference in fuse_atomic_open, types: [UNKNOWN] crash still not fixed/happens on the oldest tested release revisions tested: 7, total time: 44m38.602946973s (build: 16m54.404656148s, test: 26m11.871056779s) crash still not fixed or there were kernel test errors commit msg: Merge 746b363bef41 ("Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition") into android13-5.10-lts crash: BUG: unable to handle kernel NULL pointer dereference in fuse_atomic_open BUG: kernel NULL pointer dereference, address: 0000000000000039 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 10fcc4067 P4D 10fcc4067 PUD 10d47e067 PMD 0 Oops: 0000 [#1] PREEMPT SMP CPU: 1 PID: 355 Comm: syz-executor.0 Not tainted 5.10.194-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 RIP: 0010:fuse_atomic_open+0x4e/0x130 fs/fuse/dir.c:846 Code: 00 48 85 db 74 03 48 8b 1b 49 8b 85 50 03 00 00 a8 08 0f 85 d7 00 00 00 45 31 ff 41 f7 04 24 00 00 00 10 75 6d f6 c1 40 74 08 <49> 83 7c 24 30 00 74 1a 4c 89 fe 4c 89 f7 e8 cf 0d eb ff 48 83 c4 RSP: 0018:ffffc900005bfc90 EFLAGS: 00010202 RAX: 0000000000000009 RBX: ffff88810d6cec00 RCX: 0000000000008241 RDX: ffff8881015c4a00 RSI: 0000000000000001 RDI: ffff888110c5bb58 RBP: ffffc900005bfcc0 R08: 0000000000008000 R09: ffff8881111cb9f8 R10: ffff888100fca020 R11: 0000000000000000 R12: 0000000000000009 R13: ffff888110c5b800 R14: ffff8881011a0c80 R15: 0000000000000009 FS: 00007fdff92b16c0(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000039 CR3: 0000000111149000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: atomic_open fs/namei.c:3120 [inline] lookup_open fs/namei.c:3225 [inline] open_last_lookups fs/namei.c:3323 [inline] path_openat+0x6d2/0x10d0 fs/namei.c:3512 do_filp_open+0x9d/0x140 fs/namei.c:3542 do_sys_openat2+0x9c/0x210 fs/open.c:1217 do_sys_open fs/open.c:1233 [inline] __do_sys_creat fs/open.c:1307 [inline] __se_sys_creat fs/open.c:1301 [inline] __x64_sys_creat+0x46/0x60 fs/open.c:1301 do_syscall_64+0x32/0x80 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x61/0xc6 RIP: 0033:0x7fdff974fb29 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fdff92b10c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 RAX: ffffffffffffffda RBX: 00007fdff986f050 RCX: 00007fdff974fb29 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 RBP: 00007fdff979b47a R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000006e R14: 00007fdff986f050 R15: 00007ffe0aae0748 Modules linked in: CR2: 0000000000000039 ---[ end trace 02c69adde5631820 ]--- RIP: 0010:fuse_atomic_open+0x4e/0x130 fs/fuse/dir.c:846 Code: 00 48 85 db 74 03 48 8b 1b 49 8b 85 50 03 00 00 a8 08 0f 85 d7 00 00 00 45 31 ff 41 f7 04 24 00 00 00 10 75 6d f6 c1 40 74 08 <49> 83 7c 24 30 00 74 1a 4c 89 fe 4c 89 f7 e8 cf 0d eb ff 48 83 c4 RSP: 0018:ffffc900005bfc90 EFLAGS: 00010202 RAX: 0000000000000009 RBX: ffff88810d6cec00 RCX: 0000000000008241 RDX: ffff8881015c4a00 RSI: 0000000000000001 RDI: ffff888110c5bb58 RBP: ffffc900005bfcc0 R08: 0000000000008000 R09: ffff8881111cb9f8 R10: ffff888100fca020 R11: 0000000000000000 R12: 0000000000000009 R13: ffff888110c5b800 R14: ffff8881011a0c80 R15: 0000000000000009 FS: 00007fdff92b16c0(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000039 CR3: 0000000111149000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 48 85 add %cl,-0x7b(%rax) 3: db 74 03 48 (bad) 0x48(%rbx,%rax,1) 7: 8b 1b mov (%rbx),%ebx 9: 49 8b 85 50 03 00 00 mov 0x350(%r13),%rax 10: a8 08 test $0x8,%al 12: 0f 85 d7 00 00 00 jne 0xef 18: 45 31 ff xor %r15d,%r15d 1b: 41 f7 04 24 00 00 00 testl $0x10000000,(%r12) 22: 10 23: 75 6d jne 0x92 25: f6 c1 40 test $0x40,%cl 28: 74 08 je 0x32 * 2a: 49 83 7c 24 30 00 cmpq $0x0,0x30(%r12) <-- trapping instruction 30: 74 1a je 0x4c 32: 4c 89 fe mov %r15,%rsi 35: 4c 89 f7 mov %r14,%rdi 38: e8 cf 0d eb ff call 0xffeb0e0c 3d: 48 rex.W 3e: 83 .byte 0x83 3f: c4 .byte 0xc4