ci starts bisection 2023-02-20 08:55:23.537618944 +0000 UTC m=+142959.910673575 bisecting fixing commit since b357fd1c2afc1a3e1b73dc4574bb7ac0e3bd4193 building syzkaller on feb5635181eb12a6e3516172a3f5af06a3bc93e1 ensuring issue is reproducible on original commit b357fd1c2afc1a3e1b73dc4574bb7ac0e3bd4193 testing commit b357fd1c2afc1a3e1b73dc4574bb7ac0e3bd4193 gcc compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2 kernel signature: 98fee03415b350bfc1179c8a07b8f539b7619ff51bab5896111735b014c5d5a5 all runs: crashed: WARNING in ea_get testing current HEAD c9c3395d5e3dcc6daee66c6908354d47bf98cb0c testing commit c9c3395d5e3dcc6daee66c6908354d47bf98cb0c gcc compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2 kernel signature: 802690f7a9ff32ac4a2f461e69bfed953877c5a9d13f3e0d5b5e02fcfc51c76d all runs: crashed: WARNING in ea_get revisions tested: 2, total time: 22m25.342635946s (build: 15m13.514620271s, test: 6m6.315679849s) the crash still happens on HEAD commit msg: Linux 6.2 crash: WARNING in ea_get loop0: detected capacity change from 0 to 32768 ------------[ cut here ]------------ WARNING: CPU: 0 PID: 5594 at mm/page_alloc.c:5525 __alloc_pages+0x40e/0x5a0 mm/page_alloc.c:5525 Modules linked in: CPU: 0 PID: 5594 Comm: syz-executor.0 Not tainted 6.2.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 RIP: 0010:__alloc_pages+0x40e/0x5a0 mm/page_alloc.c:5525 Code: ff ff 00 0f 84 c3 fd ff ff 80 ce 01 e9 bb fd ff ff 83 fe 0a 0f 86 ce fc ff ff 80 3d 73 de 31 0b 00 75 09 c6 05 6a de 31 0b 01 <0f> 0b 45 31 f6 e9 52 fe ff ff 65 ff 05 c9 58 57 7e 48 c7 c0 80 af RSP: 0018:ffffc900052ef350 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 1ffff92000a5de6b RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000013 RDI: 0000000000000000 RBP: 0000000000040cc0 R08: 0000000000000001 R09: ffff888074a40000 R10: ffff888074a40018 R11: 0000000000000000 R12: 0000000000000013 R13: 0000000000000000 R14: 0000000000040cc0 R15: 0000000040b67000 FS: 00007f8ecb398700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000558864485028 CR3: 0000000024673000 CR4: 0000000000350ef0 Call Trace: __alloc_pages_node include/linux/gfp.h:237 [inline] alloc_pages_node include/linux/gfp.h:260 [inline] __kmalloc_large_node+0x85/0x160 mm/slab_common.c:1113 __do_kmalloc_node mm/slab_common.c:956 [inline] __kmalloc+0x8d/0xc0 mm/slab_common.c:981 kmalloc include/linux/slab.h:584 [inline] ea_get+0x5a9/0x1440 fs/jfs/xattr.c:487 __jfs_getxattr+0xba/0x330 fs/jfs/xattr.c:807 jfs_xattr_get+0x27/0x30 fs/jfs/xattr.c:931 vfs_getxattr_alloc+0x164/0x2c0 fs/xattr.c:395 ima_read_xattr+0x22/0x30 security/integrity/ima/ima_appraise.c:228 process_measurement+0x81d/0x13e0 security/integrity/ima/ima_main.c:320 ima_file_check+0xa7/0x100 security/integrity/ima/ima_main.c:519 do_open fs/namei.c:3559 [inline] path_openat+0x10a8/0x2290 fs/namei.c:3714 do_filp_open+0x1a5/0x3d0 fs/namei.c:3741 do_sys_openat2+0x11e/0x3f0 fs/open.c:1310 do_sys_open fs/open.c:1326 [inline] __do_sys_openat fs/open.c:1342 [inline] __se_sys_openat fs/open.c:1337 [inline] __x64_sys_openat+0x11b/0x1d0 fs/open.c:1337 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f8eca28a5a9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f8ecb398168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007f8eca3abf80 RCX: 00007f8eca28a5a9 RDX: 0000000000161842 RSI: 000000002000c380 RDI: ffffffffffffff9c RBP: 00007f8eca2e5580 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd1436bcaf R14: 00007f8ecb398300 R15: 0000000000022000