ci2 starts bisection 2024-04-01 04:06:42.139651591 +0000 UTC m=+183158.870969598 bisecting cause commit starting from fe46a7dd189e25604716c03576d05ac8a5209743 building syzkaller on 6baf506947ba27ed9ce775cf9351cb0886166083 ensuring issue is reproducible on original commit fe46a7dd189e25604716c03576d05ac8a5209743 testing commit fe46a7dd189e25604716c03576d05ac8a5209743 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 3d147d3fd8265fe5a9f8b91f691e51aae486b5f8de76366b7a99f455f095a2e9 all runs: crashed: UBSAN: array-index-out-of-bounds in jfs_readdir representative crash: UBSAN: array-index-out-of-bounds in jfs_readdir, types: [UBSAN] check whether we can drop unnecessary instrumentation disabling configs for [KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK BUG], they are not needed testing commit fe46a7dd189e25604716c03576d05ac8a5209743 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: db0272f07d1e8d35f24f7a25d4d5a41075f802ca287ce5a73baf46566af0c447 all runs: crashed: UBSAN: array-index-out-of-bounds in jfs_readdir representative crash: UBSAN: array-index-out-of-bounds in jfs_readdir, types: [UBSAN] the bug reproduces without the instrumentation disabling configs for [BUG KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed kconfig minimization: base=3932 full=7979 leaves diff=2024 split chunks (needed=false): <2024> split chunk #0 of len 2024 into 5 parts testing without sub-chunk 1/5 disabling configs for [BUG KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit fe46a7dd189e25604716c03576d05ac8a5209743 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: deabe2e1fed8bc626e6c1770eb2ddf36ebaafcddb8f1d68553fbbb7deb6a49ef all runs: crashed: UBSAN: array-index-out-of-bounds in jfs_readdir representative crash: UBSAN: array-index-out-of-bounds in jfs_readdir, types: [UBSAN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK BUG], they are not needed testing commit fe46a7dd189e25604716c03576d05ac8a5209743 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 194aaedbaa98ccd35d63803d7f7bbed8a0198b557288ce1661903d219b936bf4 all runs: crashed: UBSAN: array-index-out-of-bounds in jfs_readdir representative crash: UBSAN: array-index-out-of-bounds in jfs_readdir, types: [UBSAN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [HANG LEAK BUG KASAN LOCKDEP ATOMIC_SLEEP], they are not needed testing commit fe46a7dd189e25604716c03576d05ac8a5209743 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 976bce465a7ac4d1259194c737030faef8699a44c7554bfebb88e29dad5c3de3 all runs: OK false negative chance: 0.000 testing without sub-chunk 4/5 disabling configs for [LEAK BUG KASAN LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit fe46a7dd189e25604716c03576d05ac8a5209743 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 11284c2ada7c6ec8b6a848638db62beb51842b50b0fe1701f4fd7628b4311aa0 all runs: crashed: UBSAN: array-index-out-of-bounds in jfs_readdir representative crash: UBSAN: array-index-out-of-bounds in jfs_readdir, types: [UBSAN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [BUG KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit fe46a7dd189e25604716c03576d05ac8a5209743 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: d45209ddd877e76cabe04d1edf066d42ee41bc650a4aeb42bf8887a72e38f9a1 all runs: crashed: UBSAN: array-index-out-of-bounds in jfs_readdir representative crash: UBSAN: array-index-out-of-bounds in jfs_readdir, types: [UBSAN] the chunk can be dropped minimized to 405 configs; suspects: [AX25 BRIDGE BRIDGE_NETFILTER CAN CFG80211 CHECKPOINT_RESTORE DVB_CORE FB_CORE HAMRADIO HSR INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_USER_ACCESS INPUT_JOYSTICK INPUT_MOUSE IP6_NF_RAW IPV6_MULTIPLE_TABLES IP_NF_RAW IP_SET IP_VS IP_VS_IPV6 IP_VS_LBLC IP_VS_LBLCR IP_VS_LC IP_VS_MH IP_VS_NFCT IP_VS_NQ IP_VS_OVF IP_VS_PE_SIP IP_VS_PROTO_AH IP_VS_PROTO_AH_ESP IP_VS_PROTO_ESP IP_VS_PROTO_SCTP IP_VS_PROTO_UDP IP_VS_RR IP_VS_SED IP_VS_SH IP_VS_TWOS IP_VS_WLC IP_VS_WRR IRQ_BYPASS_MANAGER IRQ_POLL IR_IGORPLUGUSB IR_IGUANA IR_IMON IR_MCEUSB IR_REDRAT3 IR_STREAMZAP IR_TTUSBIR ISDN ISDN_CAPI_MIDDLEWARE JFFS2_CMODE_PRIORITY JFFS2_COMPRESSION_OPTIONS JFFS2_FS JFFS2_FS_POSIX_ACL JFFS2_FS_SECURITY JFFS2_FS_WRITEBUFFER JFFS2_FS_XATTR JFFS2_LZO JFFS2_RTIME JFFS2_RUBIN JFFS2_SUMMARY JFFS2_ZLIB JFS_DEBUG JFS_FS JFS_POSIX_ACL JFS_SECURITY JOYSTICK_IFORCE JOYSTICK_IFORCE_USB JOYSTICK_XPAD JOYSTICK_XPAD_FF JOYSTICK_XPAD_LEDS KARMA_PARTITION KCOV KCOV_ENABLE_COMPARISONS KCOV_INSTRUMENT_ALL KEYS_REQUEST_CACHE KEY_DH_OPERATIONS KEY_NOTIFICATIONS KSM KVM KVM_AMD KVM_ASYNC_PF KVM_COMMON KVM_COMPAT KVM_GENERIC_DIRTYLOG_READ_PROTECT KVM_GENERIC_HARDWARE_ENABLING KVM_GENERIC_MEMORY_ATTRIBUTES KVM_GENERIC_MMU_NOTIFIER KVM_GENERIC_PRIVATE_MEM KVM_HYPERV KVM_MMIO KVM_PRIVATE_MEM KVM_PROVE_MMU KVM_SW_PROTECTED_VM KVM_VFIO KVM_XEN KVM_XFER_TO_GUEST_WORK L2TP L2TP_ETH L2TP_IP L2TP_V3 LAPB LAPBETHER LDM_PARTITION LEDS_TRIGGER_AUDIO LEGACY_PTYS LIBCRC32C LIBNVDIMM LINEAR_RANGES LLC LLC2 LOGIG940_FF LOGIRUMBLEPAD2_FF LOGO LOGO_LINUX_MONO LOGO_LINUX_VGA16 LPC_ICH LWTUNNEL LWTUNNEL_BPF LZ4HC_COMPRESS LZ4_COMPRESS MAC80211 MAC80211_HAS_RC MAC80211_HWSIM MAC80211_MESH MAC80211_RC_DEFAULT_MINSTREL MAC80211_RC_MINSTREL MACSEC MACVLAN MACVTAP MAC_PARTITION MAPPING_DIRTY_HELPERS MD_RAID0 MD_RAID1 MD_RAID10 MD_RAID456 MEDIA_ANALOG_TV_SUPPORT MEDIA_ATTACH MEDIA_CONTROLLER MEDIA_CONTROLLER_DVB MEDIA_DIGITAL_TV_SUPPORT MEDIA_RADIO_SUPPORT MEDIA_SDR_SUPPORT MEDIA_SUPPORT MEDIA_SUPPORT_FILTER MEDIA_TUNER MEDIA_TUNER_MSI001 MEMORY_BALLOON MEMORY_HOTPLUG MEMORY_HOTPLUG_DEFAULT_ONLINE MEMORY_ISOLATION MEMREGION MEMSTICK MEMSTICK_REALTEK_USB MEM_SOFT_DIRTY MFD_CORE MFD_SYSCON MHI_BUS MHI_WWAN_CTRL MHP_MEMMAP_ON_MEMORY MICROCHIP_PHY MINIX_FS MINIX_SUBPARTITION MISC_RTSX MISC_RTSX_USB MISDN MISDN_DSP MISDN_HFCUSB MISDN_L1OIP MITIGATION_RFDS MKISS MLX4_CORE MLX4_INFINIBAND MMC MMC_REALTEK_USB MMC_USHC MMC_VUB300 MMU_NOTIFIER MODULE_SRCVERSION_ALL MODVERSIONS MOST MOUSE_APPLETOUCH MOUSE_BCM5974 MOUSE_PS2 MOUSE_PS2_ALPS MOUSE_PS2_BYD MOUSE_PS2_CYPRESS MOUSE_PS2_FOCALTECH MOUSE_PS2_LIFEBOOK MOUSE_PS2_LOGIPS2PP MOUSE_PS2_SMBUS MOUSE_PS2_SYNAPTICS MOUSE_PS2_SYNAPTICS_SMBUS MOUSE_PS2_TRACKPOINT MOUSE_SYNAPTICS_USB MPLS MPLS_IPTUNNEL MPLS_ROUTING MPTCP MPTCP_IPV6 MRP MTD MTD_BLKDEVS MTD_BLOCK MTD_BLOCK2MTD MTD_CFI_I1 MTD_CFI_I2 MTD_MAP_BANK_WIDTH_1 MTD_MAP_BANK_WIDTH_2 MTD_MAP_BANK_WIDTH_4 MTD_MTDRAM MTD_PHRAM MTD_SLRAM MUSB_PIO_ONLY ND_BTT ND_CLAIM ND_PFN NETDEVSIM NETFILTER_ADVANCED NETFILTER_BPF_LINK NETFILTER_FAMILY_ARP NETFILTER_FAMILY_BRIDGE NETFILTER_NETLINK_ACCT NETFILTER_NETLINK_GLUE_CT NETFILTER_NETLINK_OSF NETFILTER_NETLINK_QUEUE NETFILTER_SYNPROXY NETFILTER_XTABLES_COMPAT NETFILTER_XT_CONNMARK NETFILTER_XT_MATCH_BPF NETFILTER_XT_MATCH_CGROUP NETFILTER_XT_MATCH_CLUSTER NETFILTER_XT_MATCH_COMMENT NETFILTER_XT_MATCH_CONNBYTES NETFILTER_XT_MATCH_CONNLABEL NETFILTER_XT_MATCH_CONNLIMIT NETFILTER_XT_MATCH_CONNMARK NETFILTER_XT_MATCH_CPU NETFILTER_XT_MATCH_DCCP NETFILTER_XT_MATCH_DEVGROUP NETFILTER_XT_MATCH_DSCP NETFILTER_XT_MATCH_ECN NETFILTER_XT_MATCH_ESP NETFILTER_XT_MATCH_HASHLIMIT NETFILTER_XT_MATCH_HELPER NETFILTER_XT_MATCH_HL NETFILTER_XT_MATCH_IPCOMP NETFILTER_XT_MATCH_IPRANGE NETFILTER_XT_MATCH_IPVS NETFILTER_XT_MATCH_L2TP NETFILTER_XT_MATCH_LENGTH NETFILTER_XT_MATCH_LIMIT NETFILTER_XT_MATCH_MAC NETFILTER_XT_MATCH_MARK NETFILTER_XT_MATCH_MULTIPORT NETFILTER_XT_MATCH_NFACCT NETFILTER_XT_MATCH_OSF NETFILTER_XT_MATCH_OWNER NETFILTER_XT_MATCH_PHYSDEV NETFILTER_XT_MATCH_PKTTYPE NETFILTER_XT_MATCH_QUOTA NETFILTER_XT_MATCH_RATEEST NETFILTER_XT_MATCH_REALM NETFILTER_XT_MATCH_RECENT NETFILTER_XT_MATCH_SCTP NETFILTER_XT_MATCH_SOCKET NETFILTER_XT_MATCH_STATISTIC NETFILTER_XT_MATCH_STRING NETFILTER_XT_MATCH_TCPMSS NETFILTER_XT_MATCH_TIME NETFILTER_XT_MATCH_U32 NETFILTER_XT_SET NETFILTER_XT_TARGET_AUDIT NETFILTER_XT_TARGET_CHECKSUM NETFILTER_XT_TARGET_CLASSIFY NETFILTER_XT_TARGET_CONNMARK NETFILTER_XT_TARGET_CT NETFILTER_XT_TARGET_DSCP NETFILTER_XT_TARGET_HL NETFILTER_XT_TARGET_HMARK NETFILTER_XT_TARGET_IDLETIMER NETFILTER_XT_TARGET_LED NETFILTER_XT_TARGET_MARK NETFILTER_XT_TARGET_NETMAP NETFILTER_XT_TARGET_NFQUEUE NETFILTER_XT_TARGET_NOTRACK NETFILTER_XT_TARGET_RATEEST NETFILTER_XT_TARGET_REDIRECT NETFILTER_XT_TARGET_TCPOPTSTRIP NETFILTER_XT_TARGET_TEE NETFILTER_XT_TARGET_TPROXY NETFILTER_XT_TARGET_TRACE NETLINK_DIAG NETROM NET_9P_RDMA NET_ACT_BPF NET_ACT_CONNMARK NET_ACT_CSUM NET_ACT_CT NET_ACT_CTINFO NET_ACT_GATE NET_ACT_IFE NET_ACT_MPLS NET_ACT_NAT NET_ACT_PEDIT NET_ACT_POLICE NET_ACT_SAMPLE NET_ACT_SIMP NET_ACT_SKBEDIT NET_ACT_SKBMOD NET_ACT_TUNNEL_KEY NET_ACT_VLAN NET_CLS_BASIC NET_CLS_BPF NET_CLS_FLOW NET_CLS_FLOWER NET_CLS_FW NET_CLS_MATCHALL NET_CLS_ROUTE4 NET_DEVLINK NET_DROP_MONITOR NET_DSA NET_DSA_TAG_BRCM NET_DSA_TAG_BRCM_COMMON NET_DSA_TAG_BRCM_PREPEND NET_DSA_TAG_MTK NET_DSA_TAG_QCA NET_DSA_TAG_RTL4_A NET_EMATCH_CANID NET_EMATCH_CMP NET_EMATCH_IPSET NET_EMATCH_IPT NET_EMATCH_META NET_EMATCH_NBYTE NET_EMATCH_TEXT NET_EMATCH_U32 NET_FC NET_FOU NET_FOU_IP_TUNNELS NET_IFE NET_IFE_SKBMARK NET_IFE_SKBPRIO NET_IFE_SKBTCINDEX NET_IPGRE NET_IPGRE_BROADCAST NET_IPGRE_DEMUX NET_IPIP NET_IPVTI NET_KEY NET_KEY_MIGRATE NET_L3_MASTER_DEV NET_MPLS_GSO NET_NCSI NET_NSH NET_REDIRECT NET_SCH_CAKE NET_SCH_CBS NET_SCH_CHOKE NET_SCH_CODEL NET_SCH_DRR NET_SCH_ETF NET_SCH_ETS NET_SCH_FQ NET_SCH_FQ_CODEL NET_SCH_FQ_PIE NET_SCH_GRED NET_SCH_HFSC NET_SCH_HHF NET_SCH_HTB NET_SCH_INGRESS NET_SCH_MQPRIO NET_SCH_MQPRIO_LIB NET_SCH_MULTIQ NET_SCH_NETEM NET_SCH_PIE NET_SCH_PLUG NET_SCH_PRIO NET_SCH_QFQ NET_SCH_RED NET_SCH_SFB NET_SCH_SFQ NET_SCH_SKBPRIO NET_SCH_TAPRIO NET_SCH_TBF NET_SCH_TEQL NET_SOCK_MSG NET_SWITCHDEV NET_TC_SKB_EXT NET_TEAM NET_TEAM_MODE_ACTIVEBACKUP NET_TEAM_MODE_BROADCAST NET_TEAM_MODE_LOADBALANCE NET_TEAM_MODE_RANDOM NET_TEAM_MODE_ROUNDROBIN NET_UDP_TUNNEL NET_VRF NFC NFC_DIGITAL NFC_FDP NFC_HCI NFC_MRVL NFC_MRVL_USB NFC_NCI NFC_NCI_UART NFC_PN533 NFC_PN533_USB NFC_PORT100 NFC_SHDLC NFC_SIM NFC_VIRTUAL_NCI NFSD NFSD_BLOCKLAYOUT NFSD_FLEXFILELAYOUT NFSD_PNFS NFSD_SCSILAYOUT NFSD_V3_ACL NFSD_V4 NFSD_V4_2_INTER_SSC NFSD_V4_SECURITY_LABEL NFS_FSCACHE NFS_V4_1 NFS_V4_2 NFS_V4_2_READ_PLUS NFS_V4_2_SSC_HELPER NFS_V4_SECURITY_LABEL NFT_BRIDGE_META NFT_BRIDGE_REJECT NFT_COMPAT NFT_CONNLIMIT NFT_CT NFT_DUP_IPV4 NFT_DUP_IPV6 NFT_DUP_NETDEV NFT_FIB NFT_FIB_INET NFT_FIB_IPV4 NFT_FIB_IPV6 NFT_FIB_NETDEV NFT_FLOW_OFFLOAD NFT_HASH NFT_LIMIT NFT_LOG NFT_MASQ NFT_NAT NFT_NUMGEN NFT_OSF NFT_QUEUE NFT_QUOTA NFT_REDIR NFT_REJECT NFT_REJECT_INET NFT_REJECT_IPV4 NFT_REJECT_IPV6 NFT_REJECT_NETDEV NFT_SOCKET NFT_SYNPROXY NFT_TPROXY NFT_TUNNEL NFT_XFRM NF_CONNTRACK_AMANDA NF_CONNTRACK_BRIDGE NF_CONNTRACK_BROADCAST NF_CONNTRACK_EVENTS NF_CONNTRACK_H323 NF_CONNTRACK_LABELS NF_CONNTRACK_MARK NF_CONNTRACK_NETBIOS_NS NF_CONNTRACK_OVS NF_CONNTRACK_PPTP NF_CONNTRACK_SANE NF_CONNTRACK_TFTP NF_CONNTRACK_TIMEOUT NF_CONNTRACK_TIMESTAMP NF_CONNTRACK_ZONES NF_CT_NETLINK_HELPER NF_CT_NETLINK_TIMEOUT NF_CT_PROTO_DCCP NF_CT_PROTO_GRE NF_CT_PROTO_SCTP NF_CT_PROTO_UDPLITE NF_DUP_IPV4 NF_DUP_IPV6 NF_DUP_NETDEV NF_FLOW_TABLE NF_FLOW_TABLE_INET NF_NAT_AMANDA NF_NAT_H323 NF_NAT_OVS NF_NAT_PPTP NF_NAT_REDIRECT NF_TABLES NF_TABLES_BRIDGE NF_TABLES_INET NF_TABLES_IPV4 NF_TABLES_IPV6 NF_TABLES_NETDEV PARTITION_ADVANCED PSAMPLE RC_CORE RC_DEVICES RFKILL SPI USB_GADGET USB_MUSB_HDRC VIDEO_DEV WAN WATCH_QUEUE WIRELESS WLAN WWAN X25 X86_X32_ABI] disabling configs for [HANG LEAK BUG KASAN LOCKDEP ATOMIC_SLEEP], they are not needed picked [v6.8 v6.7 v6.6 v6.4 v6.2 v6.0 v5.18 v5.16 v5.13 v5.10 v5.7 v5.4 v5.1 v4.19] out of 31 release tags testing release v6.8 testing commit e8f897f4afef0031fe618a8e94127a0934896aba gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 9ee80bde165f381591445f8dc5d00117e6cad9fb7a9adfcebbad9e770db66f79 all runs: crashed: UBSAN: array-index-out-of-bounds in jfs_readdir representative crash: UBSAN: array-index-out-of-bounds in jfs_readdir, types: [UBSAN] testing release v6.7 testing commit 0dd3ee31125508cd67f7e7172247f05b7fd1753a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: d6430443deedc2b91e246c0d4c714d5b9d1bcc521caa9d7681d101b083a992a7 all runs: crashed: UBSAN: array-index-out-of-bounds in jfs_readdir representative crash: UBSAN: array-index-out-of-bounds in jfs_readdir, types: [UBSAN] testing release v6.6 testing commit ffc253263a1375a65fa6c9f62a893e9767fbebfa gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 1eea2db1abc4bfbc8890392c7ff5797cfb09109b6727302f680339ee6f078906 all runs: crashed: UBSAN: array-index-out-of-bounds in jfs_readdir representative crash: UBSAN: array-index-out-of-bounds in jfs_readdir, types: [UBSAN] testing release v6.4 testing commit 6995e2de6891c724bfeb2db33d7b87775f913ad1 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: a45878207af7149c1d44d319459c3f6af26af49813f534d1ee59bd857db802dd all runs: crashed: UBSAN: array-index-out-of-bounds in jfs_readdir representative crash: UBSAN: array-index-out-of-bounds in jfs_readdir, types: [UBSAN] testing release v6.2 testing commit c9c3395d5e3dcc6daee66c6908354d47bf98cb0c gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 8c88185f9d9a65e5448be9f277511cdf91d07b623eb2af1854fd04111b69ee8a all runs: crashed: UBSAN: array-index-out-of-bounds in jfs_readdir representative crash: UBSAN: array-index-out-of-bounds in jfs_readdir, types: [UBSAN] testing release v6.0 testing commit 4fe89d07dcc2804c8b562f6c7896a45643d34b2f gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: a01b1b7aa56ca3418a9ad536370dcaa0b0ef0603a0868a29d9b628e0443ca4b1 all runs: crashed: UBSAN: array-index-out-of-bounds in jfs_readdir representative crash: UBSAN: array-index-out-of-bounds in jfs_readdir, types: [UBSAN] testing release v5.18 testing commit 4b0986a3613c92f4ec1bdc7f60ec66fea135991f gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: f5c2229f7ad2e7dbf43808f400c716aa3b22818c276304d59c4abcfe610f2379 all runs: crashed: UBSAN: array-index-out-of-bounds in jfs_readdir representative crash: UBSAN: array-index-out-of-bounds in jfs_readdir, types: [UBSAN] testing release v5.16 testing commit df0cc57e057f18e44dac8e6c18aba47ab53202f9 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 66af1448eab9dcb107827aa2e6a4d27e5a50d158f37959f3640a4b7fe4fec01d all runs: boot failed: UBSAN: null-ptr-deref in corrupted unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 testing release v5.13 testing commit 62fb9874f5da54fdb243003b386128037319b219 gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 59942687b5599c6ec2df9b59195ac2a0e8a85dd761dd6b0099bf3a4101e55e1c all runs: boot failed: invalid opcode in public_key_verify_signature unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 testing release v5.10 testing commit 2c85ebc57b3e1817b6ce1a6b703928e113a90442 gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 7b39cf41bb25e7043e9c09822bbc1e929ed797847f58113375fdfa2075996b17 all runs: boot failed: invalid opcode in public_key_verify_signature unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 testing release v5.7 testing commit 3d77e6a8804abcc0504c904bd6e5cdf3a5cf8162 gcc compiler: gcc version 8.4.1 20210217 (GCC), GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 1dcde76c65b28a5fc9f78522d49fa8b4e86b9dcd80193579239017bc0c27d61c run #0: crashed: BUG: unable to handle kernel NULL pointer dereference in tomoyo_number_matches_group run #1: crashed: BUG: unable to handle kernel paging request in diWrite run #2: crashed: BUG: Bad page map run #3: crashed: BUG: unable to handle kernel paging request in diWrite run #4: crashed: BUG: unable to handle kernel NULL pointer dereference in xt_match_to_user run #5: crashed: BUG: unable to handle kernel NULL pointer dereference in tomoyo_number_matches_group run #6: crashed: BUG: Bad page map run #7: crashed: BUG: unable to handle kernel NULL pointer dereference in kernfs_find_ns run #8: crashed: invalid opcode in corrupted run #9: crashed: BUG: unable to handle kernel paging request in diWrite representative crash: BUG: unable to handle kernel NULL pointer dereference in tomoyo_number_matches_group, types: [UNKNOWN] testing release v5.4 testing commit 219d54332a09e8d8741c1e1982f5eae56099de85 gcc compiler: gcc version 8.4.1 20210217 (GCC) kernel signature: 52dd241e74185f1ef629287ed7f21e709ef57b27370196b105daba249ab0115a run #0: crashed: BUG: unable to handle kernel NULL pointer dereference in anon_vma_clone run #1: crashed: BUG: unable to handle kernel paging request in net_ctl_permissions run #2: crashed: BUG: unable to handle kernel paging request in diWrite run #3: crashed: BUG: Bad rss-counter state run #4: crashed: BUG: Bad page map run #5: crashed: BUG: unable to handle kernel paging request in alloc_vmap_area run #6: crashed: BUG: unable to handle kernel paging request in diWrite run #7: crashed: BUG: unable to handle kernel paging request in __follow_pte_pmd run #8: crashed: BUG: unable to handle kernel paging request in diWrite run #9: crashed: BUG: Bad page map representative crash: BUG: unable to handle kernel NULL pointer dereference in anon_vma_clone, types: [UNKNOWN] testing release v5.1 testing commit e93c9c99a629c61837d5a7fc2120cd2b6c70dbdd gcc compiler: gcc version 8.4.1 20210217 (GCC) kernel signature: 82e3d5ff3e3a5d81af575aeb5a02b87fb6921d0fa43899e1c07dfd7a9b281229 run #0: crashed: BUG: Bad page map run #1: crashed: kernel panic: Fatal exception run #2: crashed: BUG: unable to handle kernel NULL pointer dereference in xt_match_to_user run #3: crashed: BUG: unable to handle kernel paging request in key_put run #4: crashed: kernel panic: Fatal exception run #5: crashed: BUG: unable to handle kernel paging request in anon_vma_fork run #6: crashed: BUG: Bad page map run #7: crashed: BUG: unable to handle kernel NULL pointer dereference in __memcg_init_list_lru_node run #8: crashed: BUG: unable to handle kernel paging request in mempool_alloc_slab run #9: crashed: BUG: Bad rss-counter state representative crash: BUG: Bad page map, types: [UNKNOWN] testing release v4.19 testing commit 84df9525b0c27f3ebc2ebb1864fa62a97fdedb7d gcc compiler: gcc version 8.4.1 20210217 (GCC) kernel signature: 30388586eb03af4c3ee28b1dd3b0db46ecb0dedce825d8024b049103f18e17f6 run #0: crashed: BUG: unable to handle kernel paging request in new_inode_smack run #1: crashed: BUG: unable to handle kernel paging request in shmem_undo_range run #2: crashed: BUG: unable to handle kernel NULL pointer dereference in anon_vma_interval_tree_insert run #3: crashed: BUG: unable to handle kernel paging request in _do_fork run #4: crashed: BUG: Bad page map run #5: crashed: BUG: unable to handle kernel NULL pointer dereference in __free_pages run #6: crashed: BUG: unable to handle kernel paging request in txCommit run #7: crashed: BUG: unable to handle kernel paging request in unlink_anon_vmas run #8: crashed: BUG: unable to handle kernel paging request in __anon_vma_prepare run #9: crashed: BUG: Bad page map representative crash: BUG: unable to handle kernel paging request in new_inode_smack, types: [UNKNOWN] crash still not fixed/happens on the oldest tested release revisions tested: 21, total time: 3h36m53.033752156s (build: 1h38m20.988730536s, test: 1h49m17.887129652s) oldest tested release already had the bug or it had kernel test errors commit msg: Linux 4.19 crash: BUG: unable to handle kernel paging request in new_inode_smack ERROR: (device loop0): jfs_readdir: JFS:Dtree error: ino = 2, bn=0, index = 2 ERROR: (device loop0): jfs_readdir: JFS:Dtree error: ino = 2, bn=0, index = 3 ERROR: (device loop0): jfs_readdir: JFS:Dtree error: ino = 2, bn=0, index = 4 BUG: unable to handle kernel paging request at 0000000019ec74a6 PGD 0 P4D 0 Oops: 0000 [#1] SMP PTI CPU: 1 PID: 3104 Comm: syz-executor.0 Not tainted 4.19.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 RIP: 0010:freelist_dereference mm/slub.c:262 [inline] RIP: 0010:get_freepointer mm/slub.c:268 [inline] RIP: 0010:get_freepointer_safe mm/slub.c:282 [inline] RIP: 0010:slab_alloc_node mm/slub.c:2675 [inline] RIP: 0010:slab_alloc mm/slub.c:2714 [inline] RIP: 0010:kmem_cache_alloc+0x86/0x1e0 mm/slub.c:2719 Code: 65 4c 03 05 94 be dd 7e 49 83 78 10 00 4d 8b 20 0f 84 18 01 00 00 4d 85 e4 0f 84 0f 01 00 00 49 8b 39 41 8b 41 20 40 f6 c7 0f <49> 8b 1c 04 0f 85 49 01 00 00 48 8d 4a 01 4c 89 e0 65 48 0f c7 0f RSP: 0018:ffffc900012f7c48 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000fffffffe RDX: 0000000000002def RSI: 00000000000000b0 RDI: 0000000000026da0 RBP: ffffc900012f7c78 R08: ffff880237b26da0 R09: ffff8802336a56c0 R10: 0000000000000000 R11: ffff88022c9e9f48 R12: 0000000019ec74a6 R13: 0000000000608040 R14: ffffffff8146826b R15: ffff8802336a56c0 FS: 00007f6670f6f480(0000) GS:ffff880237b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000019ec74a6 CR3: 000000022b494000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: kmem_cache_zalloc include/linux/slab.h:697 [inline] new_inode_smack+0x1b/0x50 security/smack/smack_lsm.c:300 smack_inode_alloc_security+0x24/0x40 security/smack/smack_lsm.c:975 security_inode_alloc+0x2a/0x40 security/security.c:448 inode_init_always+0xf8/0x230 fs/inode.c:168 alloc_inode+0x2e/0x80 fs/inode.c:217 new_inode_pseudo+0xc/0x60 fs/inode.c:903 new_inode+0x14/0x30 fs/inode.c:932 __ext4_new_inode+0x12a/0x15b0 fs/ext4/ialloc.c:829 ext4_symlink+0x11e/0x400 fs/ext4/namei.c:3093 vfs_symlink+0xe6/0x170 fs/namei.c:4127 do_symlinkat+0xdd/0xf0 fs/namei.c:4154 __do_sys_symlinkat fs/namei.c:4168 [inline] __se_sys_symlinkat fs/namei.c:4165 [inline] __x64_sys_symlinkat+0x15/0x20 fs/namei.c:4165 do_syscall_64+0x69/0x170 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f6670023527 Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 0a 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fff74420998 EFLAGS: 00000202 ORIG_RAX: 000000000000010a RAX: ffffffffffffffda RBX: 00007fff74420a60 RCX: 00007f6670023527 RDX: 00007f6670070526 RSI: 00000000ffffff9c RDI: 00007fff74420a60 RBP: 0000000000000001 R08: 0000000000000017 R09: 00007fff744206e7 R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 Modules linked in: CR2: 0000000019ec74a6 ---[ end trace 59aac3baa4b09cbf ]--- RIP: 0010:freelist_dereference mm/slub.c:262 [inline] RIP: 0010:get_freepointer mm/slub.c:268 [inline] RIP: 0010:get_freepointer_safe mm/slub.c:282 [inline] RIP: 0010:slab_alloc_node mm/slub.c:2675 [inline] RIP: 0010:slab_alloc mm/slub.c:2714 [inline] RIP: 0010:kmem_cache_alloc+0x86/0x1e0 mm/slub.c:2719 Code: 65 4c 03 05 94 be dd 7e 49 83 78 10 00 4d 8b 20 0f 84 18 01 00 00 4d 85 e4 0f 84 0f 01 00 00 49 8b 39 41 8b 41 20 40 f6 c7 0f <49> 8b 1c 04 0f 85 49 01 00 00 48 8d 4a 01 4c 89 e0 65 48 0f c7 0f RSP: 0018:ffffc900012f7c48 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000fffffffe RDX: 0000000000002def RSI: 00000000000000b0 RDI: 0000000000026da0 RBP: ffffc900012f7c78 R08: ffff880237b26da0 R09: ffff8802336a56c0 R10: 0000000000000000 R11: ffff88022c9e9f48 R12: 0000000019ec74a6 R13: 0000000000608040 R14: ffffffff8146826b R15: ffff8802336a56c0 FS: 00007f6670f6f480(0000) GS:ffff880237b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000019ec74a6 CR3: 000000022b494000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 65 4c 03 05 94 be dd add %gs:0x7eddbe94(%rip),%r8 # 0x7eddbe9c 7: 7e 8: 49 83 78 10 00 cmpq $0x0,0x10(%r8) d: 4d 8b 20 mov (%r8),%r12 10: 0f 84 18 01 00 00 je 0x12e 16: 4d 85 e4 test %r12,%r12 19: 0f 84 0f 01 00 00 je 0x12e 1f: 49 8b 39 mov (%r9),%rdi 22: 41 8b 41 20 mov 0x20(%r9),%eax 26: 40 f6 c7 0f test $0xf,%dil * 2a: 49 8b 1c 04 mov (%r12,%rax,1),%rbx <-- trapping instruction 2e: 0f 85 49 01 00 00 jne 0x17d 34: 48 8d 4a 01 lea 0x1(%rdx),%rcx 38: 4c 89 e0 mov %r12,%rax 3b: 65 48 0f c7 0f cmpxchg16b %gs:(%rdi)