ci starts bisection 2024-02-17 00:33:26.718207547 +0000 UTC m=+70352.310535909 bisecting fixing commit since bfa3037d828050896ae52f6467b6ca2489ae6fb1 building syzkaller on 4547cdf9e497f833628b7b0660809b3247a7411e ensuring issue is reproducible on original commit bfa3037d828050896ae52f6467b6ca2489ae6fb1 testing commit bfa3037d828050896ae52f6467b6ca2489ae6fb1 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: c0d48d053026681d54c32bfde78942f4d46c204af528dcd3026edea257962d81 run #0: crashed: general protection fault in mm_update_next_owner run #1: crashed: general protection fault in __hrtimer_run_queues run #2: crashed: KASAN: stack-out-of-bounds Read in timerqueue_del run #3: crashed: kernel BUG in corrupted run #4: crashed: general protection fault in update_curr run #5: crashed: KASAN: vmalloc-out-of-bounds Read in __rseq_handle_notify_resume run #6: crashed: kernel BUG in __phys_addr run #7: crashed: BUG: unable to handle kernel paging request in corrupted run #8: basic kernel testing failed: failed to copy binary to VM: failed to run ["scp" "-P" "22" "-F" "/dev/null" "-o" "UserKnownHostsFile=/dev/null" "-o" "BatchMode=yes" "-o" "IdentitiesOnly=yes" "-o" "StrictHostKeyChecking=no" "-o" "ConnectTimeout=10" "-v" "/tmp/syz-executor3251008505" "root@10.128.1.69:./syz-executor3251008505"]: exit status 255 Executing: program /usr/bin/ssh host 10.128.1.69, user root, command sftp OpenSSH_9.2p1 Debian-2+deb12u1, OpenSSL 3.0.11 19 Sep 2023 debug1: Reading configuration data /dev/null debug1: Connecting to 10.128.1.69 [10.128.1.69] port 22. debug1: connect to address 10.128.1.69 port 22: Connection timed out ssh: connect to host 10.128.1.69 port 22: Connection timed out scp: Connection closed run #9: crashed: general protection fault in psi_group_change run #10: crashed: BUG: unable to handle kernel paging request in corrupted run #11: crashed: general protection fault in invalidate_inode_buffers run #12: crashed: possible deadlock in console_flush_all run #13: crashed: general protection fault in __run_timers run #14: crashed: KASAN: wild-memory-access Write in filemap_get_entry run #15: crashed: general protection fault in pwq_activate_inactive_work run #16: crashed: kernel BUG in corrupted run #17: crashed: general protection fault in __hrtimer_run_queues run #18: crashed: general protection fault in corrupted run #19: basic kernel testing failed: failed to copy binary to VM: failed to run ["scp" "-P" "22" "-F" "/dev/null" "-o" "UserKnownHostsFile=/dev/null" "-o" "BatchMode=yes" "-o" "IdentitiesOnly=yes" "-o" "StrictHostKeyChecking=no" "-o" "ConnectTimeout=10" "-v" "/tmp/syz-executor468723575" "root@10.128.15.194:./syz-executor468723575"]: exit status 255 Executing: program /usr/bin/ssh host 10.128.15.194, user root, command sftp OpenSSH_9.2p1 Debian-2+deb12u1, OpenSSL 3.0.11 19 Sep 2023 debug1: Reading configuration data /dev/null debug1: Connecting to 10.128.15.194 [10.128.15.194] port 22. debug1: connect to address 10.128.15.194 port 22: Connection timed out ssh: connect to host 10.128.15.194 port 22: Connection timed out scp: Connection closed representative crash: general protection fault in mm_update_next_owner, types: [UNKNOWN KASAN] check whether we can drop unnecessary instrumentation disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit bfa3037d828050896ae52f6467b6ca2489ae6fb1 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 4fc193a73137f6d0ac239dfc465276c8f2bd209e34f1c438079309b9c3dcb284 run #0: crashed: general protection fault in __hrtimer_run_queues run #1: crashed: general protection fault in ext4_handle_error run #2: crashed: general protection fault in io_serial_in run #3: crashed: general protection fault in ext4_mark_iloc_dirty run #4: crashed: KASAN: wild-memory-access Write in ext4_update_super run #5: OK run #6: crashed: general protection fault in __switch_to run #7: OK run #8: OK run #9: OK representative crash: general protection fault in __hrtimer_run_queues, types: [UNKNOWN] the bug reproduces without the instrumentation disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG LOCKDEP], they are not needed kconfig minimization: base=3941 full=7652 leaves diff=2004 split chunks (needed=false): <2004> split chunk #0 of len 2004 into 5 parts testing without sub-chunk 1/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit bfa3037d828050896ae52f6467b6ca2489ae6fb1 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: ac27b4b09ae40a955e52a2b9cdfeb937407631b30e72d46e6d68bf2e302ff08f run #0: crashed: BUG: unable to handle kernel paging request in mtree_range_walk run #1: crashed: general protection fault in apparmor_file_open run #2: crashed: general protection fault in __hrtimer_run_queues run #3: crashed: general protection fault in debug_check_no_obj_freed run #4: crashed: general protection fault in __d_alloc run #5: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #6: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #7: crashed: BUG: using __this_cpu_read() in preemptible code in corrupted run #8: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #9: OK representative crash: BUG: unable to handle kernel paging request in mtree_range_walk, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit bfa3037d828050896ae52f6467b6ca2489ae6fb1 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 1bae615dd10eee5cadd0b51cbd484e0b1e32766fd4a24409e536179948b6e39f run #0: crashed: general protection fault in __hrtimer_run_queues run #1: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #2: crashed: general protection fault in pid_task run #3: crashed: general protection fault in __x86_return_thunk run #4: crashed: general protection fault in corrupted run #5: crashed: go runtime error run #6: crashed: general protection fault in lock_mm_and_find_vma run #7: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #8: OK run #9: OK representative crash: general protection fault in __hrtimer_run_queues, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit bfa3037d828050896ae52f6467b6ca2489ae6fb1 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 35b3b784d5774ecf6554579ebc4ffd3acaac3d96687a66e45daf2d4184ba0a98 run #0: crashed: BUG: unable to handle kernel NULL pointer dereference in rcu_core run #1: crashed: general protection fault in lookup_object_or_alloc run #2: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #3: OK run #4: OK run #5: OK run #6: OK run #7: OK run #8: OK run #9: OK representative crash: BUG: unable to handle kernel NULL pointer dereference in rcu_core, types: [UNKNOWN] testing without sub-chunk 4/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit bfa3037d828050896ae52f6467b6ca2489ae6fb1 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 751585809084e1ce7d36ba55fac7e6772ecd57ea9b9dc0b39ca854a4652d52b5 run #0: crashed: general protection fault in unlink_anon_vmas run #1: crashed: invalid opcode in __phys_addr run #2: crashed: KFENCE: invalid read in ext4_ext_remove_space run #3: crashed: invalid opcode in __phys_addr run #4: crashed: KASAN: wild-memory-access Write in filemap_get_entry run #5: crashed: invalid opcode in __phys_addr run #6: crashed: invalid opcode in __phys_addr run #7: crashed: KASAN: stack-out-of-bounds Read in timerqueue_del run #8: crashed: general protection fault in debug_check_no_obj_freed run #9: crashed: general protection fault in ext4_inode_table run #10: crashed: KASAN: wild-memory-access Write in filemap_get_entry run #11: crashed: KASAN: wild-memory-access Read in fsnotify_perm run #12: crashed: general protection fault in __x86_return_thunk run #13: crashed: general protection fault in __x86_return_thunk run #14: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #15: crashed: invalid opcode in radix_tree_insert run #16: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #17: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #18: OK run #19: OK representative crash: general protection fault in unlink_anon_vmas, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit bfa3037d828050896ae52f6467b6ca2489ae6fb1 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 6b02400609cdb3b6e306b69a4f7f34ac006db99204af3f9cadbe534c5a912e8e run #0: crashed: general protection fault in mac80211_hwsim_netlink_notify run #1: crashed: general protection fault in __hrtimer_run_queues run #2: crashed: invalid opcode in __phys_addr run #3: crashed: stack segment fault in __stack_depot_save run #4: crashed: general protection fault in pick_next_task_fair run #5: crashed: general protection fault in update_curr run #6: crashed: general protection fault in cpuacct_account_field run #7: crashed: invalid opcode in __phys_addr run #8: crashed: KFENCE: invalid read in ext4_ext_remove_space run #9: crashed: general protection fault in __hrtimer_run_queues run #10: crashed: stack segment fault in __stack_depot_save run #11: crashed: BUG: unable to handle kernel paging request in corrupted run #12: crashed: KASAN: wild-memory-access Write in filemap_get_read_batch run #13: crashed: general protection fault in __cgroup_account_cputime run #14: crashed: general protection fault in drain_obj_stock run #15: crashed: general protection fault in inode_permission run #16: crashed: KFENCE: invalid read in ext4_ext_remove_space run #17: crashed: general protection fault in vma_interval_tree_insert run #18: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #19: OK representative crash: general protection fault in mac80211_hwsim_netlink_notify, types: [UNKNOWN] the chunk can be dropped minimized to 401 configs; suspects: [AX25 BRIDGE BRIDGE_NETFILTER CAN CFG80211 CHECKPOINT_RESTORE DVB_CORE FB FSCACHE HAMRADIO HSR IMA IMA_APPRAISE IMA_APPRAISE_MODSIG INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_USER_ACCESS INPUT_JOYSTICK INPUT_MOUSE INTEGRITY INTEGRITY_ASYMMETRIC_KEYS INTEGRITY_SIGNATURE IP6_NF_RAW IPV6_MULTIPLE_TABLES IP_NF_RAW IP_SET IP_VS IP_VS_NFCT IP_VS_NQ IP_VS_OVF IP_VS_PE_SIP IP_VS_PROTO_AH IP_VS_PROTO_AH_ESP IP_VS_PROTO_ESP IP_VS_PROTO_SCTP IP_VS_PROTO_UDP IP_VS_RR IP_VS_SED IP_VS_SH IP_VS_TWOS IP_VS_WLC IP_VS_WRR IRQ_BYPASS_MANAGER IRQ_POLL IR_IGORPLUGUSB IR_IGUANA IR_IMON IR_MCEUSB IR_REDRAT3 IR_STREAMZAP IR_TTUSBIR ISDN ISDN_CAPI_MIDDLEWARE JFFS2_CMODE_PRIORITY JFFS2_COMPRESSION_OPTIONS JFFS2_FS JFFS2_FS_POSIX_ACL JFFS2_FS_SECURITY JFFS2_FS_WRITEBUFFER JFFS2_FS_XATTR JFFS2_LZO JFFS2_RTIME JFFS2_RUBIN JFFS2_SUMMARY JFFS2_ZLIB JFS_DEBUG JFS_FS JFS_POSIX_ACL JFS_SECURITY JOYSTICK_IFORCE JOYSTICK_IFORCE_USB JOYSTICK_XPAD JOYSTICK_XPAD_FF JOYSTICK_XPAD_LEDS KARMA_PARTITION KCOV KCOV_ENABLE_COMPARISONS KCOV_INSTRUMENT_ALL KEYS_REQUEST_CACHE KEY_DH_OPERATIONS KEY_NOTIFICATIONS KSM KVM KVM_AMD KVM_ASYNC_PF KVM_COMPAT KVM_GENERIC_DIRTYLOG_READ_PROTECT KVM_GENERIC_HARDWARE_ENABLING KVM_MMIO KVM_VFIO KVM_XEN KVM_XFER_TO_GUEST_WORK L2TP L2TP_ETH L2TP_IP L2TP_V3 LAPB LAPBETHER LDM_PARTITION LEDS_TRIGGER_AUDIO LEGACY_PTYS LIBCRC32C LIBNVDIMM LINEAR_RANGES LLC LLC2 LOGIG940_FF LOGIRUMBLEPAD2_FF LOGO LOGO_LINUX_MONO LOGO_LINUX_VGA16 LPC_ICH LRU_GEN LRU_GEN_ENABLED LWTUNNEL LWTUNNEL_BPF LZ4HC_COMPRESS LZ4_COMPRESS MAC80211 MAC80211_DEBUGFS MAC80211_HAS_RC MAC80211_HWSIM MAC80211_MESH MAC80211_RC_DEFAULT_MINSTREL MAC80211_RC_MINSTREL MACSEC MACVLAN MACVTAP MAC_PARTITION MAPPING_DIRTY_HELPERS MD_LINEAR MD_MULTIPATH MD_RAID0 MD_RAID1 MD_RAID10 MD_RAID456 MEDIA_ANALOG_TV_SUPPORT MEDIA_ATTACH MEDIA_CONTROLLER MEDIA_CONTROLLER_DVB MEDIA_CONTROLLER_REQUEST_API MEDIA_DIGITAL_TV_SUPPORT MEDIA_RADIO_SUPPORT MEDIA_SDR_SUPPORT MEDIA_SUPPORT MEDIA_SUPPORT_FILTER MEDIA_TUNER MEDIA_TUNER_MSI001 MEMORY_BALLOON MEMORY_HOTPLUG MEMORY_HOTPLUG_DEFAULT_ONLINE MEMORY_ISOLATION MEMREGION MEMSTICK MEMSTICK_REALTEK_USB MEM_SOFT_DIRTY MFD_CORE MFD_SYSCON MHI_BUS MHI_WWAN_CTRL MHP_MEMMAP_ON_MEMORY MICROCHIP_PHY MICROCODE_AMD MICROCODE_INTEL MINIX_FS MINIX_SUBPARTITION MISC_RTSX MISC_RTSX_USB MISDN MISDN_DSP MISDN_HFCUSB MISDN_L1OIP MKISS MLX4_CORE MLX4_INFINIBAND MMC MMC_REALTEK_USB MMC_USHC MMC_VUB300 MMU_NOTIFIER MODULE_SIG_SHA1 MODULE_SRCVERSION_ALL MODVERSIONS MOST MOUSE_APPLETOUCH MOUSE_BCM5974 MOUSE_PS2 MOUSE_PS2_ALPS MOUSE_PS2_BYD MOUSE_PS2_CYPRESS MOUSE_PS2_FOCALTECH MOUSE_PS2_LIFEBOOK MOUSE_PS2_LOGIPS2PP MOUSE_PS2_SMBUS MOUSE_PS2_SYNAPTICS MOUSE_PS2_SYNAPTICS_SMBUS MOUSE_PS2_TRACKPOINT MOUSE_SYNAPTICS_USB MPLS MPLS_IPTUNNEL MPLS_ROUTING MPTCP MPTCP_IPV6 MRP MTD MTD_BLKDEVS MTD_BLOCK MTD_BLOCK2MTD MTD_CFI_I1 MTD_CFI_I2 MTD_MAP_BANK_WIDTH_1 MTD_MAP_BANK_WIDTH_2 MTD_MAP_BANK_WIDTH_4 MTD_MTDRAM MTD_PHRAM MTD_SLRAM MUSB_PIO_ONLY ND_BTT ND_CLAIM ND_PFN NETDEVSIM NETFILTER_ADVANCED NETFILTER_BPF_LINK NETFILTER_FAMILY_ARP NETFILTER_FAMILY_BRIDGE NETFILTER_NETLINK_ACCT NETFILTER_NETLINK_GLUE_CT NETFILTER_NETLINK_OSF NETFILTER_NETLINK_QUEUE NETFILTER_SYNPROXY NETFILTER_XTABLES_COMPAT NETFILTER_XT_CONNMARK NETFILTER_XT_MATCH_BPF NETFILTER_XT_MATCH_CGROUP NETFILTER_XT_MATCH_CLUSTER NETFILTER_XT_MATCH_COMMENT NETFILTER_XT_MATCH_CONNBYTES NETFILTER_XT_MATCH_CONNLABEL NETFILTER_XT_MATCH_CONNLIMIT NETFILTER_XT_MATCH_CONNMARK NETFILTER_XT_MATCH_CPU NETFILTER_XT_MATCH_DCCP NETFILTER_XT_MATCH_DEVGROUP NETFILTER_XT_MATCH_DSCP NETFILTER_XT_MATCH_ECN NETFILTER_XT_MATCH_ESP NETFILTER_XT_MATCH_HASHLIMIT NETFILTER_XT_MATCH_HELPER NETFILTER_XT_MATCH_HL NETFILTER_XT_MATCH_IPCOMP NETFILTER_XT_MATCH_IPRANGE NETFILTER_XT_MATCH_IPVS NETFILTER_XT_MATCH_L2TP NETFILTER_XT_MATCH_LENGTH NETFILTER_XT_MATCH_LIMIT NETFILTER_XT_MATCH_MAC NETFILTER_XT_MATCH_MARK NETFILTER_XT_MATCH_MULTIPORT NETFILTER_XT_MATCH_NFACCT NETFILTER_XT_MATCH_OSF NETFILTER_XT_MATCH_OWNER NETFILTER_XT_MATCH_PHYSDEV NETFILTER_XT_MATCH_PKTTYPE NETFILTER_XT_MATCH_QUOTA NETFILTER_XT_MATCH_RATEEST NETFILTER_XT_MATCH_REALM NETFILTER_XT_MATCH_RECENT NETFILTER_XT_MATCH_SCTP NETFILTER_XT_MATCH_SOCKET NETFILTER_XT_MATCH_STATISTIC NETFILTER_XT_MATCH_STRING NETFILTER_XT_MATCH_TCPMSS NETFILTER_XT_MATCH_TIME NETFILTER_XT_MATCH_U32 NETFILTER_XT_SET NETFILTER_XT_TARGET_AUDIT NETFILTER_XT_TARGET_CHECKSUM NETFILTER_XT_TARGET_CLASSIFY NETFILTER_XT_TARGET_CONNMARK NETFILTER_XT_TARGET_CT NETFILTER_XT_TARGET_DSCP NETFILTER_XT_TARGET_HL NETFILTER_XT_TARGET_HMARK NETFILTER_XT_TARGET_IDLETIMER NETFILTER_XT_TARGET_LED NETFILTER_XT_TARGET_MARK NETFILTER_XT_TARGET_NETMAP NETFILTER_XT_TARGET_NFQUEUE NETFILTER_XT_TARGET_NOTRACK NETFILTER_XT_TARGET_RATEEST NETFILTER_XT_TARGET_REDIRECT NETFILTER_XT_TARGET_TCPOPTSTRIP NETFILTER_XT_TARGET_TEE NETFILTER_XT_TARGET_TPROXY NETFILTER_XT_TARGET_TRACE NETLABEL NETLINK_DIAG NETROM NET_9P_RDMA NET_ACT_BPF NET_ACT_CONNMARK NET_ACT_CSUM NET_ACT_CT NET_ACT_CTINFO NET_ACT_GATE NET_ACT_IFE NET_ACT_IPT NET_ACT_MPLS NET_ACT_NAT NET_ACT_PEDIT NET_ACT_POLICE NET_ACT_SAMPLE NET_ACT_SIMP NET_ACT_SKBEDIT NET_ACT_SKBMOD NET_ACT_TUNNEL_KEY NET_ACT_VLAN NET_CLS_BASIC NET_CLS_BPF NET_CLS_FLOW NET_CLS_FLOWER NET_CLS_FW NET_CLS_MATCHALL NET_CLS_ROUTE4 NET_DEVLINK NET_DROP_MONITOR NET_DSA NET_DSA_TAG_BRCM NET_DSA_TAG_BRCM_COMMON NET_DSA_TAG_BRCM_PREPEND NET_DSA_TAG_MTK NET_DSA_TAG_QCA NET_DSA_TAG_RTL4_A NET_EMATCH_CANID NET_EMATCH_CMP NET_EMATCH_IPSET NET_EMATCH_IPT NET_EMATCH_META NET_EMATCH_NBYTE NET_EMATCH_TEXT NET_EMATCH_U32 NET_FC NET_FOU NET_FOU_IP_TUNNELS NET_IFE NET_IFE_SKBMARK NET_IFE_SKBPRIO NET_IFE_SKBTCINDEX NET_IPGRE NET_IPGRE_BROADCAST NET_IPGRE_DEMUX NET_IPIP NET_IPVTI NET_KEY NET_KEY_MIGRATE NET_L3_MASTER_DEV NET_MPLS_GSO NET_NCSI NET_NSH NET_REDIRECT NET_SCH_CAKE NET_SCH_CBS NET_SCH_CHOKE NET_SCH_CODEL NET_SCH_DRR NET_SCH_ETF NET_SCH_ETS NET_SCH_FQ NET_SCH_FQ_CODEL NET_SCH_FQ_PIE NET_SCH_GRED NET_SCH_HFSC NET_SCH_HHF NET_SCH_HTB NET_SCH_INGRESS NET_SCH_MQPRIO NET_SCH_MQPRIO_LIB NET_SCH_MULTIQ NET_SCH_NETEM NET_SCH_PIE NET_SCH_PLUG NET_SCH_PRIO NET_SCH_QFQ NET_SCH_RED NET_SCH_SFB NET_SCH_SFQ NET_SCH_SKBPRIO NET_SCH_TAPRIO NET_SCH_TBF NET_SCH_TEQL NET_SOCK_MSG NET_SWITCHDEV NET_TC_SKB_EXT NET_TEAM NET_TEAM_MODE_ACTIVEBACKUP NET_TEAM_MODE_BROADCAST NET_TEAM_MODE_LOADBALANCE NET_TEAM_MODE_RANDOM NET_TEAM_MODE_ROUNDROBIN NET_UDP_TUNNEL NET_VRF NFC NFC_DIGITAL NFC_FDP NFC_HCI NFC_MRVL NFC_MRVL_USB NFC_NCI NFC_NCI_UART NFC_PN533 NFC_PN533_USB NFC_PORT100 NFC_SHDLC NFC_SIM NFC_VIRTUAL_NCI NFSD NFSD_BLOCKLAYOUT NFSD_FLEXFILELAYOUT NFSD_PNFS NFSD_SCSILAYOUT NFSD_V3_ACL NFSD_V4 NFSD_V4_2_INTER_SSC NFSD_V4_SECURITY_LABEL NFS_FSCACHE NFS_V4_1 NFS_V4_2 NFS_V4_2_READ_PLUS NFS_V4_2_SSC_HELPER NFS_V4_SECURITY_LABEL NFT_BRIDGE_META NFT_BRIDGE_REJECT NFT_COMPAT NFT_CONNLIMIT NFT_CT NFT_DUP_IPV4 NFT_DUP_IPV6 NFT_DUP_NETDEV NFT_FIB NFT_FIB_INET NFT_FIB_IPV4 NFT_FIB_IPV6 NFT_FIB_NETDEV NFT_FLOW_OFFLOAD NFT_HASH NFT_LIMIT NFT_LOG NFT_MASQ NFT_NAT NFT_NUMGEN NFT_OSF NFT_QUEUE NFT_QUOTA NFT_REDIR NFT_REJECT NFT_REJECT_INET NFT_REJECT_IPV4 NFT_REJECT_IPV6 NFT_REJECT_NETDEV NFT_SOCKET NFT_SYNPROXY NFT_TPROXY NFT_TUNNEL NFT_XFRM NF_CONNTRACK_AMANDA NF_CONNTRACK_BRIDGE NF_CONNTRACK_BROADCAST NF_CONNTRACK_EVENTS NF_CONNTRACK_H323 NF_CONNTRACK_LABELS NF_CONNTRACK_MARK NF_CONNTRACK_NETBIOS_NS NF_CONNTRACK_OVS NF_CONNTRACK_PPTP NF_CONNTRACK_SANE NF_CONNTRACK_TFTP NF_CONNTRACK_TIMEOUT NF_CONNTRACK_TIMESTAMP NF_CONNTRACK_ZONES NF_CT_NETLINK_HELPER NF_CT_NETLINK_TIMEOUT NF_CT_PROTO_DCCP NF_CT_PROTO_GRE NF_CT_PROTO_SCTP NF_CT_PROTO_UDPLITE NF_DUP_IPV4 NF_DUP_IPV6 NF_DUP_NETDEV NF_FLOW_TABLE NF_FLOW_TABLE_INET NF_NAT_AMANDA NF_NAT_H323 NF_NAT_OVS NF_TABLES NF_TABLES_BRIDGE NF_TABLES_INET NF_TABLES_IPV4 NF_TABLES_IPV6 NF_TABLES_NETDEV PARTITION_ADVANCED PSAMPLE RC_CORE RC_DEVICES RFKILL SPI USB_GADGET USB_MUSB_HDRC VIDEO_DEV WAN WATCH_QUEUE WIRELESS WLAN WWAN X25 X86_X32_ABI] disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing current HEAD c1ca10ceffbb289ed02feaf005bc9ee6095b4507 testing commit c1ca10ceffbb289ed02feaf005bc9ee6095b4507 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e1bc18e7c2f89df6162d14a9f96fe9d33352e6f8dfc10a733c61e8c1a83ffb16 all runs: OK false negative chance: 0.000 # git bisect start c1ca10ceffbb289ed02feaf005bc9ee6095b4507 bfa3037d828050896ae52f6467b6ca2489ae6fb1 Bisecting: 24362 revisions left to test after this (roughly 15 steps) [7d461b291e65938f15f56fe58da2303b07578a76] Merge tag 'drm-next-2023-10-31-1' of git://anongit.freedesktop.org/drm/drm determine whether the revision contains the guilty commit revision bfa3037d828050896ae52f6467b6ca2489ae6fb1 crashed and is reachable testing commit 7d461b291e65938f15f56fe58da2303b07578a76 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 8f45fc51ca6bcb744ce01b5f05e48d8028aaf4139d405d3059fac880aba961bc run #0: crashed: general protection fault in fsnotify_perm run #1: crashed: invalid opcode in __phys_addr run #2: crashed: BUG: using __this_cpu_read() in preemptible code in corrupted run #3: crashed: invalid opcode in __phys_addr run #4: crashed: KASAN: wild-memory-access Read in d_set_mounted run #5: crashed: general protection fault in list_lru_del run #6: crashed: general protection fault in idr_get_free run #7: crashed: general protection fault in radix_tree_node_alloc run #8: crashed: general protection fault in ext4_inode_table run #9: crashed: BUG: unable to handle kernel paging request in __stack_depot_save run #10: crashed: general protection fault in __dentry_kill run #11: crashed: general protection fault in __d_alloc run #12: crashed: general protection fault in ext4_mb_mark_diskspace_used run #13: crashed: general protection fault in process_one_work run #14: crashed: invalid opcode in __phys_addr run #15: crashed: general protection fault in update_curr run #16: crashed: no output from test machine run #17: crashed: general protection fault in rcu_core run #18: crashed: no output from test machine run #19: crashed: KASAN: stack-out-of-bounds Read in do_coredump representative crash: general protection fault in fsnotify_perm, types: [UNKNOWN] # git bisect good 7d461b291e65938f15f56fe58da2303b07578a76 Bisecting: 12207 revisions left to test after this (roughly 14 steps) [78e727e58e54efca4c23863fbd9e16e9d2d83f81] cifs: update iface_last_update on each query-and-update determine whether the revision contains the guilty commit revision bfa3037d828050896ae52f6467b6ca2489ae6fb1 crashed and is reachable testing commit 78e727e58e54efca4c23863fbd9e16e9d2d83f81 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 4e0575f41b4adcca74ed2942370f62190323a11bb096d00de9051bb1d229e68b all runs: OK false negative chance: 0.000 # git bisect bad 78e727e58e54efca4c23863fbd9e16e9d2d83f81 Bisecting: 6129 revisions left to test after this (roughly 13 steps) [3af755a46881c32fecaecfdeaf3a8f0a869deca5] nvme: move nvme_stop_keep_alive() back to original position determine whether the revision contains the guilty commit revision bfa3037d828050896ae52f6467b6ca2489ae6fb1 crashed and is reachable testing commit 3af755a46881c32fecaecfdeaf3a8f0a869deca5 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 20141b5dcadbd18c4fbaf82870310426ffab908deab0c11e4ca3e5f558688387 run #0: crashed: general protection fault in inode_permission run #1: crashed: general protection fault in ext4_fc_track_range run #2: crashed: general protection fault in srso_safe_ret run #3: crashed: general protection fault in common_perm_cond run #4: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #5: crashed: general protection fault in cgroup_rstat_updated run #6: crashed: BUG: unable to handle kernel paging request in pid_task run #7: crashed: general protection fault in do_lock_mount run #8: crashed: invalid opcode in __phys_addr run #9: crashed: BUG: unable to handle kernel NULL pointer dereference in rcu_core run #10: crashed: invalid opcode in __phys_addr run #11: crashed: general protection fault in dqget run #12: crashed: go runtime error run #13: crashed: general protection fault in __d_alloc run #14: crashed: KASAN: user-memory-access Write in filemap_get_entry run #15: crashed: general protection fault in cpuacct_account_field run #16: crashed: general protection fault in srso_safe_ret run #17: crashed: general protection fault in corrupted run #18: crashed: BUG: unable to handle kernel paging request in v2_read_file_info run #19: crashed: general protection fault in srso_safe_ret representative crash: general protection fault in inode_permission, types: [UNKNOWN] # git bisect good 3af755a46881c32fecaecfdeaf3a8f0a869deca5 Bisecting: 3066 revisions left to test after this (roughly 12 steps) [9ba965dca3b13757e49f98bbea7cf48f07633ff9] btrfs: use page alloc/free wrappers for compression pages determine whether the revision contains the guilty commit revision bfa3037d828050896ae52f6467b6ca2489ae6fb1 crashed and is reachable testing commit 9ba965dca3b13757e49f98bbea7cf48f07633ff9 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 196f2274baa97b90b4614ccaf9035a3021ecd6691e717a3aa8a2a38caf44656a run #0: basic kernel testing failed: lost connection to test machine run #1: crashed: general protection fault in cgroup_rstat_updated run #2: crashed: general protection fault in common_perm_cond run #3: crashed: general protection fault in vma_interval_tree_remove run #4: crashed: KASAN: wild-memory-access Read in __radix_tree_delete run #5: crashed: general protection fault in srso_safe_ret run #6: crashed: BUG: unable to handle kernel paging request in kick_pool run #7: crashed: BUG: unable to handle kernel paging request in __stack_depot_save run #8: crashed: general protection fault in __cgroup_task_count run #9: crashed: general protection fault in fsnotify_perm run #10: crashed: general protection fault in __d_lookup_rcu run #11: crashed: invalid opcode in corrupted run #12: crashed: stack segment fault in __stack_depot_save run #13: crashed: general protection fault in pid_task run #14: crashed: general protection fault in pid_task run #15: crashed: invalid opcode in __phys_addr run #16: crashed: BUG: unable to handle kernel NULL pointer dereference in rcu_core run #17: crashed: general protection fault in __ext4_iget run #18: crashed: BUG: unable to handle kernel paging request in __stack_depot_save run #19: crashed: KASAN: wild-memory-access Write in filemap_get_entry representative crash: general protection fault in cgroup_rstat_updated, types: [UNKNOWN] # git bisect good 9ba965dca3b13757e49f98bbea7cf48f07633ff9 Bisecting: 1432 revisions left to test after this (roughly 11 steps) [fb46e22a9e3863e08aef8815df9f17d0f4b9aede] Merge tag 'mm-stable-2024-01-08-15-31' of git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm determine whether the revision contains the guilty commit revision 7d461b291e65938f15f56fe58da2303b07578a76 crashed and is reachable testing commit fb46e22a9e3863e08aef8815df9f17d0f4b9aede gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: becbc984a442693e508e9c47f994a3bb3cf01b2de910b45f19a33f242f759a7a all runs: OK false negative chance: 0.000 # git bisect bad fb46e22a9e3863e08aef8815df9f17d0f4b9aede Bisecting: 801 revisions left to test after this (roughly 10 steps) [1dee7f509db20402a25be94003f8f1ac3e17bdc1] Merge tag 'edac_updates_for_v6.8' of git://git.kernel.org/pub/scm/linux/kernel/git/ras/ras determine whether the revision contains the guilty commit revision bfa3037d828050896ae52f6467b6ca2489ae6fb1 crashed and is reachable testing commit 1dee7f509db20402a25be94003f8f1ac3e17bdc1 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: f571e88b2539afe5ac1e26a9c6e3127141fcdc97f935e6895a60ec617a59407b all runs: OK false negative chance: 0.000 # git bisect bad 1dee7f509db20402a25be94003f8f1ac3e17bdc1 Bisecting: 412 revisions left to test after this (roughly 9 steps) [a0652eb205b7ac13429d63bcc42806115d393632] Merge tag 'char-misc-6.7-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/char-misc determine whether the revision contains the guilty commit revision bfa3037d828050896ae52f6467b6ca2489ae6fb1 crashed and is reachable testing commit a0652eb205b7ac13429d63bcc42806115d393632 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 836ef93d23935b2fe1e22337e281897c0a68c2334170419ea1d97afdb2ea403f run #0: crashed: invalid opcode in corrupted run #1: crashed: KASAN: user-memory-access Read in mpage_process_page_bufs run #2: crashed: BUG: unable to handle kernel paging request in __stack_depot_save run #3: crashed: BUG: unable to handle kernel paging request in dquot_add_space run #4: crashed: general protection fault in __count_memcg_events run #5: crashed: invalid opcode in __phys_addr run #6: crashed: invalid opcode in __phys_addr run #7: crashed: general protection fault in mac80211_hwsim_tx_frame_no_nl run #8: crashed: KASAN: wild-memory-access Write in xas_set_mark run #9: crashed: general protection fault in __hrtimer_run_queues run #10: crashed: BUG: unable to handle kernel paging request in __stack_depot_save run #11: crashed: KASAN: wild-memory-access Read in __radix_tree_delete run #12: crashed: invalid opcode in __phys_addr run #13: crashed: invalid opcode in __phys_addr run #14: crashed: general protection fault in __d_lookup run #15: crashed: general protection fault in ext4_superblock_csum_set run #16: crashed: no output from test machine run #17: crashed: no output from test machine run #18: crashed: general protection fault in debug_check_no_obj_freed run #19: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space representative crash: invalid opcode in corrupted, types: [UNKNOWN] # git bisect good a0652eb205b7ac13429d63bcc42806115d393632 Bisecting: 206 revisions left to test after this (roughly 8 steps) [6d0dc8559c847e2dcd66c5dd93dbab3d3d887ff5] Merge tag 'soc-fixes-6.7-3a' of git://git.kernel.org/pub/scm/linux/kernel/git/soc/soc determine whether the revision contains the guilty commit revision 3af755a46881c32fecaecfdeaf3a8f0a869deca5 crashed and is reachable testing commit 6d0dc8559c847e2dcd66c5dd93dbab3d3d887ff5 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e1f64ebf064d136abfa24737757e7ccc68e6e8bd797e149f1c06ee703038d325 run #0: crashed: general protection fault in __find_rr_leaf run #1: crashed: stack segment fault in __stack_depot_save run #2: crashed: general protection fault in locks_remove_posix run #3: crashed: KASAN: wild-memory-access Write in filemap_get_folios_tag run #4: crashed: invalid opcode in __phys_addr run #5: crashed: invalid opcode in corrupted run #6: crashed: invalid opcode in corrupted run #7: crashed: go runtime error run #8: crashed: general protection fault in ext4_alloc_inode run #9: crashed: BUG: unable to handle kernel paging request in shmem_file_write_iter run #10: crashed: general protection fault in corrupted run #11: crashed: general protection fault in update_curr run #12: crashed: general protection fault in common_perm_cond run #13: crashed: general protection fault in srso_safe_ret run #14: crashed: general protection fault in pid_task run #15: crashed: KFENCE: invalid read in ext4_ext_remove_space run #16: crashed: general protection fault in srso_safe_ret run #17: crashed: BUG: unable to handle kernel paging request in ext4_mb_new_blocks run #18: crashed: general protection fault in anon_vma_interval_tree_remove run #19: crashed: general protection fault in __run_timers representative crash: general protection fault in __find_rr_leaf, types: [UNKNOWN] # git bisect good 6d0dc8559c847e2dcd66c5dd93dbab3d3d887ff5 Bisecting: 91 revisions left to test after this (roughly 7 steps) [3f6984e7301f4a37285cc5962f97c83c7c3b8239] Merge tag 'vfs-6.8.super' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs determine whether the revision contains the guilty commit revision 7d461b291e65938f15f56fe58da2303b07578a76 crashed and is reachable testing commit 3f6984e7301f4a37285cc5962f97c83c7c3b8239 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 8358ef321060362adb5b2d8327d6035bf44db28e88e0e7e7e78861deb65ec47a run #0: crashed: no output from test machine run #1: OK run #2: OK run #3: OK run #4: OK run #5: OK run #6: OK run #7: OK run #8: OK run #9: OK run #10: OK run #11: OK run #12: OK run #13: OK run #14: OK run #15: OK run #16: OK run #17: OK run #18: OK run #19: OK representative crash: no output from test machine, types: [UNKNOWN] # git bisect good 3f6984e7301f4a37285cc5962f97c83c7c3b8239 Bisecting: 48 revisions left to test after this (roughly 6 steps) [bb93c5ed457fe76597c14717eb994fc5aef22716] Merge tag 'vfs-6.8.rw' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs determine whether the revision contains the guilty commit revision 6d0dc8559c847e2dcd66c5dd93dbab3d3d887ff5 crashed and is reachable testing commit bb93c5ed457fe76597c14717eb994fc5aef22716 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 34490a23804416a5d62fd0808ef0815ef25fcb10614cfcfff876c38b6ca3fd8c all runs: OK false negative chance: 0.000 # git bisect bad bb93c5ed457fe76597c14717eb994fc5aef22716 Bisecting: 21 revisions left to test after this (roughly 5 steps) [0f292086c22b43202daffc14b585d3b54b9a1206] splice: return type ssize_t from all helpers determine whether the revision contains the guilty commit revision 7d461b291e65938f15f56fe58da2303b07578a76 crashed and is reachable testing commit 0f292086c22b43202daffc14b585d3b54b9a1206 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 961a52ca38ab1aba834c936f19dbcfbe9251b1de5be1181fb8516b5a4006860b run #0: crashed: general protection fault in fsnotify_perm run #1: crashed: general protection fault in locks_remove_posix run #2: crashed: general protection fault in __count_memcg_events run #3: crashed: BUG: unable to handle kernel paging request in ext4_es_lookup_extent run #4: crashed: general protection fault in ext4_es_lookup_extent run #5: crashed: invalid opcode in corrupted run #6: crashed: BUG: using __this_cpu_read() in preemptible code in corrupted run #7: crashed: BUG: using __this_cpu_read() in preemptible code in corrupted run #8: crashed: KASAN: wild-memory-access Read in __radix_tree_delete run #9: crashed: invalid opcode in __phys_addr run #10: crashed: general protection fault in srso_safe_ret run #11: crashed: general protection fault in loop_queue_rq run #12: crashed: general protection fault in __d_lookup_rcu run #13: crashed: stack segment fault in __stack_depot_save run #14: crashed: general protection fault in ext4_sb_block_valid run #15: crashed: general protection fault in __mod_timer run #16: crashed: general protection fault in cgroup_rstat_updated run #17: crashed: no output from test machine run #18: crashed: no output from test machine run #19: crashed: BUG: spinlock bad magic in mark_buffer_dirty representative crash: general protection fault in fsnotify_perm, types: [UNKNOWN] # git bisect good 0f292086c22b43202daffc14b585d3b54b9a1206 Bisecting: 10 revisions left to test after this (roughly 4 steps) [8c9440fea77440772542d6dbcb5c36182495c164] Merge tag 'vfs-6.8.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs determine whether the revision contains the guilty commit revision 7d461b291e65938f15f56fe58da2303b07578a76 crashed and is reachable testing commit 8c9440fea77440772542d6dbcb5c36182495c164 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 2e26198ae583fe2354fa89cbc2befbd0461d11d2eb70be94f875aca25e374c7a all runs: OK false negative chance: 0.000 # git bisect bad 8c9440fea77440772542d6dbcb5c36182495c164 Bisecting: 5 revisions left to test after this (roughly 3 steps) [6971beb4ec52ad7b26f5b5eedf19d4963be7df1b] statmount: simplify numeric option retrieval determine whether the revision contains the guilty commit revision bfa3037d828050896ae52f6467b6ca2489ae6fb1 crashed and is reachable testing commit 6971beb4ec52ad7b26f5b5eedf19d4963be7df1b gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: ae8ad69456c3143bf97424698800cf33e54824da4e56590b7330b7dc7b691a7a run #0: crashed: general protection fault in locks_remove_posix run #1: crashed: BUG: unable to handle kernel paging request in ext4_mb_release run #2: crashed: general protection fault in inode_permission run #3: crashed: general protection fault in update_curr run #4: crashed: BUG: unable to handle kernel paging request in d_set_mounted run #5: crashed: general protection fault in __cgroup_account_cputime_field run #6: crashed: BUG: unable to handle kernel NULL pointer dereference in rcu_core run #7: crashed: go runtime error run #8: crashed: general protection fault in validate_mm run #9: crashed: general protection fault in corrupted run #10: crashed: general protection fault in __d_alloc run #11: crashed: general protection fault in cpuacct_account_field run #12: crashed: stack segment fault in __stack_depot_save run #13: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #14: crashed: general protection fault in update_curr run #15: crashed: general protection fault in locks_remove_posix run #16: crashed: invalid opcode in __phys_addr run #17: crashed: general protection fault in locks_remove_posix run #18: crashed: no output from test machine run #19: OK representative crash: general protection fault in locks_remove_posix, types: [UNKNOWN] # git bisect good 6971beb4ec52ad7b26f5b5eedf19d4963be7df1b Bisecting: 2 revisions left to test after this (roughly 2 steps) [d8b0f5465012538cc4bb10ddc4affadbab73465b] wire up syscalls for statmount/listmount determine whether the revision contains the guilty commit revision 7d461b291e65938f15f56fe58da2303b07578a76 crashed and is reachable testing commit d8b0f5465012538cc4bb10ddc4affadbab73465b gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 325965578e07d8dd8781c823f0172dd3257160059e61846e829fea86284592fd run #0: crashed: general protection fault in vma_interval_tree_remove run #1: crashed: KASAN: user-memory-access Read in __find_get_block run #2: crashed: general protection fault in cpuacct_charge run #3: crashed: BUG: unable to handle kernel paging request in __stack_depot_save run #4: crashed: KASAN: user-memory-access Read in __block_commit_write run #5: crashed: general protection fault in srso_safe_ret run #6: crashed: invalid opcode in __phys_addr run #7: crashed: BUG: unable to handle kernel paging request in __stack_depot_save run #8: crashed: general protection fault in may_delete run #9: crashed: general protection fault in locks_remove_posix run #10: crashed: general protection fault in locks_remove_posix run #11: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #12: crashed: invalid opcode in __phys_addr run #13: crashed: BUG: unable to handle kernel paging request in __stack_depot_save run #14: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #15: crashed: invalid opcode in __phys_addr run #16: crashed: general protection fault in srso_safe_ret run #17: crashed: BUG: unable to handle kernel paging request in evict_inodes run #18: crashed: general protection fault in filemap_get_entry run #19: crashed: BUG: unable to handle kernel NULL pointer dereference in rcu_core representative crash: general protection fault in vma_interval_tree_remove, types: [UNKNOWN] # git bisect good d8b0f5465012538cc4bb10ddc4affadbab73465b Bisecting: 0 revisions left to test after this (roughly 1 step) [5bd3cf8cbc8a286308ef3f40656659d5abc89995] add selftest for statmount/listmount determine whether the revision contains the guilty commit revision 7d461b291e65938f15f56fe58da2303b07578a76 crashed and is reachable testing commit 5bd3cf8cbc8a286308ef3f40656659d5abc89995 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 2a5a18acb458d9574ee91dedf1664ed5b9cf98892274e260b1a7ad529e2f6cdb run #0: crashed: general protection fault in ext4_fc_track_range run #1: crashed: invalid opcode in __phys_addr run #2: crashed: go runtime error run #3: crashed: invalid opcode in corrupted run #4: crashed: KASAN: user-memory-access Read in submit_bh_wbc run #5: crashed: general protection fault in srso_safe_ret run #6: crashed: general protection fault in radix_tree_node_alloc run #7: crashed: BUG: unable to handle kernel NULL pointer dereference in rcu_core run #8: crashed: general protection fault in __d_lookup run #9: crashed: general protection fault in find_task_by_vpid run #10: crashed: general protection fault in __dquot_alloc_space run #11: crashed: general protection fault in locks_remove_posix run #12: crashed: BUG: unable to handle kernel paging request in offset_readdir run #13: crashed: general protection fault in ip6_finish_output2 run #14: crashed: general protection fault in vfs_write run #15: crashed: KFENCE: invalid read in ext4_ext_remove_space run #16: crashed: general protection fault in pid_task run #17: crashed: invalid opcode in __phys_addr run #18: crashed: go runtime error run #19: crashed: BUG: unable to handle kernel NULL pointer dereference in rcu_core representative crash: general protection fault in ext4_fc_track_range, types: [UNKNOWN] # git bisect good 5bd3cf8cbc8a286308ef3f40656659d5abc89995 8c9440fea77440772542d6dbcb5c36182495c164 is the first bad commit commit 8c9440fea77440772542d6dbcb5c36182495c164 Merge: 3f6984e7301f 5bd3cf8cbc8a Author: Linus Torvalds Date: Mon Jan 8 10:57:34 2024 -0800 Merge tag 'vfs-6.8.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs Pull vfs mount updates from Christian Brauner: "This contains the work to retrieve detailed information about mounts via two new system calls. This is hopefully the beginning of the end of the saga that started with fsinfo() years ago. The LWN articles in [1] and [2] can serve as a summary so we can avoid rehashing everything here. At LSFMM in May 2022 we got into a room and agreed on what we want to do about fsinfo(). Basically, split it into pieces. This is the first part of that agreement. Specifically, it is concerned with retrieving information about mounts. So this only concerns the mount information retrieval, not the mount table change notification, or the extended filesystem specific mount option work. That is separate work. Currently mounts have a 32bit id. Mount ids are already in heavy use by libmount and other low-level userspace but they can't be relied upon because they're recycled very quickly. We agreed that mounts should carry a unique 64bit id by which they can be referenced directly. This is now implemented as part of this work. The new 64bit mount id is exposed in statx() through the new STATX_MNT_ID_UNIQUE flag. If the flag isn't raised the old mount id is returned. If it is raised and the kernel supports the new 64bit mount id the flag is raised in the result mask and the new 64bit mount id is returned. New and old mount ids do not overlap so they cannot be conflated. Two new system calls are introduced that operate on the 64bit mount id: statmount() and listmount(). A summary of the api and usage can be found on LWN as well (cf. [3]) but of course, I'll provide a summary here as well. Both system calls rely on struct mnt_id_req. Which is the request struct used to pass the 64bit mount id identifying the mount to operate on. It is extensible to allow for the addition of new parameters and for future use in other apis that make use of mount ids. statmount() mimicks the semantics of statx() and exposes a set flags that userspace may raise in mnt_id_req to request specific information to be retrieved. A statmount() call returns a struct statmount filled in with information about the requested mount. Supported requests are indicated by raising the request flag passed in struct mnt_id_req in the @mask argument in struct statmount. Currently we do support: - STATMOUNT_SB_BASIC: Basic filesystem info - STATMOUNT_MNT_BASIC Mount information (mount id, parent mount id, mount attributes etc) - STATMOUNT_PROPAGATE_FROM Propagation from what mount in current namespace - STATMOUNT_MNT_ROOT Path of the root of the mount (e.g., mount --bind /bla /mnt returns /bla) - STATMOUNT_MNT_POINT Path of the mount point (e.g., mount --bind /bla /mnt returns /mnt) - STATMOUNT_FS_TYPE Name of the filesystem type as the magic number isn't enough due to submounts The string options STATMOUNT_MNT_{ROOT,POINT} and STATMOUNT_FS_TYPE are appended to the end of the struct. Userspace can use the offsets in @fs_type, @mnt_root, and @mnt_point to reference those strings easily. The struct statmount reserves quite a bit of space currently for future extensibility. This isn't really a problem and if this bothers us we can just send a follow-up pull request during this cycle. listmount() is given a 64bit mount id via mnt_id_req just as statmount(). It takes a buffer and a size to return an array of the 64bit ids of the child mounts of the requested mount. Userspace can thus choose to either retrieve child mounts for a mount in batches or iterate through the child mounts. For most use-cases it will be sufficient to just leave space for a few child mounts. But for big mount tables having an iterator is really helpful. Iterating through a mount table works by setting @param in mnt_id_req to the mount id of the last child mount retrieved in the previous listmount() call" Link: https://lwn.net/Articles/934469 [1] Link: https://lwn.net/Articles/829212 [2] Link: https://lwn.net/Articles/950569 [3] * tag 'vfs-6.8.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs: add selftest for statmount/listmount fs: keep struct mnt_id_req extensible wire up syscalls for statmount/listmount add listmount(2) syscall statmount: simplify string option retrieval statmount: simplify numeric option retrieval add statmount(2) syscall namespace: extract show_path() helper mounts: keep list of mounts in an rbtree add unique mount ID arch/alpha/kernel/syscalls/syscall.tbl | 2 + arch/arm/tools/syscall.tbl | 2 + arch/arm64/include/asm/unistd32.h | 4 + arch/m68k/kernel/syscalls/syscall.tbl | 2 + arch/microblaze/kernel/syscalls/syscall.tbl | 2 + arch/mips/kernel/syscalls/syscall_n32.tbl | 2 + arch/mips/kernel/syscalls/syscall_n64.tbl | 2 + arch/mips/kernel/syscalls/syscall_o32.tbl | 2 + arch/parisc/kernel/syscalls/syscall.tbl | 2 + arch/powerpc/kernel/syscalls/syscall.tbl | 2 + arch/s390/kernel/syscalls/syscall.tbl | 2 + arch/sh/kernel/syscalls/syscall.tbl | 2 + arch/sparc/kernel/syscalls/syscall.tbl | 2 + arch/x86/entry/syscalls/syscall_32.tbl | 2 + arch/x86/entry/syscalls/syscall_64.tbl | 2 + arch/xtensa/kernel/syscalls/syscall.tbl | 2 + fs/internal.h | 2 + fs/mount.h | 27 +- fs/namespace.c | 627 +++++++++++++++++---- fs/pnode.c | 2 +- fs/proc_namespace.c | 13 +- fs/stat.c | 9 +- include/linux/mount.h | 5 +- include/linux/syscalls.h | 8 + include/uapi/asm-generic/unistd.h | 8 +- include/uapi/linux/mount.h | 70 +++ include/uapi/linux/stat.h | 1 + tools/testing/selftests/Makefile | 1 + .../selftests/filesystems/statmount/.gitignore | 2 + .../selftests/filesystems/statmount/Makefile | 6 + .../filesystems/statmount/statmount_test.c | 612 ++++++++++++++++++++ 31 files changed, 1298 insertions(+), 129 deletions(-) create mode 100644 tools/testing/selftests/filesystems/statmount/.gitignore create mode 100644 tools/testing/selftests/filesystems/statmount/Makefile create mode 100644 tools/testing/selftests/filesystems/statmount/statmount_test.c accumulated error probability: 0.00 reproducer is flaky (0.50 repro chance estimate) revisions tested: 23, total time: 10h21m28.250880092s (build: 4h28m37.541651156s, test: 5h35m43.613356781s) first good commit: 8c9440fea77440772542d6dbcb5c36182495c164 Merge tag 'vfs-6.8.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs recipients (to): ["linux-kselftest@vger.kernel.org" "shuah@kernel.org" "torvalds@linux-foundation.org"] recipients (cc): ["linux-kernel@vger.kernel.org"]