ci2 starts bisection 2023-04-01 02:14:14.269581503 +0000 UTC m=+233155.283240486 bisecting fixing commit since b7b275e60bcd5f89771e865a8239325f86d9927d building syzkaller on 247de55b7ea6f9f235a407518b10c1496c8b25b3 ensuring issue is reproducible on original commit b7b275e60bcd5f89771e865a8239325f86d9927d testing commit b7b275e60bcd5f89771e865a8239325f86d9927d gcc compiler: Debian clang version 15.0.7, GNU ld (GNU Binutils for Debian) 2.35.2 kernel signature: cb9d249c07547706948d873a9c20ae0bc84bf65e99c0f2ead11bc1bf8dcbb250 all runs: crashed: WARNING in get_page_from_freelist testing current HEAD 7b50567bdcad8925ca1e075feb7171c12015afd1 testing commit 7b50567bdcad8925ca1e075feb7171c12015afd1 gcc compiler: Debian clang version 15.0.7, GNU ld (GNU Binutils for Debian) 2.35.2 kernel signature: 4a28fccc3f393ef64f25bbf802f4b2344b26bee9e1bc911889b94edee6f19520 all runs: crashed: BUG: unable to handle kernel paging request in z_erofs_decompress_queue revisions tested: 2, total time: 43m57.63789737s (build: 36m1.158967748s, test: 6m5.867700894s) the crash still happens on HEAD commit msg: media: i2c: imx290: fix conditional function defintions crash: BUG: unable to handle kernel paging request in z_erofs_decompress_queue BUG: unable to handle page fault for address: fffff521016bfff9 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 23ffed067 P4D 23ffed067 PUD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 47 Comm: kworker/u5:0 Not tainted 6.3.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 Workqueue: erofs_worker z_erofs_decompressqueue_work RIP: 0010:z_erofs_decompress_queue+0xa57/0x27f0 Code: b0 00 00 00 42 80 3c 20 00 74 0a 48 8b 7c 24 70 e8 ee 7e 42 fe 89 db 48 c1 e3 03 48 03 9c 24 20 03 00 00 49 89 de 49 c1 ee 03 <43> 80 3c 26 00 74 08 48 89 df e8 ca 7e 42 fe 48 83 3b 00 0f 84 6a RSP: 0018:ffffc90000b877c0 EFLAGS: 00010a06 RAX: 1ffff92000170f5c RBX: ffffc9080b5fffc8 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888073b660c8 RBP: ffffc90000b87bb0 R08: ffffc90000b87260 R09: fffff520016c0000 R10: 00000000703fffff R11: dffffc00000000ff R12: dffffc0000000000 R13: ffff888073b660b8 R14: 1ffff921016bfff9 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffff521016bfff9 CR3: 000000007d7d3000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: z_erofs_decompressqueue_work+0x94/0xe0 process_one_work+0x7c4/0xe70 worker_thread+0x8c9/0xfd0 kthread+0x232/0x2b0 ret_from_fork+0x1f/0x30 Modules linked in: CR2: fffff521016bfff9 ---[ end trace 0000000000000000 ]--- RIP: 0010:z_erofs_decompress_queue+0xa57/0x27f0 Code: b0 00 00 00 42 80 3c 20 00 74 0a 48 8b 7c 24 70 e8 ee 7e 42 fe 89 db 48 c1 e3 03 48 03 9c 24 20 03 00 00 49 89 de 49 c1 ee 03 <43> 80 3c 26 00 74 08 48 89 df e8 ca 7e 42 fe 48 83 3b 00 0f 84 6a RSP: 0018:ffffc90000b877c0 EFLAGS: 00010a06 RAX: 1ffff92000170f5c RBX: ffffc9080b5fffc8 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888073b660c8 RBP: ffffc90000b87bb0 R08: ffffc90000b87260 R09: fffff520016c0000 R10: 00000000703fffff R11: dffffc00000000ff R12: dffffc0000000000 R13: ffff888073b660b8 R14: 1ffff921016bfff9 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffff521016bfff9 CR3: 000000007d7d3000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: b0 00 mov $0x0,%al 2: 00 00 add %al,(%rax) 4: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) 9: 74 0a je 0x15 b: 48 8b 7c 24 70 mov 0x70(%rsp),%rdi 10: e8 ee 7e 42 fe callq 0xfe427f03 15: 89 db mov %ebx,%ebx 17: 48 c1 e3 03 shl $0x3,%rbx 1b: 48 03 9c 24 20 03 00 add 0x320(%rsp),%rbx 22: 00 23: 49 89 de mov %rbx,%r14 26: 49 c1 ee 03 shr $0x3,%r14 * 2a: 43 80 3c 26 00 cmpb $0x0,(%r14,%r12,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 48 89 df mov %rbx,%rdi 34: e8 ca 7e 42 fe callq 0xfe427f03 39: 48 83 3b 00 cmpq $0x0,(%rbx) 3d: 0f .byte 0xf 3e: 84 .byte 0x84 3f: 6a .byte 0x6a