ci2 starts bisection 2024-08-03 13:34:36.676641965 +0000 UTC m=+53435.294174817 bisecting fixing commit since 8fd7f44624538675abadc73f5a44e95016964d22 building syzkaller on 9bd8dcda8c7c494d59bd3132a668f4784ea835c6 ensuring issue is reproducible on original commit 8fd7f44624538675abadc73f5a44e95016964d22 testing commit 8fd7f44624538675abadc73f5a44e95016964d22 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 7da4f82c559d1f87f282f1513efb444639b28a57ac5805c42b88b74c7197b51e run #0: infra problem: create instance operation failed: &{Code:QUOTA_EXCEEDED ErrorDetails:[0xc007214460] Location: Message:Quota 'T2A_CPUS' exceeded. Limit: 125.0 in region us-central1. ForceSendFields:[] NullFields:[]}. run #1: infra problem: create instance operation failed: &{Code:QUOTA_EXCEEDED ErrorDetails:[0xc0072145a0] Location: Message:Quota 'T2A_CPUS' exceeded. Limit: 125.0 in region us-central1. ForceSendFields:[] NullFields:[]}. run #2: infra problem: create instance operation failed: &{Code:QUOTA_EXCEEDED ErrorDetails:[0xc004d16320] Location: Message:Quota 'T2A_CPUS' exceeded. Limit: 125.0 in region us-central1. ForceSendFields:[] NullFields:[]}. run #3: infra problem: create instance operation failed: &{Code:QUOTA_EXCEEDED ErrorDetails:[0xc0060e85f0] Location: Message:Quota 'T2A_CPUS' exceeded. Limit: 125.0 in region us-central1. ForceSendFields:[] NullFields:[]}. run #4: infra problem: create instance operation failed: &{Code:QUOTA_EXCEEDED ErrorDetails:[0xc004d16960] Location: Message:Quota 'T2A_CPUS' exceeded. Limit: 125.0 in region us-central1. ForceSendFields:[] NullFields:[]}. run #5: infra problem: create instance operation failed: &{Code:QUOTA_EXCEEDED ErrorDetails:[0xc004d16b90] Location: Message:Quota 'T2A_CPUS' exceeded. Limit: 125.0 in region us-central1. ForceSendFields:[] NullFields:[]}. run #6: crashed: BUG: unable to handle kernel paging request in jfs_flush_journal run #7: crashed: BUG: unable to handle kernel paging request in jfs_flush_journal run #8: crashed: BUG: unable to handle kernel paging request in jfs_flush_journal run #9: crashed: BUG: unable to handle kernel paging request in jfs_flush_journal run #10: crashed: BUG: unable to handle kernel paging request in jfs_flush_journal run #11: crashed: BUG: unable to handle kernel paging request in jfs_flush_journal run #12: crashed: INFO: rcu detected stall in corrupted run #13: crashed: BUG: unable to handle kernel paging request in jfs_flush_journal run #14: crashed: INFO: rcu detected stall in corrupted run #15: crashed: INFO: rcu detected stall in corrupted run #16: crashed: INFO: rcu detected stall in corrupted run #17: crashed: INFO: rcu detected stall in corrupted run #18: crashed: INFO: rcu detected stall in corrupted run #19: crashed: INFO: rcu detected stall in devlink_nl_cmd_port_get_dumpit representative crash: BUG: unable to handle kernel paging request in jfs_flush_journal, types: [UNKNOWN HANG] check whether we can drop unnecessary instrumentation disabling configs for [ATOMIC_SLEEP LEAK UBSAN BUG KASAN LOCKDEP], they are not needed testing commit 8fd7f44624538675abadc73f5a44e95016964d22 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: b0ac65a46a298b90dd853566c9c3280e1c97c554690131d8ff1c88577c29e194 run #0: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #1: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #2: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #3: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #4: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #5: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #6: crashed: INFO: rcu detected stall in corrupted run #7: crashed: INFO: rcu detected stall in corrupted run #8: crashed: INFO: rcu detected stall in corrupted run #9: crashed: INFO: rcu detected stall in devlink_nl_cmd_port_get_dumpit representative crash: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal, types: [UNKNOWN] the bug reproduces without the instrumentation disabling configs for [LEAK UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP], they are not needed kconfig minimization: base=7495 full=9696 leaves diff=1933 split chunks (needed=false): <1933> split chunk #0 of len 1933 into 5 parts testing without sub-chunk 1/5 disabling configs for [LEAK UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP], they are not needed testing commit 8fd7f44624538675abadc73f5a44e95016964d22 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e7a2242266acba5d23be3053983e0bceae8d87629a47a2e231df005f595c8d91 run #0: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #1: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #2: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #3: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #4: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #5: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #6: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #7: crashed: INFO: rcu detected stall in corrupted run #8: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #9: crashed: INFO: rcu detected stall in corrupted representative crash: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP LEAK], they are not needed testing commit 8fd7f44624538675abadc73f5a44e95016964d22 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: bfa734b1b041e4fb1a7421bf9d945e644a6364fe2e219be349e54d7d70b6a6bf all runs: boot failed: can't ssh into the instance unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 testing without sub-chunk 3/5 disabling configs for [ATOMIC_SLEEP LEAK UBSAN BUG KASAN LOCKDEP], they are not needed testing commit 8fd7f44624538675abadc73f5a44e95016964d22 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: b13f033d2e7b8cee5b3c3fba42626edb9dcf0ba9dbe5eaf67ca998edf843fd74 run #0: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #1: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #2: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #3: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #4: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #5: crashed: BUG: unable to handle kernel NULL pointer dereference in corrupted run #6: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #7: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #8: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal run #9: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal representative crash: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [KASAN LOCKDEP ATOMIC_SLEEP LEAK UBSAN BUG], they are not needed testing commit 8fd7f44624538675abadc73f5a44e95016964d22 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 3656de5e2930f4bd8eace950392c21f03047803c2a370648bba10d94b536ea65 all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal representative crash: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [LEAK UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP], they are not needed testing commit 8fd7f44624538675abadc73f5a44e95016964d22 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: eb28de247d35d4296f847a84bfab62fdb3dcdb3be2780d16a2029a0a26e038df all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal representative crash: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal, types: [UNKNOWN] the chunk can be dropped minimized to 387 configs; suspects: [6LOWPAN ACPI_VIDEO DLM DRM DRM_TTM DRM_TTM_HELPER DRM_UDL DRM_V3D DRM_VC4 DRM_VGEM DRM_VIRTIO_GPU DRM_VKMS DRM_VRAM_HELPER DUMMY DVB_AF9013 DVB_AF9033 DVB_AS102 DVB_AS102_FE DVB_B2C2_FLEXCOP DVB_B2C2_FLEXCOP_USB DVB_DIB3000MB DVB_DIB3000MC DVB_EC100 DVB_GP8PSK_FE DVB_RTL2830 DVB_RTL2832 DVB_RTL2832_SDR DVB_TEST_DRIVERS DVB_TTUSB_BUDGET DVB_TTUSB_DEC DVB_USB DVB_USB_A800 DVB_USB_AF9005 DVB_USB_AF9005_REMOTE DVB_USB_AF9015 DVB_USB_AF9035 DVB_USB_ANYSEE DVB_USB_AU6610 DVB_USB_AZ6007 DVB_USB_AZ6027 DVB_USB_CE6230 DVB_USB_CINERGY_T2 DVB_USB_CXUSB DVB_USB_DIB0700 DVB_USB_DIB3000MC DVB_USB_DIBUSB_MB DVB_USB_DIBUSB_MC DVB_USB_DIGITV DVB_USB_DTT200U DVB_USB_DTV5100 DVB_USB_DVBSKY DVB_USB_DW2102 DVB_USB_EC168 DVB_USB_GL861 DVB_USB_GP8PSK DVB_USB_LME2510 DVB_USB_M920X DVB_USB_MXL111SF DVB_USB_NOVA_T_USB2 DVB_USB_OPERA1 DVB_USB_PCTV452E DVB_USB_RTL28XXU DVB_USB_TECHNISAT_USB2 DVB_USB_TTUSB2 DVB_USB_UMT_010 DVB_USB_V2 DVB_USB_VP702X DVB_USB_VP7045 DVB_USB_ZD1301 DVB_VIDTV DVB_ZL10353 E100 ECRYPT_FS ECRYPT_FS_MESSAGING EEPROM_93CX6 EFS_FS ENCRYPTED_KEYS EQUALIZER EROFS_FS EROFS_FS_POSIX_ACL EROFS_FS_SECURITY EROFS_FS_XATTR EROFS_FS_ZIP EVM EVM_ADD_XATTRS EVM_ATTR_FSUUID EXFAT_FS EXPORTFS_BLOCK_OPS EXT3_FS_POSIX_ACL EXT3_FS_SECURITY EXT4_FS_SECURITY F2FS_CHECK_FS F2FS_FAULT_INJECTION F2FS_FS F2FS_FS_COMPRESSION F2FS_FS_LZ4 F2FS_FS_LZ4HC F2FS_FS_LZO F2FS_FS_LZORLE F2FS_FS_POSIX_ACL F2FS_FS_SECURITY F2FS_FS_XATTR F2FS_FS_ZSTD F2FS_STAT_FS FB_DEFERRED_IO FB_SYS_COPYAREA FB_SYS_FILLRECT FB_SYS_FOPS FB_SYS_IMAGEBLIT FB_TILEBLITTING FB_VIRTUAL FDDI FIB_RULES FIREWIRE FIREWIRE_NET FIREWIRE_OHCI FIREWIRE_SBP2 FRAMEBUFFER_CONSOLE_ROTATION FRONTSWAP FS_DAX FS_DAX_PMD FS_ENCRYPTION FS_ENCRYPTION_ALGS FS_VERITY FS_VERITY_BUILTIN_SIGNATURES FTL FW_LOADER_COMPRESS FW_LOADER_USER_HELPER_FALLBACK GACT_PROB GET_FREE_REGION GFS2_FS GFS2_FS_LOCKING_DLM GOOGLE_COREBOOT_TABLE GOOGLE_FIRMWARE GOOGLE_MEMCONSOLE GOOGLE_MEMCONSOLE_COREBOOT GOOGLE_VPD GPIO_DLN2 GPIO_VIPERBOARD GREENASIA_FF GREYBUS GREYBUS_BRIDGED_PHY GREYBUS_ES2 GREYBUS_HID GREYBUS_USB GTP GVE HAVE_ARCH_USERFAULTFD_MINOR HAVE_IMA_KEXEC HDLC HDLC_CISCO HDLC_FR HDLC_PPP HDLC_RAW HDLC_RAW_ETH HDLC_X25 HDMI HFSPLUS_FS HFS_FS HIDRAW HID_ACCUTOUCH HID_ACRUX HID_ACRUX_FF HID_ALPS HID_APPLEIR HID_ASUS HID_AUREAL HID_BATTERY_STRENGTH HID_BETOP_FF HID_CMEDIA HID_CORSAIR HID_CP2112 HID_ELECOM HID_ELO HID_EMS_FF HID_GEMBIRD HID_GFRM HID_GREENASIA HID_GT683R HID_GYRATION HID_HOLTEK HID_ICADE HID_KEYTOUCH HID_KYE HID_LCPOWER HID_LED HID_LENOVO HID_LOGITECH_DJ HID_LOGITECH_HIDPP HID_MAGICMOUSE HID_MAYFLASH HID_NTI HID_NTRIG HID_ORTEK HID_PENMOUNT HID_PETALYNX HID_PICOLCD HID_PICOLCD_BACKLIGHT HID_PICOLCD_CIR HID_PICOLCD_FB HID_PICOLCD_LCD HID_PICOLCD_LEDS HID_PID HID_PLANTRONICS HID_PRIMAX HID_PRODIKEYS HID_RETRODE HID_RMI HID_ROCCAT HID_SAITEK HID_SAMSUNG HID_SENSOR_ACCEL_3D HID_SENSOR_ALS HID_SENSOR_CUSTOM_SENSOR HID_SENSOR_DEVICE_ROTATION HID_SENSOR_GYRO_3D HID_SENSOR_HUB HID_SENSOR_HUMIDITY HID_SENSOR_IIO_COMMON HID_SENSOR_IIO_TRIGGER HID_SENSOR_INCLINOMETER_3D HID_SENSOR_MAGNETOMETER_3D HID_SENSOR_PRESS HID_SENSOR_PROX HID_SENSOR_TEMP HID_SPEEDLINK HID_STEELSERIES HID_SUNPLUS HID_THINGM HID_TIVO HID_TOPSEED HID_TWINHAN HID_UCLOGIC HID_UDRAW_PS3 HID_WACOM HID_WALTOP HID_WIIMOTE HID_XINMO HID_ZYDACRON HMM_MIRROR HOLTEK_FF HOTPLUG_PCI_PCIE HPFS_FS I2C_DIOLAN_U2C I2C_DLN2 I2C_MUX_REG I2C_ROBOTFUZZ_OSIF I2C_SI4713 I2C_SLAVE_EEPROM I2C_TINY_USB I2C_VIPERBOARD IEEE802154 IEEE802154_6LOWPAN IEEE802154_ATUSB IEEE802154_DRIVERS IEEE802154_HWSIM IEEE802154_NL802154_EXPERIMENTAL IEEE802154_SOCKET IFB IMA IMA_APPRAISE IMA_APPRAISE_MODSIG IMA_DEFAULT_HASH_SHA256 IMA_LSM_RULES IMA_MEASURE_ASYMMETRIC_KEYS IMA_NG_TEMPLATE IMA_QUEUE_EARLY_BOOT_KEYS IMA_READ_POLICY IMA_WRITE_POLICY INET6_AH INET6_ESP INET6_ESPINTCP INET6_ESP_OFFLOAD INET6_IPCOMP INET6_TUNNEL INET6_XFRM_TUNNEL INET_AH INET_DCCP_DIAG INET_DIAG_DESTROY INET_ESP INET_ESPINTCP INET_ESP_OFFLOAD INET_IPCOMP INET_MPTCP_DIAG INET_RAW_DIAG INET_SCTP_DIAG INET_UDP_DIAG INET_XFRM_TUNNEL INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_ADDR_TRANS_CONFIGFS INFINIBAND_IPOIB INFINIBAND_IPOIB_CM INFINIBAND_IPOIB_DEBUG INFINIBAND_ISER INFINIBAND_ON_DEMAND_PAGING INFINIBAND_RTRS INFINIBAND_SRP INFINIBAND_USER_ACCESS INFINIBAND_USER_MAD INFINIBAND_USER_MEM INPUT_ATI_REMOTE2 INPUT_CM109 INPUT_IMS_PCU INPUT_JOYDEV INPUT_JOYSTICK INPUT_KEYSPAN_REMOTE INPUT_LEDS INPUT_MOUSEDEV INPUT_MOUSEDEV_PSAUX INPUT_POWERMATE INPUT_UINPUT INPUT_YEALINK INTEGRITY INTEGRITY_ASYMMETRIC_KEYS INTEGRITY_AUDIT INTEGRITY_SIGNATURE INTEGRITY_TRUSTED_KEYRING IP6_NF_MATCH_AH IP6_NF_MATCH_EUI64 IP6_NF_MATCH_FRAG IP6_NF_MATCH_HL IP6_NF_MATCH_IPV6HEADER IP6_NF_MATCH_MH IP6_NF_MATCH_OPTS IP6_NF_MATCH_RPFILTER IP6_NF_MATCH_RT IP6_NF_MATCH_SRH IP6_NF_RAW IP6_NF_SECURITY IP6_NF_TARGET_HL IP6_NF_TARGET_NPT IP6_NF_TARGET_SYNPROXY IPV6_FOU IPV6_FOU_TUNNEL IPV6_GRE IPV6_ILA IPV6_MIP6 IPV6_MROUTE IPV6_MROUTE_MULTIPLE_TABLES IPV6_MULTIPLE_TABLES IPV6_OPTIMISTIC_DAD IPV6_PIMSM_V2 IPV6_ROUTER_PREF IPV6_ROUTE_INFO IPV6_RPL_LWTUNNEL IPV6_SEG6_BPF IPV6_SEG6_HMAC IPV6_SEG6_LWTUNNEL IPV6_SIT_6RD IPV6_SUBTREES IPV6_TUNNEL IPV6_VTI IPVLAN IPVLAN_L3S IPVTAP IP_ADVANCED_ROUTER IP_DCCP IP_DCCP_CCID3 IP_DCCP_TFRC_LIB IP_FIB_TRIE_STATS IP_MROUTE IP_MROUTE_COMMON IP_MROUTE_MULTIPLE_TABLES IP_NF_ARPFILTER IP_NF_ARPTABLES IP_NF_ARP_MANGLE IP_NF_MATCH_AH IP_NF_MATCH_ECN IP_NF_MATCH_RPFILTER IP_NF_MATCH_TTL IP_NF_RAW IP_NF_SECURITY IP_NF_TARGET_CLUSTERIP IP_NF_TARGET_ECN IP_NF_TARGET_NETMAP IP_NF_TARGET_REDIRECT IP_NF_TARGET_SYNPROXY IP_NF_TARGET_TTL IP_PIMSM_V1 IP_PIMSM_V2 IP_PNP_RARP IP_ROUTE_CLASSID IP_ROUTE_MULTIPATH IP_ROUTE_VERBOSE IP_SCTP IP_SET IP_SET_BITMAP_IP IP_SET_BITMAP_IPMAC IP_SET_BITMAP_PORT IP_SET_HASH_IP IP_SET_HASH_IPMAC IP_SET_HASH_IPMARK IP_SET_HASH_IPPORT IP_SET_HASH_IPPORTIP IP_SET_HASH_IPPORTNET IP_SET_HASH_MAC IP_SET_HASH_NET IP_SET_HASH_NETIFACE IP_SET_HASH_NETNET IP_SET_HASH_NETPORT IP_SET_HASH_NETPORTNET IP_SET_LIST_SET IP_VS_DH IP_VS_FO IP_VS_FTP IP_VS_IPV6 IP_VS_LBLC IP_VS_LBLCR IP_VS_LC IP_VS_MH IP_VS_NFCT IP_VS_NQ IP_VS_OVF IP_VS_PE_SIP IP_VS_PROTO_AH IP_VS_PROTO_AH_ESP IP_VS_PROTO_ESP IP_VS_PROTO_SCTP IP_VS_PROTO_TCP IP_VS_PROTO_UDP IP_VS_RR IP_VS_SED IP_VS_SH IP_VS_TWOS IP_VS_WLC IP_VS_WRR IR_IGORPLUGUSB IR_IGUANA IR_IMON IR_MCEUSB IR_REDRAT3 IR_STREAMZAP IR_TTUSBIR ISDN ISDN_CAPI_MIDDLEWARE ISO9660_FS JFFS2_CMODE_PRIORITY JFFS2_COMPRESSION_OPTIONS JFFS2_FS JFFS2_FS_POSIX_ACL JFFS2_FS_SECURITY JFFS2_FS_WRITEBUFFER JFFS2_FS_XATTR JFFS2_LZO JFFS2_RTIME JFFS2_RUBIN JFFS2_SUMMARY JFFS2_ZLIB JFS_DEBUG JFS_FS JFS_POSIX_ACL JFS_SECURITY JOLIET JOYSTICK_IFORCE JOYSTICK_IFORCE_USB JOYSTICK_XPAD JOYSTICK_XPAD_FF JOYSTICK_XPAD_LEDS KARMA_PARTITION KCOV KCOV_ENABLE_COMPARISONS KCOV_INSTRUMENT_ALL KEYS_REQUEST_CACHE LAPB LCD_CLASS_DEVICE MAC802154 MEDIA_RADIO_SUPPORT MEDIA_TEST_SUPPORT MFD_DLN2 MFD_VIPERBOARD MPTCP NET_IPGRE_DEMUX NFT_FWD_NETDEV NF_CONNTRACK_FTP NF_CONNTRACK_SIP NF_TABLES NF_TABLES_NETDEV PARTITION_ADVANCED RADIO_ADAPTERS RADIO_SI4713 RFKILL SND SND_SOC SOUND WAN XFRM ZONE_DEVICE] disabling configs for [LEAK UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP], they are not needed testing current HEAD 48d525b0e4634c487cf46a41c1e2824e9ee258ce testing commit 48d525b0e4634c487cf46a41c1e2824e9ee258ce gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e8564fa6104f27a9b0fcc2cdd248b9049dc6bcdc10df477bfbd1d19e42d23e20 all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal representative crash: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal, types: [UNKNOWN] crash still not fixed/happens on the oldest tested release revisions tested: 8, total time: 1h24m3.733251648s (build: 45m43.879445424s, test: 35m24.071436063s) crash still not fixed or there were kernel test errors commit msg: Linux 6.1.103 crash: BUG: unable to handle kernel NULL pointer dereference in jfs_flush_journal loop4: detected capacity change from 0 to 32768 read_mapping_page failed! diRead: diIAGRead returned -5 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000030 Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006 CM = 0, WnR = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=0000000105d1d000 [0000000000000030] pgd=080000010fb9e003, p4d=080000010fb9e003, pud=0800000112c66003, pmd=0000000000000000 Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 4091 Comm: syz-executor.4 Not tainted 6.1.103-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : write_special_inodes fs/jfs/jfs_logmgr.c:208 [inline] pc : jfs_flush_journal+0x304/0x618 fs/jfs/jfs_logmgr.c:1573 lr : write_special_inodes fs/jfs/jfs_logmgr.c:207 [inline] lr : jfs_flush_journal+0x300/0x618 fs/jfs/jfs_logmgr.c:1573 sp : ffff80001161ba70 x29: ffff80001161baa0 x28: ffff0000c55f1940 x27: 0000000000000000 x26: 0000000000000000 x25: ffff0000c057af40 x24: 0000000000000000 x23: ffff0000c5d0bda8 x22: ffff0000caa4a730 x21: ffff0000c5d0bdd0 x20: ffff0000c6460e38 x19: ffff0000c5d0bc00 x18: ffff80000adece9c x17: 0000000000000000 x16: 000000000000ba7e x15: 000000000000b67e x14: 0000000002ae8cd9 x13: 00000000000001e1 x12: ffff80000c038000 x11: 0000000000ff0100 x10: 0000000000000000 x9 : 88a2730f9187a600 x8 : 0000000000000000 x7 : 0000000000000000 x6 : ffff80000881fdb0 x5 : 0000000000000000 x4 : 0000000000000080 x3 : 0000000000000000 x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: write_special_inodes fs/jfs/jfs_logmgr.c:208 [inline] jfs_flush_journal+0x304/0x618 fs/jfs/jfs_logmgr.c:1573 jfs_umount+0x64/0x190 fs/jfs/jfs_umount.c:58 jfs_fill_super+0x344/0x454 fs/jfs/super.c:600 mount_bdev+0x1c4/0x21c fs/super.c:1443 jfs_do_mount+0x44/0x58 fs/jfs/super.c:670 legacy_get_tree+0x30/0x74 fs/fs_context.c:632 vfs_get_tree+0x3c/0xdc fs/super.c:1573 do_new_mount+0x1e8/0x4ec fs/namespace.c:3051 path_mount+0x348/0x868 fs/namespace.c:3381 do_mount fs/namespace.c:3394 [inline] __do_sys_mount fs/namespace.c:3602 [inline] __se_sys_mount fs/namespace.c:3579 [inline] __arm64_sys_mount+0x2a0/0x3a0 fs/namespace.c:3579 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x64/0x178 arch/arm64/kernel/syscall.c:52 el0_svc_common+0xb8/0x174 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x48/0x174 arch/arm64/kernel/syscall.c:204 el0_svc+0x34/0x100 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 Code: f85d8288 f9401900 97eb782d f85f0288 (f9401900) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: f85d8288 ldur x8, [x20, #-40] 4: f9401900 ldr x0, [x8, #48] 8: 97eb782d bl 0xffffffffffade0bc c: f85f0288 ldur x8, [x20, #-16] * 10: f9401900 ldr x0, [x8, #48] <-- trapping instruction