ci2 starts bisection 2024-04-05 12:05:03.481180794 +0000 UTC m=+97.368073368 bisecting cause commit starting from fe46a7dd189e25604716c03576d05ac8a5209743 building syzkaller on 0ee3535ea8ff21d50e44372bb1cfd147e299ab5b ensuring issue is reproducible on original commit fe46a7dd189e25604716c03576d05ac8a5209743 testing commit fe46a7dd189e25604716c03576d05ac8a5209743 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e297eab87494132b9a5eac632f16f911c016d3fac920d806fc2eca965663decb all runs: crashed: general protection fault in dtInsertEntry representative crash: general protection fault in dtInsertEntry, types: [UNKNOWN] check whether we can drop unnecessary instrumentation disabling configs for [UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit fe46a7dd189e25604716c03576d05ac8a5209743 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 6f0e6bb44ae7dd1538a5a9c42d2a09d0c3c316a10b3d3458f45f0076d439c4b9 all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry representative crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry, types: [UNKNOWN] the bug reproduces without the instrumentation disabling configs for [HANG LEAK UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP], they are not needed kconfig minimization: base=3932 full=7979 leaves diff=2024 split chunks (needed=false): <2024> split chunk #0 of len 2024 into 5 parts testing without sub-chunk 1/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG KASAN], they are not needed testing commit fe46a7dd189e25604716c03576d05ac8a5209743 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 5fa50f4e182578cd66b2c5ba4662a8d8a45bc78059fa8fff5069872a79ee7f0d all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry representative crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [LEAK UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit fe46a7dd189e25604716c03576d05ac8a5209743 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 19ae69655f2c7bd9f0d7d5d08bebdbce95ed764935387b50914b6abab435ae32 all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry representative crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [BUG KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit fe46a7dd189e25604716c03576d05ac8a5209743 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 3b95c7f97dc5eee11ed12c67a43c7e669ed538e721208f39d9e2f1b6dfc7e06c all runs: OK false negative chance: 0.000 testing without sub-chunk 4/5 disabling configs for [UBSAN BUG KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit fe46a7dd189e25604716c03576d05ac8a5209743 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 0625e7d601fc093f33f6784019b4f4d439184fab381bf3a178a6f821bf8e4384 all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry representative crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG KASAN], they are not needed testing commit fe46a7dd189e25604716c03576d05ac8a5209743 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 91e90aba5ba6493348ecc3689a5f1a0b0881959390c97a3a25c0eb7350c4ed3a all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry representative crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry, types: [UNKNOWN] the chunk can be dropped minimized to 405 configs; suspects: [AX25 BRIDGE BRIDGE_NETFILTER CAN CFG80211 CHECKPOINT_RESTORE DVB_CORE FB_CORE HAMRADIO HSR INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_USER_ACCESS INPUT_JOYSTICK INPUT_MOUSE IP6_NF_RAW IPV6_MULTIPLE_TABLES IP_NF_RAW IP_SET IP_VS IP_VS_IPV6 IP_VS_LBLC IP_VS_LBLCR IP_VS_LC IP_VS_MH IP_VS_NFCT IP_VS_NQ IP_VS_OVF IP_VS_PE_SIP IP_VS_PROTO_AH IP_VS_PROTO_AH_ESP IP_VS_PROTO_ESP IP_VS_PROTO_SCTP IP_VS_PROTO_UDP IP_VS_RR IP_VS_SED IP_VS_SH IP_VS_TWOS IP_VS_WLC IP_VS_WRR IRQ_BYPASS_MANAGER IRQ_POLL IR_IGORPLUGUSB IR_IGUANA IR_IMON IR_MCEUSB IR_REDRAT3 IR_STREAMZAP IR_TTUSBIR ISDN ISDN_CAPI_MIDDLEWARE JFFS2_CMODE_PRIORITY JFFS2_COMPRESSION_OPTIONS JFFS2_FS JFFS2_FS_POSIX_ACL JFFS2_FS_SECURITY JFFS2_FS_WRITEBUFFER JFFS2_FS_XATTR JFFS2_LZO JFFS2_RTIME JFFS2_RUBIN JFFS2_SUMMARY JFFS2_ZLIB JFS_DEBUG JFS_FS JFS_POSIX_ACL JFS_SECURITY JOYSTICK_IFORCE JOYSTICK_IFORCE_USB JOYSTICK_XPAD JOYSTICK_XPAD_FF JOYSTICK_XPAD_LEDS KARMA_PARTITION KCOV KCOV_ENABLE_COMPARISONS KCOV_INSTRUMENT_ALL KEYS_REQUEST_CACHE KEY_DH_OPERATIONS KEY_NOTIFICATIONS KSM KVM KVM_AMD KVM_ASYNC_PF KVM_COMMON KVM_COMPAT KVM_GENERIC_DIRTYLOG_READ_PROTECT KVM_GENERIC_HARDWARE_ENABLING KVM_GENERIC_MEMORY_ATTRIBUTES KVM_GENERIC_MMU_NOTIFIER KVM_GENERIC_PRIVATE_MEM KVM_HYPERV KVM_MMIO KVM_PRIVATE_MEM KVM_PROVE_MMU KVM_SW_PROTECTED_VM KVM_VFIO KVM_XEN KVM_XFER_TO_GUEST_WORK L2TP L2TP_ETH L2TP_IP L2TP_V3 LAPB LAPBETHER LDM_PARTITION LEDS_TRIGGER_AUDIO LEGACY_PTYS LIBCRC32C LIBNVDIMM LINEAR_RANGES LLC LLC2 LOGIG940_FF LOGIRUMBLEPAD2_FF LOGO LOGO_LINUX_MONO LOGO_LINUX_VGA16 LPC_ICH LWTUNNEL LWTUNNEL_BPF LZ4HC_COMPRESS LZ4_COMPRESS MAC80211 MAC80211_HAS_RC MAC80211_HWSIM MAC80211_MESH MAC80211_RC_DEFAULT_MINSTREL MAC80211_RC_MINSTREL MACSEC MACVLAN MACVTAP MAC_PARTITION MAPPING_DIRTY_HELPERS MD_RAID0 MD_RAID1 MD_RAID10 MD_RAID456 MEDIA_ANALOG_TV_SUPPORT MEDIA_ATTACH MEDIA_CONTROLLER MEDIA_CONTROLLER_DVB MEDIA_DIGITAL_TV_SUPPORT MEDIA_RADIO_SUPPORT MEDIA_SDR_SUPPORT MEDIA_SUPPORT MEDIA_SUPPORT_FILTER MEDIA_TUNER MEDIA_TUNER_MSI001 MEMORY_BALLOON MEMORY_HOTPLUG MEMORY_HOTPLUG_DEFAULT_ONLINE MEMORY_ISOLATION MEMREGION MEMSTICK MEMSTICK_REALTEK_USB MEM_SOFT_DIRTY MFD_CORE MFD_SYSCON MHI_BUS MHI_WWAN_CTRL MHP_MEMMAP_ON_MEMORY MICROCHIP_PHY MINIX_FS MINIX_SUBPARTITION MISC_RTSX MISC_RTSX_USB MISDN MISDN_DSP MISDN_HFCUSB MISDN_L1OIP MITIGATION_RFDS MKISS MLX4_CORE MLX4_INFINIBAND MMC MMC_REALTEK_USB MMC_USHC MMC_VUB300 MMU_NOTIFIER MODULE_SRCVERSION_ALL MODVERSIONS MOST MOUSE_APPLETOUCH MOUSE_BCM5974 MOUSE_PS2 MOUSE_PS2_ALPS MOUSE_PS2_BYD MOUSE_PS2_CYPRESS MOUSE_PS2_FOCALTECH MOUSE_PS2_LIFEBOOK MOUSE_PS2_LOGIPS2PP MOUSE_PS2_SMBUS MOUSE_PS2_SYNAPTICS MOUSE_PS2_SYNAPTICS_SMBUS MOUSE_PS2_TRACKPOINT MOUSE_SYNAPTICS_USB MPLS MPLS_IPTUNNEL MPLS_ROUTING MPTCP MPTCP_IPV6 MRP MTD MTD_BLKDEVS MTD_BLOCK MTD_BLOCK2MTD MTD_CFI_I1 MTD_CFI_I2 MTD_MAP_BANK_WIDTH_1 MTD_MAP_BANK_WIDTH_2 MTD_MAP_BANK_WIDTH_4 MTD_MTDRAM MTD_PHRAM MTD_SLRAM MUSB_PIO_ONLY ND_BTT ND_CLAIM ND_PFN NETDEVSIM NETFILTER_ADVANCED NETFILTER_BPF_LINK NETFILTER_FAMILY_ARP NETFILTER_FAMILY_BRIDGE NETFILTER_NETLINK_ACCT NETFILTER_NETLINK_GLUE_CT NETFILTER_NETLINK_OSF NETFILTER_NETLINK_QUEUE NETFILTER_SYNPROXY NETFILTER_XTABLES_COMPAT NETFILTER_XT_CONNMARK NETFILTER_XT_MATCH_BPF NETFILTER_XT_MATCH_CGROUP NETFILTER_XT_MATCH_CLUSTER NETFILTER_XT_MATCH_COMMENT NETFILTER_XT_MATCH_CONNBYTES NETFILTER_XT_MATCH_CONNLABEL NETFILTER_XT_MATCH_CONNLIMIT NETFILTER_XT_MATCH_CONNMARK NETFILTER_XT_MATCH_CPU NETFILTER_XT_MATCH_DCCP NETFILTER_XT_MATCH_DEVGROUP NETFILTER_XT_MATCH_DSCP NETFILTER_XT_MATCH_ECN NETFILTER_XT_MATCH_ESP NETFILTER_XT_MATCH_HASHLIMIT NETFILTER_XT_MATCH_HELPER NETFILTER_XT_MATCH_HL NETFILTER_XT_MATCH_IPCOMP NETFILTER_XT_MATCH_IPRANGE NETFILTER_XT_MATCH_IPVS NETFILTER_XT_MATCH_L2TP NETFILTER_XT_MATCH_LENGTH NETFILTER_XT_MATCH_LIMIT NETFILTER_XT_MATCH_MAC NETFILTER_XT_MATCH_MARK NETFILTER_XT_MATCH_MULTIPORT NETFILTER_XT_MATCH_NFACCT NETFILTER_XT_MATCH_OSF NETFILTER_XT_MATCH_OWNER NETFILTER_XT_MATCH_PHYSDEV NETFILTER_XT_MATCH_PKTTYPE NETFILTER_XT_MATCH_QUOTA NETFILTER_XT_MATCH_RATEEST NETFILTER_XT_MATCH_REALM NETFILTER_XT_MATCH_RECENT NETFILTER_XT_MATCH_SCTP NETFILTER_XT_MATCH_SOCKET NETFILTER_XT_MATCH_STATISTIC NETFILTER_XT_MATCH_STRING NETFILTER_XT_MATCH_TCPMSS NETFILTER_XT_MATCH_TIME NETFILTER_XT_MATCH_U32 NETFILTER_XT_SET NETFILTER_XT_TARGET_AUDIT NETFILTER_XT_TARGET_CHECKSUM NETFILTER_XT_TARGET_CLASSIFY NETFILTER_XT_TARGET_CONNMARK NETFILTER_XT_TARGET_CT NETFILTER_XT_TARGET_DSCP NETFILTER_XT_TARGET_HL NETFILTER_XT_TARGET_HMARK NETFILTER_XT_TARGET_IDLETIMER NETFILTER_XT_TARGET_LED NETFILTER_XT_TARGET_MARK NETFILTER_XT_TARGET_NETMAP NETFILTER_XT_TARGET_NFQUEUE NETFILTER_XT_TARGET_NOTRACK NETFILTER_XT_TARGET_RATEEST NETFILTER_XT_TARGET_REDIRECT NETFILTER_XT_TARGET_TCPOPTSTRIP NETFILTER_XT_TARGET_TEE NETFILTER_XT_TARGET_TPROXY NETFILTER_XT_TARGET_TRACE NETLINK_DIAG NETROM NET_9P_RDMA NET_ACT_BPF NET_ACT_CONNMARK NET_ACT_CSUM NET_ACT_CT NET_ACT_CTINFO NET_ACT_GATE NET_ACT_IFE NET_ACT_MPLS NET_ACT_NAT NET_ACT_PEDIT NET_ACT_POLICE NET_ACT_SAMPLE NET_ACT_SIMP NET_ACT_SKBEDIT NET_ACT_SKBMOD NET_ACT_TUNNEL_KEY NET_ACT_VLAN NET_CLS_BASIC NET_CLS_BPF NET_CLS_FLOW NET_CLS_FLOWER NET_CLS_FW NET_CLS_MATCHALL NET_CLS_ROUTE4 NET_DEVLINK NET_DROP_MONITOR NET_DSA NET_DSA_TAG_BRCM NET_DSA_TAG_BRCM_COMMON NET_DSA_TAG_BRCM_PREPEND NET_DSA_TAG_MTK NET_DSA_TAG_QCA NET_DSA_TAG_RTL4_A NET_EMATCH_CANID NET_EMATCH_CMP NET_EMATCH_IPSET NET_EMATCH_IPT NET_EMATCH_META NET_EMATCH_NBYTE NET_EMATCH_TEXT NET_EMATCH_U32 NET_FC NET_FOU NET_FOU_IP_TUNNELS NET_IFE NET_IFE_SKBMARK NET_IFE_SKBPRIO NET_IFE_SKBTCINDEX NET_IPGRE NET_IPGRE_BROADCAST NET_IPGRE_DEMUX NET_IPIP NET_IPVTI NET_KEY NET_KEY_MIGRATE NET_L3_MASTER_DEV NET_MPLS_GSO NET_NCSI NET_NSH NET_REDIRECT NET_SCH_CAKE NET_SCH_CBS NET_SCH_CHOKE NET_SCH_CODEL NET_SCH_DRR NET_SCH_ETF NET_SCH_ETS NET_SCH_FQ NET_SCH_FQ_CODEL NET_SCH_FQ_PIE NET_SCH_GRED NET_SCH_HFSC NET_SCH_HHF NET_SCH_HTB NET_SCH_INGRESS NET_SCH_MQPRIO NET_SCH_MQPRIO_LIB NET_SCH_MULTIQ NET_SCH_NETEM NET_SCH_PIE NET_SCH_PLUG NET_SCH_PRIO NET_SCH_QFQ NET_SCH_RED NET_SCH_SFB NET_SCH_SFQ NET_SCH_SKBPRIO NET_SCH_TAPRIO NET_SCH_TBF NET_SCH_TEQL NET_SOCK_MSG NET_SWITCHDEV NET_TC_SKB_EXT NET_TEAM NET_TEAM_MODE_ACTIVEBACKUP NET_TEAM_MODE_BROADCAST NET_TEAM_MODE_LOADBALANCE NET_TEAM_MODE_RANDOM NET_TEAM_MODE_ROUNDROBIN NET_UDP_TUNNEL NET_VRF NFC NFC_DIGITAL NFC_FDP NFC_HCI NFC_MRVL NFC_MRVL_USB NFC_NCI NFC_NCI_UART NFC_PN533 NFC_PN533_USB NFC_PORT100 NFC_SHDLC NFC_SIM NFC_VIRTUAL_NCI NFSD NFSD_BLOCKLAYOUT NFSD_FLEXFILELAYOUT NFSD_PNFS NFSD_SCSILAYOUT NFSD_V3_ACL NFSD_V4 NFSD_V4_2_INTER_SSC NFSD_V4_SECURITY_LABEL NFS_FSCACHE NFS_V4_1 NFS_V4_2 NFS_V4_2_READ_PLUS NFS_V4_2_SSC_HELPER NFS_V4_SECURITY_LABEL NFT_BRIDGE_META NFT_BRIDGE_REJECT NFT_COMPAT NFT_CONNLIMIT NFT_CT NFT_DUP_IPV4 NFT_DUP_IPV6 NFT_DUP_NETDEV NFT_FIB NFT_FIB_INET NFT_FIB_IPV4 NFT_FIB_IPV6 NFT_FIB_NETDEV NFT_FLOW_OFFLOAD NFT_HASH NFT_LIMIT NFT_LOG NFT_MASQ NFT_NAT NFT_NUMGEN NFT_OSF NFT_QUEUE NFT_QUOTA NFT_REDIR NFT_REJECT NFT_REJECT_INET NFT_REJECT_IPV4 NFT_REJECT_IPV6 NFT_REJECT_NETDEV NFT_SOCKET NFT_SYNPROXY NFT_TPROXY NFT_TUNNEL NFT_XFRM NF_CONNTRACK_AMANDA NF_CONNTRACK_BRIDGE NF_CONNTRACK_BROADCAST NF_CONNTRACK_EVENTS NF_CONNTRACK_H323 NF_CONNTRACK_LABELS NF_CONNTRACK_MARK NF_CONNTRACK_NETBIOS_NS NF_CONNTRACK_OVS NF_CONNTRACK_PPTP NF_CONNTRACK_SANE NF_CONNTRACK_TFTP NF_CONNTRACK_TIMEOUT NF_CONNTRACK_TIMESTAMP NF_CONNTRACK_ZONES NF_CT_NETLINK_HELPER NF_CT_NETLINK_TIMEOUT NF_CT_PROTO_DCCP NF_CT_PROTO_GRE NF_CT_PROTO_SCTP NF_CT_PROTO_UDPLITE NF_DUP_IPV4 NF_DUP_IPV6 NF_DUP_NETDEV NF_FLOW_TABLE NF_FLOW_TABLE_INET NF_NAT_AMANDA NF_NAT_H323 NF_NAT_OVS NF_NAT_PPTP NF_NAT_REDIRECT NF_TABLES NF_TABLES_BRIDGE NF_TABLES_INET NF_TABLES_IPV4 NF_TABLES_IPV6 NF_TABLES_NETDEV PARTITION_ADVANCED PSAMPLE RC_CORE RC_DEVICES RFKILL SPI USB_GADGET USB_MUSB_HDRC VIDEO_DEV WAN WATCH_QUEUE WIRELESS WLAN WWAN X25 X86_X32_ABI] disabling configs for [KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed picked [v6.8 v6.7 v6.6 v6.4 v6.2 v6.0 v5.18 v5.16 v5.13 v5.10 v5.7 v5.4 v5.1 v4.19] out of 31 release tags testing release v6.8 testing commit e8f897f4afef0031fe618a8e94127a0934896aba gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: f5df8653372cc2c7f915dcf931e5dbf5d28880ebc508e8c3bc8585f37afc35a6 all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry representative crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry, types: [UNKNOWN] testing release v6.7 testing commit 0dd3ee31125508cd67f7e7172247f05b7fd1753a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 3515448170e98f1c07335975d733af44dd79ddd1307e8d0f2f9e168a96917a51 all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry representative crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry, types: [UNKNOWN] testing release v6.6 testing commit ffc253263a1375a65fa6c9f62a893e9767fbebfa gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: a352edb0f81bab3749d209b74dc87fc61395c11bd000fbccf7005af3fbbf4271 all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry representative crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry, types: [UNKNOWN] testing release v6.4 testing commit 6995e2de6891c724bfeb2db33d7b87775f913ad1 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 4259c4c6253bc8194606a074e17af4608eff45379efa3dcb6d931b01f67bb828 all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry representative crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry, types: [UNKNOWN] testing release v6.2 testing commit c9c3395d5e3dcc6daee66c6908354d47bf98cb0c gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 6c2c53c4a83b89a68c469eb0721ac61b78a95966a22d6a8f8ec9bc38d6efc4f5 all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry representative crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry, types: [UNKNOWN] testing release v6.0 testing commit 4fe89d07dcc2804c8b562f6c7896a45643d34b2f gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 280cef6fbbaf3874d8fdd9f844d5ec90b233f5e16024ddb5d8565856891e8832 all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry representative crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry, types: [UNKNOWN] testing release v5.18 testing commit 4b0986a3613c92f4ec1bdc7f60ec66fea135991f gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 216371b44625dee840387b76ec4f5eaa3440c140a76458186aad13e4f16afef5 all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry representative crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry, types: [UNKNOWN] testing release v5.16 testing commit df0cc57e057f18e44dac8e6c18aba47ab53202f9 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: ffbaa17ea929b6ec5fa5e2f3bb6c8909618f0b05f7e3a16a0f04f599c668ada3 all runs: boot failed: invalid opcode in public_key_verify_signature unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 testing release v5.13 testing commit 62fb9874f5da54fdb243003b386128037319b219 gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: b75b52c542201533c559747df5636719ed7f8f7f18f93dee4216459763870e12 all runs: boot failed: invalid opcode in public_key_verify_signature unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 testing release v5.10 testing commit 2c85ebc57b3e1817b6ce1a6b703928e113a90442 gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: a77e0826a3092602d11912ead605dbc480deec247b262a1824c34f2fef185095 all runs: boot failed: invalid opcode in public_key_verify_signature unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 testing release v5.7 testing commit 3d77e6a8804abcc0504c904bd6e5cdf3a5cf8162 gcc compiler: gcc version 8.4.1 20210217 (GCC), GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 14c093391988b554aa106e4e7d26a23ccb8bb8bef9192fe49c78ce2aef214a3b all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry representative crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry, types: [UNKNOWN] testing release v5.4 testing commit 219d54332a09e8d8741c1e1982f5eae56099de85 gcc compiler: gcc version 8.4.1 20210217 (GCC) kernel signature: db7bbb37487f093b332a449c3a82d4e5a2ae5b85fa6651cd154b224b1911ad95 all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry representative crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry, types: [UNKNOWN] testing release v5.1 testing commit e93c9c99a629c61837d5a7fc2120cd2b6c70dbdd gcc compiler: gcc version 8.4.1 20210217 (GCC) kernel signature: 82e3d5ff3e3a5d81af575aeb5a02b87fb6921d0fa43899e1c07dfd7a9b281229 all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry representative crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry, types: [UNKNOWN] testing release v4.19 testing commit 84df9525b0c27f3ebc2ebb1864fa62a97fdedb7d gcc compiler: gcc version 8.4.1 20210217 (GCC) kernel signature: d118b626a165cb608114742c7d32aa4b024a2d2efd29eb808359442b8da35e5f all runs: crashed: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry representative crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry, types: [UNKNOWN] crash still not fixed/happens on the oldest tested release revisions tested: 21, total time: 7h36m33.002881822s (build: 3h2m14.709691703s, test: 2h33m42.48368597s) oldest tested release already had the bug or it had kernel test errors commit msg: Linux 4.19 crash: BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready BUG: unable to handle kernel NULL pointer dereference at 0000000000000008 PGD 800000022c92f067 P4D 800000022c92f067 PUD 22cd54067 PMD 0 Oops: 0002 [#1] SMP PTI CPU: 1 PID: 3033 Comm: syz-executor.0 Not tainted 4.19.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 RIP: 0010:dtInsertEntry.isra.5+0x514/0x530 fs/jfs/jfs_dtree.c:4019 Code: 98 41 83 ff 0d 41 b9 0d 00 00 00 48 c7 45 80 00 00 00 00 45 0f 4e cf 48 89 85 68 ff ff ff e9 8a fc ff ff 48 8b 85 70 ff ff ff 40 08 ff e9 e1 fd ff ff e8 8e 8d c8 ff 66 66 2e 0f 1f 84 00 00 RSP: 0018:ffffc90000fd79b0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff88022ce20a60 RCX: ffffffffffffffff RDX: 0000000000000073 RSI: 000000000000000c RDI: 000000000000000b RBP: ffffc90000fd7a50 R08: 0000000000000000 R09: 000000000000000d R10: ffffc900027290aa R11: ffffc900027290a8 R12: ffff88022e7d20e8 R13: 000000000000000d R14: 0000000000000000 R15: 0000000000000000 FS: 00007f45b0d846c0(0000) GS:ffff880237b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000008 CR3: 000000022b79e000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: dtInsert+0x105/0x230 fs/jfs/jfs_dtree.c:899 jfs_create+0x279/0x360 fs/jfs/namei.c:150 lookup_open+0x2cd/0x8a0 fs/namei.c:3234 do_last fs/namei.c:3324 [inline] path_openat+0x4db/0xc10 fs/namei.c:3534 do_filp_open+0x8e/0x100 fs/namei.c:3564 do_sys_open+0x17d/0x210 fs/open.c:1063 __do_sys_openat fs/open.c:1090 [inline] __se_sys_openat fs/open.c:1084 [inline] __x64_sys_openat+0x1b/0x20 fs/open.c:1084 do_syscall_64+0x69/0x170 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f45b1202e69 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f45b0d840c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007f45b1330f80 RCX: 00007f45b1202e69 RDX: 000000000000275a RSI: 0000000020000080 RDI: ffffffffffffff9c RBP: 00007f45b124f47a R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000006 R14: 00007f45b1330f80 R15: 00007fff72cf29c8 Modules linked in: CR2: 0000000000000008 ---[ end trace 0a6dd6fc277c5233 ]--- RIP: 0010:dtInsertEntry.isra.5+0x514/0x530 fs/jfs/jfs_dtree.c:4019 Code: 98 41 83 ff 0d 41 b9 0d 00 00 00 48 c7 45 80 00 00 00 00 45 0f 4e cf 48 89 85 68 ff ff ff e9 8a fc ff ff 48 8b 85 70 ff ff ff 40 08 ff e9 e1 fd ff ff e8 8e 8d c8 ff 66 66 2e 0f 1f 84 00 00 RSP: 0018:ffffc90000fd79b0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff88022ce20a60 RCX: ffffffffffffffff RDX: 0000000000000073 RSI: 000000000000000c RDI: 000000000000000b RBP: ffffc90000fd7a50 R08: 0000000000000000 R09: 000000000000000d R10: ffffc900027290aa R11: ffffc900027290a8 R12: ffff88022e7d20e8 R13: 000000000000000d R14: 0000000000000000 R15: 0000000000000000 FS: 00007f45b0d846c0(0000) GS:ffff880237b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000008 CR3: 000000022b79e000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 98 cwtl 1: 41 83 ff 0d cmp $0xd,%r15d 5: 41 b9 0d 00 00 00 mov $0xd,%r9d b: 48 c7 45 80 00 00 00 movq $0x0,-0x80(%rbp) 12: 00 13: 45 0f 4e cf cmovle %r15d,%r9d 17: 48 89 85 68 ff ff ff mov %rax,-0x98(%rbp) 1e: e9 8a fc ff ff jmp 0xfffffcad 23: 48 8b 85 70 ff ff ff mov -0x90(%rbp),%rax * 2a: c6 40 08 ff movb $0xff,0x8(%rax) <-- trapping instruction 2e: e9 e1 fd ff ff jmp 0xfffffe14 33: e8 8e 8d c8 ff call 0xffc88dc6 38: 66 data16 39: 66 data16 3a: 2e cs 3b: 0f .byte 0xf 3c: 1f (bad) 3d: 84 00 test %al,(%rax)