ci2 starts bisection 2025-08-04 09:10:07.465605923 +0000 UTC m=+206804.889201070 bisecting cause commit starting from 352af6a011d586ff042db4b2d1f7421875eb8a14 building syzkaller on 7368264b463a401571d2eb381f50ea2a758e9d05 ensuring issue is reproducible on original commit 352af6a011d586ff042db4b2d1f7421875eb8a14 testing commit 352af6a011d586ff042db4b2d1f7421875eb8a14 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: c0100a640a150489ca7e809531bef35645920d2384b639f9daee8eb5dce8824f all runs: crashed: UBSAN: array-index-out-of-bounds in bch2_accounting_validate representative crash: UBSAN: array-index-out-of-bounds in bch2_accounting_validate, types: [MEMORY_SAFETY_UBSAN] check whether we can drop unnecessary instrumentation disabling configs for [hang memleak bug_or_warning kasan locking atomic_sleep], they are not needed testing commit 352af6a011d586ff042db4b2d1f7421875eb8a14 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 14980f20222209aa2ba2becb011cd34a94bf7c479a9d1b27a60d2213877e64ff all runs: crashed: UBSAN: array-index-out-of-bounds in bch2_accounting_validate representative crash: UBSAN: array-index-out-of-bounds in bch2_accounting_validate, types: [MEMORY_SAFETY_UBSAN] the bug reproduces without the instrumentation disabling configs for [bug_or_warning kasan locking atomic_sleep hang memleak], they are not needed kconfig minimization: base=4088 full=8346 leaves diff=2175 split chunks (needed=false): <2175> split chunk #0 of len 2175 into 5 parts testing without sub-chunk 1/5 disabling configs for [memleak bug_or_warning kasan locking atomic_sleep hang], they are not needed testing commit 352af6a011d586ff042db4b2d1f7421875eb8a14 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 257e3e99e5ced66e9aa463ec3294b6b9489172fc5b9c4c9a0735240e902926e2 all runs: OK false negative chance: 0.000 testing without sub-chunk 2/5 disabling configs for [bug_or_warning kasan locking atomic_sleep hang memleak], they are not needed testing commit 352af6a011d586ff042db4b2d1f7421875eb8a14 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: e9bdac643650529934da9f7df31d2db862b9e1f23d046bced50e2aa5c18b9231 all runs: crashed: UBSAN: array-index-out-of-bounds in bch2_accounting_validate representative crash: UBSAN: array-index-out-of-bounds in bch2_accounting_validate, types: [MEMORY_SAFETY_UBSAN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [bug_or_warning kasan locking atomic_sleep hang memleak], they are not needed testing commit 352af6a011d586ff042db4b2d1f7421875eb8a14 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 47c9d58841472dcd8f1e81bd83d6c359e1b46d4caba10435a0a2fcf35e39856a all runs: crashed: UBSAN: array-index-out-of-bounds in bch2_accounting_validate representative crash: UBSAN: array-index-out-of-bounds in bch2_accounting_validate, types: [MEMORY_SAFETY_UBSAN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [bug_or_warning kasan locking atomic_sleep hang memleak], they are not needed testing commit 352af6a011d586ff042db4b2d1f7421875eb8a14 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 23496fcd6a62132234aac28f63f7340df1b2bfedb51210db0b3501f6e6930327 all runs: crashed: UBSAN: array-index-out-of-bounds in bch2_accounting_validate representative crash: UBSAN: array-index-out-of-bounds in bch2_accounting_validate, types: [MEMORY_SAFETY_UBSAN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [hang memleak bug_or_warning kasan locking atomic_sleep], they are not needed testing commit 352af6a011d586ff042db4b2d1f7421875eb8a14 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 3313df861eabd485624361e19b749478434be2df423d8a7a83038177e049f93c all runs: crashed: UBSAN: array-index-out-of-bounds in bch2_accounting_validate representative crash: UBSAN: array-index-out-of-bounds in bch2_accounting_validate, types: [MEMORY_SAFETY_UBSAN] the chunk can be dropped minimized to 435 configs; suspects: [6LOWPAN 6LOWPAN_GHC_EXT_HDR_DEST 6LOWPAN_GHC_EXT_HDR_FRAG 6LOWPAN_GHC_EXT_HDR_HOP 6LOWPAN_GHC_EXT_HDR_ROUTE 6LOWPAN_GHC_ICMPV6 6LOWPAN_GHC_UDP 6LOWPAN_NHC 6LOWPAN_NHC_DEST 6LOWPAN_NHC_FRAGMENT 6LOWPAN_NHC_HOP 6LOWPAN_NHC_IPV6 6LOWPAN_NHC_MOBILITY 6LOWPAN_NHC_ROUTING 6LOWPAN_NHC_UDP 6PACK 842_COMPRESS 842_DECOMPRESS 9P_FSCACHE 9P_FS_POSIX_ACL 9P_FS_SECURITY ACORN_PARTITION ACORN_PARTITION_ADFS ACORN_PARTITION_CUMANA ACORN_PARTITION_EESOX ACORN_PARTITION_ICS ACORN_PARTITION_POWERTEC ACORN_PARTITION_RISCIX ACPI_NFIT ACPI_NHLT ACPI_PLATFORM_PROFILE ADFS_FS AFFS_FS AFS_FS AFS_FSCACHE AF_KCM AF_RXRPC AF_RXRPC_IPV6 AIX_PARTITION AMD_SFH_HID AMIGA_PARTITION ANDROID_BINDERFS ANDROID_BINDER_IPC ANON_VMA_NAME APERTURE_HELPERS APPLE_MFI_FASTCHARGE AR5523 ARCH_ENABLE_MEMORY_HOTREMOVE ARCH_HAS_CPU_ATTACK_VECTORS ARCH_HAS_USER_SHADOW_STACK ARCH_SUPPORTS_HUGETLBFS ASM_MODVERSIONS ASUS_TF103C_DOCK ASYNC_CORE ASYNC_MEMCPY ASYNC_PQ ASYNC_RAID6_RECOV ASYNC_TX_DMA ASYNC_XOR ATARI_PARTITION ATA_GENERIC ATA_OVER_ETH ATH10K ATH10K_CE ATH10K_LEDS ATH10K_PCI ATH10K_USB ATH11K ATH6KL ATH6KL_USB ATH9K ATH9K_AHB ATH9K_BTCOEX_SUPPORT ATH9K_CHANNEL_CONTEXT ATH9K_COMMON ATH9K_COMMON_DEBUG ATH9K_COMMON_SPECTRAL ATH9K_DEBUGFS ATH9K_DYNACK ATH9K_HTC ATH9K_HTC_DEBUGFS ATH9K_HW ATH9K_PCI ATH9K_PCOEM ATH9K_RFKILL ATH_COMMON ATM ATM_BR2684 ATM_CLIP ATM_DRIVERS ATM_LANE ATM_MPOA ATM_TCP AUXILIARY_BUS AX25 AX25_DAMA_SLAVE AX88796B_PHY BAREUDP BATMAN_ADV BATMAN_ADV_BATMAN_V BATMAN_ADV_BLA BATMAN_ADV_DAT BATMAN_ADV_MCAST BATMAN_ADV_NC BCACHE BCACHEFS_DEBUG BCACHEFS_ERASURE_CODING BCACHEFS_FS BCACHEFS_POSIX_ACL BCACHEFS_QUOTA BCACHEFS_SIX_OPTIMISTIC_SPIN BCMA BCMA_HOST_PCI_POSSIBLE BEFS_FS BFQ_CGROUP_DEBUG BFQ_GROUP_IOSCHED BFS_FS BIG_KEYS BLK_CGROUP_PUNT_BIO BLK_CGROUP_RWSTAT BLK_DEV_BSGLIB BLK_DEV_INTEGRITY BLK_DEV_NBD BLK_DEV_NULL_BLK BLK_DEV_NULL_BLK_FAULT_INJECTION BLK_DEV_NVME BLK_DEV_PMEM BLK_DEV_RAM BLK_DEV_RNBD BLK_DEV_RNBD_CLIENT BLK_DEV_THROTTLING BLK_ICQ BLK_INLINE_ENCRYPTION BLK_INLINE_ENCRYPTION_FALLBACK BLK_WBT BLK_WBT_MQ BONDING BOOT_VESA_SUPPORT BPF_EVENTS BPF_JIT BPF_JIT_ALWAYS_ON BPF_JIT_DEFAULT_ON BPF_LSM BPF_PRELOAD BPF_PRELOAD_UMD BPF_SYSCALL BPQETHER BRIDGE BRIDGE_CFM BRIDGE_EBT_802_3 BRIDGE_EBT_AMONG BRIDGE_EBT_ARP BRIDGE_EBT_ARPREPLY BRIDGE_EBT_DNAT BRIDGE_EBT_IP BRIDGE_EBT_IP6 BRIDGE_EBT_LIMIT BRIDGE_EBT_LOG BRIDGE_EBT_MARK BRIDGE_EBT_MARK_T BRIDGE_EBT_NFLOG BRIDGE_EBT_PKTTYPE BRIDGE_EBT_REDIRECT BRIDGE_EBT_SNAT BRIDGE_EBT_STP BRIDGE_EBT_VLAN BRIDGE_IGMP_SNOOPING BRIDGE_MRP BRIDGE_NF_EBTABLES BRIDGE_VLAN_FILTERING BSD_DISKLABEL BSD_PROCESS_ACCT_V3 BT BTRFS_ASSERT BTRFS_FS BTRFS_FS_POSIX_ACL BTRFS_FS_REF_VERIFY BTT BT_6LOWPAN BT_ATH3K BT_BCM BT_BNEP BT_BNEP_MC_FILTER BT_BNEP_PROTO_FILTER BT_BREDR BT_HCIBCM203X BT_HCIBFUSB BT_HCIBPA10X BT_HCIBTUSB BT_HCIBTUSB_AUTOSUSPEND BT_HCIBTUSB_BCM BT_HCIBTUSB_MTK BT_HCIBTUSB_POLL_SYNC BT_HCIBTUSB_RTL BT_HCIUART BT_HCIUART_3WIRE BT_HCIUART_AG6XX BT_HCIUART_BCSP BT_HCIUART_H4 BT_HCIUART_LL BT_HCIUART_MRVL BT_HCIUART_QCA BT_HCIUART_SERDEV BT_HCIVHCI BT_INTEL BT_LE BT_LEDS BT_LE_L2CAP_ECRED BT_MRVL BT_MRVL_SDIO BT_MSFTEXT BT_MTK BT_MTKSDIO BT_MTKUART BT_QCA BT_RFCOMM BT_RFCOMM_TTY BT_RTL CACHEFILES CAIF CAIF_DEBUG CAIF_DRIVERS CAIF_NETDEV CAIF_TTY CAIF_USB CAIF_VIRTIO CAN CAN_8DEV_USB CAN_BCM CAN_CALC_BITTIMING CAN_DEV CAN_EMS_USB CAN_ESD_USB CAN_ETAS_ES58X CAN_F81604 CAN_GS_USB CAN_GW CAN_IFI_CANFD CAN_ISOTP CAN_J1939 CAN_KVASER_USB CAN_MCBA_USB CAN_NETLINK CAN_PEAK_USB CAN_RAW CAN_RX_OFFLOAD CAN_SLCAN CAN_UCAN CAN_VCAN CAN_VXCAN CARL9170 CARL9170_HWRNG CARL9170_LEDS CARL9170_WPC CEC_CORE CEPH_FS CEPH_FSCACHE CEPH_FS_POSIX_ACL CEPH_LIB CEPH_LIB_USE_DNS_RESOLVER CFG80211 CFG80211_CRDA_SUPPORT CFG80211_DEBUGFS CFG80211_DEFAULT_PS CFG80211_REQUIRE_SIGNED_REGDB CFG80211_USE_KERNEL_REGDB_KEYS CFG80211_WEXT CFS_BANDWIDTH CHARGER_ISP1704 CHR_DEV_ST CIFS CIFS_ALLOW_INSECURE_LEGACY CIFS_DEBUG CIFS_DFS_UPCALL CIFS_FSCACHE CIFS_POSIX CIFS_SMB_DIRECT CIFS_SWN_UPCALL CIFS_UPCALL CIFS_XATTR CLOSURES CLS_U32_MARK CLS_U32_PERF CMA CMA_SIZE_SEL_MAX CMDLINE_PARTITION COMEDI COMEDI_8254 COMEDI_8255 COMEDI_8255_PCI COMEDI_8255_SA COMEDI_ADL_PCI9118 COMEDI_ADQ12B COMEDI_AIO_AIO12_8 COMEDI_AIO_IIRO_16 COMEDI_AMPLC_DIO200 COMEDI_AMPLC_DIO200_ISA COMEDI_AMPLC_PC236 COMEDI_AMPLC_PC236_ISA COMEDI_AMPLC_PC263_ISA COMEDI_BOND COMEDI_C6XDIGIO COMEDI_DAC02 COMEDI_DAS08 COMEDI_DAS08_ISA COMEDI_DAS16M1 COMEDI_DAS1800 COMEDI_DAS6402 COMEDI_DAS800 COMEDI_DMM32AT COMEDI_DT2801 COMEDI_DT2811 COMEDI_DT2814 COMEDI_DT2815 COMEDI_DT2817 COMEDI_DT282X COMEDI_DT9812 COMEDI_FL512 COMEDI_ISADMA COMEDI_ISA_DRIVERS COMEDI_KCOMEDILIB COMEDI_MISC_DRIVERS COMEDI_MPC624 COMEDI_MULTIQ3 COMEDI_NI_ATMIO16D COMEDI_NI_AT_A2150 COMEDI_NI_AT_AO COMEDI_NI_DAQ_700_CS COMEDI_NI_LABPC COMEDI_NI_LABPC_CS COMEDI_NI_LABPC_ISA COMEDI_NI_LABPC_ISADMA COMEDI_NI_LABPC_PCI COMEDI_NI_USB6501 COMEDI_PARPORT COMEDI_PCI_DRIVERS COMEDI_PCL711 COMEDI_PCL724 COMEDI_PCL726 COMEDI_PCL730 COMEDI_PCL812 COMEDI_PCL816 COMEDI_PCL818 COMEDI_PCM3724 COMEDI_PCMAD COMEDI_PCMCIA_DRIVERS COMEDI_PCMDA12 COMEDI_PCMMIO COMEDI_PCMUIO COMEDI_RTI800 COMEDI_RTI802 COMEDI_S526 COMEDI_TEST COMEDI_USBDUX COMEDI_USBDUXFAST COMEDI_USBDUXSIGMA COMEDI_USB_DRIVERS COMEDI_VMK80XX COMPAT_NETLINK_MESSAGES COUNTER CRAMFS CRAMFS_BLOCKDEV CRAMFS_MTD CRC64 CRC64_ARCH CRC8 CRC_ITU_T CRC_T10DIF CRC_T10DIF_ARCH CRYPTO_842 CRYPTO_ADIANTUM CRYPTO_AEGIS128 CRYPTO_AEGIS128_AESNI_SSE2 CRYPTO_AES_NI_INTEL CRYPTO_AES_TI CRYPTO_ANSI_CPRNG CRYPTO_ANUBIS CRYPTO_ARC4 CRYPTO_ARCH_HAVE_LIB_BLAKE2S CRYPTO_ARCH_HAVE_LIB_CHACHA CRYPTO_ARCH_HAVE_LIB_CURVE25519 CRYPTO_ARCH_HAVE_LIB_POLY1305 CRYPTO_ARIA CRYPTO_ARIA_AESNI_AVX_X86_64 CRYPTO_BLAKE2B CRYPTO_BLAKE2S_X86 CRYPTO_BLOWFISH CRYPTO_BLOWFISH_COMMON CRYPTO_BLOWFISH_X86_64 CRYPTO_CAMELLIA CRYPTO_CAMELLIA_AESNI_AVX2_X86_64 CRYPTO_CAMELLIA_AESNI_AVX_X86_64 CRYPTO_CAMELLIA_X86_64 CRYPTO_CAST5 CRYPTO_CAST5_AVX_X86_64 CRYPTO_CAST6 CRYPTO_CAST6_AVX_X86_64 CRYPTO_CAST_COMMON CRYPTO_CHACHA20 CRYPTO_CHACHA20POLY1305 CRYPTO_CHACHA20_X86_64 CRYPTO_CRC32C CRYPTO_CRYPTD CRYPTO_CTS CRYPTO_CURVE25519 CRYPTO_CURVE25519_X86 CRYPTO_DEFLATE CRYPTO_DES CRYPTO_DES3_EDE_X86_64 CRYPTO_DEV_CCP CRYPTO_DEV_CCP_DD CRYPTO_DEV_PADLOCK CRYPTO_DEV_PADLOCK_AES CRYPTO_DEV_PADLOCK_SHA CRYPTO_DEV_QAT CRYPTO_DEV_QAT_C3XXX CRYPTO_DEV_QAT_C3XXXVF CRYPTO_DEV_QAT_C62X CRYPTO_DEV_QAT_C62XVF CRYPTO_DEV_QAT_DH895xCC CRYPTO_DEV_QAT_DH895xCCVF CRYPTO_DEV_VIRTIO CRYPTO_DH CRYPTO_DRBG_CTR CRYPTO_DRBG_HASH CRYPTO_ECDH CRYPTO_ECRDSA CRYPTO_ENGINE CRYPTO_ESSIV CRYPTO_FCRYPT CRYPTO_GHASH_CLMUL_NI_INTEL CRYPTO_HCTR2 CRYPTO_HKDF CRYPTO_KDF800108_CTR CRYPTO_KHAZAD CRYPTO_KPP CRYPTO_KRB5 CRYPTO_KRB5ENC CRYPTO_LIB_ARC4 CRYPTO_LIB_CHACHA CRYPTO_LIB_CHACHA20POLY1305 CRYPTO_LIB_CHACHA_GENERIC CRYPTO_LIB_CURVE25519 CRYPTO_LIB_CURVE25519_GENERIC CRYPTO_LIB_CURVE25519_INTERNAL CRYPTO_LIB_DES CRYPTO_LIB_POLY1305 CRYPTO_LIB_POLY1305_GENERIC CRYPTO_LIB_SHA1_ARCH CRYPTO_LIB_SHA256_ARCH CRYPTO_LIB_SHA512 CRYPTO_LIB_SHA512_ARCH CRYPTO_LIB_SM3 CRYPTO_LRW CRYPTO_LZ4 CRYPTO_LZ4HC CRYPTO_MICHAEL_MIC CRYPTO_NHPOLY1305 CRYPTO_NHPOLY1305_AVX2 CRYPTO_NHPOLY1305_SSE2 CRYPTO_PCBC CRYPTO_PCRYPT CRYPTO_POLY1305_X86_64 CRYPTO_POLYVAL CRYPTO_POLYVAL_CLMUL_NI CRYPTO_RMD160 CRYPTO_SEED CRYPTO_SERPENT CRYPTO_SERPENT_AVX2_X86_64 CRYPTO_SERPENT_AVX_X86_64 CRYPTO_SERPENT_SSE2_X86_64 CRYPTO_SM3_AVX_X86_64 CRYPTO_SM4 CRYPTO_SM4_AESNI_AVX2_X86_64 CRYPTO_SM4_AESNI_AVX_X86_64 CRYPTO_SM4_GENERIC CRYPTO_STREEBOG CRYPTO_TEA CRYPTO_TWOFISH CRYPTO_TWOFISH_AVX_X86_64 CRYPTO_TWOFISH_COMMON CRYPTO_TWOFISH_X86_64 CRYPTO_TWOFISH_X86_64_3WAY CRYPTO_USER CRYPTO_USER_API CRYPTO_USER_API_AEAD CRYPTO_USER_API_ENABLE_OBSOLETE CRYPTO_USER_API_HASH CRYPTO_USER_API_RNG CRYPTO_USER_API_SKCIPHER CRYPTO_WP512 CRYPTO_XCBC CRYPTO_XCTR CRYPTO_XTS CRYPTO_XXHASH CRYPTO_ZSTD CUSE CYPRESS_FIRMWARE DAMON DAMON_PADDR DAMON_RECLAIM DAMON_VADDR DCA DCB DEBUG_VFS DEFAULT_CODEL DEVICE_MIGRATION DEVICE_PRIVATE DMA_CMA FSCACHE FUSE_FS GPIOLIB HAMRADIO INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_RTRS_CLIENT IOSCHED_BFQ ISA_BUS LIBNVDIMM MAC80211 MAC80211_DEBUGFS MAC80211_LEDS MEDIA_SUPPORT MEMORY_HOTPLUG MEMORY_HOTREMOVE MMC MTD NET_CLS_U32 NET_SCH_DEFAULT PARTITION_ADVANCED PCCARD PCMCIA RFKILL SERIAL_DEV_BUS TLS TLS_DEVICE USB_GADGET USB_PHY VLAN_8021Q WANT_COMPAT_NETLINK_MESSAGES WEXT_CORE WIRELESS WLAN WLAN_VENDOR_ATH ZONE_DEVICE] disabling configs for [atomic_sleep hang memleak bug_or_warning kasan locking], they are not needed picked [v6.16 v6.15 v6.14 v6.12 v6.10 v6.8 v6.6 v6.4 v6.1 v5.18 v5.15 v5.12 v5.9 v5.6 v5.3 v5.0 v4.19] out of 39 release tags testing release v6.16 testing commit 038d61fd642278bab63ee8ef722c50d10ab01e8f gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 6a2ff4c58d2c79990d75bb3d417c0cdf05f25b6354dea8757e29da4f0e3c15db all runs: crashed: UBSAN: array-index-out-of-bounds in bch2_accounting_validate representative crash: UBSAN: array-index-out-of-bounds in bch2_accounting_validate, types: [MEMORY_SAFETY_UBSAN] testing release v6.15 testing commit 0ff41df1cb268fc69e703a08a57ee14ae967d0ca gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: bea95be3830c47a935bf3799d7227bf855c842d24f63985507848dd6f4c4c9be all runs: crashed: UBSAN: array-index-out-of-bounds in bch2_accounting_validate representative crash: UBSAN: array-index-out-of-bounds in bch2_accounting_validate, types: [MEMORY_SAFETY_UBSAN] testing release v6.14 testing commit 38fec10eb60d687e30c8c6b5420d86e8149f7557 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: b54925fc22943b01b1067588c6e9420dcd25091eea0742f1d12e4c84db2f6c37 all runs: crashed: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update representative crash: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update, types: [UBSAN] testing release v6.12 testing commit adc218676eef25575469234709c2d87185ca223a gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 7c9f2946663865b0528cbb32c1bac982a745040a849ff9984b78f8489c6d47e1 all runs: crashed: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update representative crash: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update, types: [UBSAN] testing release v6.10 testing commit 0c3836482481200ead7b416ca80c68a29cfdaabd gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 884e923af2c77b05209069253c5c1c927bae432c8dc450746df7a0170d92fb3c all runs: boot failed: UBSAN: signed-integer-overflow in __cancel_work unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 testing release v6.8 testing commit e8f897f4afef0031fe618a8e94127a0934896aba gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 6a0add07c37cc88c04edcd62665483c586d0cf5b1647bf2966367ebcef41e5c0 all runs: OK false negative chance: 0.000 # git bisect start adc218676eef25575469234709c2d87185ca223a e8f897f4afef0031fe618a8e94127a0934896aba Bisecting: 29982 revisions left to test after this (roughly 15 steps) [91c93e475ca4b4bd5f1e8d525c9a9810283db056] Merge tag 'drm-misc-next-2024-06-13' of https://gitlab.freedesktop.org/drm/misc/kernel into drm-next testing commit 91c93e475ca4b4bd5f1e8d525c9a9810283db056 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 2af8cedd0dcfbcb5c2700cadec99cd39ae401de8e5157b60dbceb5d381678cd7 all runs: boot failed: UBSAN: signed-integer-overflow in __cancel_work unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 # git bisect skip 91c93e475ca4b4bd5f1e8d525c9a9810283db056 Bisecting: 29983 revisions left to test after this (roughly 15 steps) [0b1efc3e78d12278a8c0f2c665d66564a2cb965f] readahead: drop dead code in ondemand_readahead() testing commit 0b1efc3e78d12278a8c0f2c665d66564a2cb965f gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: aa14392a8c1c5c340e1db56b4b4600b73f710dc7c2d3c4fd41046de47a461ecb all runs: boot failed: UBSAN: signed-integer-overflow in __cancel_work unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 # git bisect skip 0b1efc3e78d12278a8c0f2c665d66564a2cb965f Bisecting: 29983 revisions left to test after this (roughly 15 steps) [e6ce1f12d777f6ee22b20e10ae6a771e7e6f44f5] s390/cpum_cf: Fix endless loop in CF_DIAG event stop testing commit e6ce1f12d777f6ee22b20e10ae6a771e7e6f44f5 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 393b21bf2fc8933e6426d5ffe6613b24409a3aa22281079dea941c8209de38fa all runs: boot failed: UBSAN: signed-integer-overflow in __cancel_work unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 # git bisect skip e6ce1f12d777f6ee22b20e10ae6a771e7e6f44f5 Bisecting: 29983 revisions left to test after this (roughly 15 steps) [319a624ec2b79db7a0b0a2a2a61e3aa5c96eabfc] mm/huge_memory: only split PMD mapping when necessary in unmap_folio() testing commit 319a624ec2b79db7a0b0a2a2a61e3aa5c96eabfc gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 21fcfa385b3294a73cdf7bc5acc14324f42471eef722b90c39fc2d4495df8cec all runs: OK false negative chance: 0.000 # git bisect good 319a624ec2b79db7a0b0a2a2a61e3aa5c96eabfc Bisecting: 29809 revisions left to test after this (roughly 15 steps) [31b42af516afa1e184d1a9f9dd4096c54044269a] drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability testing commit 31b42af516afa1e184d1a9f9dd4096c54044269a gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 2a46103aed0e158aba5dd58cfd045bd27eb6e2d243c67af2d4cd682a04d140bb all runs: boot failed: UBSAN: signed-integer-overflow in __cancel_work unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 # git bisect skip 31b42af516afa1e184d1a9f9dd4096c54044269a Bisecting: 29809 revisions left to test after this (roughly 15 steps) [7947d187a6ea4d42ad93c59f75c5d1a71618a522] i2c: opal: reword according to newest specification testing commit 7947d187a6ea4d42ad93c59f75c5d1a71618a522 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: cc46f3f1f184c92c5aa4bf2f56432eeb4aec573469b3b067a8f5224e06d35b43 run #0: boot failed: UBSAN: signed-integer-overflow in __cancel_work run #1: boot failed: UBSAN: signed-integer-overflow in __cancel_work run #2: boot failed: can't ssh into the instance run #3: boot failed: UBSAN: signed-integer-overflow in __cancel_work run #4: boot failed: UBSAN: signed-integer-overflow in __cancel_work run #5: boot failed: UBSAN: signed-integer-overflow in __cancel_work run #6: boot failed: UBSAN: signed-integer-overflow in __cancel_work run #7: boot failed: UBSAN: signed-integer-overflow in __cancel_work run #8: boot failed: UBSAN: signed-integer-overflow in __cancel_work run #9: boot failed: UBSAN: signed-integer-overflow in __cancel_work unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 # git bisect skip 7947d187a6ea4d42ad93c59f75c5d1a71618a522 Bisecting: 29809 revisions left to test after this (roughly 15 steps) [d6b54900c564e35989cf6813e4071504fa0a90e0] drm/amd/display: Avoid overflow from uint32_t to uint8_t testing commit d6b54900c564e35989cf6813e4071504fa0a90e0 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 945050e72780d57c1490733252bec1a3af3cdf5ad386a0fc0fd338e964569cd7 all runs: crashed: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update representative crash: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update, types: [UBSAN] # git bisect bad d6b54900c564e35989cf6813e4071504fa0a90e0 Bisecting: 8015 revisions left to test after this (roughly 13 steps) [480e035fc4c714fb5536e64ab9db04fedc89e910] Merge tag 'drm-next-2024-03-13' of https://gitlab.freedesktop.org/drm/kernel testing commit 480e035fc4c714fb5536e64ab9db04fedc89e910 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 99b09d058056bd93bec4520f50f05d223d7f72099165b998f7ef89df2394aa06 all runs: crashed: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update representative crash: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update, types: [UBSAN] # git bisect bad 480e035fc4c714fb5536e64ab9db04fedc89e910 Bisecting: 2870 revisions left to test after this (roughly 12 steps) [9187210eee7d87eea37b45ea93454a88681894a4] Merge tag 'net-next-6.9' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next testing commit 9187210eee7d87eea37b45ea93454a88681894a4 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 6fc63185fba16877b515690e61baaa5789fdbb0824a188c103bfd83118b4e43c all runs: crashed: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update representative crash: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update, types: [UBSAN] # git bisect bad 9187210eee7d87eea37b45ea93454a88681894a4 Bisecting: 2600 revisions left to test after this (roughly 11 steps) [a01c9fe32378636ae65bec8047b5de3fdb2ba5c8] Merge tag 'nfsd-6.9' of git://git.kernel.org/pub/scm/linux/kernel/git/cel/linux testing commit a01c9fe32378636ae65bec8047b5de3fdb2ba5c8 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 03ebe85efb5af06216a0229f3cff897dcf2b9e4b0f362a875133a8e5389d7667 run #0: ignore: lost connection to test machine run #1: OK run #2: OK run #3: OK run #4: OK run #5: OK run #6: OK run #7: OK run #8: OK run #9: OK false negative chance: 0.000 # git bisect good a01c9fe32378636ae65bec8047b5de3fdb2ba5c8 Bisecting: 1300 revisions left to test after this (roughly 10 steps) [ba0b78371c46b2104197ff2c244f13f011ddfa80] Revert "net: bcmgenet: Ensure MDIO unregistration has clocks enabled" testing commit ba0b78371c46b2104197ff2c244f13f011ddfa80 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 563d45f1191ff4d9888920a4c65afb33ec0c3a170e5297f9d12b8cfa82421b7a all runs: OK false negative chance: 0.000 # git bisect good ba0b78371c46b2104197ff2c244f13f011ddfa80 Bisecting: 649 revisions left to test after this (roughly 9 steps) [1677293ed891664796af51b64feba12a99def4a8] net: phy: qca807x: fix compilation when CONFIG_GPIOLIB is not set testing commit 1677293ed891664796af51b64feba12a99def4a8 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 408c3223117daee30ef6a8d1fafc9a06bc25b05bc6f237949ec9be64c7c84fe3 all runs: OK false negative chance: 0.000 # git bisect good 1677293ed891664796af51b64feba12a99def4a8 Bisecting: 312 revisions left to test after this (roughly 8 steps) [2f901582f032bed47907a20f77fb44b3532b4762] Merge tag 'for-net-next-2024-03-08' of git://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next testing commit 2f901582f032bed47907a20f77fb44b3532b4762 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: b0775aace46adcdd06e1ac15394c91535bd14558342ddc5b245be16bb40c0fa6 all runs: OK false negative chance: 0.000 # git bisect good 2f901582f032bed47907a20f77fb44b3532b4762 Bisecting: 156 revisions left to test after this (roughly 7 steps) [5f20e6ab1f65aaaaae248e6946d5cb6d039e7de8] Merge tag 'for-netdev' of https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next testing commit 5f20e6ab1f65aaaaae248e6946d5cb6d039e7de8 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 78bfb1ab12a6d1231816905abe479f6a1b1c38509e565aee5110dd5135f07a34 all runs: OK false negative chance: 0.000 # git bisect good 5f20e6ab1f65aaaaae248e6946d5cb6d039e7de8 Bisecting: 76 revisions left to test after this (roughly 6 steps) [3749bda230478a8716a812f4d069c2f29dd246c4] Merge tag 'audit-pr-20240312' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/audit testing commit 3749bda230478a8716a812f4d069c2f29dd246c4 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 46dab606adf5d2fb6f00415306f0ad7a45dbfe7f14311a4c18d3a725958bbe80 all runs: crashed: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update representative crash: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update, types: [UBSAN] # git bisect bad 3749bda230478a8716a812f4d069c2f29dd246c4 Bisecting: 39 revisions left to test after this (roughly 5 steps) [c2efa5387c2676815ebbb6a954bf72fef2609709] lib: stackinit: Adjust target string to 8 bytes for m68k testing commit c2efa5387c2676815ebbb6a954bf72fef2609709 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 4d6f67309f7513ad518be2b1cccee91b61f181a5100296890151fbb8283f9ddc all runs: crashed: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update representative crash: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update, types: [UBSAN] # git bisect bad c2efa5387c2676815ebbb6a954bf72fef2609709 Bisecting: 19 revisions left to test after this (roughly 4 steps) [de2683e7fdac0c33c4c2c115e69dbbbe904a2224] hardening: Enable KFENCE in the hardening config testing commit de2683e7fdac0c33c4c2c115e69dbbbe904a2224 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: f1edede59deb8b7327059a5339c6be1479651306d8fcb8ddba34fa622cc05e33 all runs: crashed: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update representative crash: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update, types: [UBSAN] # git bisect bad de2683e7fdac0c33c4c2c115e69dbbbe904a2224 Bisecting: 9 revisions left to test after this (roughly 3 steps) [167ebeda36fae4bb47ace32bcacecde7d24d2850] ubsan: Use Clang's -fsanitize-trap=undefined option testing commit 167ebeda36fae4bb47ace32bcacecde7d24d2850 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 81d8ad2b958b5dd7e824dab220380e21a758cbeabec9f0370f1ebe9eba18e08b all runs: OK false negative chance: 0.000 # git bisect good 167ebeda36fae4bb47ace32bcacecde7d24d2850 Bisecting: 4 revisions left to test after this (roughly 2 steps) [e6584c3964f2ff76a9fb5a701e4a59997b35e547] string: Allow 2-argument strscpy() testing commit e6584c3964f2ff76a9fb5a701e4a59997b35e547 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: adb3c1bae7b2b11a0cac1a216a1deaca73c781765c3816cbff1fe4fdf2377bb3 all runs: crashed: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update representative crash: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update, types: [UBSAN] # git bisect bad e6584c3964f2ff76a9fb5a701e4a59997b35e547 Bisecting: 1 revision left to test after this (roughly 1 step) [557f8c582a9ba8abe6aa0fd734b6f342af106b26] ubsan: Reintroduce signed overflow sanitizer testing commit 557f8c582a9ba8abe6aa0fd734b6f342af106b26 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 852d1fd73b971976a3867e4b46682957f8b2f764e1f0a1980203893390a0d6e3 all runs: crashed: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update representative crash: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update, types: [UBSAN] # git bisect bad 557f8c582a9ba8abe6aa0fd734b6f342af106b26 Bisecting: 1 revision left to test after this (roughly 1 step) [30edbdf9b98ddc9087f5f8b9a9644fa5c05fa5b1] ubsan: Silence W=1 warnings in self-test testing commit 30edbdf9b98ddc9087f5f8b9a9644fa5c05fa5b1 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: bb2cf39379bf75b930fac55507b1bc4ae26cf9d4b858cd3fc14b849c11e94126 all runs: OK false negative chance: 0.000 # git bisect good 30edbdf9b98ddc9087f5f8b9a9644fa5c05fa5b1 Bisecting: 0 revisions left to test after this (roughly 0 steps) [918327e9b7ffb45321cbb4b9b86b58ec555fe6b3] ubsan: Remove CONFIG_UBSAN_SANITIZE_ALL testing commit 918327e9b7ffb45321cbb4b9b86b58ec555fe6b3 gcc compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 kernel signature: 832285517800c80d61e6dae99b93021e828cb8adf359463fb8ac9cd9240c163a all runs: OK false negative chance: 0.000 # git bisect good 918327e9b7ffb45321cbb4b9b86b58ec555fe6b3 557f8c582a9ba8abe6aa0fd734b6f342af106b26 is the first bad commit commit 557f8c582a9ba8abe6aa0fd734b6f342af106b26 Author: Kees Cook Date: Thu Jan 18 15:06:05 2024 -0800 ubsan: Reintroduce signed overflow sanitizer In order to mitigate unexpected signed wrap-around[1], bring back the signed integer overflow sanitizer. It was removed in commit 6aaa31aeb9cf ("ubsan: remove overflow checks") because it was effectively a no-op when combined with -fno-strict-overflow (which correctly changes signed overflow from being "undefined" to being explicitly "wrap around"). Compilers are adjusting their sanitizers to trap wrap-around and to detecting common code patterns that should not be instrumented (e.g. "var + offset < var"). Prepare for this and explicitly rename the option from "OVERFLOW" to "WRAP" to more accurately describe the behavior. To annotate intentional wrap-around arithmetic, the helpers wrapping_add/sub/mul_wrap() can be used for individual statements. At the function level, the __signed_wrap attribute can be used to mark an entire function as expecting its signed arithmetic to wrap around. For a single object file the Makefile can use "UBSAN_SIGNED_WRAP_target.o := n" to mark it as wrapping, and for an entire directory, "UBSAN_SIGNED_WRAP := n" can be used. Additionally keep these disabled under CONFIG_COMPILE_TEST for now. Link: https://github.com/KSPP/linux/issues/26 [1] Cc: Miguel Ojeda Cc: Nathan Chancellor Cc: Peter Zijlstra Cc: Hao Luo Reviewed-by: Marco Elver Reviewed-by: Justin Stitt Signed-off-by: Kees Cook include/linux/compiler_types.h | 9 +++++- lib/Kconfig.ubsan | 15 +++++++++- lib/test_ubsan.c | 37 +++++++++++++++++++++++ lib/ubsan.c | 68 ++++++++++++++++++++++++++++++++++++++++++ lib/ubsan.h | 4 +++ scripts/Makefile.lib | 3 ++ scripts/Makefile.ubsan | 3 ++ 7 files changed, 137 insertions(+), 2 deletions(-) accumulated error probability: 0.00 culprit signature: 852d1fd73b971976a3867e4b46682957f8b2f764e1f0a1980203893390a0d6e3 parent signature: 832285517800c80d61e6dae99b93021e828cb8adf359463fb8ac9cd9240c163a revisions tested: 35, total time: 8h14m56.363630186s (build: 3h36m19.002768694s, test: 4h11m15.973190238s) first bad commit: 557f8c582a9ba8abe6aa0fd734b6f342af106b26 ubsan: Reintroduce signed overflow sanitizer recipients (to): ["elver@google.com" "justinstitt@google.com" "keescook@chromium.org"] recipients (cc): [] crash: UBSAN: signed-integer-overflow in mean_and_variance_weighted_update bcachefs (loop2): mounting version 1.13: (unknown version) opts=metadata_checksum=none,data_checksum=none,noshard_inode_numbers bcachefs (loop2): recovering from clean shutdown, journal seq 15 bcachefs (loop2): Version downgrade required: ------------[ cut here ]------------ UBSAN: signed-integer-overflow in fs/bcachefs/mean_and_variance.c:127:52 -17293840365824 * -17226286301895 cannot be represented in type 's64' (aka 'long long') CPU: 0 PID: 3353 Comm: syz.2.17 Not tainted 6.8.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Call Trace: dump_stack_lvl+0x67/0xa0 lib/dump_stack.c:106 ubsan_epilogue+0x5/0x30 lib/ubsan.c:217 handle_overflow+0x10f/0x120 lib/ubsan.c:248 mean_and_variance_weighted_update+0x1fe/0x290 fs/bcachefs/mean_and_variance.c:127 bch2_time_stats_update_one+0x2eb/0x400 fs/bcachefs/util.c:424 __bch2_time_stats_update+0xb8/0x150 fs/bcachefs/util.c:461 bch2_time_stats_update fs/bcachefs/util.h:407 [inline] bch2_btree_node_mem_alloc+0x48c/0x7c0 fs/bcachefs/btree_cache.c:651 __bch2_btree_root_read fs/bcachefs/btree_io.c:1721 [inline] bch2_btree_root_read+0xda/0x2f0 fs/bcachefs/btree_io.c:1755 read_btree_roots+0xda/0x1c0 fs/bcachefs/recovery.c:408 bch2_fs_recovery+0xa45/0x1080 fs/bcachefs/recovery.c:973 bch2_fs_start+0x120/0x230 fs/bcachefs/super.c:1012 bch2_fs_open+0xca6/0x13f0 fs/bcachefs/super.c:2062 bch2_mount+0x239/0x620 fs/bcachefs/fs.c:1831 legacy_get_tree+0x2d/0x60 fs/fs_context.c:662 vfs_get_tree+0x26/0xb0 fs/super.c:1784 do_new_mount+0x132/0x360 fs/namespace.c:3352 do_mount fs/namespace.c:3692 [inline] __do_sys_mount fs/namespace.c:3898 [inline] __se_sys_mount+0x13c/0x1a0 fs/namespace.c:3875 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x92/0x180 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x6f/0x77 RIP: 0033:0x7f8504f5830a Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f85041c5e68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f85041c5ef0 RCX: 00007f8504f5830a RDX: 0000200000001000 RSI: 0000200000000000 RDI: 00007f85041c5eb0 RBP: 0000200000001000 R08: 00007f85041c5ef0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000200000000000 R13: 00007f85041c5eb0 R14: 0000000000004932 R15: 0000200000000040 ---[ end trace ]---