ci starts bisection 2025-04-28 04:40:30.387690988 +0000 UTC m=+223146.849310068 bisecting cause commit starting from cc17b4b9c332cc654b248619c1d8ca40d80d1155 building syzkaller on c6b4fb399236b655a39701fd51c33522caa06811 ensuring issue is reproducible on original commit cc17b4b9c332cc654b248619c1d8ca40d80d1155 testing commit cc17b4b9c332cc654b248619c1d8ca40d80d1155 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: b8cd0ad075347117dfce31eb23815f0041e9563332516d72d5cbc4e04d9d353c all runs: crashed: UBSAN: array-index-out-of-bounds in ip6_rt_copy_init representative crash: UBSAN: array-index-out-of-bounds in ip6_rt_copy_init, types: [UBSAN] check whether we can drop unnecessary instrumentation disabling configs for [HANG LEAK BUG KASAN LOCKDEP ATOMIC_SLEEP], they are not needed testing commit cc17b4b9c332cc654b248619c1d8ca40d80d1155 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 2815001f35805dd26c3fb6858b93d4466081ec450442604cdbf7c08e6e1bd7de all runs: crashed: UBSAN: array-index-out-of-bounds in ip6_rt_copy_init representative crash: UBSAN: array-index-out-of-bounds in ip6_rt_copy_init, types: [UBSAN] the bug reproduces without the instrumentation disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK BUG KASAN], they are not needed kconfig minimization: base=4087 full=8330 leaves diff=2129 split chunks (needed=false): <2129> split chunk #0 of len 2129 into 5 parts testing without sub-chunk 1/5 disabling configs for [HANG LEAK BUG KASAN LOCKDEP ATOMIC_SLEEP], they are not needed testing commit cc17b4b9c332cc654b248619c1d8ca40d80d1155 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 0ed7db4f22b150c9ec3ef6d4386ea4d79e4adaa71523f1d83233f2b13473cbb1 all runs: crashed: UBSAN: array-index-out-of-bounds in ip6_rt_copy_init representative crash: UBSAN: array-index-out-of-bounds in ip6_rt_copy_init, types: [UBSAN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK BUG], they are not needed testing commit cc17b4b9c332cc654b248619c1d8ca40d80d1155 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 failed building cc17b4b9c332cc654b248619c1d8ca40d80d1155: ld.lld: error: undefined symbol: devm_drm_of_get_bridge testing without sub-chunk 3/5 disabling configs for [HANG LEAK BUG KASAN LOCKDEP ATOMIC_SLEEP], they are not needed testing commit cc17b4b9c332cc654b248619c1d8ca40d80d1155 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 848abc0c6b533448886f4f78592a95880de319bb37bbc3ae0409e9d4fb8d5da5 all runs: crashed: UBSAN: array-index-out-of-bounds in ip6_rt_copy_init representative crash: UBSAN: array-index-out-of-bounds in ip6_rt_copy_init, types: [UBSAN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [LEAK BUG KASAN LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit cc17b4b9c332cc654b248619c1d8ca40d80d1155 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 1c1435b40ca34cc8bc51f199ddd45dabfa9c8309e7b46aa6b6694005ae92855a all runs: OK false negative chance: 0.000 testing without sub-chunk 5/5 disabling configs for [BUG KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit cc17b4b9c332cc654b248619c1d8ca40d80d1155 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 859880d47ece82a310ae363301e81f6907b1821a073f4ca9742f50effd3e0523 all runs: crashed: UBSAN: array-index-out-of-bounds in ip6_rt_copy_init representative crash: UBSAN: array-index-out-of-bounds in ip6_rt_copy_init, types: [UBSAN] the chunk can be dropped minimized to 852 configs; suspects: [6LOWPAN AF_RXRPC ARCH_ENABLE_MEMORY_HOTREMOVE ASUS_WMI ATM AX25 BT BT_BREDR BT_HIDP BXT_WC_PMIC_OPREGION CFG80211 CHARGER_BQ24190 CMA COMMON_CLK DAX DLM DRM DRM_BRIDGE DRM_CLIENT_SELECTION DRM_CLIENT_SETUP DRM_DEBUG_MM DRM_DISPLAY_DP_AUX_BUS DRM_DISPLAY_DP_HELPER DRM_DISPLAY_DSC_HELPER DRM_DISPLAY_HDCP_HELPER DRM_DISPLAY_HDMI_HELPER DRM_DISPLAY_HELPER DRM_GEM_SHMEM_HELPER DRM_GM12U320 DRM_GUD DRM_I915 DRM_I915_CAPTURE_ERROR DRM_I915_COMPRESS_ERROR DRM_I915_USERPTR DRM_KMS_HELPER DRM_MIPI_DSI DRM_PANEL DRM_PANEL_BRIDGE DRM_PANEL_EDP DRM_PANEL_ORIENTATION_QUIRKS DRM_SIMPLEDRM DRM_TTM DRM_TTM_HELPER DRM_UDL DRM_VGEM DRM_VIRTIO_GPU DRM_VIRTIO_GPU_KMS DRM_VKMS DRM_VMWGFX DUMMY DVB_AF9013 DVB_AF9033 DVB_AS102 DVB_AS102_FE DVB_B2C2_FLEXCOP DVB_B2C2_FLEXCOP_USB DVB_CORE DVB_DIB3000MB DVB_DIB3000MC DVB_EC100 DVB_GP8PSK_FE DVB_RTL2830 DVB_RTL2832 DVB_RTL2832_SDR DVB_TEST_DRIVERS DVB_TTUSB_BUDGET DVB_TTUSB_DEC DVB_USB DVB_USB_A800 DVB_USB_AF9005 DVB_USB_AF9005_REMOTE DVB_USB_AF9015 DVB_USB_AF9035 DVB_USB_ANYSEE DVB_USB_AU6610 DVB_USB_AZ6007 DVB_USB_AZ6027 DVB_USB_CE6230 DVB_USB_CINERGY_T2 DVB_USB_CXUSB DVB_USB_CXUSB_ANALOG DVB_USB_DIB0700 DVB_USB_DIB3000MC DVB_USB_DIBUSB_MB DVB_USB_DIBUSB_MC DVB_USB_DIGITV DVB_USB_DTT200U DVB_USB_DTV5100 DVB_USB_DVBSKY DVB_USB_DW2102 DVB_USB_EC168 DVB_USB_GL861 DVB_USB_GP8PSK DVB_USB_LME2510 DVB_USB_M920X DVB_USB_MXL111SF DVB_USB_NOVA_T_USB2 DVB_USB_OPERA1 DVB_USB_PCTV452E DVB_USB_RTL28XXU DVB_USB_TECHNISAT_USB2 DVB_USB_TTUSB2 DVB_USB_UMT_010 DVB_USB_V2 DVB_USB_VP702X DVB_USB_VP7045 DVB_USB_ZD1301 DVB_VIDTV DVB_ZL10353 ECRYPT_FS ECRYPT_FS_MESSAGING EDAC EFS_FS ENCRYPTED_KEYS EQUALIZER EROFS_FS EROFS_FS_POSIX_ACL EROFS_FS_SECURITY EROFS_FS_XATTR EROFS_FS_ZIP EVM EVM_ADD_XATTRS EVM_ATTR_FSUUID EXFAT_FS EXPORTFS_BLOCK_OPS EXT3_FS EXT3_FS_POSIX_ACL EXT3_FS_SECURITY EXTCON EXTCON_INTEL_CHT_WC EXTCON_PTN5150 EXTCON_USBC_TUSB320 F2FS_CHECK_FS F2FS_FAULT_INJECTION F2FS_FS F2FS_FS_COMPRESSION F2FS_FS_LZ4 F2FS_FS_LZ4HC F2FS_FS_LZO F2FS_FS_LZORLE F2FS_FS_POSIX_ACL F2FS_FS_SECURITY F2FS_FS_XATTR F2FS_FS_ZSTD F2FS_STAT_FS FANOTIFY FANOTIFY_ACCESS_PERMISSIONS FB FB_CFB_COPYAREA FB_CFB_FILLRECT FB_CFB_IMAGEBLIT FB_CORE FB_DEFERRED_IO FB_DEVICE FB_IOMEM_FOPS FB_IOMEM_HELPERS FB_NOTIFY FB_SYSMEM_FOPS FB_SYSMEM_HELPERS FB_SYSMEM_HELPERS_DEFERRED FB_SYS_COPYAREA FB_SYS_FILLRECT FB_SYS_IMAGEBLIT FB_TILEBLITTING FB_VESA FB_VGA16 FB_VIRTUAL FDDI FIREWIRE FIREWIRE_NET FIREWIRE_OHCI FIREWIRE_SBP2 FONT_8x16 FONT_8x8 FONT_SUPPORT FRAMEBUFFER_CONSOLE FRAMEBUFFER_CONSOLE_DETECT_PRIMARY FRAMEBUFFER_CONSOLE_ROTATION FS_DAX FS_DAX_PMD FS_ENCRYPTION FS_ENCRYPTION_ALGS FS_STACK FS_VERITY FS_VERITY_BUILTIN_SIGNATURES FTL FUSE_DAX FUSE_FS FW_LOADER_COMPRESS FW_LOADER_PAGED_BUF FW_LOADER_SYSFS FW_LOADER_USER_HELPER FW_LOADER_USER_HELPER_FALLBACK GACT_PROB GARP GENDWARFKSYMS GENERIC_PHY GENEVE GET_FREE_REGION GFS2_FS GFS2_FS_LOCKING_DLM GNSS GNSS_USB GOOGLE_COREBOOT_TABLE GOOGLE_FIRMWARE GOOGLE_MEMCONSOLE GOOGLE_MEMCONSOLE_COREBOOT GOOGLE_VPD GPIOLIB GPIOLIB_IRQCHIP GPIO_ACPI GPIO_DLN2 GPIO_LJCA GPIO_VIPERBOARD GREENASIA_FF GREYBUS GREYBUS_BRIDGED_PHY GREYBUS_ES2 GREYBUS_HID GREYBUS_USB GTP GUEST_PERF_EVENTS GVE HAMRADIO HAS_LTO_CLANG HAVE_ARCH_NODE_DEV_GROUP HAVE_ARCH_USERFAULTFD_MINOR HAVE_ARCH_USERFAULTFD_WP HAVE_BOOTMEM_INFO_NODE HAVE_CLK HAVE_CLK_PREPARE HAVE_KVM_CPU_RELAX_INTERCEPT HAVE_KVM_DIRTY_RING HAVE_KVM_DIRTY_RING_ACQ_REL HAVE_KVM_DIRTY_RING_TSO HAVE_KVM_IRQCHIP HAVE_KVM_IRQ_BYPASS HAVE_KVM_IRQ_ROUTING HAVE_KVM_MSI HAVE_KVM_NO_POLL HAVE_KVM_PFNCACHE HAVE_KVM_PM_NOTIFIER HAVE_KVM_READONLY_MEM HAVE_SCHED_AVG_IRQ HDLC HDLC_CISCO HDLC_FR HDLC_PPP HDLC_RAW HDLC_RAW_ETH HDLC_X25 HDMI HFSPLUS_FS HFS_FS HID_ACCUTOUCH HID_ACRUX HID_ACRUX_FF HID_ALPS HID_APPLEIR HID_ASUS HID_AUREAL HID_BATTERY_STRENGTH HID_BETOP_FF HID_BIGBEN_FF HID_CMEDIA HID_CORSAIR HID_COUGAR HID_CP2112 HID_CREATIVE_SB0540 HID_ELAN HID_ELECOM HID_ELO HID_EMS_FF HID_EVISION HID_FT260 HID_GEMBIRD HID_GFRM HID_GLORIOUS HID_GOOGLE_STADIA_FF HID_GREENASIA HID_GT683R HID_HOLTEK HID_ICADE HID_JABRA HID_KEYTOUCH HID_KYE HID_LCPOWER HID_LED HID_LENOVO HID_LETSKETCH HID_LOGITECH HID_LOGITECH_DJ HID_LOGITECH_HIDPP HID_MACALLY HID_MAGICMOUSE HID_MALTRON HID_MAYFLASH HID_MCP2200 HID_MCP2221 HID_MEGAWORLD_FF HID_MULTITOUCH HID_NINTENDO HID_NTI HID_NVIDIA_SHIELD HID_ORTEK HID_PENMOUNT HID_PICOLCD HID_PICOLCD_BACKLIGHT HID_PICOLCD_CIR HID_PICOLCD_FB HID_PICOLCD_LCD HID_PICOLCD_LEDS HID_PLANTRONICS HID_PLAYSTATION HID_PRIMAX HID_PRODIKEYS HID_PXRC HID_RAZER HID_RETRODE HID_RMI HID_ROCCAT HID_SAITEK HID_SEMITEK HID_SENSOR_ACCEL_3D HID_SENSOR_ALS HID_SENSOR_CUSTOM_INTEL_HINGE HID_SENSOR_CUSTOM_SENSOR HID_SENSOR_DEVICE_ROTATION HID_SENSOR_GYRO_3D HID_SENSOR_HUB HID_SENSOR_HUMIDITY HID_SENSOR_IIO_COMMON HID_SENSOR_IIO_TRIGGER HID_SENSOR_INCLINOMETER_3D HID_SENSOR_MAGNETOMETER_3D HID_SENSOR_PRESS HID_SENSOR_PROX HID_SENSOR_TEMP HID_SIGMAMICRO HID_SMARTJOYPLUS HID_SPEEDLINK HID_STEAM HID_STEELSERIES HID_THINGM HID_THRUSTMASTER HID_TIVO HID_TOPRE HID_TWINHAN HID_U2FZERO HID_UCLOGIC HID_UDRAW_PS3 HID_VIEWSONIC HID_VIVALDI HID_VIVALDI_COMMON HID_VRC2 HID_WACOM HID_WALTOP HID_WIIMOTE HID_XIAOMI HID_XINMO HID_ZYDACRON HMM_MIRROR HOLTEK_FF HOTPLUG_PCI_PCIE HPET_MMAP HPET_MMAP_DEFAULT HPFS_FS I2C_ALGOBIT I2C_CHARDEV I2C_CP2615 I2C_DESIGNWARE_CORE I2C_DESIGNWARE_PLATFORM I2C_DIOLAN_U2C I2C_DLN2 I2C_HID_ACPI I2C_HID_CORE I2C_HID_OF I2C_LJCA I2C_MUX I2C_MUX_REG I2C_ROBOTFUZZ_OSIF I2C_SI4713 I2C_SLAVE I2C_SLAVE_EEPROM I2C_TINY_USB I2C_VIPERBOARD IEEE802154 IEEE802154_6LOWPAN IEEE802154_ATUSB IEEE802154_DRIVERS IEEE802154_HWSIM IEEE802154_NL802154_EXPERIMENTAL IEEE802154_SOCKET IFB IIO IIO_BUFFER IIO_KFIFO_BUF IIO_TRIGGER IIO_TRIGGERED_BUFFER IKCONFIG IKCONFIG_PROC IMA IMA_APPRAISE IMA_APPRAISE_MODSIG IMA_DEFAULT_HASH_SHA256 IMA_LSM_RULES IMA_MEASURE_ASYMMETRIC_KEYS IMA_NG_TEMPLATE IMA_QUEUE_EARLY_BOOT_KEYS IMA_READ_POLICY IMA_WRITE_POLICY INET6_ESPINTCP INET6_ESP_OFFLOAD INET6_IPCOMP INET6_TUNNEL INET6_XFRM_TUNNEL INET_AH INET_DIAG INET_DIAG_DESTROY INET_ESP INET_ESPINTCP INET_ESP_OFFLOAD INET_IPCOMP INET_MPTCP_DIAG INET_RAW_DIAG INET_SCTP_DIAG INET_TCP_DIAG INET_UDP_DIAG INET_XFRM_TUNNEL INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_ADDR_TRANS_CONFIGFS INFINIBAND_IPOIB INFINIBAND_IPOIB_CM INFINIBAND_IPOIB_DEBUG INFINIBAND_ISER INFINIBAND_ON_DEMAND_PAGING INFINIBAND_RTRS INFINIBAND_SRP INFINIBAND_USER_ACCESS INFINIBAND_USER_MAD INFINIBAND_USER_MEM INFINIBAND_VIRT_DMA INPUT_ATI_REMOTE2 INPUT_CM109 INPUT_IMS_PCU INPUT_JOYDEV INPUT_KEYSPAN_REMOTE INPUT_LEDS INPUT_MOUSEDEV INPUT_MOUSEDEV_PSAUX INPUT_POWERMATE INPUT_TABLET INPUT_TOUCHSCREEN INPUT_UINPUT INPUT_YEALINK INTEGRITY INTEGRITY_ASYMMETRIC_KEYS INTEGRITY_AUDIT INTEGRITY_SIGNATURE INTEGRITY_TRUSTED_KEYRING INTEL_CHTWC_INT33FE INTEL_IDMA64 INTEL_IOATDMA INTEL_IOMMU_DEFAULT_ON INTEL_IOMMU_SVM INTEL_ISHTP_ECLITE INTEL_ISH_FIRMWARE_DOWNLOADER INTEL_ISH_HID INTEL_SCU_IPC INTEL_SOC_PMIC_BXTWC INTEL_SOC_PMIC_CHTWC INTERVAL_TREE_SPAN_ITER IOMMUFD IOMMUFD_DRIVER IOMMUFD_DRIVER_CORE IOMMUFD_TEST IO_URING_ZCRX IP6_NF_MATCH_AH IP6_NF_MATCH_EUI64 IP6_NF_MATCH_FRAG IP6_NF_MATCH_HL IP6_NF_MATCH_MH IP6_NF_MATCH_OPTS IP6_NF_MATCH_RPFILTER IP6_NF_MATCH_RT IP6_NF_MATCH_SRH IP6_NF_NAT IP6_NF_RAW IP6_NF_SECURITY IP6_NF_TARGET_HL IP6_NF_TARGET_MASQUERADE IP6_NF_TARGET_NPT IP6_NF_TARGET_SYNPROXY IPV6_FOU IPV6_FOU_TUNNEL IPV6_GRE IPV6_ILA IPV6_MIP6 IPV6_MROUTE IPV6_MROUTE_MULTIPLE_TABLES IPV6_MULTIPLE_TABLES IPV6_OPTIMISTIC_DAD IPV6_PIMSM_V2 IPV6_ROUTER_PREF IPV6_ROUTE_INFO IPV6_RPL_LWTUNNEL IPV6_SEG6_BPF IPV6_SEG6_HMAC IPV6_SEG6_LWTUNNEL IPV6_SIT_6RD IPV6_SUBTREES IPV6_TUNNEL IPV6_VTI IPVLAN IPVLAN_L3S IPVTAP IP_FIB_TRIE_STATS IP_MROUTE_MULTIPLE_TABLES IP_NF_ARPFILTER IP_NF_ARPTABLES IP_NF_ARP_MANGLE IP_NF_MATCH_AH IP_NF_MATCH_ECN IP_NF_MATCH_RPFILTER IP_NF_MATCH_TTL IP_NF_RAW IP_NF_SECURITY IP_NF_TARGET_ECN IP_NF_TARGET_NETMAP IP_NF_TARGET_REDIRECT IP_NF_TARGET_SYNPROXY IP_NF_TARGET_TTL IP_ROUTE_CLASSID IP_SCTP IP_SET IP_SET_BITMAP_IP IP_SET_BITMAP_IPMAC IP_SET_BITMAP_PORT IP_SET_HASH_IP IP_SET_HASH_IPMAC IP_SET_HASH_IPMARK IP_SET_HASH_IPPORT IP_SET_HASH_IPPORTIP IP_SET_HASH_IPPORTNET IP_SET_HASH_MAC IP_SET_HASH_NET IP_SET_HASH_NETIFACE IRQ_TIME_ACCOUNTING L2TP LAPB LCD_CLASS_DEVICE LEDS_CLASS_MULTICOLOR LIBNVDIMM MAC80211 MAC802154 MEDIA_COMMON_OPTIONS MEDIA_DIGITAL_TV_SUPPORT MEDIA_PLATFORM_SUPPORT MEDIA_RADIO_SUPPORT MEDIA_SDR_SUPPORT MEDIA_SUPPORT MEDIA_TEST_SUPPORT MEDIA_USB_SUPPORT MEMORY_HOTPLUG MEMORY_HOTREMOVE MFD_DLN2 MFD_INTEL_PMC_BXT MFD_MT6360 MFD_MT6370 MFD_RETU MFD_VIPERBOARD MMC MODVERSIONS MPTCP MTD MTD_UBI NETFILTER_ADVANCED NETFILTER_CONNCOUNT NET_ACT_GACT NET_ACT_MIRRED NET_IPGRE NET_IPGRE_DEMUX NFS_V4_1 NFT_COMPAT NFT_COMPAT_ARP NFT_FWD_NETDEV NF_TABLES NF_TABLES_ARP NF_TABLES_NETDEV NF_TPROXY_IPV4 NF_TPROXY_IPV6 NILFS2_FS NINTENDO_FF NLMON NLS_CODEPAGE_1250 NLS_CODEPAGE_1251 NLS_CODEPAGE_737 NLS_CODEPAGE_775 NLS_CODEPAGE_850 NLS_CODEPAGE_852 NLS_CODEPAGE_855 NLS_CODEPAGE_857 NLS_CODEPAGE_860 NLS_CODEPAGE_861 NLS_CODEPAGE_862 NLS_CODEPAGE_863 NLS_CODEPAGE_864 NLS_CODEPAGE_865 NLS_CODEPAGE_866 NLS_CODEPAGE_869 NLS_CODEPAGE_874 NLS_CODEPAGE_932 NLS_CODEPAGE_936 NLS_CODEPAGE_949 NLS_CODEPAGE_950 NLS_ISO8859_13 NLS_ISO8859_14 NLS_ISO8859_15 NLS_ISO8859_2 NLS_ISO8859_3 NLS_ISO8859_4 NLS_ISO8859_5 NLS_ISO8859_6 NLS_ISO8859_7 NLS_ISO8859_8 NLS_ISO8859_9 NLS_KOI8_R NLS_KOI8_U NLS_MAC_CELTIC NLS_MAC_CENTEURO NLS_MAC_CROATIAN NLS_MAC_CYRILLIC NLS_MAC_GAELIC NLS_MAC_GREEK NLS_MAC_ICELAND NLS_MAC_INUIT NLS_MAC_ROMAN NLS_MAC_ROMANIAN NLS_MAC_TURKISH NLS_UCS2_UTILS NOZOMI NTFS3_FS NTFS3_FS_POSIX_ACL NTFS3_LZX_XPRESS NULL_TTY NUMA_BALANCING NUMA_BALANCING_DEFAULT_ENABLED NUMA_EMU NUMA_KEEP_MEMINFO NVDIMM_DAX NVDIMM_KEYS NVDIMM_PFN NVIDIA_SHIELD_FF NVME_CORE NVME_FABRICS NVME_FC NVME_MULTIPATH NVME_RDMA NVME_TARGET NVME_TARGET_FC NVME_TARGET_FCLOOP NVME_TARGET_LOOP NVME_TARGET_RDMA NVME_TARGET_TCP NVME_TCP N_GSM N_HDLC OCFS2_DEBUG_FS OCFS2_FS OCFS2_FS_O2CB OCFS2_FS_STATS OCFS2_FS_USERSPACE_CLUSTER OF_GPIO OF_PMEM OMFS_FS OPENVSWITCH OPENVSWITCH_GENEVE OPENVSWITCH_GRE OPENVSWITCH_VXLAN ORANGEFS_FS OSF_PARTITION OVERLAY_FS OVERLAY_FS_DEBUG OVERLAY_FS_INDEX OVERLAY_FS_REDIRECT_ALWAYS_FOLLOW OVERLAY_FS_REDIRECT_DIR PACKET_DIAG PAGE_IDLE_FLAG PAGE_POOL PAGE_REPORTING PAHOLE_HAS_BTF_TAG PAHOLE_HAS_LANG_EXCLUDE PAHOLE_HAS_SPLIT_BTF PARPORT PARPORT_NOT_PC PARTITION_ADVANCED PCCARD PCCARD_NONSTATIC PCIEAER PCI_ENDPOINT PCI_IOV PCMCIA PCMCIA_LOAD_CIS PERCPU_STATS PERSISTENT_KEYRINGS PHYLINK PHY_CPCAP_USB PHY_QCOM_USB_HS PHY_QCOM_USB_HSIC PHY_SAMSUNG_USB2 PHY_TUSB1210 PKCS7_TEST_KEY PKCS8_PRIVATE_KEY_PARSER PLAYSTATION_FF PLFXLC PMIC_OPREGION PM_CLK PNFS_BLOCK PNFS_FILE_LAYOUT PNFS_FLEXFILE_LAYOUT PPP PPPOATM PPPOE PPPOE_HASH_BITS_1 PPPOL2TP PPP_ASYNC PPP_BSDCOMP PPP_DEFLATE PPP_FILTER PPP_MPPE PPP_MULTILINK PPP_SYNC_TTY PPTP PREEMPT PREEMPT_NOTIFIERS PROC_CHILDREN PSAMPLE PSI PSTORE PSTORE_COMPRESS QCOM_QMI_HELPERS QNX4FS_FS QNX6FS_FS QRTR QRTR_TUN RADIO_ADAPTERS RADIO_SHARK RADIO_SHARK2 RADIO_SI4713 RADIO_TEA575X RAID6_PQ RAID_ATTRS RAS RC_ATI_REMOTE RC_CORE RC_DEVICES RC_XBOX_DVD RDMA_RXE RDMA_SIW RDS RDS_RDMA RDS_TCP READ_ONLY_THP_FOR_FS REALTEK_AUTOPM REED_SOLOMON REED_SOLOMON_DEC8 REGMAP REGMAP_I2C REGMAP_IRQ REGMAP_MMIO REGMAP_SPI REGULATOR REGULATOR_FIXED_VOLTAGE REGULATOR_TWL4030 RESET_CONTROLLER RFKILL RFKILL_INPUT RFKILL_LEDS RMI4_2D_SENSOR RMI4_CORE RMI4_F03 RMI4_F03_SERIO RMI4_F11 RMI4_F12 RMI4_F30 RMI4_F3A ROMFS_BACKED_BY_BOTH ROMFS_FS ROMFS_ON_BLOCK ROMFS_ON_MTD ROSE RTC_DRV_HID_SENSOR_TIME RXKAD SCHED_CORE SCREEN_INFO SCSI_FC_ATTRS SCSI_HPSA SCSI_ISCSI_ATTRS SCSI_LOGGING SCSI_NETLINK SCSI_SAS_ATA SCSI_SAS_ATTRS SCSI_SAS_LIBSAS SCSI_SCAN_ASYNC SCSI_SRP_ATTRS SCTP_COOKIE_HMAC_MD5 SCTP_COOKIE_HMAC_SHA1 SCTP_DEFAULT_COOKIE_HMAC_MD5 SECONDARY_TRUSTED_KEYRING SECURITY_INFINIBAND SECURITY_NETWORK_XFRM SENSORS_AQUACOMPUTER_D5NEXT SENSORS_CORSAIR_CPRO SENSORS_CORSAIR_PSU SENSORS_GIGABYTE_WATERFORCE SENSORS_NZXT_KRAKEN2 SENSORS_NZXT_SMART2 SENSORS_POWERZ SERIAL_DEV_BUS SERIAL_DEV_CTRL_TTYPORT SERIAL_MCTRL_GPIO SGI_PARTITION SIGNATURE SIGNED_PE_FILE_VERIFICATION SKB_DECRYPTED SLHC SLIP SLIP_COMPRESSED SLIP_MODE_SLIP6 SLIP_SMART SMARTJOYPLUS_FF SMBFS SMB_SERVER SMC SMC_DIAG SMSC_PHY SMS_SDIO_DRV SMS_SIANO_DEBUGFS SMS_SIANO_MDTV SMS_SIANO_RC SMS_USB_DRV SND SND_ALOOP SND_BCD2000 SND_CTL_FAST_LOOKUP SND_CTL_LED SND_DEBUG SND_DMA_SGBUF SND_DRIVERS SND_DUMMY SND_DYNAMIC_MINORS SND_HDA SND_HDA_CODEC_ANALOG SND_HDA_CODEC_CA0110 SND_HDA_CODEC_CA0132 SND_HDA_CODEC_CIRRUS SND_HDA_CODEC_CMEDIA SND_HDA_CODEC_CONEXANT SND_HDA_CODEC_HDMI SND_HDA_CODEC_REALTEK SND_HDA_CODEC_SI3054 SND_HDA_CODEC_SIGMATEL SND_HDA_CODEC_VIA SND_HDA_COMPONENT SND_HDA_CORE SND_HDA_GENERIC SND_HDA_GENERIC_LEDS SND_HDA_HWDEP SND_HDA_I915 SND_HDA_INPUT_BEEP SND_HDA_INTEL SND_HDA_PATCH_LOADER SND_HDA_RECONFIG SND_HDA_SCODEC_COMPONENT SND_HRTIMER SND_HWDEP SND_INTEL_DSP_CONFIG SND_INTEL_NHLT SND_INTEL_SOUNDWIRE_ACPI SND_JACK SND_JACK_INPUT_DEV SND_MIXER_OSS SND_OSSEMUL SND_PCI SND_PCM SND_PCMCIA SND_PCM_ELD SND_PCM_OSS SND_PCM_OSS_PLUGINS SND_PCM_TIMER SND_PCM_XRUN_DEBUG SND_PROC_FS SND_RAWMIDI SND_SEQUENCER SND_SEQUENCER_OSS SND_SEQ_DEVICE SND_SEQ_DUMMY SND_SEQ_HRTIMER_DEFAULT SND_SEQ_MIDI SND_SEQ_MIDI_EVENT SND_SEQ_VIRMIDI SND_SOC SND_SOC_I2C_AND_SPI SND_SOC_SDCA_OPTIONAL SND_SUPPORT_OLD_API SND_TIMER SND_UMP SND_UMP_LEGACY_RAWMIDI SND_USB SND_USB_6FIRE SND_USB_AUDIO SND_USB_AUDIO_MIDI_V2 SND_USB_AUDIO_USE_MEDIA_CONTROLLER SND_USB_CAIAQ SND_USB_CAIAQ_INPUT SND_USB_HIFACE SND_USB_LINE6 SND_USB_POD SND_USB_PODHD SND_USB_TONEPORT SND_USB_UA101 SND_USB_US122L SND_USB_USX2Y SND_USB_VARIAX SND_VERBOSE_PROCFS SND_VIRMIDI SND_VIRTIO SND_VMASTER SND_X86 SOCK_VALIDATE_XMIT SOLARIS_X86_PARTITION SONY_FF SOUND SOUNDWIRE SOUND_OSS_CORE SOUND_OSS_CORE_PRECLAIM SPI SPI_DLN2 SPI_DYNAMIC SPI_LJCA SPI_MASTER SQUASHFS SQUASHFS_4K_DEVBLK_SIZE SQUASHFS_COMPILE_DECOMP_MULTI SQUASHFS_DECOMP_MULTI SQUASHFS_FILE_DIRECT SQUASHFS_LZ4 SQUASHFS_LZO SQUASHFS_XATTR SQUASHFS_XZ SQUASHFS_ZLIB SQUASHFS_ZSTD SSB SSB_PCIHOST_POSSIBLE SSB_PCMCIAHOST_POSSIBLE SSB_SDIOHOST_POSSIBLE STAGING STEAM_FF STP STREAM_PARSER SUNRPC_BACKCHANNEL SUN_PARTITION SURFACE_AGGREGATOR SURFACE_AGGREGATOR_BUS SURFACE_AGGREGATOR_REGISTRY SURFACE_HID SURFACE_HID_CORE SURFACE_KBD SW_SYNC SYSFB SYSFS_SYSCALL SYSV68_PARTITION TABLET_USB_ACECAD TABLET_USB_AIPTEK TABLET_USB_HANWANG TABLET_USB_KBTAB TABLET_USB_PEGASUS TAHVO_USB TAHVO_USB_HOST_BY_DEFAULT TCG_CRB TCG_TIS TCG_TIS_CORE TCG_TPM TCP_CONG_BBR TCP_CONG_BIC TCP_CONG_CDG TCP_CONG_DCTCP TCP_CONG_HSTCP TCP_CONG_HTCP TCP_CONG_HYBLA TCP_CONG_ILLINOIS TCP_CONG_LP TCP_CONG_NV TCP_CONG_SCALABLE TCP_CONG_VEGAS TCP_CONG_VENO TCP_CONG_WESTWOOD TCP_CONG_YEAH TEE TEXTSEARCH TEXTSEARCH_BM TEXTSEARCH_FSM TEXTSEARCH_KMP THP_SWAP THRUSTMASTER_FF TIPC TIPC_CRYPTO TIPC_DIAG TIPC_MEDIA_IB TIPC_MEDIA_UDP TLS TLS_TOE TMPFS_QUOTA TOOLS_SUPPORT_RELR TOUCHSCREEN_SUR40 TOUCHSCREEN_USB_3M TOUCHSCREEN_USB_COMPOSITE TOUCHSCREEN_USB_DMC_TSC10 TOUCHSCREEN_USB_E2I TOUCHSCREEN_USB_EASYTOUCH TOUCHSCREEN_USB_EGALAX TOUCHSCREEN_USB_ELO TOUCHSCREEN_USB_ETT_TC45USB TOUCHSCREEN_USB_ETURBO TOUCHSCREEN_USB_GENERAL_TOUCH TOUCHSCREEN_USB_GOTOP TOUCHSCREEN_USB_GUNZE TOUCHSCREEN_USB_IDEALTEK TOUCHSCREEN_USB_IRTOUCH TOUCHSCREEN_USB_ITM TOUCHSCREEN_USB_JASTEC TOUCHSCREEN_USB_NEXIO TOUCHSCREEN_USB_PANJIT TOUCHSCREEN_USB_ZYTRONIC TRANSPARENT_HUGEPAGE TRANSPARENT_HUGEPAGE_MADVISE TTPCI_EEPROM TTY_PRINTK TUN_VNET_CROSS_LE TWL4030_CORE TYPEC TYPEC_ANX7411 TYPEC_DP_ALTMODE TYPEC_FUSB302 TYPEC_HD3SS3220 TYPEC_MT6360 TYPEC_MUX_FSA4480 TYPEC_MUX_GPIO_SBU TYPEC_MUX_INTEL_PMC TYPEC_MUX_NB7VPQ904M TYPEC_MUX_PI3USB30532 TYPEC_MUX_PTN36502 TYPEC_MUX_WCD939X_USBSS TYPEC_NVIDIA_ALTMODE TYPEC_RT1711H TYPEC_RT1719 TYPEC_STUSB160X TYPEC_TCPCI TYPEC_TCPCI_MAXIM TYPEC_TCPCI_MT6370 TYPEC_TCPM TYPEC_TPS6598X TYPEC_UCSI TYPEC_WCOVE TYPEC_WUSB3801 UBIFS_ATIME_SUPPORT UBIFS_FS UBIFS_FS_ADVANCED_COMPR UBIFS_FS_LZO UBIFS_FS_SECURITY UBIFS_FS_XATTR UBIFS_FS_ZLIB UBIFS_FS_ZSTD UCSI_ACPI UCSI_CCG UCSI_STM32G0 UDF_FS UDMABUF UFS_FS UFS_FS_WRITE UHID ULTRIX_PARTITION UNICODE UNIXWARE_DISKLABEL UNIX_DIAG USB4 USB4_NET USBIP_CORE USBIP_HOST USBIP_VHCI_HCD USBIP_VUDC USBPCWATCHDOG USB_ACM USB_ADUTUX USB_AIRSPY USB_ALI_M5632 USB_AN2720 USB_APPLEDISPLAY USB_ARMLINUX USB_BDC_UDC USB_DWC2 USB_GADGET USB_LJCA USB_MUSB_HDRC USB_NET_CDC_SUBSET USB_ROLES_INTEL_XHCI USB_ROLE_SWITCH USB_STORAGE_REALTEK USB_ULPI_BUS USB_USBNET VIDEO_DEV VIRTIO_FS VXLAN WAN WIRELESS WLAN WLAN_VENDOR_PURELIFI ZONE_DEVICE] disabling configs for [BUG KASAN LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed picked [v6.14 v6.13 v6.12 v6.10 v6.8 v6.6 v6.4 v6.2 v5.19 v5.16 v5.13 v5.10 v5.7 v5.4 v5.1 v4.19] out of 37 release tags testing release v6.14 testing commit 38fec10eb60d687e30c8c6b5420d86e8149f7557 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: bbe46ea368b65cf883f22298ea86aaebb682e3dbe0ba278b87e8e1b53b2e5b55 run #0: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #1: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #2: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #3: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #4: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #5: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #6: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #7: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #8: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #9: crashed: UBSAN: signed-integer-overflow in __ip_select_ident representative crash: UBSAN: signed-integer-overflow in __ip_select_ident, types: [UBSAN] testing release v6.13 testing commit ffd294d346d185b70e28b1a28abe367bbfe53c04 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 96cb939dba05d5cc0d622d04404161b27e7fb85a3214f93c2a525b102c5db4c7 run #0: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #1: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #2: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #3: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #4: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #5: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #6: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #7: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #8: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #9: crashed: UBSAN: signed-integer-overflow in __ip_select_ident representative crash: UBSAN: signed-integer-overflow in __ip_select_ident, types: [UBSAN] testing release v6.12 testing commit adc218676eef25575469234709c2d87185ca223a gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: b73bbb83406ee1427f424d2e8f06cc45f7811bfc31a20a9e29a899c3e0e9bdbc run #0: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #1: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #2: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #3: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #4: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #5: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #6: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #7: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #8: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #9: crashed: UBSAN: signed-integer-overflow in __ip_select_ident representative crash: UBSAN: signed-integer-overflow in __ip_select_ident, types: [UBSAN] testing release v6.10 testing commit 0c3836482481200ead7b416ca80c68a29cfdaabd gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 25e27fb47e4d3c52816d0c51a41f4e5cff816c3b320139f1a33589b45f78bf8e all runs: boot failed: UBSAN: signed-integer-overflow in __cancel_work unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 testing release v6.8 testing commit e8f897f4afef0031fe618a8e94127a0934896aba gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: d249dc3fee96897f6d72d4297d1ffee5de1ddc1aaca9aa849cd3ba85e3bde809 all runs: OK false negative chance: 0.000 # git bisect start adc218676eef25575469234709c2d87185ca223a e8f897f4afef0031fe618a8e94127a0934896aba Bisecting: 29982 revisions left to test after this (roughly 15 steps) [91c93e475ca4b4bd5f1e8d525c9a9810283db056] Merge tag 'drm-misc-next-2024-06-13' of https://gitlab.freedesktop.org/drm/misc/kernel into drm-next testing commit 91c93e475ca4b4bd5f1e8d525c9a9810283db056 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: dbd0d6242b33673e4bb2f1d9a6216e295b507b0d4e63af85e78a194db7008a7a all runs: boot failed: UBSAN: signed-integer-overflow in __cancel_work unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 # git bisect skip 91c93e475ca4b4bd5f1e8d525c9a9810283db056 Bisecting: 29983 revisions left to test after this (roughly 15 steps) [0b1efc3e78d12278a8c0f2c665d66564a2cb965f] readahead: drop dead code in ondemand_readahead() testing commit 0b1efc3e78d12278a8c0f2c665d66564a2cb965f gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 8c644e1285c7dcf5ddaf2aaedcf656503003f6f483e8a20b5848484c862b1787 all runs: boot failed: UBSAN: signed-integer-overflow in __cancel_work unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 # git bisect skip 0b1efc3e78d12278a8c0f2c665d66564a2cb965f Bisecting: 29983 revisions left to test after this (roughly 15 steps) [e6ce1f12d777f6ee22b20e10ae6a771e7e6f44f5] s390/cpum_cf: Fix endless loop in CF_DIAG event stop testing commit e6ce1f12d777f6ee22b20e10ae6a771e7e6f44f5 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 72077040cd0a2d84363d4125ee3311364849287e80d713cf5b0024250a535995 all runs: boot failed: UBSAN: signed-integer-overflow in __cancel_work unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 # git bisect skip e6ce1f12d777f6ee22b20e10ae6a771e7e6f44f5 Bisecting: 29983 revisions left to test after this (roughly 15 steps) [319a624ec2b79db7a0b0a2a2a61e3aa5c96eabfc] mm/huge_memory: only split PMD mapping when necessary in unmap_folio() testing commit 319a624ec2b79db7a0b0a2a2a61e3aa5c96eabfc gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 8156998c16fd26727821cb39b66dbfb45c20a71bfc146903a5ff2403c4b3ab7e all runs: OK false negative chance: 0.000 # git bisect good 319a624ec2b79db7a0b0a2a2a61e3aa5c96eabfc Bisecting: 29809 revisions left to test after this (roughly 15 steps) [31b42af516afa1e184d1a9f9dd4096c54044269a] drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability testing commit 31b42af516afa1e184d1a9f9dd4096c54044269a gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 510af0c1038ca29632fe979921af4e976bdf10a220b9ef3e37bff71d96d6d67d all runs: boot failed: UBSAN: signed-integer-overflow in __cancel_work unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 # git bisect skip 31b42af516afa1e184d1a9f9dd4096c54044269a Bisecting: 29809 revisions left to test after this (roughly 15 steps) [7947d187a6ea4d42ad93c59f75c5d1a71618a522] i2c: opal: reword according to newest specification testing commit 7947d187a6ea4d42ad93c59f75c5d1a71618a522 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: f8a55f572e9c768c3e0ec13f49d82d53b8de9098e44c33bf96eb6c3fc8f95abf all runs: boot failed: UBSAN: signed-integer-overflow in __cancel_work unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 0 # git bisect skip 7947d187a6ea4d42ad93c59f75c5d1a71618a522 Bisecting: 29809 revisions left to test after this (roughly 15 steps) [d6b54900c564e35989cf6813e4071504fa0a90e0] drm/amd/display: Avoid overflow from uint32_t to uint8_t testing commit d6b54900c564e35989cf6813e4071504fa0a90e0 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 5f68d04843b931449dd129a45936a923d6379bfe01be99bd6805a59858d97f3c run #0: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #1: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #2: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #3: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #4: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #5: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #6: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #7: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #8: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #9: crashed: UBSAN: signed-integer-overflow in __ip_select_ident representative crash: UBSAN: signed-integer-overflow in __ip_select_ident, types: [UBSAN] # git bisect bad d6b54900c564e35989cf6813e4071504fa0a90e0 Bisecting: 8015 revisions left to test after this (roughly 13 steps) [480e035fc4c714fb5536e64ab9db04fedc89e910] Merge tag 'drm-next-2024-03-13' of https://gitlab.freedesktop.org/drm/kernel testing commit 480e035fc4c714fb5536e64ab9db04fedc89e910 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 621ed74c0f5f44626a50f49a944dbb0a109e1b1394ad844d9de1729dd2e9240b run #0: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #1: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #2: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #3: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #4: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #5: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #6: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #7: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #8: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #9: crashed: UBSAN: signed-integer-overflow in __ip_select_ident representative crash: UBSAN: signed-integer-overflow in __ip_select_ident, types: [UBSAN] # git bisect bad 480e035fc4c714fb5536e64ab9db04fedc89e910 Bisecting: 2870 revisions left to test after this (roughly 12 steps) [9187210eee7d87eea37b45ea93454a88681894a4] Merge tag 'net-next-6.9' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next testing commit 9187210eee7d87eea37b45ea93454a88681894a4 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: b693a4179ff77f24c4819eeedb16a5fa6c1cc35eafc237d6fda47578cabaf573 run #0: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #1: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #2: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #3: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #4: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #5: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #6: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #7: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #8: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #9: crashed: UBSAN: signed-integer-overflow in __ip_select_ident representative crash: UBSAN: signed-integer-overflow in __ip_select_ident, types: [UBSAN] unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 4 # git bisect skip 9187210eee7d87eea37b45ea93454a88681894a4 Bisecting: 2870 revisions left to test after this (roughly 12 steps) [aafd753555c0ecb9c7ce11ff14429a34c8c0a14b] genirq/irq_sim: Shrink code by using helpers testing commit aafd753555c0ecb9c7ce11ff14429a34c8c0a14b gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: f0c052f539509ff0429b0c0959647db6d66dfbdc2828ba3bd25875c0058f6ed4 all runs: OK false negative chance: 0.000 # git bisect good aafd753555c0ecb9c7ce11ff14429a34c8c0a14b Bisecting: 2870 revisions left to test after this (roughly 12 steps) [08d45ee84bb2650e237e150caca87cc4ded9b3e2] overflow: Introduce wrapping_assign_add() and wrapping_assign_sub() testing commit 08d45ee84bb2650e237e150caca87cc4ded9b3e2 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 173caad7270a713744566b99e3430d0e5158932821ab0cc204c47fec55b6f8eb run #0: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #1: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #2: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #3: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #4: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #5: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #6: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #7: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #8: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #9: crashed: UBSAN: signed-integer-overflow in __ip_select_ident representative crash: UBSAN: signed-integer-overflow in __ip_select_ident, types: [UBSAN] # git bisect bad 08d45ee84bb2650e237e150caca87cc4ded9b3e2 Bisecting: 11 revisions left to test after this (roughly 4 steps) [918327e9b7ffb45321cbb4b9b86b58ec555fe6b3] ubsan: Remove CONFIG_UBSAN_SANITIZE_ALL testing commit 918327e9b7ffb45321cbb4b9b86b58ec555fe6b3 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 4c14a1d8aab3905bb6f7fdd3ed7a2044731cf4bf622fd1e1b2fe62a0d42abe55 all runs: OK false negative chance: 0.000 # git bisect good 918327e9b7ffb45321cbb4b9b86b58ec555fe6b3 Bisecting: 5 revisions left to test after this (roughly 3 steps) [006eac3fe20f03ea70765cb02a823dbb8737ec00] hardening: drop obsolete UBSAN_SANITIZE_ALL from config fragment testing commit 006eac3fe20f03ea70765cb02a823dbb8737ec00 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 2285c431e2dba903353218e225df8a4b7659c00aa59984c568afb5e767b75956 run #0: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #1: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #2: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #3: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #4: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #5: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #6: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #7: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #8: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #9: OK representative crash: UBSAN: signed-integer-overflow in __ip_select_ident, types: [UBSAN] # git bisect bad 006eac3fe20f03ea70765cb02a823dbb8737ec00 Bisecting: 2 revisions left to test after this (roughly 2 steps) [e6584c3964f2ff76a9fb5a701e4a59997b35e547] string: Allow 2-argument strscpy() testing commit e6584c3964f2ff76a9fb5a701e4a59997b35e547 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 8bc207a7d859a77f0f1e4b7f2422f55956987063cbbede07d0d63e4929f529ed run #0: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #1: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #2: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #3: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #4: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #5: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #6: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #7: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #8: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #9: crashed: UBSAN: signed-integer-overflow in __ip_select_ident representative crash: UBSAN: signed-integer-overflow in __ip_select_ident, types: [UBSAN] unable to determine the verdict: 0 good runs (wanted 5), for bad wanted 5 in total, got 4 # git bisect skip e6584c3964f2ff76a9fb5a701e4a59997b35e547 Bisecting: 2 revisions left to test after this (roughly 2 steps) [f478898e0aa74a759fcf629a3ee8b040467b8533] string: Redefine strscpy_pad() as a macro testing commit f478898e0aa74a759fcf629a3ee8b040467b8533 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: 662830abb5ec5667b45e3664afe68971728d61bb7b41eecc6dcd10e3804bbd44 run #0: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #1: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #2: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #3: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #4: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #5: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #6: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #7: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #8: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #9: crashed: UBSAN: signed-integer-overflow in __ip_select_ident representative crash: UBSAN: signed-integer-overflow in __ip_select_ident, types: [UBSAN] # git bisect bad f478898e0aa74a759fcf629a3ee8b040467b8533 Bisecting: 0 revisions left to test after this (roughly 0 steps) [557f8c582a9ba8abe6aa0fd734b6f342af106b26] ubsan: Reintroduce signed overflow sanitizer testing commit 557f8c582a9ba8abe6aa0fd734b6f342af106b26 gcc compiler: Debian clang version 20.1.2 (++20250402124445+58df0ef89dd6-1~exp1~20250402004600.97), Debian LLD 20.1.2 kernel signature: c1c030b1e8c363b35b0ff10ed2ef03bd5cf57caf558450faaf3f1680772cbc17 run #0: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #1: basic kernel testing failed: UBSAN: signed-integer-overflow in __ip_select_ident run #2: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #3: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #4: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #5: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #6: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #7: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #8: crashed: UBSAN: signed-integer-overflow in __ip_select_ident run #9: crashed: UBSAN: signed-integer-overflow in __ip_select_ident representative crash: UBSAN: signed-integer-overflow in __ip_select_ident, types: [UBSAN] # git bisect bad 557f8c582a9ba8abe6aa0fd734b6f342af106b26 557f8c582a9ba8abe6aa0fd734b6f342af106b26 is the first bad commit commit 557f8c582a9ba8abe6aa0fd734b6f342af106b26 Author: Kees Cook Date: Thu Jan 18 15:06:05 2024 -0800 ubsan: Reintroduce signed overflow sanitizer In order to mitigate unexpected signed wrap-around[1], bring back the signed integer overflow sanitizer. It was removed in commit 6aaa31aeb9cf ("ubsan: remove overflow checks") because it was effectively a no-op when combined with -fno-strict-overflow (which correctly changes signed overflow from being "undefined" to being explicitly "wrap around"). Compilers are adjusting their sanitizers to trap wrap-around and to detecting common code patterns that should not be instrumented (e.g. "var + offset < var"). Prepare for this and explicitly rename the option from "OVERFLOW" to "WRAP" to more accurately describe the behavior. To annotate intentional wrap-around arithmetic, the helpers wrapping_add/sub/mul_wrap() can be used for individual statements. At the function level, the __signed_wrap attribute can be used to mark an entire function as expecting its signed arithmetic to wrap around. For a single object file the Makefile can use "UBSAN_SIGNED_WRAP_target.o := n" to mark it as wrapping, and for an entire directory, "UBSAN_SIGNED_WRAP := n" can be used. Additionally keep these disabled under CONFIG_COMPILE_TEST for now. Link: https://github.com/KSPP/linux/issues/26 [1] Cc: Miguel Ojeda Cc: Nathan Chancellor Cc: Peter Zijlstra Cc: Hao Luo Reviewed-by: Marco Elver Reviewed-by: Justin Stitt Signed-off-by: Kees Cook include/linux/compiler_types.h | 9 +++++- lib/Kconfig.ubsan | 15 +++++++++- lib/test_ubsan.c | 37 +++++++++++++++++++++++ lib/ubsan.c | 68 ++++++++++++++++++++++++++++++++++++++++++ lib/ubsan.h | 4 +++ scripts/Makefile.lib | 3 ++ scripts/Makefile.ubsan | 3 ++ 7 files changed, 137 insertions(+), 2 deletions(-) accumulated error probability: 0.00 culprit signature: c1c030b1e8c363b35b0ff10ed2ef03bd5cf57caf558450faaf3f1680772cbc17 parent signature: 4c14a1d8aab3905bb6f7fdd3ed7a2044731cf4bf622fd1e1b2fe62a0d42abe55 revisions tested: 27, total time: 11h30m30.112145038s (build: 7h10m38.517132983s, test: 3h39m32.165690814s) first bad commit: 557f8c582a9ba8abe6aa0fd734b6f342af106b26 ubsan: Reintroduce signed overflow sanitizer recipients (to): ["elver@google.com" "justinstitt@google.com" "keescook@chromium.org"] recipients (cc): [] crash: UBSAN: signed-integer-overflow in __ip_select_ident cfg80211: failed to load regulatory.db ------------[ cut here ]------------ UBSAN: signed-integer-overflow in ./arch/x86/include/asm/atomic.h:85:11 1574579090 + 2106142658 cannot be represented in type 'int' CPU: 0 PID: 235 Comm: kworker/0:2 Not tainted 6.8.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 Workqueue: mld mld_ifc_work Call Trace: dump_stack_lvl+0x67/0xa0 lib/dump_stack.c:106 ubsan_epilogue+0x5/0x30 lib/ubsan.c:217 handle_overflow+0x10f/0x120 lib/ubsan.c:248 arch_atomic_add_return arch/x86/include/asm/atomic.h:85 [inline] raw_atomic_add_return include/linux/atomic/atomic-arch-fallback.h:564 [inline] atomic_add_return include/linux/atomic/atomic-instrumented.h:124 [inline] ip_idents_reserve net/ipv4/route.c:480 [inline] __ip_select_ident+0xcb/0xe0 net/ipv4/route.c:496 iptunnel_xmit+0x167/0x220 net/ipv4/ip_tunnel_core.c:80 udp_tunnel_xmit_skb+0xd3/0xf0 net/ipv4/udp_tunnel_core.c:172 geneve_xmit_skb drivers/net/geneve.c:903 [inline] geneve_xmit+0x8e0/0xd70 drivers/net/geneve.c:1023 __netdev_start_xmit include/linux/netdevice.h:4989 [inline] netdev_start_xmit include/linux/netdevice.h:5003 [inline] xmit_one net/core/dev.c:3547 [inline] dev_hard_start_xmit+0xc4/0x210 net/core/dev.c:3563 __dev_queue_xmit+0x892/0xeb0 net/core/dev.c:4351 dev_queue_xmit include/linux/netdevice.h:3171 [inline] neigh_resolve_output+0x1d1/0x240 net/core/neighbour.c:1563 neigh_output include/net/neighbour.h:542 [inline] ip6_finish_output2+0x4d2/0x6c0 net/ipv6/ip6_output.c:137 NF_HOOK_COND include/linux/netfilter.h:303 [inline] ip6_output+0x8e/0x170 net/ipv6/ip6_output.c:243 dst_output include/net/dst.h:451 [inline] NF_HOOK+0x59/0x170 include/linux/netfilter.h:314 mld_sendpack+0x21b/0x2c0 net/ipv6/mcast.c:1818 mld_send_cr net/ipv6/mcast.c:2119 [inline] mld_ifc_work+0x289/0x410 net/ipv6/mcast.c:2650 process_one_work kernel/workqueue.c:2633 [inline] process_scheduled_works+0x273/0x500 kernel/workqueue.c:2706 worker_thread+0x265/0x370 kernel/workqueue.c:2787 kthread+0xe8/0x100 kernel/kthread.c:388 ret_from_fork+0x32/0x40 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:242 ---[ end trace ]---