ci starts bisection 2023-10-31 05:02:34.061111087 +0000 UTC m=+51440.957786473 bisecting fixing commit since bfa3037d828050896ae52f6467b6ca2489ae6fb1 building syzkaller on 4547cdf9e497f833628b7b0660809b3247a7411e ensuring issue is reproducible on original commit bfa3037d828050896ae52f6467b6ca2489ae6fb1 testing commit bfa3037d828050896ae52f6467b6ca2489ae6fb1 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: bc6fef12efcdd89440149eb3f18cdab251bd65a955c475a1b63d59beefdf5230 run #0: crashed: general protection fault in put_pid run #1: crashed: KASAN: stack-out-of-bounds Read in timerqueue_del run #2: crashed: KASAN: wild-memory-access Read in __radix_tree_delete run #3: crashed: BUG: unable to handle kernel paging request in task_active_pid_ns run #4: crashed: KASAN: stack-out-of-bounds Read in timerqueue_del run #5: crashed: general protection fault in timerqueue_del run #6: crashed: general protection fault in cpuacct_account_field run #7: crashed: general protection fault in hrtimer_nanosleep run #8: crashed: general protection fault in enqueue_entity run #9: crashed: general protection fault in update_load_avg run #10: crashed: stack segment fault in __stack_depot_save run #11: crashed: general protection fault in __run_timers run #12: crashed: general protection fault in rcu_core run #13: crashed: general protection fault in locks_remove_posix run #14: crashed: kernel BUG in __phys_addr run #15: crashed: KASAN: wild-memory-access Read in __lock_task_sighand run #16: crashed: BUG: sleeping function called from invalid context in corrupted run #17: crashed: kernel BUG in __phys_addr run #18: crashed: general protection fault in proc_invalidate_siblings_dcache run #19: basic kernel testing failed: failed to copy binary to VM: failed to run ["scp" "-P" "22" "-F" "/dev/null" "-o" "UserKnownHostsFile=/dev/null" "-o" "BatchMode=yes" "-o" "IdentitiesOnly=yes" "-o" "StrictHostKeyChecking=no" "-o" "ConnectTimeout=10" "-v" "/tmp/syz-executor2551048931" "root@10.128.1.21:./syz-executor2551048931"]: exit status 255 Executing: program /usr/bin/ssh host 10.128.1.21, user root, command sftp OpenSSH_9.2p1 Debian-2, OpenSSL 3.0.9 30 May 2023 debug1: Reading configuration data /dev/null debug1: Connecting to 10.128.1.21 [10.128.1.21] port 22. debug1: connect to address 10.128.1.21 port 22: Connection timed out ssh: connect to host 10.128.1.21 port 22: Connection timed out scp: Connection closed representative crash: general protection fault in put_pid, types: [UNKNOWN KASAN] check whether we can drop unnecessary instrumentation disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit bfa3037d828050896ae52f6467b6ca2489ae6fb1 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 00312fc49f7d0258d5241b7ae394489cf7e2fe2b4b41f2c76864cf69f73552a1 run #0: crashed: KASAN: unknown-crash Write in copy_thread run #1: crashed: kernel panic: corrupted stack end in corrupted run #2: crashed: BUG: unable to handle kernel paging request in generic_file_write_iter run #3: crashed: invalid opcode in __phys_addr run #4: crashed: invalid opcode in jbd2_journal_dirty_metadata run #5: crashed: general protection fault in pid_task run #6: crashed: general protection fault in io_serial_in run #7: crashed: general protection fault in debug_check_no_obj_freed run #8: crashed: general protection fault in debug_check_no_obj_freed run #9: OK representative crash: kernel panic: corrupted stack end in corrupted, types: [UNKNOWN] the bug reproduces without the instrumentation disabling configs for [BUG LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed kconfig minimization: base=3938 full=7652 leaves diff=1990 split chunks (needed=false): <1990> split chunk #0 of len 1990 into 5 parts testing without sub-chunk 1/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit bfa3037d828050896ae52f6467b6ca2489ae6fb1 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 9924cc629afbe61ce89a9c2b5255b5612dc230f5a1253e11adcc0590949321c5 run #0: crashed: invalid opcode in __phys_addr run #1: crashed: BUG: unable to handle kernel paging request in corrupted run #2: crashed: BUG: unable to handle kernel NULL pointer dereference in rcu_core run #3: crashed: KASAN: stack-out-of-bounds Read in timerqueue_del run #4: crashed: general protection fault in __hrtimer_run_queues run #5: crashed: invalid opcode in __phys_addr run #6: crashed: general protection fault in ext4_handle_error run #7: crashed: KASAN: wild-memory-access Read in dput run #8: OK run #9: OK representative crash: invalid opcode in __phys_addr, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit bfa3037d828050896ae52f6467b6ca2489ae6fb1 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 2d3edc644a08c7b36f139dda42bd6cfb57ad4760e5d4ef952301a62b75f87668 run #0: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #1: crashed: general protection fault in timerqueue_del run #2: crashed: invalid opcode in __phys_addr run #3: crashed: invalid opcode in corrupted run #4: crashed: general protection fault in hrtimer_nanosleep run #5: crashed: BUG: unable to handle kernel paging request in generic_file_write_iter run #6: basic kernel testing failed: failed to copy binary to VM: failed to run ["scp" "-P" "22" "-F" "/dev/null" "-o" "UserKnownHostsFile=/dev/null" "-o" "BatchMode=yes" "-o" "IdentitiesOnly=yes" "-o" "StrictHostKeyChecking=no" "-o" "ConnectTimeout=10" "-v" "/tmp/syz-executor2444892711" "root@10.128.1.16:./syz-executor2444892711"]: exit status 255 Executing: program /usr/bin/ssh host 10.128.1.16, user root, command sftp OpenSSH_9.2p1 Debian-2, OpenSSL 3.0.9 30 May 2023 debug1: Reading configuration data /dev/null debug1: Connecting to 10.128.1.16 [10.128.1.16] port 22. debug1: connect to address 10.128.1.16 port 22: Connection timed out ssh: connect to host 10.128.1.16 port 22: Connection timed out scp: Connection closed run #7: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #8: crashed: general protection fault in delay_tsc run #9: OK representative crash: BUG: unable to handle kernel paging request in ext4_ext_remove_space, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG LOCKDEP], they are not needed testing commit bfa3037d828050896ae52f6467b6ca2489ae6fb1 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 57d0e4ac1e2eb182ba072ca7b0de740b6187ca02405a8b6e55728cc4a7f9b28e run #0: crashed: invalid opcode in __phys_addr run #1: crashed: invalid opcode in __phys_addr run #2: crashed: general protection fault in __d_lookup_rcu run #3: OK run #4: OK run #5: OK run #6: OK run #7: OK run #8: OK run #9: OK representative crash: invalid opcode in __phys_addr, types: [UNKNOWN] testing without sub-chunk 4/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit bfa3037d828050896ae52f6467b6ca2489ae6fb1 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 9370cf85d2b50cecfd95fe7549499f3f437d31b21166afc72713b7602948c003 run #0: crashed: invalid opcode in __phys_addr run #1: crashed: invalid opcode in __phys_addr run #2: crashed: BUG: unable to handle kernel paging request in io_serial_in run #3: crashed: general protection fault in debug_check_no_obj_freed run #4: crashed: KASAN: user-memory-access Read in __find_get_block run #5: crashed: general protection fault in debug_check_no_obj_freed run #6: crashed: general protection fault in tomoyo_realpath_from_path run #7: crashed: BUG: unable to handle kernel paging request in filemap_get_entry run #8: crashed: KASAN: wild-memory-access Read in __radix_tree_delete run #9: crashed: KFENCE: invalid read in ext4_ext_remove_space run #10: crashed: stack segment fault in __stack_depot_save run #11: crashed: KASAN: wild-memory-access Read in mpage_process_page_bufs run #12: crashed: general protection fault in debug_check_no_obj_freed run #13: crashed: invalid opcode in __phys_addr run #14: crashed: BUG: unable to handle kernel paging request in tomoyo_realpath_from_path run #15: crashed: invalid opcode in __phys_addr run #16: crashed: BUG: unable to handle kernel paging request in ext4_ext_remove_space run #17: crashed: BUG: unable to handle kernel NULL pointer dereference in rcu_core run #18: OK run #19: OK representative crash: invalid opcode in __phys_addr, types: [UNKNOWN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit bfa3037d828050896ae52f6467b6ca2489ae6fb1 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: ce23510b333494339a778a5eb285e46f45e4ca7df5b7319b2321323a6ffdee09 run #0: crashed: KFENCE: invalid read in ext4_ext_remove_space run #1: crashed: general protection fault in free_pgtables run #2: crashed: general protection fault in find_task_by_vpid run #3: crashed: general protection fault in pid_task run #4: crashed: KASAN: wild-memory-access Read in __radix_tree_delete run #5: crashed: general protection fault in pid_task run #6: crashed: general protection fault in do_iter_write run #7: crashed: invalid opcode in __phys_addr run #8: crashed: KFENCE: invalid read in ext4_ext_remove_space run #9: crashed: general protection fault in idr_get_free run #10: crashed: KASAN: wild-memory-access Read in do_lock_mount run #11: crashed: BUG: unable to handle kernel NULL pointer dereference in rcu_core run #12: crashed: BUG: unable to handle kernel paging request in generic_file_write_iter run #13: crashed: BUG: unable to handle kernel paging request in __stack_depot_save run #14: crashed: BUG: unable to handle kernel NULL pointer dereference in rcu_core run #15: crashed: general protection fault in update_curr run #16: crashed: go runtime error run #17: crashed: BUG: unable to handle kernel NULL pointer dereference in rcu_core run #18: crashed: invalid opcode in corrupted run #19: crashed: BUG: unable to handle kernel NULL pointer dereference in rcu_core representative crash: KFENCE: invalid read in ext4_ext_remove_space, types: [UNKNOWN] the chunk can be dropped minimized to 398 configs; suspects: [AX25 BRIDGE BRIDGE_NETFILTER CAN CFG80211 CHECKPOINT_RESTORE DVB_CORE FB FSCACHE HAMRADIO HSR INFINIBAND INFINIBAND_ADDR_TRANS INFINIBAND_USER_ACCESS INPUT_JOYSTICK INPUT_MOUSE IP6_NF_RAW IPV6_MULTIPLE_TABLES IP_NF_RAW IP_SET IP_VS IP_VS_OVF IP_VS_PE_SIP IP_VS_PROTO_AH IP_VS_PROTO_AH_ESP IP_VS_PROTO_ESP IP_VS_PROTO_SCTP IP_VS_PROTO_UDP IP_VS_RR IP_VS_SED IP_VS_SH IP_VS_TWOS IP_VS_WLC IP_VS_WRR IRQ_BYPASS_MANAGER IRQ_POLL IR_IGORPLUGUSB IR_IGUANA IR_IMON IR_MCEUSB IR_REDRAT3 IR_STREAMZAP IR_TTUSBIR ISDN ISDN_CAPI_MIDDLEWARE JFFS2_CMODE_PRIORITY JFFS2_COMPRESSION_OPTIONS JFFS2_FS JFFS2_FS_POSIX_ACL JFFS2_FS_SECURITY JFFS2_FS_WRITEBUFFER JFFS2_FS_XATTR JFFS2_LZO JFFS2_RTIME JFFS2_RUBIN JFFS2_SUMMARY JFFS2_ZLIB JFS_DEBUG JFS_FS JFS_POSIX_ACL JFS_SECURITY JOYSTICK_IFORCE JOYSTICK_IFORCE_USB JOYSTICK_XPAD JOYSTICK_XPAD_FF JOYSTICK_XPAD_LEDS KARMA_PARTITION KCOV KCOV_ENABLE_COMPARISONS KCOV_INSTRUMENT_ALL KEYS_REQUEST_CACHE KEY_DH_OPERATIONS KEY_NOTIFICATIONS KSM KVM KVM_AMD KVM_ASYNC_PF KVM_COMPAT KVM_GENERIC_DIRTYLOG_READ_PROTECT KVM_GENERIC_HARDWARE_ENABLING KVM_MMIO KVM_VFIO KVM_XEN KVM_XFER_TO_GUEST_WORK L2TP L2TP_ETH L2TP_IP L2TP_V3 LAPB LAPBETHER LDM_PARTITION LEDS_TRIGGER_AUDIO LEGACY_PTYS LIBNVDIMM LINEAR_RANGES LLC LLC2 LOGIG940_FF LOGIRUMBLEPAD2_FF LOGO LOGO_LINUX_MONO LOGO_LINUX_VGA16 LPC_ICH LRU_GEN LRU_GEN_ENABLED LWTUNNEL LWTUNNEL_BPF MAC80211 MAC80211_DEBUGFS MAC80211_HAS_RC MAC80211_HWSIM MAC80211_MESH MAC80211_RC_DEFAULT_MINSTREL MAC80211_RC_MINSTREL MACSEC MACVLAN MACVTAP MAC_PARTITION MAPPING_DIRTY_HELPERS MD_LINEAR MD_MULTIPATH MD_RAID0 MD_RAID1 MD_RAID10 MD_RAID456 MEDIA_ANALOG_TV_SUPPORT MEDIA_ATTACH MEDIA_CONTROLLER MEDIA_CONTROLLER_DVB MEDIA_CONTROLLER_REQUEST_API MEDIA_DIGITAL_TV_SUPPORT MEDIA_RADIO_SUPPORT MEDIA_SDR_SUPPORT MEDIA_SUPPORT MEDIA_SUPPORT_FILTER MEDIA_TUNER MEDIA_TUNER_MSI001 MEMORY_BALLOON MEMORY_HOTPLUG MEMORY_HOTPLUG_DEFAULT_ONLINE MEMORY_ISOLATION MEMREGION MEMSTICK MEMSTICK_REALTEK_USB MEM_SOFT_DIRTY MFD_CORE MFD_SYSCON MHI_BUS MHI_WWAN_CTRL MHP_MEMMAP_ON_MEMORY MICROCHIP_PHY MICROCODE_AMD MICROCODE_INTEL MINIX_FS MINIX_SUBPARTITION MISC_RTSX MISC_RTSX_USB MISDN MISDN_DSP MISDN_HFCUSB MISDN_L1OIP MKISS MLX4_CORE MLX4_INFINIBAND MMC MMC_REALTEK_USB MMC_USHC MMC_VUB300 MMU_NOTIFIER MODULE_SRCVERSION_ALL MODVERSIONS MOST MOUSE_APPLETOUCH MOUSE_BCM5974 MOUSE_PS2 MOUSE_PS2_ALPS MOUSE_PS2_BYD MOUSE_PS2_CYPRESS MOUSE_PS2_FOCALTECH MOUSE_PS2_LIFEBOOK MOUSE_PS2_LOGIPS2PP MOUSE_PS2_SMBUS MOUSE_PS2_SYNAPTICS MOUSE_PS2_SYNAPTICS_SMBUS MOUSE_PS2_TRACKPOINT MOUSE_SYNAPTICS_USB MPLS MPLS_IPTUNNEL MPLS_ROUTING MPTCP MPTCP_IPV6 MRP MTD MTD_BLKDEVS MTD_BLOCK MTD_BLOCK2MTD MTD_CFI_I1 MTD_CFI_I2 MTD_MAP_BANK_WIDTH_1 MTD_MAP_BANK_WIDTH_2 MTD_MAP_BANK_WIDTH_4 MTD_MTDRAM MTD_PHRAM MTD_SLRAM MUSB_PIO_ONLY ND_BTT ND_CLAIM ND_PFN NETDEVSIM NETFILTER_ADVANCED NETFILTER_BPF_LINK NETFILTER_FAMILY_ARP NETFILTER_FAMILY_BRIDGE NETFILTER_NETLINK_ACCT NETFILTER_NETLINK_GLUE_CT NETFILTER_NETLINK_OSF NETFILTER_NETLINK_QUEUE NETFILTER_SYNPROXY NETFILTER_XTABLES_COMPAT NETFILTER_XT_CONNMARK NETFILTER_XT_MATCH_BPF NETFILTER_XT_MATCH_CGROUP NETFILTER_XT_MATCH_CLUSTER NETFILTER_XT_MATCH_COMMENT NETFILTER_XT_MATCH_CONNBYTES NETFILTER_XT_MATCH_CONNLABEL NETFILTER_XT_MATCH_CONNLIMIT NETFILTER_XT_MATCH_CONNMARK NETFILTER_XT_MATCH_CPU NETFILTER_XT_MATCH_DCCP NETFILTER_XT_MATCH_DEVGROUP NETFILTER_XT_MATCH_DSCP NETFILTER_XT_MATCH_ECN NETFILTER_XT_MATCH_ESP NETFILTER_XT_MATCH_HASHLIMIT NETFILTER_XT_MATCH_HELPER NETFILTER_XT_MATCH_HL NETFILTER_XT_MATCH_IPCOMP NETFILTER_XT_MATCH_IPRANGE NETFILTER_XT_MATCH_IPVS NETFILTER_XT_MATCH_L2TP NETFILTER_XT_MATCH_LENGTH NETFILTER_XT_MATCH_LIMIT NETFILTER_XT_MATCH_MAC NETFILTER_XT_MATCH_MARK NETFILTER_XT_MATCH_MULTIPORT NETFILTER_XT_MATCH_NFACCT NETFILTER_XT_MATCH_OSF NETFILTER_XT_MATCH_OWNER NETFILTER_XT_MATCH_PHYSDEV NETFILTER_XT_MATCH_PKTTYPE NETFILTER_XT_MATCH_QUOTA NETFILTER_XT_MATCH_RATEEST NETFILTER_XT_MATCH_REALM NETFILTER_XT_MATCH_RECENT NETFILTER_XT_MATCH_SCTP NETFILTER_XT_MATCH_SOCKET NETFILTER_XT_MATCH_STATISTIC NETFILTER_XT_MATCH_STRING NETFILTER_XT_MATCH_TCPMSS NETFILTER_XT_MATCH_TIME NETFILTER_XT_MATCH_U32 NETFILTER_XT_SET NETFILTER_XT_TARGET_AUDIT NETFILTER_XT_TARGET_CHECKSUM NETFILTER_XT_TARGET_CLASSIFY NETFILTER_XT_TARGET_CONNMARK NETFILTER_XT_TARGET_CT NETFILTER_XT_TARGET_DSCP NETFILTER_XT_TARGET_HL NETFILTER_XT_TARGET_HMARK NETFILTER_XT_TARGET_IDLETIMER NETFILTER_XT_TARGET_LED NETFILTER_XT_TARGET_MARK NETFILTER_XT_TARGET_NETMAP NETFILTER_XT_TARGET_NFQUEUE NETFILTER_XT_TARGET_NOTRACK NETFILTER_XT_TARGET_RATEEST NETFILTER_XT_TARGET_REDIRECT NETFILTER_XT_TARGET_TCPOPTSTRIP NETFILTER_XT_TARGET_TEE NETFILTER_XT_TARGET_TPROXY NETFILTER_XT_TARGET_TRACE NETLABEL NETLINK_DIAG NETROM NET_9P_RDMA NET_ACT_BPF NET_ACT_CONNMARK NET_ACT_CSUM NET_ACT_CT NET_ACT_CTINFO NET_ACT_GATE NET_ACT_IFE NET_ACT_IPT NET_ACT_MPLS NET_ACT_NAT NET_ACT_PEDIT NET_ACT_POLICE NET_ACT_SAMPLE NET_ACT_SIMP NET_ACT_SKBEDIT NET_ACT_SKBMOD NET_ACT_TUNNEL_KEY NET_ACT_VLAN NET_CLS_BASIC NET_CLS_BPF NET_CLS_FLOW NET_CLS_FLOWER NET_CLS_FW NET_CLS_MATCHALL NET_CLS_ROUTE4 NET_DEVLINK NET_DROP_MONITOR NET_DSA NET_DSA_TAG_BRCM NET_DSA_TAG_BRCM_COMMON NET_DSA_TAG_BRCM_PREPEND NET_DSA_TAG_MTK NET_DSA_TAG_QCA NET_DSA_TAG_RTL4_A NET_EMATCH_CANID NET_EMATCH_CMP NET_EMATCH_IPSET NET_EMATCH_IPT NET_EMATCH_META NET_EMATCH_NBYTE NET_EMATCH_TEXT NET_EMATCH_U32 NET_FC NET_FOU NET_FOU_IP_TUNNELS NET_IFE NET_IFE_SKBMARK NET_IFE_SKBPRIO NET_IFE_SKBTCINDEX NET_IPGRE NET_IPGRE_BROADCAST NET_IPGRE_DEMUX NET_IPIP NET_IPVTI NET_KEY NET_KEY_MIGRATE NET_L3_MASTER_DEV NET_MPLS_GSO NET_NCSI NET_NSH NET_REDIRECT NET_SCH_CAKE NET_SCH_CBS NET_SCH_CHOKE NET_SCH_CODEL NET_SCH_DRR NET_SCH_ETF NET_SCH_ETS NET_SCH_FQ NET_SCH_FQ_CODEL NET_SCH_FQ_PIE NET_SCH_GRED NET_SCH_HFSC NET_SCH_HHF NET_SCH_HTB NET_SCH_INGRESS NET_SCH_MQPRIO NET_SCH_MQPRIO_LIB NET_SCH_MULTIQ NET_SCH_NETEM NET_SCH_PIE NET_SCH_PLUG NET_SCH_PRIO NET_SCH_QFQ NET_SCH_RED NET_SCH_SFB NET_SCH_SFQ NET_SCH_SKBPRIO NET_SCH_TAPRIO NET_SCH_TBF NET_SCH_TEQL NET_SOCK_MSG NET_SWITCHDEV NET_TC_SKB_EXT NET_TEAM NET_TEAM_MODE_ACTIVEBACKUP NET_TEAM_MODE_BROADCAST NET_TEAM_MODE_LOADBALANCE NET_TEAM_MODE_RANDOM NET_TEAM_MODE_ROUNDROBIN NET_UDP_TUNNEL NET_VRF NFC NFC_DIGITAL NFC_FDP NFC_HCI NFC_MRVL NFC_MRVL_USB NFC_NCI NFC_NCI_UART NFC_PN533 NFC_PN533_USB NFC_PORT100 NFC_SHDLC NFC_SIM NFC_VIRTUAL_NCI NFSD NFSD_BLOCKLAYOUT NFSD_FLEXFILELAYOUT NFSD_PNFS NFSD_SCSILAYOUT NFSD_V3_ACL NFSD_V4 NFSD_V4_2_INTER_SSC NFSD_V4_SECURITY_LABEL NFS_FSCACHE NFS_V4_1 NFS_V4_2 NFS_V4_2_READ_PLUS NFS_V4_2_SSC_HELPER NFS_V4_SECURITY_LABEL NFT_BRIDGE_META NFT_BRIDGE_REJECT NFT_COMPAT NFT_CONNLIMIT NFT_CT NFT_DUP_IPV4 NFT_DUP_IPV6 NFT_DUP_NETDEV NFT_FIB NFT_FIB_INET NFT_FIB_IPV4 NFT_FIB_IPV6 NFT_FIB_NETDEV NFT_FLOW_OFFLOAD NFT_HASH NFT_LIMIT NFT_LOG NFT_MASQ NFT_NAT NFT_NUMGEN NFT_OSF NFT_QUEUE NFT_QUOTA NFT_REDIR NFT_REJECT NFT_REJECT_INET NFT_REJECT_IPV4 NFT_REJECT_IPV6 NFT_REJECT_NETDEV NFT_SOCKET NFT_SYNPROXY NFT_TPROXY NFT_TUNNEL NFT_XFRM NF_CONNTRACK_AMANDA NF_CONNTRACK_BRIDGE NF_CONNTRACK_BROADCAST NF_CONNTRACK_EVENTS NF_CONNTRACK_H323 NF_CONNTRACK_LABELS NF_CONNTRACK_MARK NF_CONNTRACK_NETBIOS_NS NF_CONNTRACK_OVS NF_CONNTRACK_PPTP NF_CONNTRACK_SANE NF_CONNTRACK_SNMP NF_CONNTRACK_TFTP NF_CONNTRACK_TIMEOUT NF_CONNTRACK_TIMESTAMP NF_CONNTRACK_ZONES NF_CT_NETLINK_HELPER NF_CT_NETLINK_TIMEOUT NF_CT_PROTO_DCCP NF_CT_PROTO_GRE NF_CT_PROTO_SCTP NF_CT_PROTO_UDPLITE NF_DUP_IPV4 NF_DUP_IPV6 NF_DUP_NETDEV NF_FLOW_TABLE NF_FLOW_TABLE_INET NF_NAT_AMANDA NF_NAT_H323 NF_NAT_OVS NF_NAT_PPTP NF_NAT_REDIRECT NF_NAT_SNMP_BASIC NF_TABLES NF_TABLES_BRIDGE NF_TABLES_INET NF_TABLES_IPV4 NF_TABLES_IPV6 NF_TABLES_NETDEV PARTITION_ADVANCED PSAMPLE RC_CORE RC_DEVICES RFKILL SPI USB_GADGET USB_MUSB_HDRC VIDEO_DEV WAN WATCH_QUEUE WIRELESS WLAN WWAN X25 X86_X32_ABI] disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing current HEAD eb55307e6716b1a02f7db05e27d60e8ca2289c03 testing commit eb55307e6716b1a02f7db05e27d60e8ca2289c03 gcc compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e9539efed42984f6ca559435e25029d215b5c898aa8d7281ee178f732f84ab3b run #0: crashed: KASAN: wild-memory-access Read in __block_commit_write run #1: crashed: general protection fault in kvfree_call_rcu run #2: crashed: general protection fault in __mod_lruvec_page_state run #3: crashed: BUG: unable to handle kernel NULL pointer dereference in rcu_core run #4: crashed: KASAN: wild-memory-access Write in ext4_punch_hole run #5: crashed: general protection fault in rcu_core run #6: crashed: general protection fault in __es_tree_search run #7: crashed: BUG: unable to handle kernel paging request in debug_check_no_obj_freed run #8: crashed: general protection fault in __d_lookup_rcu run #9: crashed: general protection fault in __xa_alloc run #10: crashed: general protection fault in debug_check_no_obj_freed run #11: crashed: general protection fault in mm_update_next_owner run #12: crashed: general protection fault in vma_interval_tree_remove run #13: crashed: general protection fault in do_iter_write run #14: crashed: general protection fault in __dquot_alloc_space run #15: crashed: KASAN: wild-memory-access Write in mapping_try_invalidate run #16: crashed: KASAN: wild-memory-access Write in xas_set_mark run #17: crashed: BUG: unable to handle kernel paging request in do_get_write_access run #18: crashed: general protection fault in list_lru_del run #19: OK representative crash: general protection fault in kvfree_call_rcu, types: [UNKNOWN] crash still not fixed/happens on the oldest tested release reproducer is flaky (1.00 repro chance estimate) revisions tested: 8, total time: 2h41m24.051967567s (build: 1h1m2.033171187s, test: 1h28m33.149956232s) crash still not fixed or there were kernel test errors commit msg: Merge tag 'x86-core-2023-10-29-v2' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip crash: general protection fault in kvfree_call_rcu general protection fault, probably for non-canonical address 0xdffffc007ffff113: 0000 [#1] PREEMPT SMP KASAN KASAN: probably user-memory-access in range [0x00000003ffff8898-0x00000003ffff889f] CPU: 1 PID: 1683 Comm: udevd Not tainted 6.6.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 RIP: 0010:lookup_object lib/debugobjects.c:195 [inline] RIP: 0010:lookup_object_or_alloc lib/debugobjects.c:564 [inline] RIP: 0010:debug_object_activate+0x109/0x3f0 lib/debugobjects.c:719 Code: d8 48 c1 e8 03 42 80 3c 20 00 0f 85 6e 02 00 00 48 8b 1b 48 85 db 0f 84 f7 00 00 00 48 8d 7b 18 83 c5 01 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 2d 02 00 00 4c 3b 7b 18 75 c3 48 81 fb 00 f0 RSP: 0018:ffffc90001b97d78 EFLAGS: 00010012 RAX: 000000007ffff113 RBX: 00000003ffff8881 RCX: ffffffff8146d74e RDX: 1ffffffff1109ba0 RSI: ffffffff8884dd00 RDI: 00000003ffff8899 RBP: 0000000000000003 R08: 0000000000000001 R09: 0000000000000212 R10: 0000000000000003 R11: ffffffff8884dd20 R12: dffffc0000000000 R13: ffffffff856adae0 R14: ffffffff8884dd08 R15: ffff8881130a9600 FS: 00007f7fd67abc80(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000002000f000 CR3: 000000010f2ef000 CR4: 0000000000350ef0 Call Trace: debug_rcu_head_queue kernel/rcu/rcu.h:226 [inline] kvfree_call_rcu+0x30/0x970 kernel/rcu/tree.c:3363 kernfs_unlink_open_file+0x338/0x410 fs/kernfs/file.c:633 kernfs_fop_release+0xec/0x1e0 fs/kernfs/file.c:805 __fput+0x257/0xba0 fs/file_table.c:394 __fput_sync+0x47/0x50 fs/file_table.c:475 __do_sys_close fs/open.c:1590 [inline] __se_sys_close fs/open.c:1575 [inline] __x64_sys_close+0x87/0xf0 fs/open.c:1575 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x63/0x6b RIP: 0033:0x7f7fd68da37f Code: af 6a 0d 00 f7 d8 64 89 02 48 83 c8 ff 44 89 c7 48 89 04 24 e8 e1 fc f9 ff 48 8b 04 24 48 83 c4 28 c3 c3 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 10 48 8b 15 7a 6a 0d 00 f7 d8 64 89 02 48 83 RSP: 002b:00007fffb81ae6b8 EFLAGS: 00000202 ORIG_RAX: 0000000000000003 RAX: ffffffffffffffda RBX: 000055ae1e31e0c0 RCX: 00007f7fd68da37f RDX: 00007f7fd69ad860 RSI: 0000000000000001 RDI: 000000000000000c RBP: 0000000000000000 R08: 000000000000000c R09: 0000000000000000 R10: 0000000000000002 R11: 0000000000000202 R12: 0000000000000000 R13: 0000000000000007 R14: 0000000000000001 R15: 000055ae1c48bfc1 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:lookup_object lib/debugobjects.c:195 [inline] RIP: 0010:lookup_object_or_alloc lib/debugobjects.c:564 [inline] RIP: 0010:debug_object_activate+0x109/0x3f0 lib/debugobjects.c:719 Code: d8 48 c1 e8 03 42 80 3c 20 00 0f 85 6e 02 00 00 48 8b 1b 48 85 db 0f 84 f7 00 00 00 48 8d 7b 18 83 c5 01 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 2d 02 00 00 4c 3b 7b 18 75 c3 48 81 fb 00 f0 RSP: 0018:ffffc90001b97d78 EFLAGS: 00010012 RAX: 000000007ffff113 RBX: 00000003ffff8881 RCX: ffffffff8146d74e RDX: 1ffffffff1109ba0 RSI: ffffffff8884dd00 RDI: 00000003ffff8899 RBP: 0000000000000003 R08: 0000000000000001 R09: 0000000000000212 R10: 0000000000000003 R11: ffffffff8884dd20 R12: dffffc0000000000 R13: ffffffff856adae0 R14: ffffffff8884dd08 R15: ffff8881130a9600 FS: 00007f7fd67abc80(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000002000f000 CR3: 000000010f2ef000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: d8 48 c1 fmuls -0x3f(%rax) 3: e8 03 42 80 3c call 0x3c80420b 8: 20 00 and %al,(%rax) a: 0f 85 6e 02 00 00 jne 0x27e 10: 48 8b 1b mov (%rbx),%rbx 13: 48 85 db test %rbx,%rbx 16: 0f 84 f7 00 00 00 je 0x113 1c: 48 8d 7b 18 lea 0x18(%rbx),%rdi 20: 83 c5 01 add $0x1,%ebp 23: 48 89 f8 mov %rdi,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) <-- trapping instruction 2f: 0f 85 2d 02 00 00 jne 0x262 35: 4c 3b 7b 18 cmp 0x18(%rbx),%r15 39: 75 c3 jne 0xfffffffe 3b: 48 rex.W 3c: 81 .byte 0x81 3d: fb sti 3e: 00 f0 add %dh,%al