bcachefs (loop2): shutdown complete
Oops: general protection fault, probably for non-canonical address 0xd1619254e923f376: 0000 [#1] PREEMPT SMP KASAN NOPTI
CPU: 0 PID: 7831 Comm: syz-executor.2 Not tainted 6.10.0-rc1-syzkaller-00027-g4a4be1ad3a6e #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
RIP: 0010:qlist_move_cache+0x6b/0x120 mm/kasan/quarantine.c:302
Code: 26 49 83 3e 00 0f 84 bb 00 00 00 49 8b 46 08 4c 89 28 4d 89 6e 08 49 c7 45 00 00 00 00 00 49 01 56 10 4d 85 ff 74 6a 4d 89 fd <4d> 8b 3f 4c 89 ef e8 1a 11 52 ff 48 c1 e8 0c 48 c1 e0 06 4c 01 e0
RSP: 0018:ffffc90006307610 EFLAGS: 00010082
RAX: ffff88805fabe000 RBX: ffffc90006307648 RCX: ffffc90024cf9000
RDX: 0000000000000080 RSI: ffffffff813dd476 RDI: 0000000000000007
RBP: ffff888025b1cc80 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000003 R12: ffffea0000000000
R13: d1619254e923f376 R14: ffffffff94af8760 R15: d1619254e923f376
FS: 0000000000000000(0000) GS:ffff88802c000000(0063) knlGS:00000000f5e72b40
CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033
CR2: 00000000ffafa8e0 CR3: 00000000006be000 CR4: 0000000000350ef0
DR0: 0000000000000000 DR1: 00000000000000a6 DR2: 0000000000000000
DR3: 000000000000c08b DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
kasan_quarantine_remove_cache+0x10a/0x180 mm/kasan/quarantine.c:370
shutdown_cache mm/slab_common.c:454 [inline]
kmem_cache_destroy mm/slab_common.c:496 [inline]
kmem_cache_destroy+0x58/0x1b0 mm/slab_common.c:479
bio_put_slab block/bio.c:155 [inline]
bioset_exit+0x2fc/0x5b0 block/bio.c:1740
bch2_fs_fs_io_direct_exit+0x19/0x30 fs/bcachefs/fs-io-direct.c:668
__bch2_fs_free fs/bcachefs/super.c:544 [inline]
bch2_fs_release+0xb7/0x810 fs/bcachefs/super.c:603
kobject_cleanup lib/kobject.c:689 [inline]
kobject_release lib/kobject.c:720 [inline]
kref_put include/linux/kref.h:65 [inline]
kobject_put+0x1fa/0x5b0 lib/kobject.c:737
bch2_fs_stop fs/bcachefs/super.c:673 [inline]
bch2_fs_open+0x80a/0x10f0 fs/bcachefs/super.c:2139
bch2_mount+0xd41/0x1090 fs/bcachefs/fs.c:1917
legacy_get_tree+0x109/0x220 fs/fs_context.c:662
vfs_get_tree+0x8f/0x380 fs/super.c:1780
do_new_mount fs/namespace.c:3352 [inline]
path_mount+0x6e1/0x1f10 fs/namespace.c:3679
do_mount fs/namespace.c:3692 [inline]
__do_sys_mount fs/namespace.c:3898 [inline]
__se_sys_mount fs/namespace.c:3875 [inline]
__ia32_sys_mount+0x295/0x320 fs/namespace.c:3875
do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline]
__do_fast_syscall_32+0x73/0x120 arch/x86/entry/common.c:386
do_fast_syscall_32+0x32/0x80 arch/x86/entry/common.c:411
entry_SYSENTER_compat_after_hwframe+0x84/0x8e
RIP: 0023:0xf7280579
Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
RSP: 002b:00000000f5e72400 EFLAGS: 00000292 ORIG_RAX: 0000000000000015
RAX: ffffffffffffffda RBX: 00000000f5e72460 RCX: 0000000020011a40
RDX: 0000000020011a00 RSI: 0000000001200014 RDI: 00000000f5e724a0
RBP: 00000000f5e72460 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000296 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:qlist_move_cache+0x6b/0x120 mm/kasan/quarantine.c:302
Code: 26 49 83 3e 00 0f 84 bb 00 00 00 49 8b 46 08 4c 89 28 4d 89 6e 08 49 c7 45 00 00 00 00 00 49 01 56 10 4d 85 ff 74 6a 4d 89 fd <4d> 8b 3f 4c 89 ef e8 1a 11 52 ff 48 c1 e8 0c 48 c1 e0 06 4c 01 e0
RSP: 0018:ffffc90006307610 EFLAGS: 00010082
RAX: ffff88805fabe000 RBX: ffffc90006307648 RCX: ffffc90024cf9000
RDX: 0000000000000080 RSI: ffffffff813dd476 RDI: 0000000000000007
RBP: ffff888025b1cc80 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000003 R12: ffffea0000000000
R13: d1619254e923f376 R14: ffffffff94af8760 R15: d1619254e923f376
FS: 0000000000000000(0000) GS:ffff88802c000000(0063) knlGS:00000000f5e72b40
CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033
CR2: 00000000ffafa8e0 CR3: 00000000006be000 CR4: 0000000000350ef0
DR0: 0000000000000000 DR1: 00000000000000a6 DR2: 0000000000000000
DR3: 000000000000c08b DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 26 49 83 3e 00 es cmpq $0x0,(%r14)
5: 0f 84 bb 00 00 00 je 0xc6
b: 49 8b 46 08 mov 0x8(%r14),%rax
f: 4c 89 28 mov %r13,(%rax)
12: 4d 89 6e 08 mov %r13,0x8(%r14)
16: 49 c7 45 00 00 00 00 movq $0x0,0x0(%r13)
1d: 00
1e: 49 01 56 10 add %rdx,0x10(%r14)
22: 4d 85 ff test %r15,%r15
25: 74 6a je 0x91
27: 4d 89 fd mov %r15,%r13
* 2a: 4d 8b 3f mov (%r15),%r15 <-- trapping instruction
2d: 4c 89 ef mov %r13,%rdi
30: e8 1a 11 52 ff call 0xff52114f
35: 48 c1 e8 0c shr $0xc,%rax
39: 48 c1 e0 06 shl $0x6,%rax
3d: 4c 01 e0 add %r12,%rax