syzbot


general protection fault in bioset_exit (2)

Status: upstream: reported C repro on 2025/02/02 18:04
Subsystems: bcachefs
[Documentation on labels]
Reported-by: syzbot+76f13f2acac84df26aae@syzkaller.appspotmail.com
First crash: 57d, last: 13d
Cause bisection: introduced by (bisect log) :
commit 14152654805256d760315ec24e414363bfa19a06
Author: Kent Overstreet <kent.overstreet@linux.dev>
Date: Mon Nov 25 05:21:27 2024 +0000

  bcachefs: Bad btree roots are now autofix

Crash: BUG: unable to handle kernel paging request in kernfs_dop_revalidate (log)
Repro: C syz .config
  
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [block?] general protection fault in bioset_exit (2) 1 (4) 2025/02/17 08:52
Similar bugs (1)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream general protection fault in bioset_exit block 2 300d 298d 0/28 auto-obsoleted due to no activity on 2024/08/29 08:35

Sample crash report:
bcachefs (loop0): inconsistency detected - emergency read only at journal seq 10
bcachefs (loop0): bch2_fs_get_tree(): error mounting: error getting root inode ENOENT_bkey_type_mismatch
bcachefs (loop0): shutting down
bcachefs (loop0): shutdown complete
BUG: kernel NULL pointer dereference, address: 0000000000000300
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 1 UID: 0 PID: 5844 Comm: syz-executor176 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
RIP: 0010:qlist_move_cache+0x6a/0x140 mm/kasan/quarantine.c:302
Code: 00 00 00 00 48 8d 47 08 48 89 44 24 18 48 8d 47 10 48 89 44 24 10 48 8d 46 08 48 89 44 24 08 48 8d 46 10 48 89 04 24 4c 89 eb <4d> 8b 6d 00 48 89 df e8 fa 24 48 ff 48 c1 e8 06 48 83 e0 c0 48 8b
RSP: 0018:ffffc90003fff780 EFLAGS: 00010006
RAX: 0000000000000600 RBX: 0000000000000300 RCX: ffffffff9a680e68
RDX: ffffffff9a680e70 RSI: ffff88807c6c5e70 RDI: 0000000000000000
RBP: ffffea0000000000 R08: ffffffff816eac3c R09: fffff520007ffed8
R10: dffffc0000000000 R11: fffff520007ffed8 R12: ffffffff9a680e60
R13: 0000000000000300 R14: ffffc90003fff7d8 R15: ffff8880697e3500
FS:  0000555586e7f480(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000300 CR3: 0000000026434000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 kasan_quarantine_remove_cache+0x10b/0x180 mm/kasan/quarantine.c:370
 kmem_cache_destroy+0x6e/0x160 mm/slab_common.c:528
 bio_put_slab block/bio.c:155 [inline]
 bioset_exit+0x54e/0x650 block/bio.c:1662
 bch2_fs_fs_io_direct_exit+0x19/0x30 fs/bcachefs/fs-io-direct.c:676
 __bch2_fs_free fs/bcachefs/super.c:558 [inline]
 bch2_fs_release+0x1a9/0x7b0 fs/bcachefs/super.c:624
 kobject_cleanup lib/kobject.c:689 [inline]
 kobject_release lib/kobject.c:720 [inline]
 kref_put include/linux/kref.h:65 [inline]
 kobject_put+0x22f/0x480 lib/kobject.c:737
 deactivate_locked_super+0xc4/0x130 fs/super.c:473
 bch2_fs_get_tree+0xd42/0x17a0 fs/bcachefs/fs.c:2304
 vfs_get_tree+0x90/0x2b0 fs/super.c:1814
 do_new_mount+0x2be/0xb40 fs/namespace.c:3560
 do_mount fs/namespace.c:3900 [inline]
 __do_sys_mount fs/namespace.c:4111 [inline]
 __se_sys_mount+0x2d6/0x3c0 fs/namespace.c:4088
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f3c90b3039a
Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 7e 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffed06c5358 EFLAGS: 00000282 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007ffed06c5370 RCX: 00007f3c90b3039a
RDX: 00004000000058c0 RSI: 0000400000005900 RDI: 00007ffed06c5370
RBP: 0000400000005900 R08: 00007ffed06c53b0 R09: 000000000000590c
R10: 0000000000010000 R11: 0000000000000282 R12: 00004000000058c0
R13: 00007ffed06c53b0 R14: 0000000000000003 R15: 0000000000010000
 </TASK>
Modules linked in:
CR2: 0000000000000300
---[ end trace 0000000000000000 ]---
RIP: 0010:qlist_move_cache+0x6a/0x140 mm/kasan/quarantine.c:302
Code: 00 00 00 00 48 8d 47 08 48 89 44 24 18 48 8d 47 10 48 89 44 24 10 48 8d 46 08 48 89 44 24 08 48 8d 46 10 48 89 04 24 4c 89 eb <4d> 8b 6d 00 48 89 df e8 fa 24 48 ff 48 c1 e8 06 48 83 e0 c0 48 8b
RSP: 0018:ffffc90003fff780 EFLAGS: 00010006
RAX: 0000000000000600 RBX: 0000000000000300 RCX: ffffffff9a680e68
RDX: ffffffff9a680e70 RSI: ffff88807c6c5e70 RDI: 0000000000000000
RBP: ffffea0000000000 R08: ffffffff816eac3c R09: fffff520007ffed8
R10: dffffc0000000000 R11: fffff520007ffed8 R12: ffffffff9a680e60
R13: 0000000000000300 R14: ffffc90003fff7d8 R15: ffff8880697e3500
FS:  0000555586e7f480(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000300 CR3: 0000000026434000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	48 8d 47 08          	lea    0x8(%rdi),%rax
   8:	48 89 44 24 18       	mov    %rax,0x18(%rsp)
   d:	48 8d 47 10          	lea    0x10(%rdi),%rax
  11:	48 89 44 24 10       	mov    %rax,0x10(%rsp)
  16:	48 8d 46 08          	lea    0x8(%rsi),%rax
  1a:	48 89 44 24 08       	mov    %rax,0x8(%rsp)
  1f:	48 8d 46 10          	lea    0x10(%rsi),%rax
  23:	48 89 04 24          	mov    %rax,(%rsp)
  27:	4c 89 eb             	mov    %r13,%rbx
* 2a:	4d 8b 6d 00          	mov    0x0(%r13),%r13 <-- trapping instruction
  2e:	48 89 df             	mov    %rbx,%rdi
  31:	e8 fa 24 48 ff       	call   0xff482530
  36:	48 c1 e8 06          	shr    $0x6,%rax
  3a:	48 83 e0 c0          	and    $0xffffffffffffffc0,%rax
  3e:	48                   	rex.W
  3f:	8b                   	.byte 0x8b

Crashes (23):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/02/28 22:33 upstream 76544811c850 67cf5345 .config console log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs BUG: unable to handle kernel NULL pointer dereference in bioset_exit
2025/02/17 02:10 upstream 224e74511041 40a34ec9 .config console log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs BUG: unable to handle kernel paging request in bioset_exit
2025/02/28 21:43 upstream 76544811c850 1e7a43e1 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] [mounted in repro] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in bioset_exit
2025/03/12 21:32 upstream 0fed89a961ea 1a5d9317 .config console log report syz / log [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs BUG: unable to handle kernel NULL pointer dereference in bioset_exit
2025/03/12 21:05 upstream 0fed89a961ea 1a5d9317 .config console log report syz / log [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs BUG: unable to handle kernel NULL pointer dereference in bioset_exit
2025/03/05 05:08 upstream 48a5eed9ad58 c3901742 .config console log report syz / log [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs BUG: unable to handle kernel NULL pointer dereference in bioset_exit
2025/02/20 13:48 upstream 87a132e73910 50668798 .config console log report syz / log [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs BUG: unable to handle kernel NULL pointer dereference in bioset_exit
2025/02/18 20:54 upstream 6537cfb395f3 9a14138f .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root general protection fault in bioset_exit
2025/02/04 14:02 upstream 0de63bb7d919 8f267cef .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root general protection fault in bioset_exit
2025/02/04 01:59 upstream 0de63bb7d919 8f267cef .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root general protection fault in bioset_exit
2025/02/01 08:45 upstream 69e858e0b8b2 aa47157c .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root general protection fault in bioset_exit
2025/02/01 08:35 upstream 69e858e0b8b2 aa47157c .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root general protection fault in bioset_exit
2025/01/31 20:34 upstream 69e858e0b8b2 aa47157c .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root general protection fault in bioset_exit
2025/01/29 17:54 upstream 805ba04cb7cc d03b0c97 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root general protection fault in bioset_exit
2025/03/14 06:35 upstream 4003c9e78778 e2826670 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel NULL pointer dereference in bioset_exit
2025/03/14 01:55 upstream 4003c9e78778 e2826670 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel NULL pointer dereference in bioset_exit
2025/03/04 16:14 upstream 99fa936e8e4f c3901742 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel NULL pointer dereference in bioset_exit
2025/03/02 18:14 upstream ece144f151ac c3901742 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel NULL pointer dereference in bioset_exit
2025/02/20 09:22 upstream 87a132e73910 50668798 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel NULL pointer dereference in bioset_exit
2025/02/15 06:56 upstream 04f41cbf03ec 40a34ec9 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in bioset_exit
2025/02/14 16:45 upstream 128c8f96eb86 fe17639f .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in bioset_exit
2025/02/01 05:29 upstream 69e858e0b8b2 aa47157c .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in bioset_exit
2025/01/31 21:10 upstream 69e858e0b8b2 aa47157c .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in bioset_exit
* Struck through repros no longer work on HEAD.