bcachefs (loop2): mounting version 1.7: mi_btree_bitmap opts=metadata_checksum=none,data_checksum=none,nojournal_transaction_names bcachefs (loop2): recovering from clean shutdown, journal seq 10 Oops: general protection fault, probably for non-canonical address 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] CPU: 0 PID: 5974 Comm: syz-executor.2 Not tainted 6.10.0-rc4-syzkaller-00217-g35bb670d65fc #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 RIP: 0010:crypto_skcipher_alg include/crypto/skcipher.h:375 [inline] RIP: 0010:crypto_skcipher_encrypt+0x48/0x170 crypto/skcipher.c:637 Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 22 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 6b 40 48 8d 7d 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 f5 00 00 00 48 8d 7d 04 4c 8b 65 18 48 b8 00 00 RSP: 0018:ffffc90003ad65e0 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffffc90003ad6650 RCX: ffffc900067b3000 RDX: 0000000000000004 RSI: ffffffff844ae6d0 RDI: 0000000000000020 RBP: 0000000000000008 R08: 0000000000000020 R09: 0000000000000001 R10: 0000000000000001 R11: 0000000000000003 R12: 0000000000000008 R13: 0000000000000020 R14: ffff88801ec734c0 R15: ffff88801ec734c0 FS: 00007fa5b37e76c0(0000) GS:ffff88806b000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b31a28000 CR3: 000000001e732000 CR4: 0000000000350ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: do_encrypt_sg+0xcc/0x160 fs/bcachefs/checksum.c:108 do_encrypt+0x26d/0x450 fs/bcachefs/checksum.c:150 gen_poly_key.isra.0+0x16b/0x330 fs/bcachefs/checksum.c:191 bch2_checksum+0x1f9/0x2e0 fs/bcachefs/checksum.c:227 bch2_btree_node_read_done+0x766/0x4fe0 fs/bcachefs/btree_io.c:1074 btree_node_read_work+0x567/0x1060 fs/bcachefs/btree_io.c:1345 bch2_btree_node_read+0x8b3/0xe40 fs/bcachefs/btree_io.c:1730 __bch2_btree_root_read fs/bcachefs/btree_io.c:1769 [inline] bch2_btree_root_read+0x2ca/0x690 fs/bcachefs/btree_io.c:1793 read_btree_roots fs/bcachefs/recovery.c:475 [inline] bch2_fs_recovery+0x1ba8/0x3db0 fs/bcachefs/recovery.c:803 bch2_fs_start+0x2e9/0x600 fs/bcachefs/super.c:1035 bch2_fs_open+0xfa0/0x1110 fs/bcachefs/super.c:2127 bch2_mount+0xe2c/0x1230 fs/bcachefs/fs.c:1919 legacy_get_tree+0x109/0x220 fs/fs_context.c:662 vfs_get_tree+0x8f/0x380 fs/super.c:1780 do_new_mount fs/namespace.c:3352 [inline] path_mount+0x14e6/0x1f20 fs/namespace.c:3679 do_mount fs/namespace.c:3692 [inline] __do_sys_mount fs/namespace.c:3898 [inline] __se_sys_mount fs/namespace.c:3875 [inline] __x64_sys_mount+0x297/0x320 fs/namespace.c:3875 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fa5b2a7e5ea Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa5b37e6ef8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fa5b37e6f80 RCX: 00007fa5b2a7e5ea RDX: 0000000020011a00 RSI: 0000000020011a40 RDI: 00007fa5b37e6f40 RBP: 0000000020011a00 R08: 00007fa5b37e6f80 R09: 0000000000000604 R10: 0000000000000604 R11: 0000000000000202 R12: 0000000020011a40 R13: 00007fa5b37e6f40 R14: 00000000000119fc R15: 0000000020011a80 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:crypto_skcipher_alg include/crypto/skcipher.h:375 [inline] RIP: 0010:crypto_skcipher_encrypt+0x48/0x170 crypto/skcipher.c:637 Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 22 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 6b 40 48 8d 7d 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 f5 00 00 00 48 8d 7d 04 4c 8b 65 18 48 b8 00 00 RSP: 0018:ffffc90003ad65e0 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffffc90003ad6650 RCX: ffffc900067b3000 RDX: 0000000000000004 RSI: ffffffff844ae6d0 RDI: 0000000000000020 RBP: 0000000000000008 R08: 0000000000000020 R09: 0000000000000001 R10: 0000000000000001 R11: 0000000000000003 R12: 0000000000000008 R13: 0000000000000020 R14: ffff88801ec734c0 R15: ffff88801ec734c0 FS: 00007fa5b37e76c0(0000) GS:ffff88806b300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555584e1d978 CR3: 000000001e732000 CR4: 0000000000350ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 48 89 fa mov %rdi,%rdx 3: 48 c1 ea 03 shr $0x3,%rdx 7: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) b: 0f 85 22 01 00 00 jne 0x133 11: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 18: fc ff df 1b: 48 8b 6b 40 mov 0x40(%rbx),%rbp 1f: 48 8d 7d 18 lea 0x18(%rbp),%rdi 23: 48 89 fa mov %rdi,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2e: 0f 85 f5 00 00 00 jne 0x129 34: 48 8d 7d 04 lea 0x4(%rbp),%rdi 38: 4c 8b 65 18 mov 0x18(%rbp),%r12 3c: 48 rex.W 3d: b8 .byte 0xb8