kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 30826 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:constant_test_bit arch/x86/include/asm/bitops.h:317 [inline] RIP: 0010:buffer_mapped include/linux/buffer_head.h:126 [inline] RIP: 0010:__find_get_block_slow fs/buffer.c:216 [inline] RIP: 0010:__find_get_block+0x6f2/0xde0 fs/buffer.c:1295 Code: 48 8d 7b 08 48 89 f8 48 c1 e8 03 80 3c 28 00 0f 85 d1 06 00 00 48 8b 5b 08 49 39 df 74 58 e8 f5 09 b2 ff 48 89 d8 48 c1 e8 03 <80> 3c 28 00 0f 85 62 06 00 00 48 8b 03 31 ff 48 c1 e8 05 41 89 c6 RSP: 0018:ffff8880a34b7520 EFLAGS: 00010206 RAX: 00000005c0000000 RBX: 0000002e00000000 RCX: ffffc9000c558000 RDX: 0000000000040000 RSI: ffffffff81b07b7b RDI: ffff888041498a88 RBP: dffffc0000000000 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000 R13: 000000000000039d R14: 0000000000000000 R15: ffff888041498a80 FS: 00007f918a2b0700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005584084e9fd0 CR3: 0000000098c04000 CR4: 00000000003426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __getblk_gfp+0x28/0x70 fs/buffer.c:1317 sb_getblk include/linux/buffer_head.h:333 [inline] __ext4_get_inode_loc+0x351/0x10f0 fs/ext4/inode.c:4621 ext4_get_inode_loc fs/ext4/inode.c:4734 [inline] ext4_reserve_inode_write+0xeb/0x260 fs/ext4/inode.c:5938 ext4_mark_inode_dirty+0x160/0x870 fs/ext4/inode.c:6105 ext4_dirty_inode+0x88/0xb0 fs/ext4/inode.c:6144 __mark_inode_dirty+0x16b/0x1140 fs/fs-writeback.c:2164 mark_inode_dirty include/linux/fs.h:2086 [inline] __generic_write_end+0x26a/0x300 fs/buffer.c:2129 ext4_da_write_end+0x623/0xa70 fs/ext4/inode.c:3201 generic_perform_write+0x2ae/0x4d0 mm/filemap.c:3181 __generic_file_write_iter+0x24b/0x610 mm/filemap.c:3295 ext4_file_write_iter+0x2fe/0xf20 fs/ext4/file.c:272 call_write_iter include/linux/fs.h:1821 [inline] do_iter_readv_writev+0x668/0x790 fs/read_write.c:681 do_iter_write+0x182/0x5d0 fs/read_write.c:960 vfs_writev+0x153/0x2e0 fs/read_write.c:1005 do_pwritev fs/read_write.c:1094 [inline] __do_sys_pwritev fs/read_write.c:1141 [inline] __se_sys_pwritev fs/read_write.c:1136 [inline] __x64_sys_pwritev+0x22b/0x310 fs/read_write.c:1136 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f918cd5bae9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f918a2b0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 RAX: ffffffffffffffda RBX: 00007f918ce6f020 RCX: 00007f918cd5bae9 RDX: 0000000000000018 RSI: 00000000200006c0 RDI: 0000000000000007 RBP: 00007f918cdb5f6d R08: 0000000000000004 R09: 0000000000000000 R10: 000000000400fa7f R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff36108e1f R14: 00007f918a2b0300 R15: 0000000000022000 Modules linked in: BUG: unable to handle kernel paging request at 0000002e00000228 ---[ end trace dd0d4cf296d296a8 ]--- PGD 98f2d067 P4D 98f2d067 PUD 0 RIP: 0010:constant_test_bit arch/x86/include/asm/bitops.h:317 [inline] RIP: 0010:buffer_mapped include/linux/buffer_head.h:126 [inline] RIP: 0010:__find_get_block_slow fs/buffer.c:216 [inline] RIP: 0010:__find_get_block+0x6f2/0xde0 fs/buffer.c:1295 Oops: 0000 [#2] PREEMPT SMP KASAN CPU: 1 PID: 30831 Comm: syz-executor.0 Tainted: G D 4.19.211-syzkaller #0 Code: 48 8d 7b 08 48 89 f8 48 c1 e8 03 80 3c 28 00 0f 85 d1 06 00 00 48 8b 5b 08 49 39 df 74 58 e8 f5 09 b2 ff 48 89 d8 48 c1 e8 03 <80> 3c 28 00 0f 85 62 06 00 00 48 8b 03 31 ff 48 c1 e8 05 41 89 c6 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:variable_test_bit arch/x86/include/asm/bitops.h:324 [inline] RIP: 0010:tag_get lib/radix-tree.c:167 [inline] RIP: 0010:node_tag_set+0xa1/0x150 lib/radix-tree.c:1398 Code: 7b 08 0f b6 6b 01 48 89 f8 48 c1 e8 03 42 80 3c 28 00 0f 85 9f 00 00 00 48 8b 5b 08 48 85 db 74 34 e8 23 ca 73 f9 4e 8d 24 33 <49> 0f a3 2c 24 41 0f 92 c7 31 ff 44 89 fe e8 3c cb 73 f9 45 84 ff RSP: 0018:ffff8880a34b7520 EFLAGS: 00010206 RSP: 0018:ffff888037297c80 EFLAGS: 00010293 RAX: ffff888054810680 RBX: 0000002e00000000 RCX: ffffffff87eebb64 RDX: 0000000000000000 RSI: ffffffff87eebb4d RDI: ffff88804144fb48 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 1ffff1101245db0b R12: 0000002e00000228 R13: dffffc0000000000 R14: 0000000000000228 R15: 0000000000000000 RAX: 00000005c0000000 RBX: 0000002e00000000 RCX: ffffc9000c558000 FS: 0000555555df6400(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000002e00000228 CR3: 000000004f128000 CR4: 00000000003426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 RDX: 0000000000040000 RSI: ffffffff81b07b7b RDI: ffff888041498a88 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __radix_tree_delete+0x143/0x160 lib/radix-tree.c:1993 radix_tree_delete_item+0xe7/0x210 lib/radix-tree.c:2050 RBP: dffffc0000000000 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000 bpf_prog_free_id kernel/bpf/syscall.c:1106 [inline] bpf_prog_free_id+0x146/0x200 kernel/bpf/syscall.c:1091 R13: 000000000000039d R14: 0000000000000000 R15: ffff888041498a80 __bpf_prog_put kernel/bpf/syscall.c:1129 [inline] __bpf_prog_put+0x73/0xd0 kernel/bpf/syscall.c:1125 bpf_prog_put kernel/bpf/syscall.c:1138 [inline] bpf_raw_tracepoint_release+0xa7/0xf0 kernel/bpf/syscall.c:1526 __fput+0x2ce/0x890 fs/file_table.c:278 task_work_run+0x148/0x1c0 kernel/task_work.c:113 FS: 00007f918a2b0700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x251/0x2a0 arch/x86/entry/common.c:167 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f25e4d8b72b CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 RSP: 002b:00007ffc9315e350 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00007f25e4d8b72b RDX: 0000000000000000 RSI: 00007f25e4ca96d8 RDI: 0000000000000004 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b30524054 CR2: 00005584084e9fd0 CR3: 0000000098c04000 CR4: 00000000003426f0 R10: 0000000000001a0c R11: 0000000000000293 R12: 00007f25e4eecb60 R13: 00007f25e4eecb60 R14: 00007f25e4eebf60 R15: 00000000000810fd Modules linked in: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 CR2: 0000002e00000228 ---[ end trace dd0d4cf296d296a9 ]--- DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 RIP: 0010:constant_test_bit arch/x86/include/asm/bitops.h:317 [inline] RIP: 0010:buffer_mapped include/linux/buffer_head.h:126 [inline] RIP: 0010:__find_get_block_slow fs/buffer.c:216 [inline] RIP: 0010:__find_get_block+0x6f2/0xde0 fs/buffer.c:1295 Code: 48 8d 7b 08 48 89 f8 48 c1 e8 03 80 3c 28 00 0f 85 d1 06 00 00 48 8b 5b 08 49 39 df 74 58 e8 f5 09 b2 ff 48 89 d8 48 c1 e8 03 <80> 3c 28 00 0f 85 62 06 00 00 48 8b 03 31 ff 48 c1 e8 05 41 89 c6 ---------------- Code disassembly (best guess): 0: 48 8d 7b 08 lea 0x8(%rbx),%rdi 4: 48 89 f8 mov %rdi,%rax 7: 48 c1 e8 03 shr $0x3,%rax b: 80 3c 28 00 cmpb $0x0,(%rax,%rbp,1) f: 0f 85 d1 06 00 00 jne 0x6e6 15: 48 8b 5b 08 mov 0x8(%rbx),%rbx 19: 49 39 df cmp %rbx,%r15 1c: 74 58 je 0x76 1e: e8 f5 09 b2 ff callq 0xffb20a18 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 80 3c 28 00 cmpb $0x0,(%rax,%rbp,1) <-- trapping instruction 2e: 0f 85 62 06 00 00 jne 0x696 34: 48 8b 03 mov (%rbx),%rax 37: 31 ff xor %edi,%edi 39: 48 c1 e8 05 shr $0x5,%rax 3d: 41 89 c6 mov %eax,%r14d