Received: by 2002:ab2:7b86:0:b0:1f7:5705:b850 with SMTP id q6csp88108lqh; Fri, 3 May 2024 14:24:58 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXUuZAMxNmg4tKuMjc2L6Qjf6OIFM1mRHTfjo7LNEiNKEex7WcEOhW/GEi2txU7MZz0kcEPcZlv1aY4+IBc8/ANJc43z1yaNWav2gq//g== X-Google-Smtp-Source: AGHT+IFTNXxPqAdGZmtTLv8AEx2SBP4YjxdGelPChCCzKhToFsv2QZJzu+kKovSzMApPqf8lWjlj X-Received: by 2002:a05:6830:120c:b0:6eb:7b6f:150d with SMTP id r12-20020a056830120c00b006eb7b6f150dmr4294918otp.8.1714771498724; Fri, 03 May 2024 14:24:58 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714771498; cv=pass; d=google.com; s=arc-20160816; b=r9trP7qUPVeO7x5r5urE4i3ajekEtjeu51XYNyGuwbJEW07BdIoKA8h8hvxfiBz5hQ RIzvaIayVQqK3aBetXihYOaIdERO5Fz1rDH6+nkIEmNN8yrlN5rQhl8rNAAu0HOS4qEd R2nomRenAfGg0yP0m5sX0gZl0pfjktrDCzDnILBjQMRzQsRndaoN4Bo+1HoYs2NImlGy ON5AoCEM51Bj5HF8OSDvk306BaXHKb12C66CQTxRGstFSK6oSUNipY67WKiflLltUQ0J 3LRqQyWNKDMmpoD/MXgWg2cHWZ5aonSs5+UCe3KIv4o0VTpfOXnk//xam0Uu1HgfKHgg zkKA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=to:from:subject:message-id:date:mime-version:list-unsubscribe :list-subscribe:list-id:precedence; bh=x4GbqEKgZuUa1KrnN/Su4ZMPhtfNcJzTLzCPfurOMJw=; fh=Q27LDMTQaS55Vb/ZMpC32PtxcgNO7UiDdvJeb1d0mIM=; b=xxZH8Hrh226+UTohd/ToVvtmmhrtE5hts1D74oFpiFEiW/j3rkDdkvDgg3NB9rmEaU K2zlTVtsHTXCz3JS5xgcVnuuiK0jFMGOBoN+XwtWf3YImWtsaOJsfbFob+p4zihoLsni diWemMq1uuXcUzakRLFKAJrtZNnEYKUjBCEuDlhacDzu1oavrNTZODYOaCjVeRpRdcji jOHSPt3h/a9UMXI+USAdrvO8oi8roeTmclOZkhUvxnWK2FKN83ZuwNrlyUqQKpVe3Gji o0geUNOiIgJUIsP107Xnq8ANnTEaOrR/UTinkUPToraGUDwNPw1qvh8QegiLsofM8WJD GyVA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=m3kw2wvrgufz5godrsrytgd7.apphosting.bounces.google.com); spf=pass (google.com: domain of linux-kernel+bounces-168245-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-168245-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id z21-20020a05620a08d500b007928632fe5csi480918qkz.19.2024.05.03.14.24.58 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 03 May 2024 14:24:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-168245-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=m3kw2wvrgufz5godrsrytgd7.apphosting.bounces.google.com); spf=pass (google.com: domain of linux-kernel+bounces-168245-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-168245-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 4E0501C22ACC for ; Fri, 3 May 2024 21:24:58 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9321359B71; Fri, 3 May 2024 21:23:28 +0000 (UTC) Received: from mail-io1-f70.google.com (mail-io1-f70.google.com [209.85.166.70]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 56AA454BD8 for ; Fri, 3 May 2024 21:23:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.166.70 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714771407; cv=none; b=joe8P+X5oc6m7Ybul4D63G4FbUUaKhEcH46ZRvmewJTQHeys01585/HuaYxrO/hwi6hZ8yu2PnK+8UsHAwk/v5N24bO4nng+VysscMGgsQ3FbgvbYa7dA1jHcD3zpudN5aq3kYqT87uBkhm4rspYcrLM6vNhxByzrVOJj/kLayY= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714771407; c=relaxed/simple; bh=0I9HYehUPiTbvcoZm+bi9oIqOfptahzemmvOSF8E9kQ=; h=MIME-Version:Date:Message-ID:Subject:From:To:Content-Type; b=Q4Nz5Vk+7pOQ8gMkVfRTFlRYf5xn06RhQuQaRiR7GyGmPHi9Kz1d7UrWwWzkVMT3ptqnk0Y3r4Q+wFT0ufy7OSK8KkndVau2P44t623AntsVoYNadNVJ1CDmxBG1ka2GIpHv1J6Ih9EnEQxVjqy8XZ+FqbVPPotRVJ0J2tK0c9E= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=syzkaller.appspotmail.com; spf=pass smtp.mailfrom=M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com; arc=none smtp.client-ip=209.85.166.70 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=syzkaller.appspotmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com Received: by mail-io1-f70.google.com with SMTP id ca18e2360f4ac-7deb999eea4so9238239f.3 for ; Fri, 03 May 2024 14:23:26 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714771405; x=1715376205; h=to:from:subject:message-id:date:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=x4GbqEKgZuUa1KrnN/Su4ZMPhtfNcJzTLzCPfurOMJw=; b=dZy8eufHNzToWQfKBAOKZ73F/ASuIEt4iyAbH7hvFAEqfkoHJbJ7QvJMVYnVJBdV53 VbwY0ezkLolXAL+QpqgqqIo3iKeDo1ThT+D581nAFFVFAVLWyyBy/guvaqbst33YhiWA zfg55e52+SI4lfTT+LIqf2dAV0A8n8Gokbb0Oe76Ur8FngHOJ0uD21gXieHzKE6gEMKM 4avOi9MgTAuuXBVTr2ERfD3UZfkiSUjRWEEuJN4hkfBDndxG/+zQKDtDU8pnp4pOE+y2 t7IbnYkW7ZASIVJRW0LcJN3Fbxyxv8ifL6kXfSLSlUBKfU6tmpov7O21IPyLvrm9AcNc mOEw== X-Forwarded-Encrypted: i=1; AJvYcCWLwEkfKP7sH2z7xXJDq6txEz0m84pgpQlpTkvI5ZF7qiEgoEN0PXjwdbY6HbeHbIGLJDOvDk8BlIzaqyDJOhZedPZ6gKVLVYkFK53N X-Gm-Message-State: AOJu0YwAaR6/6WlooXiVTPZKdqQaMJs6tcIaLOZVgRUouiqZ0EmwOsIs HzlMvtvRFY9d79BJC66v7xjcYGAkWKerHYBkVO6/+Cmy8xqnRQF14rF6LR9R9ydf40rs7Y3LfhJ 8RG/SEksPIc7ySmQn1Kod45BQQIs8l9GddlDjsI9EYzmj7zxJhh7T6J0= Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Received: by 2002:a05:6638:6d12:b0:487:31da:eaf1 with SMTP id he18-20020a0566386d1200b0048731daeaf1mr82103jab.1.1714771405656; Fri, 03 May 2024 14:23:25 -0700 (PDT) Date: Fri, 03 May 2024 14:23:25 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <0000000000008160ad06179354a2@google.com> Subject: [syzbot] [bcachefs?] kernel BUG in bch2_fs_recovery From: syzbot To: bfoster@redhat.com, kent.overstreet@linux.dev, linux-bcachefs@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" Hello, syzbot found the following issue on: HEAD commit: 3d25a941ea50 Merge tag 'block-6.9-20240503' of git://git.k.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=114b39ff180000 kernel config: https://syzkaller.appspot.com/x/.config?x=3310e643b6ef5d69 dashboard link: https://syzkaller.appspot.com/bug?extid=05c1843ef85da9e52042 compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40 syz repro: https://syzkaller.appspot.com/x/repro.syz?x=13aed9df180000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=14ac7a28980000 Downloadable assets: disk image (non-bootable): https://storage.googleapis.com/syzbot-assets/7bc7510fe41f/non_bootable_disk-3d25a941.raw.xz vmlinux: https://storage.googleapis.com/syzbot-assets/9d8ed74e49f1/vmlinux-3d25a941.xz kernel image: https://storage.googleapis.com/syzbot-assets/d724e9151b52/bzImage-3d25a941.xz mounted in repro: https://storage.googleapis.com/syzbot-assets/998b7ff57836/mount_0.gz IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+05c1843ef85da9e52042@syzkaller.appspotmail.com u64s 11 type btree_ptr_v2 SPOS_MAX len 0 ver 0: seq afc6cc17f332ffe0 written 24 min_key POS_MIN durability: 0 (invalid extent entry 0000000000020040) invalid extent entry type (got 6, max 6), shutting down bcachefs (loop0): inconsistency detected - emergency read only at journal seq 0 ------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:23! invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 2 PID: 5178 Comm: syz-executor317 Not tainted 6.9.0-rc6-syzkaller-00227-g3d25a941ea50 #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 RIP: 0010:__phys_addr+0x120/0x150 arch/x86/mm/physaddr.c:23 Code: 10 00 75 39 48 8b 1d 4f c8 1b 0c 48 89 ee bf ff ff ff 1f e8 72 49 4f 00 48 01 eb 48 81 fd ff ff ff 1f 76 a7 e8 51 4e 4f 00 90 <0f> 0b 48 c7 c7 bd 39 9f 8f e8 b2 99 aa 00 e9 52 ff ff ff 48 c7 c7 RSP: 0018:ffffc900032ef4a0 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 000000007ffff75e RCX: ffffffff813e77ce RDX: ffff888011aca440 RSI: ffffffff813e77df RDI: 0000000000000007 RBP: 000000007ffff75e R08: 0000000000000007 R09: 000000001fffffff R10: 000000007ffff75e R11: 0000000000000000 R12: 0000000000000001 R13: 0000000000000001 R14: 00000000663551f8 R15: ffffed1005ea010e FS: 000055557a454380(0000) GS:ffff88806b400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff7a9096410 CR3: 00000000203ec000 CR4: 0000000000350ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: virt_to_folio include/linux/mm.h:1306 [inline] kfree+0x6c/0x390 mm/slub.c:4382 bch2_fs_recovery+0xfe9/0x3c40 fs/bcachefs/recovery.c:905 bch2_fs_start+0x2e9/0x600 fs/bcachefs/super.c:1043 bch2_fs_open+0xf87/0x1110 fs/bcachefs/super.c:2102 bch2_mount+0xdcc/0x1130 fs/bcachefs/fs.c:1903 legacy_get_tree+0x109/0x220 fs/fs_context.c:662 vfs_get_tree+0x8f/0x380 fs/super.c:1779 do_new_mount fs/namespace.c:3352 [inline] path_mount+0x14e6/0x1f20 fs/namespace.c:3679 do_mount fs/namespace.c:3692 [inline] __do_sys_mount fs/namespace.c:3898 [inline] __se_sys_mount fs/namespace.c:3875 [inline] __x64_sys_mount+0x297/0x320 fs/namespace.c:3875 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcf/0x260 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f1ad400a8fa Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 5e 04 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffd674e3108 EFLAGS: 00000282 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ffd674e3120 RCX: 00007f1ad400a8fa RDX: 0000000020011a00 RSI: 0000000020000080 RDI: 00007ffd674e3120 RBP: 0000000000000004 R08: 00007ffd674e3160 R09: 00000000000119fd R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 R13: 00007ffd674e3160 R14: 0000000000000003 R15: 0000000001000000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__phys_addr+0x120/0x150 arch/x86/mm/physaddr.c:23 Code: 10 00 75 39 48 8b 1d 4f c8 1b 0c 48 89 ee bf ff ff ff 1f e8 72 49 4f 00 48 01 eb 48 81 fd ff ff ff 1f 76 a7 e8 51 4e 4f 00 90 <0f> 0b 48 c7 c7 bd 39 9f 8f e8 b2 99 aa 00 e9 52 ff ff ff 48 c7 c7 RSP: 0018:ffffc900032ef4a0 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 000000007ffff75e RCX: ffffffff813e77ce RDX: ffff888011aca440 RSI: ffffffff813e77df RDI: 0000000000000007 RBP: 000000007ffff75e R08: 0000000000000007 R09: 000000001fffffff R10: 000000007ffff75e R11: 0000000000000000 R12: 0000000000000001 R13: 0000000000000001 R14: 00000000663551f8 R15: ffffed1005ea010e FS: 000055557a454380(0000) GS:ffff88806b400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff7a9096410 CR3: 00000000203ec000 CR4: 0000000000350ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. If the report is already addressed, let syzbot know by replying with: #syz fix: exact-commit-title If you want syzbot to run the reproducer, reply with: #syz test: git://repo/address.git branch-or-commit-hash If you attach or paste a git patch, syzbot will apply it before testing. If you want to overwrite report's subsystems, reply with: #syz set subsystems: new-subsystem (See the list of subsystem names on the web dashboard) If the report is a duplicate of another one, reply with: #syz dup: exact-subject-of-another-report If you want to undo deduplication, reply with: #syz undup