lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <686272db.a70a0220.3b7e22.0db2.GAE@google.com>
Date: Mon, 30 Jun 2025 04:19:55 -0700
From: syzbot <syzbot+5e43fb34e0478e83681c@...kaller.appspotmail.com>
To: kapoorarnav43@...il.com
Cc: kapoorarnav43@...il.com, linux-kernel@...r.kernel.org, 
	syzkaller-bugs@...glegroups.com
Subject: Re: Private message regarding: [syzbot] [bcachefs?] kernel BUG in bch2_journal_keys_peek_prev_min

> #syz test 
>
> 0001-bcachefs-avoid-BUG-when-journal-index-is-out-of-bounds.patch
>
> From 56f5b5e4abcde123456789012345678901234567 Mon Sep 17 00:00:00 2001
> From: Arnav Kapoor <kapoor...@...il.com <https://groups.google.com/u/1/>>
> Date: Sat, 29 Jun 2025 17:05:00 +0000
> Subject: [PATCH] bcachefs: avoid BUG when journal index is out of bounds
>
> Replace BUG_ON(*idx > keys->nr) with a proper bounds check.  
> Log an error and safely return NULL if idx is invalid, instead of crashing.
>
> Fixes a kernel BUG triggered by syzbot when calling
> bch2_journal_keys_peek_prev_min with invalid idx.
>
> Reported-by: syzbot+5e43fb...@...kaller.appspotmail.com 
> <https://groups.google.com/u/1/>
> Signed-off-by: Arnav Kapoor <kapoor...@...il.com 
> <https://groups.google.com/u/1/>>
> ---
>  fs/bcachefs/btree_journal_iter.c | 10 +++++++++-
>  1 file changed, 9 insertions(+), 1 deletion(-)
>
> diff --git a/fs/bcachefs/btree_journal_iter.c 
> b/fs/bcachefs/btree_journal_iter.c
> index 0123456789ab..abcdef012345 100644
> --- a/fs/bcachefs/btree_journal_iter.c
> +++ b/fs/bcachefs/btree_journal_iter.c
> @@
>  struct bkey_i *bch2_journal_keys_peek_prev_min(struct bch_fs *c, enum 
> btree_id btree_id,
>         unsigned level, struct bpos pos,
>         struct bpos end_pos, size_t *idx)
>  {
>   struct journal_keys *keys = &c->journal_keys;
>   unsigned iters = 0;
>   struct journal_key *k;
>  
> - BUG_ON(*idx > keys->nr);
> + if (unlikely(*idx > keys->nr)) {
> + pr_err("bch2_journal_keys_peek_prev_min: invalid idx %zu > nr %zu\n",
> +        *idx, keys->nr);
> + return NULL;
> + }
> +
> + if (!keys->nr)
> + return NULL;
>  
>  search:
>   if (!*idx)
>   *idx = __bch2_journal_key_search(keys, btree_id, level, pos);
>  
>   while (*idx &&
>          __journal_key_cmp(btree_id, level, end_pos, idx_to_key(keys, *idx 
> - 1)) <= 0) {
>   (*idx)++;
>   iters++;
>   if (iters == 10) {
>   *idx = 0;
>   goto search;
>   }
>   }
>  
>   return (*idx && *idx <= keys->nr) ? idx_to_key(keys, *idx - 1) : NULL;
>  }
> -- 
> 2.40.1
>
>
> On Sunday, 29 June 2025 at 22:25:29 UTC+5:30 syzbot wrote:
>
> Hello, 
>
> syzbot found the following issue on: 
>
> HEAD commit: 7595b66ae9de Merge tag 'selinux-pr-20250624' of git://git... 
> git tree: upstream 
> console output: https://syzkaller.appspot.com/x/log.txt?x=10edd182580000 
> kernel config: https://syzkaller.appspot.com/x/.config?x=79da270cec5ffd65 
> dashboard link: https://syzkaller.appspot.com/bug?extid=5e43fb34e0478e83681c 
> compiler: Debian clang version 20.1.6 
> (++20250514063057+1e4d39e07757-1~exp1~20250514183223.118), Debian LLD 
> 20.1.6 
>
> Unfortunately, I don't have any reproducer for this issue yet. 
>
> Downloadable assets: 
> disk image (non-bootable): 
> https://storage.googleapis.com/syzbot-assets/d900f083ada3/non_bootable_disk-7595b66a.raw.xz 
> vmlinux: 
> https://storage.googleapis.com/syzbot-assets/3332acf57c8d/vmlinux-7595b66a.xz 
> kernel image: 
> https://storage.googleapis.com/syzbot-assets/e83a48cfe09a/bzImage-7595b66a.xz 
>
> IMPORTANT: if you fix the issue, please add the following tag to the 
> commit: 
> Reported-by: syzbot+5e43fb...@...kaller.appspotmail.com 
>
> loop0: detected capacity change from 0 to 32768 
> bcachefs (loop0): starting version 1.7: mi_btree_bitmap 
> opts=metadata_checksum=crc64,data_checksum=none,compression=lz4,journal_flush_disabled,fsck,recovery_pass_last=set_may_go_rw,reconstruct_alloc,no_data_io 
>
> allowing incompatible features above 0.0: (unknown version) 
> features: 
> lz4,new_siphash,inline_data,new_extent_overwrite,btree_ptr_v2,new_varint,journal_no_flush,alloc_v2,extents_across_btree_nodes 
>
> bcachefs (loop0): Using encoding defined by superblock: utf8-12.1.0 
> bcachefs (loop0): recovering from clean shutdown, journal seq 10 
> bcachefs (loop0): Version upgrade required: 
> Version upgrade from 0.24: unwritten_extents to 1.7: mi_btree_bitmap 
> incomplete 
> Doing incompatible version upgrade from 0.24: unwritten_extents to 1.28: 
> inode_has_case_insensitive 
> running recovery passes: 
> check_allocations,check_alloc_info,check_lrus,check_btree_backpointers,check_backpointers_to_extents,check_extents_to_backpointers,check_alloc_to_lru_refs,bucket_gens_init,check_snapshot_trees,check_snapshots,check_subvols,check_subvol_children,delete_dead_snapshots,check_inodes,check_extents,check_indirect_extents,check_dirents,check_xattrs,check_root,check_unreachable_inodes,check_subvolume_structure,check_directory_structure,check_nlinks,check_rebalance_work,set_fs_needs_rebalance 
>
> bcachefs (loop0): dropping and reconstructing all alloc info 
> bcachefs (loop0): accounting_read... done 
> bcachefs (loop0): alloc_read... done 
> bcachefs (loop0): snapshots_read... done 
> bcachefs (loop0): check_allocations... done 
> bcachefs (loop0): going read-write 
> bcachefs (loop0): done starting filesystem 
> ------------[ cut here ]------------ 
> kernel BUG at fs/bcachefs/btree_journal_iter.c:139! 
> Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI 
> CPU: 0 UID: 0 PID: 5329 Comm: syz.0.0 Not tainted 
> 6.16.0-rc3-syzkaller-00044-g7595b66ae9de #0 PREEMPT(full) 
> Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 
> 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 
> RIP: 0010:bch2_journal_keys_peek_prev_min+0x15e4/0x15f0 
> fs/bcachefs/btree_journal_iter.c:139 
> Code: b9 00 00 00 00 00 fc ff df 80 3c 08 00 74 08 48 89 df e8 ff 87 fe fd 
> 48 8b 1b e9 b6 fe ff ff e8 a2 5f 41 07 e8 1d 05 9b fd 90 <0f> 0b 66 2e 0f 
> 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 
> RSP: 0018:ffffc9000d38f1a0 EFLAGS: 00010283 
> RAX: ffffffff84254803 RBX: ffffffffffffffff RCX: 0000000000100000 
> RDX: ffffc9000df5a000 RSI: 00000000000337b5 RDI: 00000000000337b6 
> RBP: ffffc9000d38f380 R08: 00090018ffffffff R09: 2000000000000000 
> R10: 0000000000000000 R11: 00090018ffffffff R12: ffffc9000d38f9b0 
> R13: dffffc0000000000 R14: 000000000000003b R15: ffff888052f00000 
> FS: 00007fe8791aa6c0(0000) GS:ffff88808d251000(0000) knlGS:0000000000000000 
> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 
> CR2: 00007f1f90184000 CR3: 0000000043c47000 CR4: 0000000000352ef0 
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 
> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 
> Call Trace: 
> <TASK> 
> bch2_btree_journal_peek_prev fs/bcachefs/btree_iter.c:2172 [inline] 
> btree_trans_peek_prev_journal+0x259/0x3b0 fs/bcachefs/btree_iter.c:2186 
> __bch2_btree_iter_peek_prev fs/bcachefs/btree_iter.c:2560 [inline] 
> bch2_btree_iter_peek_prev_min+0x1439/0x5400 fs/bcachefs/btree_iter.c:2635 
> __bch2_resume_logged_op_finsert+0x7fc/0x2240 fs/bcachefs/io_misc.c:432 
> bch2_fcollapse_finsert+0x19b/0x250 fs/bcachefs/io_misc.c:536 
> bchfs_fcollapse_finsert+0x378/0x470 fs/bcachefs/fs-io.c:621 
> bch2_fallocate_dispatch+0x2a4/0x410 fs/bcachefs/fs-io.c:-1 
> vfs_fallocate+0x6a0/0x830 fs/open.c:341 
> ksys_fallocate fs/open.c:365 [inline] 
> __do_sys_fallocate fs/open.c:370 [inline] 
> __se_sys_fallocate fs/open.c:368 [inline] 
> __x64_sys_fallocate+0xc0/0x110 fs/open.c:368 
> do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] 
> do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 
> entry_SYSCALL_64_after_hwframe+0x77/0x7f 
> RIP: 0033:0x7fe87838e929 
> Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 
> 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff 
> ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 
> RSP: 002b:00007fe8791aa038 EFLAGS: 00000246 ORIG_RAX: 000000000000011d 
> RAX: ffffffffffffffda RBX: 00007fe8785b5fa0 RCX: 00007fe87838e929 
> RDX: 0000000000000000 RSI: 0000000000000020 RDI: 000000000000000a 
> RBP: 00007fe878410b39 R08: 0000000000000000 R09: 0000000000000000 
> R10: 0000000007000000 R11: 0000000000000246 R12: 0000000000000000 
> R13: 0000000000000000 R14: 00007fe8785b5fa0 R15: 00007ffc77682dc8 
> </TASK> 
> Modules linked in: 
> ---[ end trace 0000000000000000 ]--- 
> RIP: 0010:bch2_journal_keys_peek_prev_min+0x15e4/0x15f0 
> fs/bcachefs/btree_journal_iter.c:139 
> Code: b9 00 00 00 00 00 fc ff df 80 3c 08 00 74 08 48 89 df e8 ff 87 fe fd 
> 48 8b 1b e9 b6 fe ff ff e8 a2 5f 41 07 e8 1d 05 9b fd 90 <0f> 0b 66 2e 0f 
> 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 
> RSP: 0018:ffffc9000d38f1a0 EFLAGS: 00010283 
> RAX: ffffffff84254803 RBX: ffffffffffffffff RCX: 0000000000100000 
> RDX: ffffc9000df5a000 RSI: 00000000000337b5 RDI: 00000000000337b6 
> RBP: ffffc9000d38f380 R08: 00090018ffffffff R09: 2000000000000000 
> R10: 0000000000000000 R11: 00090018ffffffff R12: ffffc9000d38f9b0 
> R13: dffffc0000000000 R14: 000000000000003b R15: ffff888052f00000 
> FS: 00007fe8791aa6c0(0000) GS:ffff88808d251000(0000) knlGS:0000000000000000 
> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 
> CR2: 00007fe8783ec970 CR3: 0000000043c47000 CR4: 0000000000352ef0 
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 
> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 
>
>
> --- 
> This report is generated by a bot. It may contain errors. 
> See https://goo.gl/tpsmEJ for more information about syzbot. 
> syzbot engineers can be reached at syzk...@...glegroups.com. 
>
> syzbot will keep track of this issue. See: 
> https://goo.gl/tpsmEJ#status for how to communicate with syzbot. 
>
> If the report is already addressed, let syzbot know by replying with: 
> #syz fix: exact-commit-title 
>
> If you want to overwrite report's subsystems, reply with: 
> #syz set subsystems: new-subsystem 
> (See the list of subsystem names on the web dashboard) 
>
> If the report is a duplicate of another one, reply with: 
> #syz dup: exact-subject-of-another-report 
>
> If you want to undo deduplication, reply with: 
> #syz undup 
>

Command #1:
This crash does not have a reproducer. I cannot test it.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ