general protection fault, probably for non-canonical address 0xdffffc00000000db: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x00000000000006d8-0x00000000000006df]
CPU: 0 PID: 18144 Comm: syz-executor.2 Not tainted 5.10.158-syzkaller-01202-gd31626cbea61 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:f2fs_release_page+0x328/0xb90 fs/f2fs/data.c:3775
Code: 00 4c 03 23 4c 89 e0 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 e7 e8 b8 eb 92 ff bb d8 06 00 00 49 03 1c 24 48 89 d8 48 c1 e8 03 <42> 8a 04 28 84 c0 0f 85 c9 07 00 00 44 8b 33 bb 00 00 00 40 be 00
RSP: 0018:ffffc90006c15a00 EFLAGS: 00010206
RAX: 00000000000000db RBX: 00000000000006d8 RCX: ffff88811c793b40
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90006c15a48 R08: ffffffff82143630 R09: fffff94000887be1
R10: fffff94000887be1 R11: 1ffffd4000887be0 R12: ffff8881582bd3c8
R13: dffffc0000000000 R14: 8000000000002005 R15: ffffea000443df00
FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f96a3777000 CR3: 000000016de9e000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
try_to_release_page+0x1bd/0x210 mm/filemap.c:3664
shrink_page_list+0x240a/0x3c60 mm/vmscan.c:1453
shrink_inactive_list+0x38f/0xcd0 mm/vmscan.c:2016
shrink_list mm/vmscan.c:2240 [inline]
shrink_lruvec+0x499/0xa50 mm/vmscan.c:2558
shrink_node_memcgs+0x44f/0x9a0 mm/vmscan.c:2749
shrink_node+0xce1/0x1b30 mm/vmscan.c:2866
shrink_zones+0x48d/0x960 mm/vmscan.c:3069
do_try_to_free_pages+0x217/0xa50 mm/vmscan.c:3125
try_to_free_mem_cgroup_pages+0x3a2/0x840 mm/vmscan.c:3443
try_charge+0x4a5/0x1020 mm/memcontrol.c:2774
__mem_cgroup_charge+0x12d/0x720 mm/memcontrol.c:6836
mem_cgroup_charge include/linux/memcontrol.h:456 [inline]
__add_to_page_cache_locked+0x2bc/0xb30 mm/filemap.c:854
add_to_page_cache_lru+0x116/0x2b0 mm/filemap.c:948
pagecache_get_page+0x62c/0x850 mm/filemap.c:1859
grab_cache_page_write_begin+0x5c/0xa0 mm/filemap.c:3418
ext4_da_write_begin+0x5c2/0xf10 fs/ext4/inode.c:3056
generic_perform_write+0x309/0x5b0 mm/filemap.c:3468
ext4_buffered_write_iter+0x47c/0x610 fs/ext4/file.c:272
ext4_file_write_iter+0x192/0x1c70 fs/ext4/file.c:689
__kernel_write+0x5ad/0x9d0 fs/read_write.c:550
dump_emit fs/coredump.c:849 [inline]
dump_user_range+0x25b/0x3b0 fs/coredump.c:902
elf_core_dump+0x3156/0x3cd0 fs/binfmt_elf.c:2287
do_coredump+0x1f7c/0x2dc0 fs/coredump.c:811
get_signal+0xdde/0x1440 kernel/signal.c:2774
arch_do_signal+0x8e/0x650 arch/x86/kernel/signal.c:805
exit_to_user_mode_loop+0xa3/0xe0 kernel/entry/common.c:161
exit_to_user_mode_prepare kernel/entry/common.c:191 [inline]
irqentry_exit_to_user_mode+0x56/0x80 kernel/entry/common.c:279
irqentry_exit+0x12/0x60 kernel/entry/common.c:367
exc_page_fault+0x7e/0x1b0 arch/x86/mm/fault.c:1521
asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:571
RIP: 0033:0x7f6be3a56e97
Code: 38 5d 41 5c c3 48 8d 3d 8d ea 0b 00 e8 72 f8 ff ff 48 8d 3d 8f ea 0b 00 e8 66 f8 ff ff 66 0f 1f 44 00 00 55 89 fd 48 83 ec 10 <64> 8b 04 25 b4 ff ff ff 85 c0 74 2a 89 fe 31 c0 bf 3c 00 00 00 e8
RSP: 002b:00007f6be27ee260 EFLAGS: 00010206
RAX: 0000000000000000 RBX: 00007f6be3bdb050 RCX: 00007f6be3abb0d9
RDX: 00007f6be27ee280 RSI: 00007f6be27ee3b0 RDI: 000000000000000b
RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000
R13: 00007ffea8b0642f R14: 00007f6be280d300 R15: 0000000000022000
Modules linked in:
---[ end trace 1a6004f28ded4c84 ]---
RIP: 0010:f2fs_release_page+0x328/0xb90 fs/f2fs/data.c:3775
Code: 00 4c 03 23 4c 89 e0 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 e7 e8 b8 eb 92 ff bb d8 06 00 00 49 03 1c 24 48 89 d8 48 c1 e8 03 <42> 8a 04 28 84 c0 0f 85 c9 07 00 00 44 8b 33 bb 00 00 00 40 be 00
RSP: 0018:ffffc90006c15a00 EFLAGS: 00010206
RAX: 00000000000000db RBX: 00000000000006d8 RCX: ffff88811c793b40
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90006c15a48 R08: ffffffff82143630 R09: fffff94000887be1
R10: fffff94000887be1 R11: 1ffffd4000887be0 R12: ffff8881582bd3c8
R13: dffffc0000000000 R14: 8000000000002005 R15: ffffea000443df00
FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055c58ab21000 CR3: 000000016de9e000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 00 4c 03 23 add %cl,0x23(%rbx,%rax,1)
4: 4c 89 e0 mov %r12,%rax
7: 48 c1 e8 03 shr $0x3,%rax
b: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1)
10: 74 08 je 0x1a
12: 4c 89 e7 mov %r12,%rdi
15: e8 b8 eb 92 ff callq 0xff92ebd2
1a: bb d8 06 00 00 mov $0x6d8,%ebx
1f: 49 03 1c 24 add (%r12),%rbx
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 8a 04 28 mov (%rax,%r13,1),%al <-- trapping instruction
2e: 84 c0 test %al,%al
30: 0f 85 c9 07 00 00 jne 0x7ff
36: 44 8b 33 mov (%rbx),%r14d
39: bb 00 00 00 40 mov $0x40000000,%ebx
3e: be .byte 0xbe