general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 PID: 18986 Comm: kworker/u4:11 Not tainted 6.1.0-rc2-syzkaller-00105-gb229b6ca5abb #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 Workqueue: btrfs-endio btrfs_end_bio_work RIP: 0010:memcmp lib/string.c:765 [inline] RIP: 0010:bcmp+0x61/0x1e0 lib/string.c:797 Code: 48 c1 e8 03 0f b6 04 10 84 c0 75 65 48 89 e8 48 c1 e8 03 0f b6 04 10 84 c0 75 7b 49 8b 34 24 49 8d 6d 07 4c 89 e8 48 c1 e8 03 <0f> b6 04 10 84 c0 0f 85 85 00 00 00 48 89 e8 48 c1 e8 03 0f b6 04 RSP: 0018:ffffc9000adaf840 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffffc9000adafae0 RCX: 0000000000000000 RDX: dffffc0000000000 RSI: ac869b6f32d8bbdb RDI: ffffc9000adafae0 RBP: 0000000000000007 R08: ffffffff838962d4 R09: ffff888077b86000 R10: fffffbfff1c1b5f6 R11: 1ffffffff1c1b5f5 R12: ffffc9000adafae0 R13: 0000000000000000 R14: 0000000000000008 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe0f24ae850 CR3: 000000001e9ad000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: _Z6memcmpPKvU17pass_object_size0S0_U17pass_object_size0m include/linux/fortify-string.h:531 [inline] btrfs_check_sector_csum fs/btrfs/inode.c:3437 [inline] btrfs_check_data_csum+0x30f/0x860 fs/btrfs/inode.c:3474 btrfs_check_read_dio_bio fs/btrfs/inode.c:7856 [inline] btrfs_end_dio_bio+0x33b/0x820 fs/btrfs/inode.c:7895 process_one_work+0x877/0xdb0 kernel/workqueue.c:2289 worker_thread+0xb14/0x1330 kernel/workqueue.c:2436 kthread+0x266/0x300 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:memcmp lib/string.c:765 [inline] RIP: 0010:bcmp+0x61/0x1e0 lib/string.c:797 Code: 48 c1 e8 03 0f b6 04 10 84 c0 75 65 48 89 e8 48 c1 e8 03 0f b6 04 10 84 c0 75 7b 49 8b 34 24 49 8d 6d 07 4c 89 e8 48 c1 e8 03 <0f> b6 04 10 84 c0 0f 85 85 00 00 00 48 89 e8 48 c1 e8 03 0f b6 04 RSP: 0018:ffffc9000adaf840 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffffc9000adafae0 RCX: 0000000000000000 RDX: dffffc0000000000 RSI: ac869b6f32d8bbdb RDI: ffffc9000adafae0 RBP: 0000000000000007 R08: ffffffff838962d4 R09: ffff888077b86000 R10: fffffbfff1c1b5f6 R11: 1ffffffff1c1b5f5 R12: ffffc9000adafae0 R13: 0000000000000000 R14: 0000000000000008 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2f025000 CR3: 000000007b4bb000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 48 c1 e8 03 shr $0x3,%rax 4: 0f b6 04 10 movzbl (%rax,%rdx,1),%eax 8: 84 c0 test %al,%al a: 75 65 jne 0x71 c: 48 89 e8 mov %rbp,%rax f: 48 c1 e8 03 shr $0x3,%rax 13: 0f b6 04 10 movzbl (%rax,%rdx,1),%eax 17: 84 c0 test %al,%al 19: 75 7b jne 0x96 1b: 49 8b 34 24 mov (%r12),%rsi 1f: 49 8d 6d 07 lea 0x7(%r13),%rbp 23: 4c 89 e8 mov %r13,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 0f b6 04 10 movzbl (%rax,%rdx,1),%eax <-- trapping instruction 2e: 84 c0 test %al,%al 30: 0f 85 85 00 00 00 jne 0xbb 36: 48 89 e8 mov %rbp,%rax 39: 48 c1 e8 03 shr $0x3,%rax 3d: 0f .byte 0xf 3e: b6 04 mov $0x4,%dh