general protection fault, probably for non-canonical address 0xdffffc0000000011: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]
CPU: 0 PID: 5095 Comm: syz-executor.0 Not tainted 6.3.0-rc4-syzkaller-00195-g5a57b48fdfcb #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023
RIP: 0010:evict_linked_inode fs/gfs2/super.c:1370 [inline]
RIP: 0010:gfs2_evict_inode+0xa0b/0x14a0 fs/gfs2/super.c:1420
Code: fc ff df 80 3c 08 00 74 08 4c 89 f7 e8 9e c8 26 fe bb 8c 00 00 00 49 03 1e 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 0f 85 18 09 00 00 8b 13 45 31 e4 4c 89 ff 31 f6
RSP: 0018:ffffc900046cf9a0 EFLAGS: 00010207
RAX: 0000000000000011 RBX: 000000000000008c RCX: dffffc0000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc900046cfb40 R08: ffffffff83b2826d R09: ffffed10051910cf
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88808bba62c8
R13: ffff88808bba5e10 R14: ffff8880567dc900 R15: ffff8880567dc000
FS:  000055555725f400(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555557268848 CR3: 000000003bc28000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 evict+0x2a4/0x620 fs/inode.c:665
 gfs2_jindex_free+0x44d/0x500 fs/gfs2/super.c:75
 gfs2_put_super+0x81f/0x890 fs/gfs2/super.c:631
 generic_shutdown_super+0x134/0x340 fs/super.c:500
 kill_block_super+0x7e/0xe0 fs/super.c:1407
 deactivate_locked_super+0xa4/0x110 fs/super.c:331
 cleanup_mnt+0x426/0x4c0 fs/namespace.c:1177
 task_work_run+0x24a/0x300 kernel/task_work.c:179
 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
 exit_to_user_mode_loop+0xd9/0x100 kernel/entry/common.c:171
 exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:204
 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline]
 syscall_exit_to_user_mode+0x64/0x280 kernel/entry/common.c:297
 do_syscall_64+0x4d/0xc0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f9d3888d567
Code: ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffceb8329a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f9d3888d567
RDX: 00007ffceb832a7b RSI: 000000000000000a RDI: 00007ffceb832a70
RBP: 00007ffceb832a70 R08: 00000000ffffffff R09: 00007ffceb832840
R10: 00005555572608b3 R11: 0000000000000246 R12: 00007f9d388e6b74
R13: 00007ffceb833b30 R14: 0000555557260810 R15: 00007ffceb833b70
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:evict_linked_inode fs/gfs2/super.c:1370 [inline]
RIP: 0010:gfs2_evict_inode+0xa0b/0x14a0 fs/gfs2/super.c:1420
Code: fc ff df 80 3c 08 00 74 08 4c 89 f7 e8 9e c8 26 fe bb 8c 00 00 00 49 03 1e 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 0f 85 18 09 00 00 8b 13 45 31 e4 4c 89 ff 31 f6
RSP: 0018:ffffc900046cf9a0 EFLAGS: 00010207
RAX: 0000000000000011 RBX: 000000000000008c RCX: dffffc0000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc900046cfb40 R08: ffffffff83b2826d R09: ffffed10051910cf
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88808bba62c8
R13: ffff88808bba5e10 R14: ffff8880567dc900 R15: ffff8880567dc000
FS:  000055555725f400(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c02d7de000 CR3: 000000003bc28000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess), 2 bytes skipped:
   0:	df 80 3c 08 00 74    	filds  0x7400083c(%rax)
   6:	08 4c 89 f7          	or     %cl,-0x9(%rcx,%rcx,4)
   a:	e8 9e c8 26 fe       	callq  0xfe26c8ad
   f:	bb 8c 00 00 00       	mov    $0x8c,%ebx
  14:	49 03 1e             	add    (%r14),%rbx
  17:	48 89 d8             	mov    %rbx,%rax
  1a:	48 c1 e8 03          	shr    $0x3,%rax
  1e:	48 b9 00 00 00 00 00 	movabs $0xdffffc0000000000,%rcx
  25:	fc ff df
* 28:	0f b6 04 08          	movzbl (%rax,%rcx,1),%eax <-- trapping instruction
  2c:	84 c0                	test   %al,%al
  2e:	0f 85 18 09 00 00    	jne    0x94c
  34:	8b 13                	mov    (%rbx),%edx
  36:	45 31 e4             	xor    %r12d,%r12d
  39:	4c 89 ff             	mov    %r15,%rdi
  3c:	31 f6                	xor    %esi,%esi