general protection fault, probably for non-canonical address 0xdffffc00000000ba: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x00000000000005d0-0x00000000000005d7] CPU: 1 PID: 9 Comm: kworker/u4:0 Not tainted 5.15.173-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 Workqueue: writeback wb_workfn (flush-7:2) RIP: 0010:bio_associate_blkg_from_css+0x113/0x960 block/blk-cgroup.c:1867 Code: ef 03 41 80 3c 2f 00 74 08 4c 89 f7 e8 46 4d d3 fd bd d0 05 00 00 49 03 2e 48 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 ef e8 1f 4d d3 fd bb 90 00 00 00 48 03 5d RSP: 0018:ffffc90000ce7200 EFLAGS: 00010202 RAX: 00000000000000ba RBX: ffffffff96a127f0 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: ffffffff96a126e0 RDI: ffff888022e79500 RBP: 00000000000005d0 R08: ffffffff83f708e4 R09: fffffbfff20ec821 R10: 0000000000000000 R11: dffffc0000000001 R12: ffffffff96a126e0 R13: ffff888022e79500 R14: ffff888022e79508 R15: 1ffff110045cf2a1 FS: 0000000000000000(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555556593808 CR3: 00000000628ae000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bio_associate_blkg+0x220/0x330 block/blk-cgroup.c:1893 lbmStartIO+0x207/0x4b0 fs/jfs/jfs_logmgr.c:2130 lbmWrite+0x379/0x4a0 fs/jfs/jfs_logmgr.c:2079 jfs_flush_journal+0x533/0xec0 fs/jfs/jfs_logmgr.c:1556 jfs_write_inode+0x129/0x210 fs/jfs/inode.c:128 write_inode fs/fs-writeback.c:1495 [inline] __writeback_single_inode+0x644/0xe30 fs/fs-writeback.c:1705 writeback_sb_inodes+0xbce/0x1a40 fs/fs-writeback.c:1930 wb_writeback+0x451/0xc50 fs/fs-writeback.c:2104 wb_do_writeback fs/fs-writeback.c:2247 [inline] wb_workfn+0x46c/0x1130 fs/fs-writeback.c:2288 process_one_work+0x8a1/0x10c0 kernel/workqueue.c:2310 worker_thread+0xaca/0x1280 kernel/workqueue.c:2457 kthread+0x3f6/0x4f0 kernel/kthread.c:334 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 Modules linked in: ---[ end trace b99aeeb417236603 ]--- RIP: 0010:bio_associate_blkg_from_css+0x113/0x960 block/blk-cgroup.c:1867 Code: ef 03 41 80 3c 2f 00 74 08 4c 89 f7 e8 46 4d d3 fd bd d0 05 00 00 49 03 2e 48 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 ef e8 1f 4d d3 fd bb 90 00 00 00 48 03 5d RSP: 0018:ffffc90000ce7200 EFLAGS: 00010202 RAX: 00000000000000ba RBX: ffffffff96a127f0 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: ffffffff96a126e0 RDI: ffff888022e79500 RBP: 00000000000005d0 R08: ffffffff83f708e4 R09: fffffbfff20ec821 R10: 0000000000000000 R11: dffffc0000000001 R12: ffffffff96a126e0 R13: ffff888022e79500 R14: ffff888022e79508 R15: 1ffff110045cf2a1 FS: 0000000000000000(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555556593808 CR3: 00000000628ae000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: ef out %eax,(%dx) 1: 03 41 80 add -0x80(%rcx),%eax 4: 3c 2f cmp $0x2f,%al 6: 00 74 08 4c add %dh,0x4c(%rax,%rcx,1) a: 89 f7 mov %esi,%edi c: e8 46 4d d3 fd call 0xfdd34d57 11: bd d0 05 00 00 mov $0x5d0,%ebp 16: 49 03 2e add (%r14),%rbp 19: 48 89 e8 mov %rbp,%rax 1c: 48 c1 e8 03 shr $0x3,%rax 20: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx 27: fc ff df * 2a: 80 3c 08 00 cmpb $0x0,(%rax,%rcx,1) <-- trapping instruction 2e: 74 08 je 0x38 30: 48 89 ef mov %rbp,%rdi 33: e8 1f 4d d3 fd call 0xfdd34d57 38: bb 90 00 00 00 mov $0x90,%ebx 3d: 48 rex.W 3e: 03 .byte 0x3 3f: 5d pop %rbp