Oops: general protection fault, probably for non-canonical address 0xfd7bfbff8000001c: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: maybe wild-memory-access in range [0xebdffffc000000e0-0xebdffffc000000e7] CPU: 1 UID: 0 PID: 10539 Comm: syz.7.1200 Not tainted 6.13.0-rc1-syzkaller-00378-g62b5a46999c7 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:pid_nr include/linux/pid.h:179 [inline] RIP: 0010:dump_holder fs/gfs2/glock.c:2295 [inline] RIP: 0010:gfs2_dump_glock+0x124d/0x1c80 fs/gfs2/glock.c:2407 Code: 85 8e 06 00 00 49 8b 6c 24 18 48 c7 04 24 00 00 00 00 48 85 ed 74 2f e8 41 c8 c7 fd 48 8d bd e0 00 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 74 08 3c 03 0f 8e 62 07 00 00 48 63 85 e0 00 RSP: 0018:ffffc900041577a8 EFLAGS: 00010212 RAX: 1d7bffff8000001c RBX: ffffffff8175b4ed RCX: ffffc9000d54a000 RDX: 0000000000080000 RSI: ffffffff83d23d6f RDI: ebdffffc000000e0 RBP: ebdffffc00000000 R08: 0000000000000003 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000002 R12: ffffffff8175b4cd R13: ffffc90004157898 R14: ffffffff8175b4ef R15: dffffc0000000000 FS: 00007ffaec8336c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f89b2f47bac CR3: 000000004740c000 CR4: 0000000000350ef0 Call Trace: gfs2_consist_inode_i+0x104/0x150 fs/gfs2/util.c:457 gfs2_dirent_scan+0x352/0x400 fs/gfs2/dir.c:589 gfs2_dir_read+0x36a/0x14d0 fs/gfs2/dir.c:1602 gfs2_readdir+0x137/0x1d0 fs/gfs2/file.c:116 iterate_dir+0x532/0xb40 fs/readdir.c:108 __do_sys_getdents fs/readdir.c:322 [inline] __se_sys_getdents fs/readdir.c:308 [inline] __x64_sys_getdents+0x148/0x2c0 fs/readdir.c:308 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7ffaeb97fed9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffaec833058 EFLAGS: 00000246 ORIG_RAX: 000000000000004e RAX: ffffffffffffffda RBX: 00007ffaebb45fa0 RCX: 00007ffaeb97fed9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007ffaeb9f3cc8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ffaebb45fa0 R15: 00007ffd3cbb9b18 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:pid_nr include/linux/pid.h:179 [inline] RIP: 0010:dump_holder fs/gfs2/glock.c:2295 [inline] RIP: 0010:gfs2_dump_glock+0x124d/0x1c80 fs/gfs2/glock.c:2407 Code: 85 8e 06 00 00 49 8b 6c 24 18 48 c7 04 24 00 00 00 00 48 85 ed 74 2f e8 41 c8 c7 fd 48 8d bd e0 00 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 74 08 3c 03 0f 8e 62 07 00 00 48 63 85 e0 00 RSP: 0018:ffffc900041577a8 EFLAGS: 00010212 RAX: 1d7bffff8000001c RBX: ffffffff8175b4ed RCX: ffffc9000d54a000 RDX: 0000000000080000 RSI: ffffffff83d23d6f RDI: ebdffffc000000e0 RBP: ebdffffc00000000 R08: 0000000000000003 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000002 R12: ffffffff8175b4cd R13: ffffc90004157898 R14: ffffffff8175b4ef R15: dffffc0000000000 FS: 00007ffaec8336c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe68b50d178 CR3: 000000004740c000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: 85 8e 06 00 00 49 test %ecx,0x49000006(%rsi) 6: 8b 6c 24 18 mov 0x18(%rsp),%ebp a: 48 c7 04 24 00 00 00 movq $0x0,(%rsp) 11: 00 12: 48 85 ed test %rbp,%rbp 15: 74 2f je 0x46 17: e8 41 c8 c7 fd call 0xfdc7c85d 1c: 48 8d bd e0 00 00 00 lea 0xe0(%rbp),%rdi 23: 48 89 f8 mov %rdi,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 0f b6 04 38 movzbl (%rax,%r15,1),%eax <-- trapping instruction 2f: 84 c0 test %al,%al 31: 74 08 je 0x3b 33: 3c 03 cmp $0x3,%al 35: 0f 8e 62 07 00 00 jle 0x79d 3b: 48 rex.W 3c: 63 .byte 0x63 3d: 85 e0 test %esp,%eax