BTRFS info (device loop3): last unmount of filesystem 395ef67a-297e-477c-816d-cd80a5b93e5d Oops: general protection fault, probably for non-canonical address 0xe01ffbf110036933: 0000 [#1] SMP KASAN NOPTI KASAN: maybe wild-memory-access in range [0x00ffff88801b4998-0x00ffff88801b499f] CPU: 1 UID: 0 PID: 5846 Comm: syz-executor Not tainted 6.15.0-rc7-syzkaller-00099-g94305e83eccb #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:kasan_byte_accessible+0x15/0x30 mm/kasan/generic.c:199 Code: 00 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 48 b8 00 00 00 00 00 fc ff df 48 c1 ef 03 48 01 c7 <0f> b6 07 3c 07 0f 96 c0 e9 e9 76 f0 fe 66 66 2e 0f 1f 84 00 00 00 RSP: 0018:ffffc90003c0fad0 EFLAGS: 00010086 RAX: dffffc0000000000 RBX: 00ffff88801b4998 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8b6d88d6 RDI: e01ffbf110036933 RBP: 00ffff88801b4998 R08: 0000000000000001 R09: 0000000000000000 R10: ffffffff90854e17 R11: 0000000000000000 R12: ffffffff8b6d88d6 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 000055556c262500(0000) GS:ffff888124ae1000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f75818e56c0 CR3: 000000005bffc000 CR4: 0000000000350ef0 Call Trace: __kasan_check_byte+0x13/0x50 mm/kasan/common.c:556 kasan_check_byte include/linux/kasan.h:399 [inline] lock_acquire kernel/locking/lockdep.c:5840 [inline] lock_acquire+0xfc/0x350 kernel/locking/lockdep.c:5823 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:119 [inline] _raw_spin_lock_irq+0x36/0x50 kernel/locking/spinlock.c:170 put_pwq_unlocked kernel/workqueue.c:1662 [inline] put_pwq_unlocked kernel/workqueue.c:1655 [inline] destroy_workqueue+0x5dd/0xaa0 kernel/workqueue.c:5911 btrfs_destroy_workqueue+0x3f/0x260 fs/btrfs/async-thread.c:359 btrfs_stop_all_workers+0x1de/0x370 fs/btrfs/disk-io.c:1786 close_ctree+0x5c0/0xf60 fs/btrfs/disk-io.c:4470 generic_shutdown_super+0x156/0x390 fs/super.c:642 kill_anon_super+0x3a/0x60 fs/super.c:1237 btrfs_kill_super+0x3b/0x50 fs/btrfs/super.c:2103 deactivate_locked_super+0xc1/0x1a0 fs/super.c:473 deactivate_super fs/super.c:506 [inline] deactivate_super+0xde/0x100 fs/super.c:502 cleanup_mnt+0x225/0x450 fs/namespace.c:1431 task_work_run+0x150/0x240 kernel/task_work.c:227 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] exit_to_user_mode_loop kernel/entry/common.c:114 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x27b/0x2a0 kernel/entry/common.c:218 do_syscall_64+0xda/0x260 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f737338fc97 Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 RSP: 002b:00007ffdb8b4fa48 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: 0000000000000000 RBX: 00007f737341089d RCX: 00007f737338fc97 RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffdb8b4fb00 RBP: 00007ffdb8b4fb00 R08: 0000000000000000 R09: 0000000000000000 R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffdb8b50b90 R13: 00007f737341089d R14: 0000000000028ae8 R15: 00007ffdb8b50bd0 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:kasan_byte_accessible+0x15/0x30 mm/kasan/generic.c:199 Code: 00 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 48 b8 00 00 00 00 00 fc ff df 48 c1 ef 03 48 01 c7 <0f> b6 07 3c 07 0f 96 c0 e9 e9 76 f0 fe 66 66 2e 0f 1f 84 00 00 00 RSP: 0018:ffffc90003c0fad0 EFLAGS: 00010086 RAX: dffffc0000000000 RBX: 00ffff88801b4998 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8b6d88d6 RDI: e01ffbf110036933 RBP: 00ffff88801b4998 R08: 0000000000000001 R09: 0000000000000000 R10: ffffffff90854e17 R11: 0000000000000000 R12: ffffffff8b6d88d6 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 000055556c262500(0000) GS:ffff888124ae1000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f75818e56c0 CR3: 000000005bffc000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: 0f 1f 00 nopl (%rax) 5: 90 nop 6: 90 nop 7: 90 nop 8: 90 nop 9: 90 nop a: 90 nop b: 90 nop c: 90 nop d: 90 nop e: 90 nop f: 90 nop 10: 90 nop 11: 90 nop 12: 90 nop 13: 90 nop 14: 90 nop 15: 66 0f 1f 00 nopw (%rax) 19: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 20: fc ff df 23: 48 c1 ef 03 shr $0x3,%rdi 27: 48 01 c7 add %rax,%rdi * 2a: 0f b6 07 movzbl (%rdi),%eax <-- trapping instruction 2d: 3c 07 cmp $0x7,%al 2f: 0f 96 c0 setbe %al 32: e9 e9 76 f0 fe jmp 0xfef07720 37: 66 data16 38: 66 data16 39: 2e cs 3a: 0f .byte 0xf 3b: 1f (bad) 3c: 84 00 test %al,(%rax)