general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 PID: 8212 Comm: syz-executor.1 Not tainted 5.7.0-rc7-next-20200529-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__switch_to_asm+0x0/0x40 arch/x86/entry/entry_64.S:228 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90017186e58 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: ffff888057e8a6f0 RCX: 1ffff1100afd1571 RDX: 1ffff11015ce6fc2 RSI: ffff88805f7f8080 RDI: ffff888057e8a2c0 RBP: ffffc90017186f28 R08: 0000000000000000 R09: fffffbfff155b432 R10: ffffffff8aada18f R11: fffffbfff155b431 R12: ffff888057e8a2c0 R13: ffff8880ae737e00 R14: ffff88805f7f8080 R15: ffff8880ae737e18 FS: 00007fa68af35700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000073e914 CR3: 000000005f7e6000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: context_switch kernel/sched/core.c:3430 [inline] __schedule+0x8f3/0x1f80 kernel/sched/core.c:4155 preempt_schedule_irq+0xb0/0x150 kernel/sched/core.c:4413 idtentry_exit_cond_resched arch/x86/entry/common.c:600 [inline] idtentry_exit_cond_rcu+0xc0/0xf0 arch/x86/entry/common.c:647 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:576 RIP: 0010:should_failslab+0x0/0xf mm/slab_common.c:1790 Code: 48 89 ee 4c 89 e7 e8 cf dc ff ff 31 c0 5b 5d 41 5c c3 48 89 ef e8 d0 d9 ff ff eb e4 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 7b 13 14 00 3c 01 19 c0 f7 d0 83 e0 f4 c3 4c 89 e6 48 c7 c7 98 RSP: 0018:ffffc90017187020 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000408d40 RCX: 0000000000000001 RDX: 0000000000000000 RSI: 0000000000408d40 RDI: ffff88821bc46e00 RBP: ffff88821bc46e00 R08: ffff888057e8a2c0 R09: fffffbfff155b432 R10: ffffffff8aada18f R11: fffffbfff155b431 R12: 0000000000408c40 R13: 0000000000408d40 R14: 0000000000000400 R15: 0000000000000000 slab_pre_alloc_hook mm/slab.h:569 [inline] slab_alloc mm/slab.c:3306 [inline] kmem_cache_alloc+0x29b/0x740 mm/slab.c:3484 kmem_cache_zalloc include/linux/slab.h:659 [inline] alloc_buffer_head+0x20/0x110 fs/buffer.c:3398 alloc_page_buffers+0x167/0x590 fs/buffer.c:857 grow_dev_page fs/buffer.c:1004 [inline] grow_buffers fs/buffer.c:1057 [inline] __getblk_slow fs/buffer.c:1090 [inline] __getblk_gfp+0x686/0xeb0 fs/buffer.c:1392 sb_getblk include/linux/buffer_head.h:325 [inline] ext4_read_block_bitmap_nowait+0x224/0x1c70 fs/ext4/balloc.c:436 ext4_mb_init_cache+0x571/0x13c0 fs/ext4/mballoc.c:864 ext4_mb_init_group+0x20d/0x9a0 fs/ext4/mballoc.c:1062 ext4_mb_load_buddy_gfp+0xaa6/0xda0 fs/ext4/mballoc.c:1130 ext4_mb_load_buddy fs/ext4/mballoc.c:1241 [inline] ext4_mballoc_query_range+0xa2/0x64b fs/ext4/mballoc.c:5366 ext4_getfsmap_datadev+0x1753/0x28c0 fs/ext4/fsmap.c:534 ext4_getfsmap+0x700/0x9a0 fs/ext4/fsmap.c:705 ext4_ioc_getfsmap+0x2f9/0x970 fs/ext4/ioctl.c:662 ext4_ioctl+0x2fc/0x4f60 fs/ext4/ioctl.c:778 vfs_ioctl fs/ioctl.c:48 [inline] ksys_ioctl+0x11a/0x180 fs/ioctl.c:753 __do_sys_ioctl fs/ioctl.c:762 [inline] __se_sys_ioctl fs/ioctl.c:760 [inline] __x64_sys_ioctl+0x6f/0xb0 fs/ioctl.c:760 do_syscall_64+0x60/0xe0 arch/x86/entry/common.c:359 entry_SYSCALL_64_after_hwframe+0x44/0xa9 general protection fault, probably for non-canonical address 0x1fffc22019fb71e2: 0000 [#2] PREEMPT SMP KASAN CPU: 1 PID: 8212 Comm: syz-executor.1 Not tainted 5.7.0-rc7-next-20200529-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:perf_msr_probe+0x55/0x3a0 arch/x86/events/probe.c:20 Code: c1 e8 03 88 54 24 37 48 89 44 24 28 4c 01 f8 48 c7 44 24 40 b3 8a b5 41 48 c7 44 24 48 cf 9b 69 89 48 c7 44 24 50 e0 5a 01 81 00 f1 f1 f1 f1 c7 40 04 04 f3 f3 f3 65 48 8b 04 25 28 00 00 00 RSP: 0018:ffffc90017186490 EFLAGS: 00010017 RAX: 1fffc22019fb71e2 RBX: ffffc90017186528 RCX: ffffffff8169e51e RDX: 0000000040000002 RSI: ffffffff8169e549 RDI: 000000000045ca69 RBP: 000000000045ca69 R08: ffff888057e8a2c0 R09: fffffbfff1918a22 R10: ffffffff8c8c5109 R11: fffffbfff1918a21 R12: 0000000000000000 R13: ffffc900171865f8 R14: 000000000045ca69 R15: ffffc90017186548 FS: 00007fa68af35700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000073e914 CR3: 000000005f7e6000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: Modules linked in: ---[ end trace 665a0351aff3ce86 ]--- RIP: 0010:__switch_to_asm+0x0/0x40 arch/x86/entry/entry_64.S:228 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90017186e58 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: ffff888057e8a6f0 RCX: 1ffff1100afd1571 RDX: 1ffff11015ce6fc2 RSI: ffff88805f7f8080 RDI: ffff888057e8a2c0 RBP: ffffc90017186f28 R08: 0000000000000000 R09: fffffbfff155b432 R10: ffffffff8aada18f R11: fffffbfff155b431 R12: ffff888057e8a2c0 R13: ffff8880ae737e00 R14: ffff88805f7f8080 R15: ffff8880ae737e18 FS: 00007fa68af35700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000073e914 CR3: 000000005f7e6000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400