general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 PID: 11 Comm: kworker/u4:1 Not tainted 6.1.0-rc1-syzkaller-00427-gd47136c28015 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 Workqueue: writeback wb_workfn (flush-7:4) RIP: 0010:nilfs_clear_dirty_page+0x9a/0x1080 fs/nilfs2/page.c:387 Code: 31 e8 4a 9d 3c fe 49 8d 5f 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 08 48 89 df e8 80 8b 90 fe 48 8b 1b 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 df e8 67 8b 90 fe 4c 8b 2b 49 8d 5d 28 RSP: 0018:ffffc90000107020 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff88801236ba80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0002565a80 RBP: ffffc900001070f0 R08: ffffffff834aff7a R09: fffff940004acb51 R10: fffff940004acb51 R11: 1ffffd40004acb50 R12: 000000000000000b R13: 0000000000000000 R14: dffffc0000000000 R15: ffffea0002565a80 FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055555723b848 CR3: 00000000333d4000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: nilfs_clear_dirty_pages+0x1d9/0x380 fs/nilfs2/page.c:372 nilfs_writepages+0x117/0x150 fs/nilfs2/inode.c:165 do_writepages+0x3c3/0x680 mm/page-writeback.c:2469 __writeback_single_inode+0xd1/0x670 fs/fs-writeback.c:1587 writeback_sb_inodes+0xb3b/0x18f0 fs/fs-writeback.c:1870 __writeback_inodes_wb+0x125/0x420 fs/fs-writeback.c:1941 wb_writeback+0x440/0x7b0 fs/fs-writeback.c:2046 wb_check_start_all fs/fs-writeback.c:2168 [inline] wb_do_writeback fs/fs-writeback.c:2194 [inline] wb_workfn+0x827/0xef0 fs/fs-writeback.c:2227 process_one_work+0x877/0xdb0 kernel/workqueue.c:2289 worker_thread+0xb14/0x1330 kernel/workqueue.c:2436 kthread+0x266/0x300 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:nilfs_clear_dirty_page+0x9a/0x1080 fs/nilfs2/page.c:387 Code: 31 e8 4a 9d 3c fe 49 8d 5f 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 08 48 89 df e8 80 8b 90 fe 48 8b 1b 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 df e8 67 8b 90 fe 4c 8b 2b 49 8d 5d 28 RSP: 0018:ffffc90000107020 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff88801236ba80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0002565a80 RBP: ffffc900001070f0 R08: ffffffff834aff7a R09: fffff940004acb51 R10: fffff940004acb51 R11: 1ffffd40004acb50 R12: 000000000000000b R13: 0000000000000000 R14: dffffc0000000000 R15: ffffea0002565a80 FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2f135000 CR3: 000000001d58b000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 31 e8 xor %ebp,%eax 2: 4a 9d rex.WX popfq 4: 3c fe cmp $0xfe,%al 6: 49 8d 5f 18 lea 0x18(%r15),%rbx a: 48 89 d8 mov %rbx,%rax d: 48 c1 e8 03 shr $0x3,%rax 11: 42 80 3c 30 00 cmpb $0x0,(%rax,%r14,1) 16: 74 08 je 0x20 18: 48 89 df mov %rbx,%rdi 1b: e8 80 8b 90 fe callq 0xfe908ba0 20: 48 8b 1b mov (%rbx),%rbx 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 30 00 cmpb $0x0,(%rax,%r14,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 48 89 df mov %rbx,%rdi 34: e8 67 8b 90 fe callq 0xfe908ba0 39: 4c 8b 2b mov (%rbx),%r13 3c: 49 8d 5d 28 lea 0x28(%r13),%rbx