kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 17256 Comm: syz-executor.2 Not tainted 5.4.219-syzkaller-00012-ga8aad8851131 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:f2fs_release_page+0x2c1/0xa20 fs/f2fs/data.c:3800 Code: 00 4c 03 23 4c 89 e0 48 c1 e8 03 42 80 3c 30 00 74 08 4c 89 e7 e8 2f 61 9f ff bb 90 05 00 00 49 03 1c 24 48 89 d8 48 c1 e8 03 <42> 8a 04 30 84 c0 0f 85 fd 06 00 00 8b 1b bd 00 00 00 40 be 00 00 RSP: 0018:ffff8881e7555b50 EFLAGS: 00010206 RAX: 00000000000000b2 RBX: 0000000000000590 RCX: ffff8881ed121f80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffff81f44f71 R09: fffff94000f8ff11 R10: fffff94000f8ff11 R11: 1ffffd4000f8ff10 R12: ffff8881aa06d3f0 R13: ffffea0007c7f888 R14: dffffc0000000000 R15: ffffea0007c7f880 FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055555739d3b8 CR3: 00000001a0e7e000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: shrink_page_list+0x135c/0x3360 mm/vmscan.c:1447 shrink_inactive_list+0x51e/0xf60 mm/vmscan.c:1997 shrink_list mm/vmscan.c:2288 [inline] shrink_node_memcg+0x5c1/0x1080 mm/vmscan.c:2618 shrink_node+0x3be/0x1350 mm/vmscan.c:2831 shrink_zones+0x48d/0x960 mm/vmscan.c:3048 do_try_to_free_pages+0x21b/0x990 mm/vmscan.c:3106 try_to_free_mem_cgroup_pages+0x3e5/0x960 mm/vmscan.c:3407 try_charge+0x4fa/0x11f0 mm/memcontrol.c:2616 mem_cgroup_try_charge+0xd5/0x2a0 mm/memcontrol.c:6571 __add_to_page_cache_locked+0x246/0x970 mm/filemap.c:865 add_to_page_cache_lru+0x116/0x2b0 mm/filemap.c:962 pagecache_get_page+0x539/0x760 mm/filemap.c:1701 grab_cache_page_write_begin+0x50/0x90 mm/filemap.c:3261 ext4_da_write_begin+0x5ce/0xf80 fs/ext4/inode.c:3144 generic_perform_write+0x2f9/0x5a0 mm/filemap.c:3311 __generic_file_write_iter+0x239/0x490 mm/filemap.c:3440 ext4_file_write_iter+0x495/0x10e0 fs/ext4/file.c:270 call_write_iter include/linux/fs.h:1976 [inline] new_sync_write fs/read_write.c:483 [inline] __vfs_write+0x5e3/0x780 fs/read_write.c:496 __kernel_write+0x12c/0x340 fs/read_write.c:515 dump_emit+0x223/0x360 fs/coredump.c:838 elf_core_dump+0x3f18/0x4870 fs/binfmt_elf.c:2352 do_coredump+0x1faf/0x2ed0 fs/coredump.c:801 get_signal+0xd5b/0x13f0 kernel/signal.c:2729 do_signal+0xb0/0x1200 arch/x86/kernel/signal.c:809 exit_to_usermode_loop+0xdd/0x1d0 arch/x86/entry/common.c:159 prepare_exit_to_usermode+0x17c/0x1d0 arch/x86/entry/common.c:194 retint_user+0x8/0x8 Modules linked in: ---[ end trace 1f1998174e0c8277 ]--- RIP: 0010:f2fs_release_page+0x2c1/0xa20 fs/f2fs/data.c:3800 Code: 00 4c 03 23 4c 89 e0 48 c1 e8 03 42 80 3c 30 00 74 08 4c 89 e7 e8 2f 61 9f ff bb 90 05 00 00 49 03 1c 24 48 89 d8 48 c1 e8 03 <42> 8a 04 30 84 c0 0f 85 fd 06 00 00 8b 1b bd 00 00 00 40 be 00 00 RSP: 0018:ffff8881e7555b50 EFLAGS: 00010206 RAX: 00000000000000b2 RBX: 0000000000000590 RCX: ffff8881ed121f80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffff81f44f71 R09: fffff94000f8ff11 R10: fffff94000f8ff11 R11: 1ffffd4000f8ff10 R12: ffff8881aa06d3f0 R13: ffffea0007c7f888 R14: dffffc0000000000 R15: ffffea0007c7f880 FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020006000 CR3: 00000001a0e7e000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 4c 03 23 add %cl,0x23(%rbx,%rax,1) 4: 4c 89 e0 mov %r12,%rax 7: 48 c1 e8 03 shr $0x3,%rax b: 42 80 3c 30 00 cmpb $0x0,(%rax,%r14,1) 10: 74 08 je 0x1a 12: 4c 89 e7 mov %r12,%rdi 15: e8 2f 61 9f ff callq 0xff9f6149 1a: bb 90 05 00 00 mov $0x590,%ebx 1f: 49 03 1c 24 add (%r12),%rbx 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 8a 04 30 mov (%rax,%r14,1),%al <-- trapping instruction 2e: 84 c0 test %al,%al 30: 0f 85 fd 06 00 00 jne 0x733 36: 8b 1b mov (%rbx),%ebx 38: bd 00 00 00 40 mov $0x40000000,%ebp 3d: be .byte 0xbe