general protection fault, probably for non-canonical address 0xdffffc00000000db: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x00000000000006d8-0x00000000000006df] CPU: 0 PID: 18144 Comm: syz-executor.2 Not tainted 5.10.158-syzkaller-01202-gd31626cbea61 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:f2fs_release_page+0x328/0xb90 fs/f2fs/data.c:3775 Code: 00 4c 03 23 4c 89 e0 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 e7 e8 b8 eb 92 ff bb d8 06 00 00 49 03 1c 24 48 89 d8 48 c1 e8 03 <42> 8a 04 28 84 c0 0f 85 c9 07 00 00 44 8b 33 bb 00 00 00 40 be 00 RSP: 0018:ffffc90006c15a00 EFLAGS: 00010206 RAX: 00000000000000db RBX: 00000000000006d8 RCX: ffff88811c793b40 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc90006c15a48 R08: ffffffff82143630 R09: fffff94000887be1 R10: fffff94000887be1 R11: 1ffffd4000887be0 R12: ffff8881582bd3c8 R13: dffffc0000000000 R14: 8000000000002005 R15: ffffea000443df00 FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f96a3777000 CR3: 000000016de9e000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: try_to_release_page+0x1bd/0x210 mm/filemap.c:3664 shrink_page_list+0x240a/0x3c60 mm/vmscan.c:1453 shrink_inactive_list+0x38f/0xcd0 mm/vmscan.c:2016 shrink_list mm/vmscan.c:2240 [inline] shrink_lruvec+0x499/0xa50 mm/vmscan.c:2558 shrink_node_memcgs+0x44f/0x9a0 mm/vmscan.c:2749 shrink_node+0xce1/0x1b30 mm/vmscan.c:2866 shrink_zones+0x48d/0x960 mm/vmscan.c:3069 do_try_to_free_pages+0x217/0xa50 mm/vmscan.c:3125 try_to_free_mem_cgroup_pages+0x3a2/0x840 mm/vmscan.c:3443 try_charge+0x4a5/0x1020 mm/memcontrol.c:2774 __mem_cgroup_charge+0x12d/0x720 mm/memcontrol.c:6836 mem_cgroup_charge include/linux/memcontrol.h:456 [inline] __add_to_page_cache_locked+0x2bc/0xb30 mm/filemap.c:854 add_to_page_cache_lru+0x116/0x2b0 mm/filemap.c:948 pagecache_get_page+0x62c/0x850 mm/filemap.c:1859 grab_cache_page_write_begin+0x5c/0xa0 mm/filemap.c:3418 ext4_da_write_begin+0x5c2/0xf10 fs/ext4/inode.c:3056 generic_perform_write+0x309/0x5b0 mm/filemap.c:3468 ext4_buffered_write_iter+0x47c/0x610 fs/ext4/file.c:272 ext4_file_write_iter+0x192/0x1c70 fs/ext4/file.c:689 __kernel_write+0x5ad/0x9d0 fs/read_write.c:550 dump_emit fs/coredump.c:849 [inline] dump_user_range+0x25b/0x3b0 fs/coredump.c:902 elf_core_dump+0x3156/0x3cd0 fs/binfmt_elf.c:2287 do_coredump+0x1f7c/0x2dc0 fs/coredump.c:811 get_signal+0xdde/0x1440 kernel/signal.c:2774 arch_do_signal+0x8e/0x650 arch/x86/kernel/signal.c:805 exit_to_user_mode_loop+0xa3/0xe0 kernel/entry/common.c:161 exit_to_user_mode_prepare kernel/entry/common.c:191 [inline] irqentry_exit_to_user_mode+0x56/0x80 kernel/entry/common.c:279 irqentry_exit+0x12/0x60 kernel/entry/common.c:367 exc_page_fault+0x7e/0x1b0 arch/x86/mm/fault.c:1521 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:571 RIP: 0033:0x7f6be3a56e97 Code: 38 5d 41 5c c3 48 8d 3d 8d ea 0b 00 e8 72 f8 ff ff 48 8d 3d 8f ea 0b 00 e8 66 f8 ff ff 66 0f 1f 44 00 00 55 89 fd 48 83 ec 10 <64> 8b 04 25 b4 ff ff ff 85 c0 74 2a 89 fe 31 c0 bf 3c 00 00 00 e8 RSP: 002b:00007f6be27ee260 EFLAGS: 00010206 RAX: 0000000000000000 RBX: 00007f6be3bdb050 RCX: 00007f6be3abb0d9 RDX: 00007f6be27ee280 RSI: 00007f6be27ee3b0 RDI: 000000000000000b RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 00007ffea8b0642f R14: 00007f6be280d300 R15: 0000000000022000 Modules linked in: ---[ end trace 1a6004f28ded4c84 ]--- RIP: 0010:f2fs_release_page+0x328/0xb90 fs/f2fs/data.c:3775 Code: 00 4c 03 23 4c 89 e0 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 e7 e8 b8 eb 92 ff bb d8 06 00 00 49 03 1c 24 48 89 d8 48 c1 e8 03 <42> 8a 04 28 84 c0 0f 85 c9 07 00 00 44 8b 33 bb 00 00 00 40 be 00 RSP: 0018:ffffc90006c15a00 EFLAGS: 00010206 RAX: 00000000000000db RBX: 00000000000006d8 RCX: ffff88811c793b40 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc90006c15a48 R08: ffffffff82143630 R09: fffff94000887be1 R10: fffff94000887be1 R11: 1ffffd4000887be0 R12: ffff8881582bd3c8 R13: dffffc0000000000 R14: 8000000000002005 R15: ffffea000443df00 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055c58ab21000 CR3: 000000016de9e000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 4c 03 23 add %cl,0x23(%rbx,%rax,1) 4: 4c 89 e0 mov %r12,%rax 7: 48 c1 e8 03 shr $0x3,%rax b: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) 10: 74 08 je 0x1a 12: 4c 89 e7 mov %r12,%rdi 15: e8 b8 eb 92 ff callq 0xff92ebd2 1a: bb d8 06 00 00 mov $0x6d8,%ebx 1f: 49 03 1c 24 add (%r12),%rbx 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 8a 04 28 mov (%rax,%r13,1),%al <-- trapping instruction 2e: 84 c0 test %al,%al 30: 0f 85 c9 07 00 00 jne 0x7ff 36: 44 8b 33 mov (%rbx),%r14d 39: bb 00 00 00 40 mov $0x40000000,%ebx 3e: be .byte 0xbe