------------[ cut here ]------------ kernel BUG at fs/notify/dnotify/dnotify.c:135! invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 1 PID: 1047 Comm: kworker/u8:6 Not tainted 6.9.0-rc4-syzkaller-00274-g3b68086599f8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Workqueue: events_unbound fsnotify_mark_destroy_workfn RIP: 0010:dnotify_free_mark+0x58/0x60 fs/notify/dnotify/dnotify.c:135 Code: 89 df e8 ab c3 da ff 48 83 3b 00 75 17 e8 40 b2 79 ff 48 8b 3d a9 57 b7 0b 4c 89 f6 5b 41 5e e9 ee 52 cf ff e8 29 b2 79 ff 90 <0f> 0b 66 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffc900041f7ae8 EFLAGS: 00010293 RAX: ffffffff821c4e47 RBX: ffff88802446a080 RCX: ffff888021fc9e00 RDX: 0000000000000000 RSI: ffffffff8bcab8a0 RDI: ffff88802446a000 RBP: ffffc900041f7bb0 R08: ffffffff92efb5bf R09: 1ffffffff25df6b7 R10: dffffc0000000000 R11: ffffffff821c4df0 R12: ffff888017ff9800 R13: ffffc900041f7b40 R14: ffff88802446a000 R15: ffff88802446a000 FS: 0000000000000000(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f67dc0024d0 CR3: 000000007e43a000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: fsnotify_final_mark_destroy fs/notify/mark.c:278 [inline] fsnotify_mark_destroy_workfn+0x2cf/0x350 fs/notify/mark.c:866 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0xa10/0x17c0 kernel/workqueue.c:3335 worker_thread+0x86d/0xd70 kernel/workqueue.c:3416 kthread+0x2f0/0x390 kernel/kthread.c:388 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:dnotify_free_mark+0x58/0x60 fs/notify/dnotify/dnotify.c:135 Code: 89 df e8 ab c3 da ff 48 83 3b 00 75 17 e8 40 b2 79 ff 48 8b 3d a9 57 b7 0b 4c 89 f6 5b 41 5e e9 ee 52 cf ff e8 29 b2 79 ff 90 <0f> ---------------- Code disassembly (best guess): 0: 89 df mov %ebx,%edi 2: e8 ab c3 da ff call 0xffdac3b2 7: 48 83 3b 00 cmpq $0x0,(%rbx) b: 75 17 jne 0x24 d: e8 40 b2 79 ff call 0xff79b252 12: 48 8b 3d a9 57 b7 0b mov 0xbb757a9(%rip),%rdi # 0xbb757c2 19: 4c 89 f6 mov %r14,%rsi 1c: 5b pop %rbx 1d: 41 5e pop %r14 1f: e9 ee 52 cf ff jmp 0xffcf5312 24: e8 29 b2 79 ff call 0xff79b252 29: 90 nop * 2a: 0f .byte 0xf <-- trapping instruction