general protection fault, probably for non-canonical address 0xdffffc0000000058: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x00000000000002c0-0x00000000000002c7] CPU: 0 PID: 35 Comm: kworker/u4:2 Not tainted 6.2.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 Workqueue: writeback wb_workfn (flush-7:0) RIP: 0010:iput+0x40/0x740 fs/inode.c:1763 Code: 48 85 ff 0f 84 3d 03 00 00 49 bf 00 00 00 00 00 fc ff df 48 8b 04 24 48 8d 98 d8 00 00 00 48 89 d8 48 c1 e8 03 48 89 44 24 10 <42> 80 3c 38 00 74 08 48 89 df e8 21 8b ed ff f6 03 40 0f 85 dc 06 RSP: 0018:ffffc90000ac6560 EFLAGS: 00010202 RAX: 0000000000000058 RBX: 00000000000002c0 RCX: 0000000080000001 RDX: 0000000000000000 RSI: ffffffff89ea7220 RDI: 00000000000001e8 RBP: ffffc90000ac6b40 R08: dffffc0000000000 R09: fffffbfff1a7b756 R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90000ac6ae8 R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f5670e019ee CR3: 000000007c687000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: xfs_filestream_select_ag+0x47f/0x1530 fs/xfs/xfs_filestream.c:360 xfs_bmap_btalloc_filestreams fs/xfs/libxfs/xfs_bmap.c:3551 [inline] xfs_bmap_btalloc+0xd13/0x2290 fs/xfs/libxfs/xfs_bmap.c:3655 xfs_bmap_alloc_userdata fs/xfs/libxfs/xfs_bmap.c:4029 [inline] xfs_bmapi_allocate+0x5a5/0xcd0 fs/xfs/libxfs/xfs_bmap.c:4072 xfs_bmapi_convert_delalloc+0x81d/0x10f0 fs/xfs/libxfs/xfs_bmap.c:4537 xfs_convert_blocks fs/xfs/xfs_aops.c:266 [inline] xfs_map_blocks+0x67f/0xf00 fs/xfs/xfs_aops.c:389 iomap_writepage_map fs/iomap/buffered-io.c:1612 [inline] iomap_do_writepage+0x8a5/0x2680 fs/iomap/buffered-io.c:1775 write_cache_pages+0x7fe/0x1140 mm/page-writeback.c:2472 iomap_writepages+0x58/0x210 fs/iomap/buffered-io.c:1792 xfs_vm_writepages+0x12c/0x190 fs/xfs/xfs_aops.c:506 do_writepages+0x340/0x5d0 mm/page-writeback.c:2581 __writeback_single_inode+0x116/0xe50 fs/fs-writeback.c:1598 writeback_sb_inodes+0x65c/0x1020 fs/fs-writeback.c:1889 wb_writeback+0x3d7/0xba0 fs/fs-writeback.c:2063 wb_do_writeback fs/fs-writeback.c:2206 [inline] wb_workfn+0x414/0xe90 fs/fs-writeback.c:2246 process_one_work+0x7e5/0x1000 kernel/workqueue.c:2289 worker_thread+0x8c9/0xfd0 kernel/workqueue.c:2436 kthread+0x232/0x2b0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:iput+0x40/0x740 fs/inode.c:1763 Code: 48 85 ff 0f 84 3d 03 00 00 49 bf 00 00 00 00 00 fc ff df 48 8b 04 24 48 8d 98 d8 00 00 00 48 89 d8 48 c1 e8 03 48 89 44 24 10 <42> 80 3c 38 00 74 08 48 89 df e8 21 8b ed ff f6 03 40 0f 85 dc 06 RSP: 0018:ffffc90000ac6560 EFLAGS: 00010202 RAX: 0000000000000058 RBX: 00000000000002c0 RCX: 0000000080000001 RDX: 0000000000000000 RSI: ffffffff89ea7220 RDI: 00000000000001e8 RBP: ffffc90000ac6b40 R08: dffffc0000000000 R09: fffffbfff1a7b756 R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90000ac6ae8 R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005580dfa98000 CR3: 000000000bc8e000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 48 85 ff test %rdi,%rdi 3: 0f 84 3d 03 00 00 je 0x346 9: 49 bf 00 00 00 00 00 movabs $0xdffffc0000000000,%r15 10: fc ff df 13: 48 8b 04 24 mov (%rsp),%rax 17: 48 8d 98 d8 00 00 00 lea 0xd8(%rax),%rbx 1e: 48 89 d8 mov %rbx,%rax 21: 48 c1 e8 03 shr $0x3,%rax 25: 48 89 44 24 10 mov %rax,0x10(%rsp) * 2a: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 48 89 df mov %rbx,%rdi 34: e8 21 8b ed ff callq 0xffed8b5a 39: f6 03 40 testb $0x40,(%rbx) 3c: 0f .byte 0xf 3d: 85 dc test %ebx,%esp 3f: 06 (bad)