loop0: detected capacity change from 0 to 4096 EXT4-fs error (device loop0): ext4_get_journal_inode:5712: inode #3: comm syz-executor.0: casefold flag without casefold feature general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] CPU: 1 PID: 416 Comm: syz-executor.0 Not tainted 6.1.0-syzkaller-01737-g0ec5a38bf849 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:__fscrypt_inode_uses_inline_crypto fs/crypto/inline_crypt.c:235 [inline] RIP: 0010:fscrypt_inode_uses_inline_crypto include/linux/fscrypt.h:824 [inline] RIP: 0010:fscrypt_limit_io_blocks+0xc7/0x2a0 fs/crypto/inline_crypt.c:466 Code: c4 68 02 00 00 4d 89 e6 49 c1 ee 03 43 80 3c 2e 00 74 08 4c 89 e7 e8 c8 0a e2 ff 49 8b 1c 24 48 83 c3 11 48 89 d8 48 c1 e8 03 <42> 8a 04 28 84 c0 0f 85 53 01 00 00 0f b6 1b 31 ff 89 de e8 f1 c6 RSP: 0018:ffffc90002bbf300 EFLAGS: 00010202 RAX: 0000000000000002 RBX: 0000000000000011 RCX: 0000000000000000 RDX: ffff888114eeb240 RSI: 0000000000008000 RDI: 0000000000008000 RBP: ffffc90002bbf330 R08: ffffffff81d2c2bf R09: ffffed102402f4a4 R10: ffffed102402f4a4 R11: 1ffff1102402f4a3 R12: ffff88812017a7a8 R13: dffffc0000000000 R14: 1ffff1102402f4f5 R15: 0000000000000001 FS: 00007f669c936700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055e62bdb89c0 CR3: 000000011167e000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ext4_iomap_begin+0x95e/0xc20 fs/ext4/inode.c:3477 iomap_iter+0x650/0x820 fs/iomap/iter.c:74 iomap_bmap+0x1a4/0x370 fs/iomap/fiemap.c:114 ext4_bmap+0x3b0/0x430 fs/ext4/inode.c:3211 bmap+0xa5/0xe0 fs/inode.c:1798 jbd2_journal_init_inode+0x9d/0x390 fs/jbd2/journal.c:1496 ext4_get_journal fs/ext4/super.c:5747 [inline] ext4_load_journal fs/ext4/super.c:5881 [inline] ext4_load_and_init_journal+0x33f/0x1fe0 fs/ext4/super.c:4807 __ext4_fill_super fs/ext4/super.c:5280 [inline] ext4_fill_super+0x5b85/0x84b0 fs/ext4/super.c:5643 get_tree_bdev+0x414/0x630 fs/super.c:1324 ext4_get_tree+0x1c/0x20 fs/ext4/super.c:5673 vfs_get_tree+0x88/0x290 fs/super.c:1531 do_new_mount+0x289/0xac0 fs/namespace.c:3040 path_mount+0x609/0x1050 fs/namespace.c:3370 do_mount fs/namespace.c:3383 [inline] __do_sys_mount fs/namespace.c:3591 [inline] __se_sys_mount+0x2d2/0x3c0 fs/namespace.c:3568 __x64_sys_mount+0xbf/0xd0 fs/namespace.c:3568 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2f/0x50 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f669bc8cada Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f669c935f88 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f669bc8cada RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f669c935fe0 RBP: 00007f669c936020 R08: 00007f669c936020 R09: 0000000020000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 R13: 0000000020000100 R14: 00007f669c935fe0 R15: 0000000020012f00 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__fscrypt_inode_uses_inline_crypto fs/crypto/inline_crypt.c:235 [inline] RIP: 0010:fscrypt_inode_uses_inline_crypto include/linux/fscrypt.h:824 [inline] RIP: 0010:fscrypt_limit_io_blocks+0xc7/0x2a0 fs/crypto/inline_crypt.c:466 Code: c4 68 02 00 00 4d 89 e6 49 c1 ee 03 43 80 3c 2e 00 74 08 4c 89 e7 e8 c8 0a e2 ff 49 8b 1c 24 48 83 c3 11 48 89 d8 48 c1 e8 03 <42> 8a 04 28 84 c0 0f 85 53 01 00 00 0f b6 1b 31 ff 89 de e8 f1 c6 RSP: 0018:ffffc90002bbf300 EFLAGS: 00010202 RAX: 0000000000000002 RBX: 0000000000000011 RCX: 0000000000000000 RDX: ffff888114eeb240 RSI: 0000000000008000 RDI: 0000000000008000 RBP: ffffc90002bbf330 R08: ffffffff81d2c2bf R09: ffffed102402f4a4 R10: ffffed102402f4a4 R11: 1ffff1102402f4a3 R12: ffff88812017a7a8 R13: dffffc0000000000 R14: 1ffff1102402f4f5 R15: 0000000000000001 FS: 00007f669c936700(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055e62bdb7c48 CR3: 000000011167e000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 68 02 00 00 4d pushq $0x4d000002 5: 89 e6 mov %esp,%esi 7: 49 c1 ee 03 shr $0x3,%r14 b: 43 80 3c 2e 00 cmpb $0x0,(%r14,%r13,1) 10: 74 08 je 0x1a 12: 4c 89 e7 mov %r12,%rdi 15: e8 c8 0a e2 ff callq 0xffe20ae2 1a: 49 8b 1c 24 mov (%r12),%rbx 1e: 48 83 c3 11 add $0x11,%rbx 22: 48 89 d8 mov %rbx,%rax 25: 48 c1 e8 03 shr $0x3,%rax * 29: 42 8a 04 28 mov (%rax,%r13,1),%al <-- trapping instruction 2d: 84 c0 test %al,%al 2f: 0f 85 53 01 00 00 jne 0x188 35: 0f b6 1b movzbl (%rbx),%ebx 38: 31 ff xor %edi,%edi 3a: 89 de mov %ebx,%esi 3c: e8 .byte 0xe8 3d: f1 icebp 3e: c6 .byte 0xc6