general protection fault, probably for non-canonical address 0xdffffc0000000022: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000110-0x0000000000000117] CPU: 0 PID: 5427 Comm: gfs2_quotad Not tainted 6.2.0-rc1-syzkaller-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 RIP: 0010:gfs2_quota_sync+0x304/0x820 fs/gfs2/quota.c:483 Code: 8b d1 fd 48 8b 5c 24 08 e9 6a 04 00 00 e8 84 8b d1 fd 45 31 ed eb 05 e8 7a 8b d1 fd 49 8d 9d 10 01 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 48 8b 6c 24 28 0f 85 83 04 00 00 ff 03 48 8b RSP: 0018:ffffc9000522fd30 EFLAGS: 00010206 RAX: 0000000000000022 RBX: 0000000000000110 RCX: 0000000000000001 RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 RBP: ffff888021698a60 R08: dffffc0000000000 R09: fffffbfff1a518e9 R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 R13: 0000000000000000 R14: ffff888021be2800 R15: ffff888021698000 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055ba156af680 CR3: 00000000189d4000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: gfs2_quotad+0x407/0x690 fs/gfs2/quota.c:1512 kthread+0x270/0x300 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:gfs2_quota_sync+0x304/0x820 fs/gfs2/quota.c:483 Code: 8b d1 fd 48 8b 5c 24 08 e9 6a 04 00 00 e8 84 8b d1 fd 45 31 ed eb 05 e8 7a 8b d1 fd 49 8d 9d 10 01 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 48 8b 6c 24 28 0f 85 83 04 00 00 ff 03 48 8b RSP: 0018:ffffc9000522fd30 EFLAGS: 00010206 RAX: 0000000000000022 RBX: 0000000000000110 RCX: 0000000000000001 RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 RBP: ffff888021698a60 R08: dffffc0000000000 R09: fffffbfff1a518e9 R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 R13: 0000000000000000 R14: ffff888021be2800 R15: ffff888021698000 FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffef4468378 CR3: 000000001f3ee000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 8b d1 mov %ecx,%edx 2: fd std 3: 48 8b 5c 24 08 mov 0x8(%rsp),%rbx 8: e9 6a 04 00 00 jmp 0x477 d: e8 84 8b d1 fd call 0xfdd18b96 12: 45 31 ed xor %r13d,%r13d 15: eb 05 jmp 0x1c 17: e8 7a 8b d1 fd call 0xfdd18b96 1c: 49 8d 9d 10 01 00 00 lea 0x110(%r13),%rbx 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 0f b6 04 20 movzbl (%rax,%r12,1),%eax <-- trapping instruction 2f: 84 c0 test %al,%al 31: 48 8b 6c 24 28 mov 0x28(%rsp),%rbp 36: 0f 85 83 04 00 00 jne 0x4bf 3c: ff 03 incl (%rbx) 3e: 48 rex.W 3f: 8b .byte 0x8b