Oops: general protection fault, probably for non-canonical address 0xdffffc000000003e: 0000 [#1] SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x00000000000001f0-0x00000000000001f7] CPU: 0 UID: 0 PID: 5319 Comm: syz.0.0 Not tainted syzkaller #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 RIP: 0010:btrfs_root_id fs/btrfs/ctree.h:333 [inline] RIP: 0010:do_perf_trace_btrfs__inode include/trace/events/btrfs.h:204 [inline] RIP: 0010:perf_trace_btrfs__inode+0x44d/0x580 include/trace/events/btrfs.h:204 Code: c1 e8 03 42 80 3c 30 00 74 08 4c 89 ff e8 db 43 66 fe 4d 8b 2f 4d 8d bd f7 01 00 00 49 81 c5 fe 01 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 0f 85 e4 00 00 00 4c 89 e8 48 c1 e8 03 42 0f RSP: 0018:ffffc9000d2bf800 EFLAGS: 00010203 RAX: 000000000000003e RBX: ffffe8ffffc4e720 RCX: ffffffff83c10ce7 RDX: 0000000000000010 RSI: ffff88803f5c2000 RDI: ffffe8ffffc4e6e8 RBP: ffffc9000d2bf8d0 R08: e443157bdb42d614 R09: f8256aac8f4be681 R10: e443157bdb42d614 R11: f8256aac8f4be681 R12: ffffe8ffffc4e6e0 R13: 00000000000001fe R14: dffffc0000000000 R15: 00000000000001f7 FS: 00007fe89fff56c0(0000) GS:ffff88808d733000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe89ffd3fc8 CR3: 0000000042b96000 CR4: 0000000000352ef0 Call Trace: __do_trace_btrfs_inode_evict include/trace/events/btrfs.h:255 [inline] trace_btrfs_inode_evict include/trace/events/btrfs.h:255 [inline] btrfs_evict_inode+0x107a/0x1110 fs/btrfs/inode.c:5480 evict+0x504/0x9c0 fs/inode.c:810 btrfs_create_common+0x1c9/0x230 fs/btrfs/inode.c:6800 btrfs_mkdir+0xc7/0xf0 fs/btrfs/inode.c:6927 vfs_mkdir+0x306/0x510 fs/namei.c:4453 do_mkdirat+0x247/0x590 fs/namei.c:4486 __do_sys_mkdir fs/namei.c:4508 [inline] __se_sys_mkdir fs/namei.c:4506 [inline] __x64_sys_mkdir+0x6c/0x80 fs/namei.c:4506 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fe89f18efc9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fe89fff5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007fe89f3e6090 RCX: 00007fe89f18efc9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000300 RBP: 00007fe89f211f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fe89f3e6128 R14: 00007fe89f3e6090 R15: 00007fff94560688 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:btrfs_root_id fs/btrfs/ctree.h:333 [inline] RIP: 0010:do_perf_trace_btrfs__inode include/trace/events/btrfs.h:204 [inline] RIP: 0010:perf_trace_btrfs__inode+0x44d/0x580 include/trace/events/btrfs.h:204 Code: c1 e8 03 42 80 3c 30 00 74 08 4c 89 ff e8 db 43 66 fe 4d 8b 2f 4d 8d bd f7 01 00 00 49 81 c5 fe 01 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 0f 85 e4 00 00 00 4c 89 e8 48 c1 e8 03 42 0f RSP: 0018:ffffc9000d2bf800 EFLAGS: 00010203 RAX: 000000000000003e RBX: ffffe8ffffc4e720 RCX: ffffffff83c10ce7 RDX: 0000000000000010 RSI: ffff88803f5c2000 RDI: ffffe8ffffc4e6e8 RBP: ffffc9000d2bf8d0 R08: e443157bdb42d614 R09: f8256aac8f4be681 R10: e443157bdb42d614 R11: f8256aac8f4be681 R12: ffffe8ffffc4e6e0 R13: 00000000000001fe R14: dffffc0000000000 R15: 00000000000001f7 FS: 00007fe89fff56c0(0000) GS:ffff88808d733000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe89ffd3fc8 CR3: 0000000042b96000 CR4: 0000000000352ef0 ---------------- Code disassembly (best guess): 0: c1 e8 03 shr $0x3,%eax 3: 42 80 3c 30 00 cmpb $0x0,(%rax,%r14,1) 8: 74 08 je 0x12 a: 4c 89 ff mov %r15,%rdi d: e8 db 43 66 fe call 0xfe6643ed 12: 4d 8b 2f mov (%r15),%r13 15: 4d 8d bd f7 01 00 00 lea 0x1f7(%r13),%r15 1c: 49 81 c5 fe 01 00 00 add $0x1fe,%r13 23: 4c 89 f8 mov %r15,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 0f b6 04 30 movzbl (%rax,%r14,1),%eax <-- trapping instruction 2f: 84 c0 test %al,%al 31: 0f 85 e4 00 00 00 jne 0x11b 37: 4c 89 e8 mov %r13,%rax 3a: 48 c1 e8 03 shr $0x3,%rax 3e: 42 rex.X 3f: 0f .byte 0xf