Oops: general protection fault, probably for non-canonical address 0xdffffc0000000001: 00[ 225.944528][ T9814] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] CPU: 0 UID: 0 PID: 9814 Comm: syz.3.1623 Not tainted syzkaller #0 PREEMPT_{RT,(full)} Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 RIP: 0010:hfsplus_create_attributes_file fs/hfsplus/xattr.c:320 [inline] RIP: 0010:__hfsplus_setxattr+0x1c86/0x2890 fs/hfsplus/xattr.c:432 Code: 8b 36 49 83 c6 30 4c 89 f0 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 f7 e8 d8 9a 86 ff 4d 8b 36 49 83 c6 08 4c 89 f0 48 c1 e8 03 <42> 80 3c 20 00 74 08 4c 89 f7 e8 bb 9a 86 ff 4d 8b 36 49 8d be 50 RSP: 0018:ffffc90003eef4e0 EFLAGS: 00010202 RAX: 0000000000000001 RBX: fffff520007ddebc RCX: 0000000000080000 RDX: ffffc90006df9000 RSI: 0000000000001b32 RDI: 0000000000001b33 RBP: ffffc90003eef9b8 R08: 0000000000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: fffff9400028237f R12: dffffc0000000000 R13: ffff888061354560 R14: 0000000000000008 R15: ffff888061353d30 FS: 00007fdbc89d66c0(0000) GS:ffff8881260c0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff9726f56b8 CR3: 00000000311b0000 CR4: 00000000003526f0 Call Trace: hfsplus_setxattr+0x124/0x340 fs/hfsplus/xattr.c:555 hfsplus_trusted_setxattr+0x40/0x60 fs/hfsplus/xattr_trusted.c:30 __vfs_setxattr+0x43c/0x480 fs/xattr.c:218 __vfs_setxattr_noperm+0x12d/0x660 fs/xattr.c:252 vfs_setxattr+0x163/0x370 fs/xattr.c:339 do_setxattr fs/xattr.c:654 [inline] file_setxattr+0x1d9/0x2b0 fs/xattr.c:664 path_setxattrat+0x3b0/0x440 fs/xattr.c:724 __do_sys_fsetxattr fs/xattr.c:774 [inline] __se_sys_fsetxattr fs/xattr.c:771 [inline] __x64_sys_fsetxattr+0xbc/0xe0 fs/xattr.c:771 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fdbca77c819 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fdbc89d6028 EFLAGS: 00000246 ORIG_RAX: 00000000000000be RAX: ffffffffffffffda RBX: 00007fdbca9f5fa0 RCX: 00007fdbca77c819 RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 RBP: 00007fdbca812c91 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fdbca9f6038 R14: 00007fdbca9f5fa0 R15: 00007ffd8316d288 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:hfsplus_create_attributes_file fs/hfsplus/xattr.c:320 [inline] RIP: 0010:__hfsplus_setxattr+0x1c86/0x2890 fs/hfsplus/xattr.c:432 Code: 8b 36 49 83 c6 30 4c 89 f0 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 f7 e8 d8 9a 86 ff 4d 8b 36 49 83 c6 08 4c 89 f0 48 c1 e8 03 <42> 80 3c 20 00 74 08 4c 89 f7 e8 bb 9a 86 ff 4d 8b 36 49 8d be 50 RSP: 0018:ffffc90003eef4e0 EFLAGS: 00010202 RAX: 0000000000000001 RBX: fffff520007ddebc RCX: 0000000000080000 RDX: ffffc90006df9000 RSI: 0000000000001b32 RDI: 0000000000001b33 RBP: ffffc90003eef9b8 R08: 0000000000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: fffff9400028237f R12: dffffc0000000000 R13: ffff888061354560 R14: 0000000000000008 R15: ffff888061353d30 FS: 00007fdbc89d66c0(0000) GS:ffff8881260c0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff9726f56b8 CR3: 00000000311b0000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: 8b 36 mov (%rsi),%esi 2: 49 83 c6 30 add $0x30,%r14 6: 4c 89 f0 mov %r14,%rax 9: 48 c1 e8 03 shr $0x3,%rax d: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) 12: 74 08 je 0x1c 14: 4c 89 f7 mov %r14,%rdi 17: e8 d8 9a 86 ff call 0xff869af4 1c: 4d 8b 36 mov (%r14),%r14 1f: 49 83 c6 08 add $0x8,%r14 23: 4c 89 f0 mov %r14,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 4c 89 f7 mov %r14,%rdi 34: e8 bb 9a 86 ff call 0xff869af4 39: 4d 8b 36 mov (%r14),%r14 3c: 49 rex.WB 3d: 8d .byte 0x8d 3e: be .byte 0xbe 3f: 50 push %rax