general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 22285 Comm: udevd Not tainted 5.4.219-syzkaller-00096-gd7e5d5321233 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:create_empty_buffers+0x57/0x500 fs/buffer.c:1533
Code: ef 48 89 de ba 01 00 00 00 e8 f5 e0 ff ff 48 89 c5 48 89 04 24 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 e8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 ef e8 1a a2 ed ff 4c 09 7d 00 48 83 c5
RSP: 0018:ffff8881ec147848 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000020000000 RCX: ffff8881e6af0000
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffff81a5f2c9 R09: fffff94000f35fa1
R10: fffff94000f35fa1 R11: 1ffffd4000f35fa0 R12: ffffea00079afd00
R13: 0000000000000000 R14: dffffc0000000000 R15: 0000000000000000
FS: 00007f054812b840(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fb7df675dc0 CR3: 00000001e4dd5000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
create_page_buffers+0x12a/0x1e0 fs/buffer.c:1647
block_read_full_page+0xe5/0xa10 fs/buffer.c:2237
generic_file_buffered_read mm/filemap.c:2207 [inline]
generic_file_read_iter+0xd07/0x2180 mm/filemap.c:2343
blkdev_read_iter+0x12a/0x180 fs/block_dev.c:2043
call_read_iter include/linux/fs.h:1970 [inline]
new_sync_read fs/read_write.c:414 [inline]
__vfs_read+0x5e0/0x760 fs/read_write.c:427
vfs_read+0x166/0x370 fs/read_write.c:461
ksys_read+0x198/0x2c0 fs/read_write.c:587
do_syscall_64+0xcb/0x1c0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
Modules linked in:
---[ end trace c587d90e10c35931 ]---
RIP: 0010:create_empty_buffers+0x57/0x500 fs/buffer.c:1533
Code: ef 48 89 de ba 01 00 00 00 e8 f5 e0 ff ff 48 89 c5 48 89 04 24 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 e8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 ef e8 1a a2 ed ff 4c 09 7d 00 48 83 c5
RSP: 0018:ffff8881ec147848 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000020000000 RCX: ffff8881e6af0000
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffff81a5f2c9 R09: fffff94000f35fa1
R10: fffff94000f35fa1 R11: 1ffffd4000f35fa0 R12: ffffea00079afd00
R13: 0000000000000000 R14: dffffc0000000000 R15: 0000000000000000
FS: 00007f054812b840(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020002d43 CR3: 00000001e4dd5000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: ef out %eax,(%dx)
1: 48 89 de mov %rbx,%rsi
4: ba 01 00 00 00 mov $0x1,%edx
9: e8 f5 e0 ff ff callq 0xffffe103
e: 48 89 c5 mov %rax,%rbp
11: 48 89 04 24 mov %rax,(%rsp)
15: 66 66 2e 0f 1f 84 00 data16 nopw %cs:0x0(%rax,%rax,1)
1c: 00 00 00 00
20: 0f 1f 00 nopl (%rax)
23: 48 89 e8 mov %rbp,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 30 00 cmpb $0x0,(%rax,%r14,1) <-- trapping instruction
2f: 74 08 je 0x39
31: 48 89 ef mov %rbp,%rdi
34: e8 1a a2 ed ff callq 0xffeda253
39: 4c 09 7d 00 or %r15,0x0(%rbp)
3d: 48 rex.W
3e: 83 .byte 0x83
3f: c5 .byte 0xc5