loop7: detected capacity change from 0 to 1036 general protection fault, probably for non-canonical address 0xdffffc0000000027: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000138-0x000000000000013f] CPU: 1 PID: 3367 Comm: syz-executor.1 Not tainted 5.15.0-rc5-next-20211013-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:hctx_lock+0x29/0x1d0 block/blk-mq.c:757 Code: 00 41 55 41 54 49 89 f4 55 53 48 89 fb e8 cf 76 b3 fd 48 8d bb 38 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 8a 01 00 00 48 8b ab 38 01 00 00 31 ff 83 e5 20 RSP: 0018:ffffc9000232f0c8 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000ddb9000 RDX: 0000000000000027 RSI: ffffffff83c3edc1 RDI: 0000000000000138 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: ffffc9000232f110 R13: 0000000000000001 R14: 0000000000000148 R15: ffffc9000232f570 FS: 00007f189cb7e700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007faac6842ff8 CR3: 00000000a6273000 CR4: 00000000003506e0 Call Trace: blk_mq_run_hw_queue+0x79/0x2f0 block/blk-mq.c:1674 blk_mq_submit_bio+0x136b/0x1920 block/blk-mq.c:2293 __submit_bio_noacct_mq block/blk-core.c:997 [inline] submit_bio_noacct block/blk-core.c:1026 [inline] submit_bio_noacct+0xa26/0xee0 block/blk-core.c:1012 submit_bio block/blk-core.c:1087 [inline] submit_bio+0x1ea/0x470 block/blk-core.c:1045 submit_bio_wait+0x106/0x230 block/bio.c:1266 blkdev_issue_flush+0xd6/0x130 block/blk-flush.c:458 blkdev_fsync+0x8e/0xd0 block/fops.c:405 vfs_fsync_range+0x13a/0x220 fs/sync.c:200 generic_write_sync include/linux/fs.h:2951 [inline] blkdev_write_iter+0x3dc/0x550 block/fops.c:488 call_write_iter include/linux/fs.h:2159 [inline] do_iter_readv_writev+0x472/0x750 fs/read_write.c:729 do_iter_write+0x188/0x710 fs/read_write.c:855 vfs_iter_write+0x70/0xa0 fs/read_write.c:896 iter_file_splice_write+0x723/0xc70 fs/splice.c:689 do_splice_from fs/splice.c:767 [inline] direct_splice_actor+0x110/0x180 fs/splice.c:936 splice_direct_to_actor+0x34b/0x8c0 fs/splice.c:891 do_splice_direct+0x1b3/0x280 fs/splice.c:979 do_sendfile+0xaf2/0x1250 fs/read_write.c:1249 __do_sys_sendfile64 fs/read_write.c:1314 [inline] __se_sys_sendfile64 fs/read_write.c:1300 [inline] __x64_sys_sendfile64+0x1cc/0x210 fs/read_write.c:1300 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f189f608a39 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f189cb7e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 RAX: ffffffffffffffda RBX: 00007f189f70bf60 RCX: 00007f189f608a39 RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 RBP: 00007f189f662c5f R08: 0000000000000000 R09: 0000000000000000 R10: 0000000024002da8 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe0c0200af R14: 00007f189cb7e300 R15: 0000000000022000 Modules linked in: ---[ end trace 3388f6db10e16e40 ]--- RIP: 0010:hctx_lock+0x29/0x1d0 block/blk-mq.c:757 Code: 00 41 55 41 54 49 89 f4 55 53 48 89 fb e8 cf 76 b3 fd 48 8d bb 38 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 8a 01 00 00 48 8b ab 38 01 00 00 31 ff 83 e5 20 RSP: 0018:ffffc9000232f0c8 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000ddb9000 RDX: 0000000000000027 RSI: ffffffff83c3edc1 RDI: 0000000000000138 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: ffffc9000232f110 R13: 0000000000000001 R14: 0000000000000148 R15: ffffc9000232f570 FS: 00007f189cb7e700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007faac6842ff8 CR3: 00000000a6273000 CR4: 00000000003506e0 ---------------- Code disassembly (best guess): 0: 00 41 55 add %al,0x55(%rcx) 3: 41 54 push %r12 5: 49 89 f4 mov %rsi,%r12 8: 55 push %rbp 9: 53 push %rbx a: 48 89 fb mov %rdi,%rbx d: e8 cf 76 b3 fd callq 0xfdb376e1 12: 48 8d bb 38 01 00 00 lea 0x138(%rbx),%rdi 19: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 20: fc ff df 23: 48 89 fa mov %rdi,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2e: 0f 85 8a 01 00 00 jne 0x1be 34: 48 8b ab 38 01 00 00 mov 0x138(%rbx),%rbp 3b: 31 ff xor %edi,%edi 3d: 83 e5 20 and $0x20,%ebp