Oops: general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f] CPU: 1 UID: 0 PID: 11629 Comm: syz.7.1257 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:fsnotify_parent include/linux/fsnotify.h:81 [inline] RIP: 0010:fsnotify_path include/linux/fsnotify.h:113 [inline] RIP: 0010:fsnotify_file include/linux/fsnotify.h:127 [inline] RIP: 0010:fsnotify_close include/linux/fsnotify.h:457 [inline] RIP: 0010:__fput+0x1b5/0xa70 fs/file_table.c:454 Code: fc ff df 80 3c 08 00 74 08 4c 89 e7 e8 b4 0d ee ff 4d 8b 34 24 49 8d 6e 28 48 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 ef e8 8d 0d ee ff 41 bc 60 06 00 00 4c 03 RSP: 0018:ffffc9000ff2f970 EFLAGS: 00010206 RAX: 0000000000000005 RBX: ffff8880760b7dc0 RCX: dffffc0000000000 RDX: ffff88807cbd3d00 RSI: 0000000004000000 RDI: 0000000002000000 RBP: 0000000000000028 R08: ffffffff8f813377 R09: 1ffffffff1f0266e R10: dffffc0000000000 R11: ffffffff823a0220 R12: ffff888049dc47c0 R13: 0000000000000000 R14: 0000000000000000 R15: ffff8880340cb640 FS: 0000000000000000(0000) GS:ffff888125f4f000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c429cdf CR3: 00000000357d8000 CR4: 00000000003526f0 Call Trace: task_work_run+0x1d4/0x260 kernel/task_work.c:233 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0x6c5/0x2310 kernel/exit.c:971 do_group_exit+0x21c/0x2d0 kernel/exit.c:1112 get_signal+0x1285/0x1340 kernel/signal.c:3034 arch_do_signal_or_restart+0x9a/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:41 [inline] exit_to_user_mode_loop+0x87/0x4f0 kernel/entry/common.c:75 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline] syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:159 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:194 [inline] do_syscall_64+0x2e3/0xf80 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7ff48fb8f749 Code: Unable to access opcode bytes at 0x7ff48fb8f71f. RSP: 002b:00007ffd728a7e48 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffdfc RBX: 00000000000909a1 RCX: 00007ff48fb8f749 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007ff48fde5fac RBP: 0000000000000032 R08: 3fffffffffffffff R09: 0000001b728a813f R10: 00007ffd728a7f40 R11: 0000000000000246 R12: 00007ff48fde5fac R13: 00007ffd728a7f40 R14: 00000000000909d3 R15: 00007ffd728a7f60 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:fsnotify_parent include/linux/fsnotify.h:81 [inline] RIP: 0010:fsnotify_path include/linux/fsnotify.h:113 [inline] RIP: 0010:fsnotify_file include/linux/fsnotify.h:127 [inline] RIP: 0010:fsnotify_close include/linux/fsnotify.h:457 [inline] RIP: 0010:__fput+0x1b5/0xa70 fs/file_table.c:454 Code: fc ff df 80 3c 08 00 74 08 4c 89 e7 e8 b4 0d ee ff 4d 8b 34 24 49 8d 6e 28 48 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 ef e8 8d 0d ee ff 41 bc 60 06 00 00 4c 03 RSP: 0018:ffffc9000ff2f970 EFLAGS: 00010206 RAX: 0000000000000005 RBX: ffff8880760b7dc0 RCX: dffffc0000000000 RDX: ffff88807cbd3d00 RSI: 0000000004000000 RDI: 0000000002000000 RBP: 0000000000000028 R08: ffffffff8f813377 R09: 1ffffffff1f0266e R10: dffffc0000000000 R11: ffffffff823a0220 R12: ffff888049dc47c0 R13: 0000000000000000 R14: 0000000000000000 R15: ffff8880340cb640 FS: 0000000000000000(0000) GS:ffff888125f4f000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555593958608 CR3: 000000007d9ec000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess), 2 bytes skipped: 0: df 80 3c 08 00 74 filds 0x7400083c(%rax) 6: 08 4c 89 e7 or %cl,-0x19(%rcx,%rcx,4) a: e8 b4 0d ee ff call 0xffee0dc3 f: 4d 8b 34 24 mov (%r12),%r14 13: 49 8d 6e 28 lea 0x28(%r14),%rbp 17: 48 89 e8 mov %rbp,%rax 1a: 48 c1 e8 03 shr $0x3,%rax 1e: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx 25: fc ff df * 28: 80 3c 08 00 cmpb $0x0,(%rax,%rcx,1) <-- trapping instruction 2c: 74 08 je 0x36 2e: 48 89 ef mov %rbp,%rdi 31: e8 8d 0d ee ff call 0xffee0dc3 36: 41 bc 60 06 00 00 mov $0x660,%r12d 3c: 4c rex.WR 3d: 03 .byte 0x3