random: crng init done kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 2044 Comm: syz-executor026 Not tainted 4.9.191+ #0 task: 00000000816cef1b task.stack: 00000000e0268ce5 RIP: 0010:[] [<00000000263da7db>] __read_once_size include/linux/compiler.h:264 [inline] RIP: 0010:[] [<00000000263da7db>] compound_head include/linux/page-flags.h:145 [inline] RIP: 0010:[] [<00000000263da7db>] get_page include/linux/mm.h:772 [inline] RIP: 0010:[] [<00000000263da7db>] submit_page_section fs/direct-io.c:826 [inline] RIP: 0010:[] [<00000000263da7db>] do_direct_IO fs/direct-io.c:1046 [inline] RIP: 0010:[] [<00000000263da7db>] do_blockdev_direct_IO fs/direct-io.c:1275 [inline] RIP: 0010:[] [<00000000263da7db>] __blockdev_direct_IO+0x1c55/0xd370 fs/direct-io.c:1361 RSP: 0018:ffff8801c42cf310 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffffea00073a561c RCX: 000000000000000c RDX: 0000000000000004 RSI: ffffffff815ddad8 RDI: 0000000000000020 RBP: ffff8801c42cf650 R08: 0000000000000000 R09: ffff8801d1b08800 R10: ffffed003a36110d R11: ffff8801d1b0886f R12: ffffea00073a5600 R13: ffffea00073a5600 R14: 0000000000000000 R15: ffff8801ce90c000 FS: 0000000002617880(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020011000 CR3: 00000001ce876000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffffffff83cc9470 0000000000000003 1ffff1003a0e3805 ffff8801d071c028 ffff8801d071af80 ffff8801c42cf440 0005080000000000 0000000000001000 ffff8801ce90c079 ffff8801d071af80 ffff8801d915e780 ffffffff00000000 Call Trace: [<00000000c2c9b563>] ext4_direct_IO_write fs/ext4/inode.c:3504 [inline] [<00000000c2c9b563>] ext4_direct_IO+0xa1d/0x29b0 fs/ext4/inode.c:3660 [<00000000ca9a2289>] generic_file_direct_write+0x293/0x520 mm/filemap.c:2841 [<00000000bd9b5b3a>] __generic_file_write_iter+0x20f/0x530 mm/filemap.c:3021 [<000000000a784361>] ext4_file_write_iter+0x6e7/0xcd0 fs/ext4/file.c:165 [<000000001a8a6044>] vfs_iter_write+0x2e2/0x580 fs/read_write.c:390 [<0000000068c9fd69>] iter_file_splice_write+0x5a9/0xb10 fs/splice.c:768 [<000000003a62c447>] do_splice_from fs/splice.c:870 [inline] [<000000003a62c447>] do_splice fs/splice.c:1166 [inline] [<000000003a62c447>] SYSC_splice fs/splice.c:1416 [inline] [<000000003a62c447>] SyS_splice+0xe02/0x14c0 fs/splice.c:1399 [<00000000edbe4289>] do_syscall_64+0x1ad/0x5c0 arch/x86/entry/common.c:288 [<000000009ec19c75>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Code: b2 81 e6 ff e9 b3 77 00 00 e8 b8 4d d4 ff 48 8b 84 24 f8 00 00 00 48 8d 78 20 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 bc 96 00 00 48 8b 84 24 f8 00 00 00 4c 8b 68 RIP [<00000000263da7db>] __read_once_size include/linux/compiler.h:264 [inline] RIP [<00000000263da7db>] compound_head include/linux/page-flags.h:145 [inline] RIP [<00000000263da7db>] get_page include/linux/mm.h:772 [inline] RIP [<00000000263da7db>] submit_page_section fs/direct-io.c:826 [inline] RIP [<00000000263da7db>] do_direct_IO fs/direct-io.c:1046 [inline] RIP [<00000000263da7db>] do_blockdev_direct_IO fs/direct-io.c:1275 [inline] RIP [<00000000263da7db>] __blockdev_direct_IO+0x1c55/0xd370 fs/direct-io.c:1361 RSP ---[ end trace f5d02020fcaccc37 ]---