Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 0 UID: 0 PID: 9315 Comm: syz.0.909 Not tainted 6.14.0-rc3-next-20250218-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 RIP: 0010:vma_refcount_put include/linux/mm.h:712 [inline] RIP: 0010:vma_end_read include/linux/mm.h:811 [inline] RIP: 0010:lock_vma_under_rcu+0x578/0xac0 mm/memory.c:6454 Code: be 5d b1 ff 49 be 00 00 00 00 00 fc ff df 4d 85 ff 74 0d 49 81 ff 01 f0 ff ff 0f 82 a3 02 00 00 49 83 ff f5 0f 85 55 03 00 00 <41> 80 3e 00 74 0a bf 05 00 00 00 e8 28 df 18 00 4c 8b 34 25 05 00 RSP: 0000:ffffc9000571fd80 EFLAGS: 00010246 RAX: fffffffffffffff5 RBX: 0000000000000000 RCX: ffff888026485a00 RDX: ffff888026485a00 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc9000571fed8 R08: ffffffff8210a26a R09: fffff52000ae3fc0 R10: dffffc0000000000 R11: fffff52000ae3fc0 R12: ffffc9000571fe10 R13: ffff88807aead220 R14: dffffc0000000000 R15: fffffffffffffff5 FS: 000055555d11d500(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000040000057eff8 CR3: 0000000034972000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: do_user_addr_fault arch/x86/mm/fault.c:1328 [inline] handle_page_fault arch/x86/mm/fault.c:1480 [inline] exc_page_fault+0x17b/0x920 arch/x86/mm/fault.c:1538 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0033:0x7f5a8f653b33 Code: 48 85 c0 74 1b 48 83 f8 01 0f 85 3b 03 00 00 0f b7 44 24 18 66 c1 c0 08 0f b7 c0 48 89 44 24 18 48 8b 44 24 10 0f b7 54 24 18 <66> 89 10 e9 82 fe ff ff 48 83 3c 24 08 0f 85 a1 02 00 00 48 8b 44 RSP: 002b:00007ffc63bdecf0 EFLAGS: 00010246 RAX: 000040000057eff8 RBX: 0000000000000002 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000055555d11d3c8 RBP: 00007ffc63bdedf8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 00007f5a8f9a608c R13: 00007f5a8f9a6080 R14: fffffffffffffffe R15: 00007ffc63bdee40 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:vma_refcount_put include/linux/mm.h:712 [inline] RIP: 0010:vma_end_read include/linux/mm.h:811 [inline] RIP: 0010:lock_vma_under_rcu+0x578/0xac0 mm/memory.c:6454 Code: be 5d b1 ff 49 be 00 00 00 00 00 fc ff df 4d 85 ff 74 0d 49 81 ff 01 f0 ff ff 0f 82 a3 02 00 00 49 83 ff f5 0f 85 55 03 00 00 <41> 80 3e 00 74 0a bf 05 00 00 00 e8 28 df 18 00 4c 8b 34 25 05 00 RSP: 0000:ffffc9000571fd80 EFLAGS: 00010246 RAX: fffffffffffffff5 RBX: 0000000000000000 RCX: ffff888026485a00 RDX: ffff888026485a00 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc9000571fed8 R08: ffffffff8210a26a R09: fffff52000ae3fc0 R10: dffffc0000000000 R11: fffff52000ae3fc0 R12: ffffc9000571fe10 R13: ffff88807aead220 R14: dffffc0000000000 R15: fffffffffffffff5 FS: 000055555d11d500(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c416239 CR3: 0000000034972000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 5d pop %rbp 1: b1 ff mov $0xff,%cl 3: 49 be 00 00 00 00 00 movabs $0xdffffc0000000000,%r14 a: fc ff df d: 4d 85 ff test %r15,%r15 10: 74 0d je 0x1f 12: 49 81 ff 01 f0 ff ff cmp $0xfffffffffffff001,%r15 19: 0f 82 a3 02 00 00 jb 0x2c2 1f: 49 83 ff f5 cmp $0xfffffffffffffff5,%r15 23: 0f 85 55 03 00 00 jne 0x37e * 29: 41 80 3e 00 cmpb $0x0,(%r14) <-- trapping instruction 2d: 74 0a je 0x39 2f: bf 05 00 00 00 mov $0x5,%edi 34: e8 28 df 18 00 call 0x18df61 39: 4c rex.WR 3a: 8b .byte 0x8b 3b: 34 25 xor $0x25,%al 3d: 05 .byte 0x5