kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 30065 Comm: syz-executor1 Not tainted 4.20.0-rc4+ #261 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__find_plane_by_offset drivers/media/common/videobuf2/videobuf2-core.c:2006 [inline] RIP: 0010:vb2_mmap+0x23c/0x6f0 drivers/media/common/videobuf2/videobuf2-core.c:2128 Code: 80 3c 10 00 0f 85 1b 04 00 00 48 b9 00 00 00 00 00 fc ff df 48 8b 45 b8 48 8b 00 48 8d 78 14 48 89 45 d0 48 89 f8 48 c1 e8 03 <0f> b6 14 08 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 fa RSP: 0018:ffff8881c313f780 EFLAGS: 00010203 RAX: 0000000000000002 RBX: 0000000000000009 RCX: dffffc0000000000 RDX: dffffc0000000000 RSI: ffffffff8558c480 RDI: 0000000000000014 RBP: ffff8881c313f7d0 R08: ffff8881bdc58380 R09: ffffed1038396916 R10: ffffed1038396916 R11: ffff8881c1cb48b7 R12: 0000000000000000 R13: 0000000000000001 R14: 0000000040000000 R15: ffff8881ca9072e8 FS: 0000000000000000(0000) GS:ffff8881daf00000(0063) knlGS:00000000f5f56b40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 00000000f5fb8c30 CR3: 0000000183c4c000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: vb2_fop_mmap+0x4b/0x70 drivers/media/common/videobuf2/videobuf2-v4l2.c:999 v4l2_mmap+0x153/0x200 drivers/media/v4l2-core/v4l2-dev.c:401 call_mmap include/linux/fs.h:1862 [inline] mmap_region+0xe85/0x1cd0 mm/mmap.c:1786 do_mmap+0xa22/0x1230 mm/mmap.c:1559 do_mmap_pgoff include/linux/mm.h:2328 [inline] vm_mmap_pgoff+0x213/0x2c0 mm/util.c:350 kobject: 'loop5' (00000000fbb88c69): kobject_uevent_env ksys_mmap_pgoff+0x4da/0x660 mm/mmap.c:1609 kobject: 'loop5' (00000000fbb88c69): fill_kobj_path: path = '/devices/virtual/block/loop5' __do_sys_mmap_pgoff mm/mmap.c:1620 [inline] __se_sys_mmap_pgoff mm/mmap.c:1616 [inline] __ia32_sys_mmap_pgoff+0xdd/0x1a0 mm/mmap.c:1616 do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x34d/0xfb2 arch/x86/entry/common.c:397 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7f5aa29 Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 002b:00000000f5f560cc EFLAGS: 00000296 ORIG_RAX: 00000000000000c0 RAX: ffffffffffffffda RBX: 0000000020ffe000 RCX: 0000000000002000 RDX: 00000000fffffffd RSI: 0000000000000011 RDI: 0000000000000004 RBP: 0000000000040000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Modules linked in: kobject: 'loop3' (00000000b1f13ef0): kobject_uevent_env ---[ end trace 7602f63fe0e31155 ]--- RIP: 0010:__find_plane_by_offset drivers/media/common/videobuf2/videobuf2-core.c:2006 [inline] RIP: 0010:vb2_mmap+0x23c/0x6f0 drivers/media/common/videobuf2/videobuf2-core.c:2128 Code: 80 3c 10 00 0f 85 1b 04 00 00 48 b9 00 00 00 00 00 fc ff df 48 8b 45 b8 48 8b 00 48 8d 78 14 48 89 45 d0 48 89 f8 48 c1 e8 03 <0f> b6 14 08 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 fa kobject: 'loop3' (00000000b1f13ef0): fill_kobj_path: path = '/devices/virtual/block/loop3' RSP: 0018:ffff8881c313f780 EFLAGS: 00010203 kobject: 'loop0' (0000000041480196): kobject_uevent_env RAX: 0000000000000002 RBX: 0000000000000009 RCX: dffffc0000000000 kobject: 'loop0' (0000000041480196): fill_kobj_path: path = '/devices/virtual/block/loop0' RDX: dffffc0000000000 RSI: ffffffff8558c480 RDI: 0000000000000014 RBP: ffff8881c313f7d0 R08: ffff8881bdc58380 R09: ffffed1038396916 R10: ffffed1038396916 R11: ffff8881c1cb48b7 R12: 0000000000000000 R13: 0000000000000001 R14: 0000000040000000 R15: ffff8881ca9072e8 FS: 0000000000000000(0000) GS:ffff8881dae00000(0063) knlGS:00000000f5f56b40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 kobject: 'loop4' (00000000c0ec30b6): kobject_uevent_env kobject: 'loop4' (00000000c0ec30b6): fill_kobj_path: path = '/devices/virtual/block/loop4' CR2: 00007f8a47aae000 CR3: 0000000183c4c000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400