get_swap_device: Bad swap file entry 4003ffffff7fffff general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 0 PID: 14951 Comm: syz-executor.2 Not tainted 5.10.178-syzkaller-00127-g43c801dc3325 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 RIP: 0010:do_swap_page+0x3ca/0x1f70 mm/memory.c:3634 Code: c6 e8 5a 42 cd ff 45 31 f6 85 db 41 0f 95 c6 eb 56 4c 89 f7 e8 27 0e 08 00 48 89 c3 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 df e8 f8 4b 0a 00 4c 8b 33 bb 00 10 00 00 RSP: 0000:ffffc90000f0f980 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000010 RDI: 0000000000000000 RBP: ffffc90000f0fb10 R08: ffffffff81a542d3 R09: ffffed103ee0a600 R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88810a71ccb8 R13: 1ffff920001e1f48 R14: 4003ffffff7fffff R15: ffffc90000f0fda8 FS: 0000555555c69400(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2a15401000 CR3: 0000000159201000 CR4: 00000000003526b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: handle_pte_fault+0x6d9/0x3e00 mm/memory.c:4742 __handle_mm_fault mm/memory.c:4891 [inline] handle_mm_fault+0x11d6/0x1a10 mm/memory.c:5285 do_user_addr_fault arch/x86/mm/fault.c:1396 [inline] handle_page_fault arch/x86/mm/fault.c:1462 [inline] exc_page_fault+0x2a6/0x5b0 arch/x86/mm/fault.c:1518 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:571 RIP: 0033:0x7f2a1584f42d Code: e8 38 08 ff ff 40 08 c5 0f 85 ff 01 00 00 41 83 c5 01 45 39 6f 04 0f 86 c4 00 00 00 48 8b 0c 24 44 89 ee 4c 89 f0 4d 8b 77 28 <4c> 03 34 f1 44 89 f3 81 e3 00 f0 ff ff 80 3d 77 ec 16 00 00 75 3f RSP: 002b:00007ffdb3e980d0 EFLAGS: 00010206 RAX: ffffffff822b608d RBX: 00000000822b647c RCX: 00007f2a15216008 RDX: 00000000822b647c RSI: 000000000003d5ff RDI: 000000000000047c RBP: 0000000000000001 R08: 0000001b2d720000 R09: 00000000822b6480 R10: 00000000000251be R11: 0000000000000302 R12: 00007f2a159b6000 R13: 000000000003d5ff R14: 0000000000000000 R15: 00007f2a159c2018 Modules linked in: ---[ end trace 98514e027c74032a ]--- RIP: 0010:do_swap_page+0x3ca/0x1f70 mm/memory.c:3634 Code: c6 e8 5a 42 cd ff 45 31 f6 85 db 41 0f 95 c6 eb 56 4c 89 f7 e8 27 0e 08 00 48 89 c3 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 df e8 f8 4b 0a 00 4c 8b 33 bb 00 10 00 00 RSP: 0000:ffffc90000f0f980 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000010 RDI: 0000000000000000 RBP: ffffc90000f0fb10 R08: ffffffff81a542d3 R09: ffffed103ee0a600 R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88810a71ccb8 R13: 1ffff920001e1f48 R14: 4003ffffff7fffff R15: ffffc90000f0fda8 FS: 0000555555c69400(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2a15401000 CR3: 0000000159201000 CR4: 00000000003526b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: e8 5a 42 cd ff callq 0xffcd425f 5: 45 31 f6 xor %r14d,%r14d 8: 85 db test %ebx,%ebx a: 41 0f 95 c6 setne %r14b e: eb 56 jmp 0x66 10: 4c 89 f7 mov %r14,%rdi 13: e8 27 0e 08 00 callq 0x80e3f 18: 48 89 c3 mov %rax,%rbx 1b: 48 c1 e8 03 shr $0x3,%rax 1f: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx 26: fc ff df * 29: 80 3c 08 00 cmpb $0x0,(%rax,%rcx,1) <-- trapping instruction 2d: 74 08 je 0x37 2f: 48 89 df mov %rbx,%rdi 32: e8 f8 4b 0a 00 callq 0xa4c2f 37: 4c 8b 33 mov (%rbx),%r14 3a: bb 00 10 00 00 mov $0x1000,%ebx