Oops: general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] CPU: 0 UID: 0 PID: 18085 Comm: syz.3.3159 Not tainted 6.15.0-rc2-syzkaller-00493-gac71fabf1567 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 RIP: 0010:bdev_nr_sectors include/linux/blkdev.h:831 [inline] RIP: 0010:guard_bio_eod+0x47/0x120 block/bio.c:694 Code: e3 fc 49 8d 5e 08 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 57 4d 4d fd 48 8b 1b 48 83 c3 08 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 3a 4d 4d fd 4c 8b 23 31 ff 4c 89 RSP: 0018:ffffc90004556ae0 EFLAGS: 00010212 RAX: 0000000000000001 RBX: 0000000000000008 RCX: 0000000000080000 RDX: ffffc9000c3e5000 RSI: 0000000000015c24 RDI: 0000000000015c25 RBP: dffffc0000000000 R08: ffffffff84dfe120 R09: 1ffff1100415c99e R10: dffffc0000000000 R11: ffffed100415c99f R12: ffffc90004556ce0 R13: dffffc0000000000 R14: ffff888020ae4c80 R15: ffffea0001a18d00 FS: 00007f2c145ec6c0(0000) GS:ffff888124f9a000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb09124da09 CR3: 000000004ea32000 CR4: 0000000000350ef0 Call Trace: mpage_bio_submit_read fs/mpage.c:74 [inline] do_mpage_readpage+0x156c/0x1980 fs/mpage.c:296 mpage_readahead+0x458/0x780 fs/mpage.c:371 read_pages+0x195/0x590 mm/readahead.c:160 page_cache_ra_order+0xa37/0xca0 mm/readahead.c:515 do_sync_mmap_readahead+0x3e6/0x6c0 mm/filemap.c:-1 filemap_fault+0x763/0x13d0 mm/filemap.c:3403 __do_fault+0x137/0x390 mm/memory.c:5098 do_read_fault mm/memory.c:5518 [inline] do_fault mm/memory.c:5652 [inline] do_pte_missing mm/memory.c:4160 [inline] handle_pte_fault+0x3f0c/0x61c0 mm/memory.c:5997 __handle_mm_fault mm/memory.c:6140 [inline] handle_mm_fault+0x1129/0x1bf0 mm/memory.c:6309 do_user_addr_fault arch/x86/mm/fault.c:1388 [inline] handle_page_fault arch/x86/mm/fault.c:1480 [inline] exc_page_fault+0x2bb/0x920 arch/x86/mm/fault.c:1538 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0010:fault_in_readable+0x177/0x2e0 mm/gup.c:2241 Code: 49 81 c5 ff 0f 00 00 49 81 e5 00 f0 ff ff 49 39 c5 0f 82 85 00 00 00 e8 97 f6 b2 ff 4c 39 eb 0f 84 88 00 00 00 4c 89 64 24 10 <44> 8a 23 43 0f b6 04 3e 84 c0 75 18 44 88 64 24 40 48 81 c3 00 10 RSP: 0018:ffffc90004557a00 EFLAGS: 00050287 RAX: ffffffff820fc689 RBX: 0000200000083000 RCX: 0000000000080000 RDX: ffffc9000c3e5000 RSI: 00000000000150ef RDI: 00000000000150f0 RBP: ffffc90004557ab8 R08: ffffffff820fc620 R09: ffffffff85017739 R10: 0000000000000002 R11: ffff88802b025a00 R12: 0000000000000240 R13: 0000200000084000 R14: 1ffff920008aaf48 R15: dffffc0000000000 fault_in_iov_iter_readable+0x229/0x280 lib/iov_iter.c:94 generic_perform_write+0x8a4/0xa10 mm/filemap.c:4152 shmem_file_write_iter+0xf9/0x120 mm/shmem.c:3464 new_sync_write fs/read_write.c:591 [inline] vfs_write+0x711/0xd10 fs/read_write.c:684 ksys_write+0x19d/0x2d0 fs/read_write.c:736 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xf3/0x210 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f2c1378e169 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f2c145ec038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007f2c139b5fa0 RCX: 00007f2c1378e169 RDX: 000000000208e24b RSI: 0000200000000240 RDI: 0000000000000005 RBP: 00007f2c13810a68 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f2c139b5fa0 R15: 00007ffe69f4e278 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:bdev_nr_sectors include/linux/blkdev.h:831 [inline] RIP: 0010:guard_bio_eod+0x47/0x120 block/bio.c:694 Code: e3 fc 49 8d 5e 08 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 57 4d 4d fd 48 8b 1b 48 83 c3 08 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 3a 4d 4d fd 4c 8b 23 31 ff 4c 89 RSP: 0018:ffffc90004556ae0 EFLAGS: 00010212 RAX: 0000000000000001 RBX: 0000000000000008 RCX: 0000000000080000 RDX: ffffc9000c3e5000 RSI: 0000000000015c24 RDI: 0000000000015c25 RBP: dffffc0000000000 R08: ffffffff84dfe120 R09: 1ffff1100415c99e R10: dffffc0000000000 R11: ffffed100415c99f R12: ffffc90004556ce0 R13: dffffc0000000000 R14: ffff888020ae4c80 R15: ffffea0001a18d00 FS: 00007f2c145ec6c0(0000) GS:ffff888124f9a000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2cf15ff8 CR3: 000000004ea32000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: e3 fc jrcxz 0xfffffffe 2: 49 8d 5e 08 lea 0x8(%r14),%rbx 6: 48 89 d8 mov %rbx,%rax 9: 48 c1 e8 03 shr $0x3,%rax d: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) 12: 74 08 je 0x1c 14: 48 89 df mov %rbx,%rdi 17: e8 57 4d 4d fd call 0xfd4d4d73 1c: 48 8b 1b mov (%rbx),%rbx 1f: 48 83 c3 08 add $0x8,%rbx 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 48 89 df mov %rbx,%rdi 34: e8 3a 4d 4d fd call 0xfd4d4d73 39: 4c 8b 23 mov (%rbx),%r12 3c: 31 ff xor %edi,%edi 3e: 4c rex.WR 3f: 89 .byte 0x89