BUG: unable to handle page fault for address: fffffffffffffff4 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD ca8f067 P4D ca8f067 PUD ca91067 PMD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 10692 Comm: syz-executor.0 Not tainted 5.19.0-syzkaller-13930-g7ebfc85e2cd7 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 RIP: 0010:dma_unmap_sgtable include/linux/dma-mapping.h:378 [inline] RIP: 0010:put_sg_table drivers/dma-buf/udmabuf.c:89 [inline] RIP: 0010:release_udmabuf+0xda/0x250 drivers/dma-buf/udmabuf.c:114 Code: 48 89 df e8 38 3a d3 fc 4c 8b 3b 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 3c 08 00 74 08 4c 89 ef e8 16 3a d3 fc <49> 8b 5d 00 49 8d 7d 0c 48 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 RSP: 0018:ffffc90003517d20 EFLAGS: 00010246 RAX: 1ffffffffffffffe RBX: ffffffff8d523390 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88807b2a4800 RBP: dffffc0000000000 R08: ffffffff8508420f R09: fffffbfff1c4ace6 R10: fffffbfff1c4ace6 R11: 1ffffffff1c4ace5 R12: ffff88802d6f05e0 R13: fffffffffffffff4 R14: ffff88807db76800 R15: ffff888147938000 FS: 00005555564b6400(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffff4 CR3: 0000000082c3f000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: dma_buf_release+0x103/0x250 drivers/dma-buf/dma-buf.c:78 __dentry_kill+0x418/0x5b0 fs/dcache.c:612 dentry_kill+0xbb/0x290 dput+0x1f3/0x410 fs/dcache.c:913 __fput+0x5a8/0x820 fs/file_table.c:333 task_work_run+0x146/0x1c0 kernel/task_work.c:177 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop+0x134/0x160 kernel/entry/common.c:169 exit_to_user_mode_prepare+0xad/0x110 kernel/entry/common.c:201 __syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline] syscall_exit_to_user_mode+0x2e/0x60 kernel/entry/common.c:294 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f97b143bebb Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 RSP: 002b:00007fff0b350e90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000007 RCX: 00007f97b143bebb RDX: 00007f97b15a0428 RSI: ffffffffffffffff RDI: 0000000000000006 RBP: 00007f97b159d980 R08: 0000000000000000 R09: 00007f97b15a0430 R10: 00007fff0b350f90 R11: 0000000000000293 R12: 0000000000051aa8 R13: 00007fff0b350f90 R14: 00007f97b159bf80 R15: 0000000000000032 Modules linked in: CR2: fffffffffffffff4 ---[ end trace 0000000000000000 ]--- RIP: 0010:dma_unmap_sgtable include/linux/dma-mapping.h:378 [inline] RIP: 0010:put_sg_table drivers/dma-buf/udmabuf.c:89 [inline] RIP: 0010:release_udmabuf+0xda/0x250 drivers/dma-buf/udmabuf.c:114 Code: 48 89 df e8 38 3a d3 fc 4c 8b 3b 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 3c 08 00 74 08 4c 89 ef e8 16 3a d3 fc <49> 8b 5d 00 49 8d 7d 0c 48 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 RSP: 0018:ffffc90003517d20 EFLAGS: 00010246 RAX: 1ffffffffffffffe RBX: ffffffff8d523390 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88807b2a4800 RBP: dffffc0000000000 R08: ffffffff8508420f R09: fffffbfff1c4ace6 R10: fffffbfff1c4ace6 R11: 1ffffffff1c4ace5 R12: ffff88802d6f05e0 R13: fffffffffffffff4 R14: ffff88807db76800 R15: ffff888147938000 FS: 00005555564b6400(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffff4 CR3: 0000000082c3f000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 48 89 df mov %rbx,%rdi 3: e8 38 3a d3 fc callq 0xfcd33a40 8: 4c 8b 3b mov (%rbx),%r15 b: 4c 89 e8 mov %r13,%rax e: 48 c1 e8 03 shr $0x3,%rax 12: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx 19: fc ff df 1c: 80 3c 08 00 cmpb $0x0,(%rax,%rcx,1) 20: 74 08 je 0x2a 22: 4c 89 ef mov %r13,%rdi 25: e8 16 3a d3 fc callq 0xfcd33a40 * 2a: 49 8b 5d 00 mov 0x0(%r13),%rbx <-- trapping instruction 2e: 49 8d 7d 0c lea 0xc(%r13),%rdi 32: 48 89 f8 mov %rdi,%rax 35: 48 c1 e8 03 shr $0x3,%rax 39: 48 rex.W 3a: b9 00 00 00 00 mov $0x0,%ecx