general protection fault, probably for non-canonical address 0xdffffc0000000034: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x00000000000001a0-0x00000000000001a7] CPU: 0 PID: 5664 Comm: syz-executor.4 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 RIP: 0010:__lock_acquire+0x6a/0x1fd0 kernel/locking/lockdep.c:5005 Code: df 0f b6 04 30 84 c0 0f 85 4b 16 00 00 83 3d 58 cd 15 0e 00 0f 84 1c 11 00 00 83 3d 0f 4c 8e 0c 00 74 2c 4c 89 e0 48 c1 e8 03 <80> 3c 30 00 74 12 4c 89 e7 e8 08 a4 86 00 48 be 00 00 00 00 00 fc RSP: 0018:ffffc900051cf6b0 EFLAGS: 00010002 RAX: 0000000000000034 RBX: 0000000000000000 RCX: 0000000000000001 RDX: 0000000000000000 RSI: dffffc0000000000 RDI: 00000000000001a0 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 R10: dffffc0000000000 R11: fffffbfff1f0e74e R12: 00000000000001a0 R13: 0000000000000000 R14: ffff88801773da00 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b9400000(0063) knlGS:00000000f5e9ab40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000031223000 CR3: 00000000785fe000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire+0x1e4/0x530 kernel/locking/lockdep.c:5754 down_read_killable+0xca/0xd30 kernel/locking/rwsem.c:1549 mmap_read_lock_killable include/linux/mmap_lock.h:155 [inline] do_pagemap_scan fs/proc/task_mmu.c:2460 [inline] do_pagemap_cmd+0x8c2/0x1330 fs/proc/task_mmu.c:2513 __do_compat_sys_ioctl fs/ioctl.c:1004 [inline] __se_compat_sys_ioctl+0x51c/0xca0 fs/ioctl.c:947 do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline] __do_fast_syscall_32+0xbe/0x120 arch/x86/entry/common.c:321 do_fast_syscall_32+0x34/0x80 arch/x86/entry/common.c:346 entry_SYSENTER_compat_after_hwframe+0x7a/0x84 RIP: 0023:0xf72a0579 Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 002b:00000000f5e9a5ac EFLAGS: 00000206 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000c0606610 RDX: 0000000020000300 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__lock_acquire+0x6a/0x1fd0 kernel/locking/lockdep.c:5005 Code: df 0f b6 04 30 84 c0 0f 85 4b 16 00 00 83 3d 58 cd 15 0e 00 0f 84 1c 11 00 00 83 3d 0f 4c 8e 0c 00 74 2c 4c 89 e0 48 c1 e8 03 <80> 3c 30 00 74 12 4c 89 e7 e8 08 a4 86 00 48 be 00 00 00 00 00 fc RSP: 0018:ffffc900051cf6b0 EFLAGS: 00010002 RAX: 0000000000000034 RBX: 0000000000000000 RCX: 0000000000000001 RDX: 0000000000000000 RSI: dffffc0000000000 RDI: 00000000000001a0 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 R10: dffffc0000000000 R11: fffffbfff1f0e74e R12: 00000000000001a0 R13: 0000000000000000 R14: ffff88801773da00 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b9400000(0063) knlGS:00000000f5e9ab40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000031223000 CR3: 00000000785fe000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: df 0f fisttps (%rdi) 2: b6 04 mov $0x4,%dh 4: 30 84 c0 0f 85 4b 16 xor %al,0x164b850f(%rax,%rax,8) b: 00 00 add %al,(%rax) d: 83 3d 58 cd 15 0e 00 cmpl $0x0,0xe15cd58(%rip) # 0xe15cd6c 14: 0f 84 1c 11 00 00 je 0x1136 1a: 83 3d 0f 4c 8e 0c 00 cmpl $0x0,0xc8e4c0f(%rip) # 0xc8e4c30 21: 74 2c je 0x4f 23: 4c 89 e0 mov %r12,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 80 3c 30 00 cmpb $0x0,(%rax,%rsi,1) <-- trapping instruction 2e: 74 12 je 0x42 30: 4c 89 e7 mov %r12,%rdi 33: e8 08 a4 86 00 call 0x86a440 38: 48 rex.W 39: be 00 00 00 00 mov $0x0,%esi 3e: 00 fc add %bh,%ah