Oops: general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f] CPU: 1 UID: 0 PID: 10016 Comm: syz.0.467 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:fsnotify_parent include/linux/fsnotify.h:81 [inline] RIP: 0010:fsnotify_path include/linux/fsnotify.h:113 [inline] RIP: 0010:fsnotify_file include/linux/fsnotify.h:127 [inline] RIP: 0010:fsnotify_close include/linux/fsnotify.h:457 [inline] RIP: 0010:__fput+0x1b5/0xa70 fs/file_table.c:454 Code: fc ff df 80 3c 08 00 74 08 4c 89 e7 e8 b4 0d ee ff 4d 8b 34 24 49 8d 6e 28 48 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 ef e8 8d 0d ee ff 41 bc 60 06 00 00 4c 03 RSP: 0018:ffffc9000ba37970 EFLAGS: 00010206 RAX: 0000000000000005 RBX: ffff88805d5cae00 RCX: dffffc0000000000 RDX: ffff88807f4f8000 RSI: 0000000004000000 RDI: 0000000002000000 RBP: 0000000000000028 R08: ffffffff8fc2d477 R09: 1ffffffff1f85a8e R10: dffffc0000000000 R11: ffffffff823a4220 R12: ffff888077759380 R13: 0000000000000000 R14: 0000000000000000 R15: ffff888033cf8700 FS: 0000000000000000(0000) GS:ffff888125b03000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055558f35e808 CR3: 00000000783ba000 CR4: 00000000003526f0 Call Trace: task_work_run+0x1d4/0x260 kernel/task_work.c:233 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0x6c5/0x2310 kernel/exit.c:971 do_group_exit+0x21c/0x2d0 kernel/exit.c:1112 get_signal+0x1285/0x1340 kernel/signal.c:3034 arch_do_signal_or_restart+0x9a/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:41 [inline] exit_to_user_mode_loop+0x87/0x4f0 kernel/entry/common.c:75 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline] syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:159 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:194 [inline] do_syscall_64+0x2e3/0xf80 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f5136d8f749 Code: Unable to access opcode bytes at 0x7f5136d8f71f. RSP: 002b:00007f5137b4a0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000000 RBX: 00007f5136fe6098 RCX: 00007f5136d8f749 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f5136fe6098 RBP: 00007f5136fe6090 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5136fe6128 R14: 00007ffce9297810 R15: 00007ffce92978f8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:fsnotify_parent include/linux/fsnotify.h:81 [inline] RIP: 0010:fsnotify_path include/linux/fsnotify.h:113 [inline] RIP: 0010:fsnotify_file include/linux/fsnotify.h:127 [inline] RIP: 0010:fsnotify_close include/linux/fsnotify.h:457 [inline] RIP: 0010:__fput+0x1b5/0xa70 fs/file_table.c:454 Code: fc ff df 80 3c 08 00 74 08 4c 89 e7 e8 b4 0d ee ff 4d 8b 34 24 49 8d 6e 28 48 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 ef e8 8d 0d ee ff 41 bc 60 06 00 00 4c 03 RSP: 0018:ffffc9000ba37970 EFLAGS: 00010206 RAX: 0000000000000005 RBX: ffff88805d5cae00 RCX: dffffc0000000000 RDX: ffff88807f4f8000 RSI: 0000000004000000 RDI: 0000000002000000 RBP: 0000000000000028 R08: ffffffff8fc2d477 R09: 1ffffffff1f85a8e R10: dffffc0000000000 R11: ffffffff823a4220 R12: ffff888077759380 R13: 0000000000000000 R14: 0000000000000000 R15: ffff888033cf8700 FS: 0000000000000000(0000) GS:ffff888125b03000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f32809b42f8 CR3: 0000000062970000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess), 2 bytes skipped: 0: df 80 3c 08 00 74 filds 0x7400083c(%rax) 6: 08 4c 89 e7 or %cl,-0x19(%rcx,%rcx,4) a: e8 b4 0d ee ff call 0xffee0dc3 f: 4d 8b 34 24 mov (%r12),%r14 13: 49 8d 6e 28 lea 0x28(%r14),%rbp 17: 48 89 e8 mov %rbp,%rax 1a: 48 c1 e8 03 shr $0x3,%rax 1e: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx 25: fc ff df * 28: 80 3c 08 00 cmpb $0x0,(%rax,%rcx,1) <-- trapping instruction 2c: 74 08 je 0x36 2e: 48 89 ef mov %rbp,%rdi 31: e8 8d 0d ee ff call 0xffee0dc3 36: 41 bc 60 06 00 00 mov $0x660,%r12d 3c: 4c rex.WR 3d: 03 .byte 0x3