get_swap_device: Bad swap file entry 4003ffffffffffff
general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 1 PID: 1041 Comm: syz-executor.2 Tainted: G        W         5.10.161-syzkaller-00019-g416c4356f372 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023
RIP: 0010:do_swap_page+0x301/0x1ce0 mm/memory.c:3650
Code: 84 db 4c 8b 6c 24 20 75 62 e8 ab d5 d0 ff 41 be 01 00 00 00 4c 8b 7c 24 28 eb 7c 48 89 df e8 96 71 08 00 49 89 c6 48 c1 e8 03 <42> 80 3c 20 00 49 89 df 74 08 4c 89 f7 e8 4d d7 0a 00 4d 8b 36 bb
RSP: 0018:ffffc900090478c0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 4003ffffffffffff RCX: ffff8881065da780
RDX: 0000000000000000 RSI: 0000000000000010 RDI: 0000000000000000
RBP: ffffc90009047a48 R08: ffffffff81a4bdd3 R09: ffffed103ee2a5e8
R10: ffffed103ee2a5e8 R11: 1ffff1103ee2a5e7 R12: dffffc0000000000
R13: ffff888112a2fa68 R14: 0000000000000000 R15: 4003ffffffffffff
FS:  00007f41744c5700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4175873988 CR3: 000000010d755000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 handle_pte_fault+0x49e/0x9d0 mm/memory.c:4744
 ___handle_speculative_fault+0xfca/0x1470 mm/memory.c:5149
 __handle_speculative_fault+0xc3/0x2b0 mm/memory.c:5192
 handle_speculative_fault include/linux/mm.h:1817 [inline]
 do_user_addr_fault+0x885/0xce0 arch/x86/mm/fault.c:1319
 handle_page_fault arch/x86/mm/fault.c:1462 [inline]
 exc_page_fault+0x71/0x1b0 arch/x86/mm/fault.c:1518
 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:571
RIP: 0033:0x7f41756fbae5
Code: b9 40 42 0f 00 ba 81 00 00 00 4c 89 e6 41 c7 04 24 01 00 00 00 bf ca 00 00 00 31 c0 e8 d4 65 05 00 eb c1 0f b6 35 c3 fb c9 00 <8b> bf 98 00 00 00 31 d2 e8 fe 5c ff ff eb 85 48 8d 3d b9 1c 0b 00
RSP: 002b:00007f41744c5220 EFLAGS: 00010202
RAX: 0000000000000001 RBX: 0000000000000000 RCX: 00007f41744c5700
RDX: 573831159bdc0248 RSI: 0000000000000000 RDI: 00007f4175871f80
RBP: 00007f4175871f80 R08: 00007f41744c5700 R09: 00007f41744c5700
R10: 00007f41744c59d0 R11: 0000000000000202 R12: 00007ffdaadbe09e
R13: 00007ffdaadbe09f R14: 00007f41744c5300 R15: 0000000000022000
Modules linked in:
---[ end trace 45d742c39e28619c ]---
RIP: 0010:do_swap_page+0x301/0x1ce0 mm/memory.c:3650
Code: 84 db 4c 8b 6c 24 20 75 62 e8 ab d5 d0 ff 41 be 01 00 00 00 4c 8b 7c 24 28 eb 7c 48 89 df e8 96 71 08 00 49 89 c6 48 c1 e8 03 <42> 80 3c 20 00 49 89 df 74 08 4c 89 f7 e8 4d d7 0a 00 4d 8b 36 bb
RSP: 0018:ffffc900090478c0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 4003ffffffffffff RCX: ffff8881065da780
RDX: 0000000000000000 RSI: 0000000000000010 RDI: 0000000000000000
RBP: ffffc90009047a48 R08: ffffffff81a4bdd3 R09: ffffed103ee2a5e8
R10: ffffed103ee2a5e8 R11: 1ffff1103ee2a5e7 R12: dffffc0000000000
R13: ffff888112a2fa68 R14: 0000000000000000 R15: 4003ffffffffffff
FS:  00007f41744c5700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f41744a4718 CR3: 000000010d755000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	84 db                	test   %bl,%bl
   2:	4c 8b 6c 24 20       	mov    0x20(%rsp),%r13
   7:	75 62                	jne    0x6b
   9:	e8 ab d5 d0 ff       	callq  0xffd0d5b9
   e:	41 be 01 00 00 00    	mov    $0x1,%r14d
  14:	4c 8b 7c 24 28       	mov    0x28(%rsp),%r15
  19:	eb 7c                	jmp    0x97
  1b:	48 89 df             	mov    %rbx,%rdi
  1e:	e8 96 71 08 00       	callq  0x871b9
  23:	49 89 c6             	mov    %rax,%r14
  26:	48 c1 e8 03          	shr    $0x3,%rax
* 2a:	42 80 3c 20 00       	cmpb   $0x0,(%rax,%r12,1) <-- trapping instruction
  2f:	49 89 df             	mov    %rbx,%r15
  32:	74 08                	je     0x3c
  34:	4c 89 f7             	mov    %r14,%rdi
  37:	e8 4d d7 0a 00       	callq  0xad789
  3c:	4d 8b 36             	mov    (%r14),%r14
  3f:	bb                   	.byte 0xbb