general protection fault, probably for non-canonical address 0xdffffc0000000011: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f] CPU: 0 PID: 23939 Comm: syz-executor Tainted: G W 5.10.236-syzkaller-00012-gab07aeb2c93d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 RIP: 0010:kobject_uevent_env+0xb5/0x700 lib/kobject_uevent.c:497 Code: 48 c1 e8 03 0f b6 04 18 84 c0 0f 85 29 06 00 00 41 80 0e 08 eb 05 e8 7a 6f 0d ff 4d 89 ec 4d 8d 74 24 20 4c 89 f0 48 c1 e8 03 <80> 3c 18 00 74 08 4c 89 f7 e8 fd 55 47 ff 4d 8b 36 4d 85 f6 75 2d RSP: 0018:ffffc90000e0f210 EFLAGS: 00010206 RAX: 0000000000000011 RBX: dffffc0000000000 RCX: ffff888117128000 RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 RBP: ffffc90000e0f288 R08: 0000000000000004 R09: 0000000000000003 R10: fffff520001c1e40 R11: 1ffff920001c1e40 R12: 0000000000000068 R13: 0000000000000068 R14: 0000000000000088 R15: 0000000000000002 FS: 000055555f8e2500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f538dfc411b CR3: 0000000134c6a000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: kobject_uevent+0x1d/0x30 lib/kobject_uevent.c:657 __loop_clr_fd+0x5fc/0x9c0 drivers/block/loop.c:1255 loop_clr_fd drivers/block/loop.c:1344 [inline] lo_ioctl+0xda0/0x1a80 drivers/block/loop.c:1702 __blkdev_driver_ioctl block/ioctl.c:240 [inline] blkdev_ioctl+0x2d2/0x5b0 block/ioctl.c:635 block_ioctl+0xae/0x100 fs/block_dev.c:1888 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl+0x121/0x1a0 fs/ioctl.c:739 __x64_sys_ioctl+0x7b/0x90 fs/ioctl.c:739 do_syscall_64+0x31/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7f677797e56b Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 RSP: 002b:00007ffde32503e0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f677797e56b RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000003 RBP: 00007ffde325047c R08: 000000000000000a R09: 00007ffde3250187 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a R13: 000055555f8f5470 R14: 00000000002441a5 R15: 00007ffde32504d0 Modules linked in: ---[ end trace ca02e20567015c8e ]--- RIP: 0010:kobject_uevent_env+0xb5/0x700 lib/kobject_uevent.c:497 Code: 48 c1 e8 03 0f b6 04 18 84 c0 0f 85 29 06 00 00 41 80 0e 08 eb 05 e8 7a 6f 0d ff 4d 89 ec 4d 8d 74 24 20 4c 89 f0 48 c1 e8 03 <80> 3c 18 00 74 08 4c 89 f7 e8 fd 55 47 ff 4d 8b 36 4d 85 f6 75 2d RSP: 0018:ffffc90000e0f210 EFLAGS: 00010206 RAX: 0000000000000011 RBX: dffffc0000000000 RCX: ffff888117128000 RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 RBP: ffffc90000e0f288 R08: 0000000000000004 R09: 0000000000000003 R10: fffff520001c1e40 R11: 1ffff920001c1e40 R12: 0000000000000068 R13: 0000000000000068 R14: 0000000000000088 R15: 0000000000000002 FS: 000055555f8e2500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffe8 CR3: 0000000134c6a000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 48 c1 e8 03 shr $0x3,%rax 4: 0f b6 04 18 movzbl (%rax,%rbx,1),%eax 8: 84 c0 test %al,%al a: 0f 85 29 06 00 00 jne 0x639 10: 41 80 0e 08 orb $0x8,(%r14) 14: eb 05 jmp 0x1b 16: e8 7a 6f 0d ff call 0xff0d6f95 1b: 4d 89 ec mov %r13,%r12 1e: 4d 8d 74 24 20 lea 0x20(%r12),%r14 23: 4c 89 f0 mov %r14,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 80 3c 18 00 cmpb $0x0,(%rax,%rbx,1) <-- trapping instruction 2e: 74 08 je 0x38 30: 4c 89 f7 mov %r14,%rdi 33: e8 fd 55 47 ff call 0xff475635 38: 4d 8b 36 mov (%r14),%r14 3b: 4d 85 f6 test %r14,%r14 3e: 75 2d jne 0x6d