general protection fault, probably for non-canonical address 0xdffffc0070d38bf4: 0000 [#1] PREEMPT SMP KASAN KASAN: probably user-memory-access in range [0x00000003869c5fa0-0x00000003869c5fa7] CPU: 0 PID: 1169 Comm: udevd Not tainted 5.17.0-rc6-syzkaller-00100-g98d107b84614 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:dev_uevent+0x103/0x780 drivers/base/core.c:2316 Code: 03 80 3c 02 00 0f 85 df 05 00 00 4c 8b 63 58 4d 85 e4 74 40 e8 0e ac 88 fe 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 14 06 00 00 4d 8b 24 24 4d 85 e4 74 17 e8 e5 ab RSP: 0018:ffffc90000967a70 EFLAGS: 00010203 RAX: dffffc0000000000 RBX: ffff88810da042f0 RCX: 0000000000000000 RDX: 0000000070d38bf4 RSI: ffffffff82bb5422 RDI: 0000000000000003 RBP: 1ffff9200012cf4e R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff82bb53e7 R11: 000000000005003e R12: 00000003869c5fa4 R13: ffff88810c60c000 R14: ffff88810da04348 R15: ffff8881085ac090 FS: 00007fe9ff5be840(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fcdbf310000 CR3: 0000000111018000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: uevent_show+0x1b8/0x380 drivers/base/core.c:2391 dev_attr_show+0x4b/0x90 drivers/base/core.c:2094 sysfs_kf_seq_show+0x219/0x3d0 fs/sysfs/file.c:59 seq_read_iter+0x4f5/0x1280 fs/seq_file.c:230 kernfs_fop_read_iter+0x514/0x6f0 fs/kernfs/file.c:241 call_read_iter include/linux/fs.h:2068 [inline] new_sync_read+0x429/0x6e0 fs/read_write.c:400 vfs_read+0x35c/0x600 fs/read_write.c:481 ksys_read+0x12d/0x250 fs/read_write.c:619 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fe9ff7158fe Code: c0 e9 e6 fe ff ff 50 48 8d 3d 0e c7 09 00 e8 c9 cf 01 00 66 0f 1f 84 00 00 00 00 00 64 8b 04 25 18 00 00 00 85 c0 75 14 0f 05 <48> 3d 00 f0 ff ff 77 5a c3 66 0f 1f 84 00 00 00 00 00 48 83 ec 28 RSP: 002b:00007fff0d40f908 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 00005578752bb6a0 RCX: 00007fe9ff7158fe RDX: 0000000000001000 RSI: 00005578752cb6f0 RDI: 000000000000000c RBP: 00007fe9ff7e2380 R08: 000000000000000c R09: 00007fe9ff7e5a60 R10: 0000000000002000 R11: 0000000000000246 R12: 00005578752bb6a0 R13: 0000000000000d68 R14: 00007fe9ff7e1780 R15: 0000000000000d68 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:dev_uevent+0x103/0x780 drivers/base/core.c:2316 Code: 03 80 3c 02 00 0f 85 df 05 00 00 4c 8b 63 58 4d 85 e4 74 40 e8 0e ac 88 fe 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 14 06 00 00 4d 8b 24 24 4d 85 e4 74 17 e8 e5 ab RSP: 0018:ffffc90000967a70 EFLAGS: 00010203 RAX: dffffc0000000000 RBX: ffff88810da042f0 RCX: 0000000000000000 RDX: 0000000070d38bf4 RSI: ffffffff82bb5422 RDI: 0000000000000003 RBP: 1ffff9200012cf4e R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff82bb53e7 R11: 000000000005003e R12: 00000003869c5fa4 R13: ffff88810c60c000 R14: ffff88810da04348 R15: ffff8881085ac090 FS: 00007fe9ff5be840(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fcdbf310000 CR3: 0000000111018000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 03 80 3c 02 00 0f add 0xf00023c(%rax),%eax 6: 85 df test %ebx,%edi 8: 05 00 00 4c 8b add $0x8b4c0000,%eax d: 63 58 4d movsxd 0x4d(%rax),%ebx 10: 85 e4 test %esp,%esp 12: 74 40 je 0x54 14: e8 0e ac 88 fe callq 0xfe88ac27 19: 4c 89 e2 mov %r12,%rdx 1c: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 23: fc ff df 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2e: 0f 85 14 06 00 00 jne 0x648 34: 4d 8b 24 24 mov (%r12),%r12 38: 4d 85 e4 test %r12,%r12 3b: 74 17 je 0x54 3d: e8 .byte 0xe8 3e: e5 ab in $0xab,%eax