BUG: unable to handle page fault for address: fffffffffffffff4 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD ca8f067 P4D ca8f067 PUD ca91067 PMD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 3608 Comm: syz-executor229 Not tainted 5.19.0-syzkaller-13930-g7ebfc85e2cd7 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 RIP: 0010:dma_unmap_sgtable include/linux/dma-mapping.h:378 [inline] RIP: 0010:put_sg_table drivers/dma-buf/udmabuf.c:89 [inline] RIP: 0010:release_udmabuf+0xda/0x250 drivers/dma-buf/udmabuf.c:114 Code: 48 89 df e8 38 3a d3 fc 4c 8b 3b 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 3c 08 00 74 08 4c 89 ef e8 16 3a d3 fc <49> 8b 5d 00 49 8d 7d 0c 48 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 RSP: 0018:ffffc9000373fbe0 EFLAGS: 00010246 RAX: 1ffffffffffffffe RBX: ffffffff8d523390 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88807e0dd000 RBP: dffffc0000000000 R08: ffffffff8508420f R09: fffffbfff1c4ace6 R10: fffffbfff1c4ace6 R11: 1ffffffff1c4ace5 R12: ffff888076151d60 R13: fffffffffffffff4 R14: ffff8880228984c0 R15: ffff88801ea74000 FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffff4 CR3: 0000000026f46000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: dma_buf_release+0x103/0x250 drivers/dma-buf/dma-buf.c:78 __dentry_kill+0x418/0x5b0 fs/dcache.c:612 dentry_kill+0xbb/0x290 dput+0x1f3/0x410 fs/dcache.c:913 __fput+0x5a8/0x820 fs/file_table.c:333 task_work_run+0x146/0x1c0 kernel/task_work.c:177 exit_task_work include/linux/task_work.h:38 [inline] do_exit+0x55e/0x20a0 kernel/exit.c:795 do_group_exit+0x23b/0x2f0 kernel/exit.c:925 __do_sys_exit_group kernel/exit.c:936 [inline] __se_sys_exit_group kernel/exit.c:934 [inline] __x64_sys_exit_group+0x3b/0x40 kernel/exit.c:934 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fe757979299 Code: Unable to access opcode bytes at RIP 0x7fe75797926f. RSP: 002b:00007ffe1db72138 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 00007fe7579fc470 RCX: 00007fe757979299 RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 RBP: 0000000000000001 R08: ffffffffffffffb8 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe7579fc470 R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 Modules linked in: CR2: fffffffffffffff4 ---[ end trace 0000000000000000 ]--- RIP: 0010:dma_unmap_sgtable include/linux/dma-mapping.h:378 [inline] RIP: 0010:put_sg_table drivers/dma-buf/udmabuf.c:89 [inline] RIP: 0010:release_udmabuf+0xda/0x250 drivers/dma-buf/udmabuf.c:114 Code: 48 89 df e8 38 3a d3 fc 4c 8b 3b 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 3c 08 00 74 08 4c 89 ef e8 16 3a d3 fc <49> 8b 5d 00 49 8d 7d 0c 48 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 RSP: 0018:ffffc9000373fbe0 EFLAGS: 00010246 RAX: 1ffffffffffffffe RBX: ffffffff8d523390 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88807e0dd000 RBP: dffffc0000000000 R08: ffffffff8508420f R09: fffffbfff1c4ace6 R10: fffffbfff1c4ace6 R11: 1ffffffff1c4ace5 R12: ffff888076151d60 R13: fffffffffffffff4 R14: ffff8880228984c0 R15: ffff88801ea74000 FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffff4 CR3: 0000000026f46000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 48 89 df mov %rbx,%rdi 3: e8 38 3a d3 fc callq 0xfcd33a40 8: 4c 8b 3b mov (%rbx),%r15 b: 4c 89 e8 mov %r13,%rax e: 48 c1 e8 03 shr $0x3,%rax 12: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx 19: fc ff df 1c: 80 3c 08 00 cmpb $0x0,(%rax,%rcx,1) 20: 74 08 je 0x2a 22: 4c 89 ef mov %r13,%rdi 25: e8 16 3a d3 fc callq 0xfcd33a40 * 2a: 49 8b 5d 00 mov 0x0(%r13),%rbx <-- trapping instruction 2e: 49 8d 7d 0c lea 0xc(%r13),%rdi 32: 48 89 f8 mov %rdi,%rax 35: 48 c1 e8 03 shr $0x3,%rax 39: 48 rex.W 3a: b9 00 00 00 00 mov $0x0,%ecx