general protection fault, probably for non-canonical address 0xf07c0001f80441ec: 0000 [#1] PREEMPT SMP KASAN KASAN: maybe wild-memory-access in range [0x83e0200fc0220f60-0x83e0200fc0220f67] CPU: 1 PID: 8454 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210421-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:find_vma+0xdc/0x180 mm/mmap.c:2320 Code: 03 42 80 3c 30 00 0f 85 a0 00 00 00 48 8b 5b 10 e8 f9 d4 c9 ff 48 85 db 74 4c e8 ef d4 c9 ff 48 8d 7b e8 48 89 f8 48 c1 e8 03 <42> 80 3c 30 00 75 60 4c 8b 6b e8 48 89 ee 4c 89 ef e8 0e db c9 ff RSP: 0000:ffffc9000169fe88 EFLAGS: 00010a03 RAX: 107c0401f80441ec RBX: 83e0200fc0220f7f RCX: 0000000000000000 RDX: ffff88802590b900 RSI: ffffffff81aaa581 RDI: 83e0200fc0220f67 RBP: 000000c000804000 R08: 000010b000209066 R09: ffffffff901f68c7 R10: ffffffff81aaa54e R11: 0000000000000000 R12: ffff88800000102e R13: 000010b000209066 R14: dffffc0000000000 R15: ffff888028ef8000 FS: 000000c00015a490(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c000804000 CR3: 0000000013733000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: do_user_addr_fault+0x2d7/0x1210 arch/x86/mm/fault.c:1351 handle_page_fault arch/x86/mm/fault.c:1475 [inline] exc_page_fault+0x9e/0x180 arch/x86/mm/fault.c:1531 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:577 RIP: 0033:0x670a83 Code: 48 8b 48 08 48 89 4c 24 38 48 8b 00 48 89 44 24 68 48 8b 94 24 c0 00 00 00 48 8b 9c 24 a0 00 00 00 31 f6 eb 28 48 8b 7c 24 68 <89> 04 97 48 8d 72 01 4c 8b 84 24 c0 00 00 00 4c 8b 8c 24 a0 00 00 RSP: 002b:000000c000175658 EFLAGS: 00010293 RAX: 0000000083e89f12 RBX: 0000000000000eb6 RCX: 00000000ffffffff RDX: 0000000000000000 RSI: fffffffffffffffc RDI: 000000c000804000 RBP: 000000c0001756e8 R08: 000000c00074bbab R09: 0000000000000012 R10: 0000000000000004 R11: 0000000000000011 R12: 0000000000000018 R13: 0000000000000000 R14: 00000000009412b7 R15: 0000000000000000 Modules linked in: ---[ end trace bf2d05ac1d41f90d ]--- RIP: 0010:find_vma+0xdc/0x180 mm/mmap.c:2320 Code: 03 42 80 3c 30 00 0f 85 a0 00 00 00 48 8b 5b 10 e8 f9 d4 c9 ff 48 85 db 74 4c e8 ef d4 c9 ff 48 8d 7b e8 48 89 f8 48 c1 e8 03 <42> 80 3c 30 00 75 60 4c 8b 6b e8 48 89 ee 4c 89 ef e8 0e db c9 ff RSP: 0000:ffffc9000169fe88 EFLAGS: 00010a03 RAX: 107c0401f80441ec RBX: 83e0200fc0220f7f RCX: 0000000000000000 RDX: ffff88802590b900 RSI: ffffffff81aaa581 RDI: 83e0200fc0220f67 RBP: 000000c000804000 R08: 000010b000209066 R09: ffffffff901f68c7 R10: ffffffff81aaa54e R11: 0000000000000000 R12: ffff88800000102e R13: 000010b000209066 R14: dffffc0000000000 R15: ffff888028ef8000 FS: 000000c00015a490(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000557455149158 CR3: 0000000013733000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400