Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 0 UID: 0 PID: 5373 Comm: syz.3.10 Not tainted 6.11.0-rc5-next-20240827-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:vma_iter_store_gfp mm/vma.h:147 [inline] RIP: 0010:vms_abort_munmap_vmas mm/vma.h:240 [inline] RIP: 0010:mmap_region+0xc12/0x27f0 mm/mmap.c:1590 Code: 0f b6 44 25 00 84 c0 0f 85 b7 19 00 00 41 8b 1e bf 01 00 00 00 89 de e8 3c a8 ad ff 83 fb 01 0f 85 88 01 00 00 e8 ee a3 ad ff <41> 80 3c 24 00 74 07 31 ff e8 40 7b 16 00 48 8b 1c 25 00 00 00 00 RSP: 0018:ffffc90004157800 EFLAGS: 00010283 RAX: ffffffff81e66a72 RBX: 0000000000000001 RCX: 0000000000040000 RDX: ffffc90009079000 RSI: 0000000000001856 RDI: 0000000000001857 RBP: ffffc90004157c50 R08: ffffffff81e66a64 R09: 1ffffffff26f6f06 R10: dffffc0000000000 R11: fffffbfff26f6f07 R12: dffffc0000000000 R13: 1ffff9200082af63 R14: ffffc90004157b18 R15: ffffc90004157ae0 FS: 00007fb677ba86c0(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000007c8c4000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: do_mmap+0x8f0/0x1000 mm/mmap.c:496 vm_mmap_pgoff+0x1dd/0x3d0 mm/util.c:588 ksys_mmap_pgoff+0x4eb/0x720 mm/mmap.c:542 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fb676d79e79 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fb677ba8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007fb676f15f80 RCX: 00007fb676d79e79 RDX: 0000000000000000 RSI: 0000000000002000 RDI: 0000000020002000 RBP: 00007fb676de793e R08: 0000000000000005 R09: 0000000080000000 R10: 0000000000000011 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fb676f15f80 R15: 00007fff19384a58 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:vma_iter_store_gfp mm/vma.h:147 [inline] RIP: 0010:vms_abort_munmap_vmas mm/vma.h:240 [inline] RIP: 0010:mmap_region+0xc12/0x27f0 mm/mmap.c:1590 Code: 0f b6 44 25 00 84 c0 0f 85 b7 19 00 00 41 8b 1e bf 01 00 00 00 89 de e8 3c a8 ad ff 83 fb 01 0f 85 88 01 00 00 e8 ee a3 ad ff <41> 80 3c 24 00 74 07 31 ff e8 40 7b 16 00 48 8b 1c 25 00 00 00 00 RSP: 0018:ffffc90004157800 EFLAGS: 00010283 RAX: ffffffff81e66a72 RBX: 0000000000000001 RCX: 0000000000040000 RDX: ffffc90009079000 RSI: 0000000000001856 RDI: 0000000000001857 RBP: ffffc90004157c50 R08: ffffffff81e66a64 R09: 1ffffffff26f6f06 R10: dffffc0000000000 R11: fffffbfff26f6f07 R12: dffffc0000000000 R13: 1ffff9200082af63 R14: ffffc90004157b18 R15: ffffc90004157ae0 FS: 00007fb677ba86c0(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b32f11ff8 CR3: 000000007c8c4000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 0f b6 44 25 00 movzbl 0x0(%rbp,%riz,1),%eax 5: 84 c0 test %al,%al 7: 0f 85 b7 19 00 00 jne 0x19c4 d: 41 8b 1e mov (%r14),%ebx 10: bf 01 00 00 00 mov $0x1,%edi 15: 89 de mov %ebx,%esi 17: e8 3c a8 ad ff call 0xffada858 1c: 83 fb 01 cmp $0x1,%ebx 1f: 0f 85 88 01 00 00 jne 0x1ad 25: e8 ee a3 ad ff call 0xffada418 * 2a: 41 80 3c 24 00 cmpb $0x0,(%r12) <-- trapping instruction 2f: 74 07 je 0x38 31: 31 ff xor %edi,%edi 33: e8 40 7b 16 00 call 0x167b78 38: 48 8b 1c 25 00 00 00 mov 0x0,%rbx 3f: 00