MTD: Attempt to mount non-MTD device "/dev/loop3" romfs: Mounting image 'rom 5f663c08' through the block layer kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access audit: type=1800 audit(1643150658.993:103): pid=13014 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.3" name="file0" dev="loop3" ino=128 res=0 general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 12996 Comm: syz-executor.2 Not tainted 4.14.262-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8880507f2680 task.stack: ffff8880470c0000 RIP: 0010:scatterwalk_start include/crypto/scatterwalk.h:86 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:111 [inline] RIP: 0010:scatterwalk_copychunks+0x4a3/0x680 crypto/scatterwalk.c:55 RSP: 0018:ffff8880470c7520 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000001000 RCX: ffffc90007c30000 RDX: 0000000000000002 RSI: ffffffff8316e3c4 RDI: ffff8880b4a90928 RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed10091d63c1 R10: ffff888048eb1e0c R11: 0000000000000000 R12: 0000000000001000 R13: ffff8880470c75d8 R14: 0000000000003000 R15: ffff8880b4a90934 FS: 00007f0747e48700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe40d414fc0 CR3: 000000009f3e4000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: scatterwalk_map_and_copy crypto/scatterwalk.c:72 [inline] scatterwalk_map_and_copy+0x100/0x1a0 crypto/scatterwalk.c:60 gcmaes_encrypt.constprop.0+0x5b5/0xc00 arch/x86/crypto/aesni-intel_glue.c:778 Code: fc ff df 80 3c 02 00 0f 85 d9 01 00 00 48 8d 45 10 49 89 6d 00 48 89 c2 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 81 01 00 00 48 b8 00 00 00 RIP: scatterwalk_start include/crypto/scatterwalk.h:86 [inline] RSP: ffff8880470c7520 RIP: scatterwalk_pagedone include/crypto/scatterwalk.h:111 [inline] RSP: ffff8880470c7520 RIP: scatterwalk_copychunks+0x4a3/0x680 crypto/scatterwalk.c:55 RSP: ffff8880470c7520 ---[ end trace 3b50e728f52fd5bd ]--- ---------------- Code disassembly (best guess), 2 bytes skipped: 0: df 80 3c 02 00 0f filds 0xf00023c(%rax) 6: 85 d9 test %ebx,%ecx 8: 01 00 add %eax,(%rax) a: 00 48 8d add %cl,-0x73(%rax) d: 45 10 49 89 adc %r9b,-0x77(%r9) 11: 6d insl (%dx),%es:(%rdi) 12: 00 48 89 add %cl,-0x77(%rax) 15: c2 48 89 retq $0x8948 18: 44 24 18 rex.R and $0x18,%al 1b: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 22: fc ff df 25: 48 c1 ea 03 shr $0x3,%rdx * 29: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2d: 84 c0 test %al,%al 2f: 74 08 je 0x39 31: 3c 03 cmp $0x3,%al 33: 0f 8e 81 01 00 00 jle 0x1ba 39: 48 rex.W 3a: b8 .byte 0xb8 3b: 00 00 add %al,(%rax)