Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 0 UID: 0 PID: 6740 Comm: syz.4.212 Not tainted 6.14.0-rc3-next-20250218-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 RIP: 0010:vma_refcount_put include/linux/mm.h:712 [inline] RIP: 0010:vma_end_read include/linux/mm.h:811 [inline] RIP: 0010:lock_vma_under_rcu+0x578/0xac0 mm/memory.c:6454 Code: be 5d b1 ff 49 be 00 00 00 00 00 fc ff df 4d 85 ff 74 0d 49 81 ff 01 f0 ff ff 0f 82 a3 02 00 00 49 83 ff f5 0f 85 55 03 00 00 <41> 80 3e 00 74 0a bf 05 00 00 00 e8 28 df 18 00 4c 8b 34 25 05 00 RSP: 0000:ffffc9001bfc7d80 EFLAGS: 00010246 RAX: fffffffffffffff5 RBX: 0000000000000000 RCX: ffff88802c48da00 RDX: ffff88802c48da00 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc9001bfc7ed8 R08: ffffffff8210a26a R09: 1ffff110060b2b50 R10: dffffc0000000000 R11: ffffed10060b2b51 R12: ffffc9001bfc7e10 R13: ffff88807770dc20 R14: dffffc0000000000 R15: fffffffffffffff5 FS: 000055556d983500(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c436116 CR3: 0000000034a42000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: do_user_addr_fault arch/x86/mm/fault.c:1328 [inline] handle_page_fault arch/x86/mm/fault.c:1480 [inline] exc_page_fault+0x17b/0x920 arch/x86/mm/fault.c:1538 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0033:0x7f04a2853ca1 Code: 48 8b 54 24 08 48 85 d2 74 17 8b 44 24 18 0f c8 89 c0 48 89 44 24 18 48 83 fa 01 0f 85 b3 01 00 00 48 8b 44 24 10 8b 54 24 18 <89> 10 e9 15 fd ff ff 48 8b 44 24 10 8b 10 48 8b 44 24 08 48 85 c0 RSP: 002b:00007ffdb156c770 EFLAGS: 00010246 RAX: 0000400000000ab4 RBX: 0000000000000004 RCX: 0000000000000000 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 000055556d9833c8 RBP: 00007ffdb156c878 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 00007f04a2ba608c R13: 00007f04a2ba6080 R14: fffffffffffffffe R15: 00007ffdb156c8c0 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:vma_refcount_put include/linux/mm.h:712 [inline] RIP: 0010:vma_end_read include/linux/mm.h:811 [inline] RIP: 0010:lock_vma_under_rcu+0x578/0xac0 mm/memory.c:6454 Code: be 5d b1 ff 49 be 00 00 00 00 00 fc ff df 4d 85 ff 74 0d 49 81 ff 01 f0 ff ff 0f 82 a3 02 00 00 49 83 ff f5 0f 85 55 03 00 00 <41> 80 3e 00 74 0a bf 05 00 00 00 e8 28 df 18 00 4c 8b 34 25 05 00 RSP: 0000:ffffc9001bfc7d80 EFLAGS: 00010246 RAX: fffffffffffffff5 RBX: 0000000000000000 RCX: ffff88802c48da00 RDX: ffff88802c48da00 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc9001bfc7ed8 R08: ffffffff8210a26a R09: 1ffff110060b2b50 R10: dffffc0000000000 R11: ffffed10060b2b51 R12: ffffc9001bfc7e10 R13: ffff88807770dc20 R14: dffffc0000000000 R15: fffffffffffffff5 FS: 000055556d983500(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b30315ff8 CR3: 0000000034a42000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 5d pop %rbp 1: b1 ff mov $0xff,%cl 3: 49 be 00 00 00 00 00 movabs $0xdffffc0000000000,%r14 a: fc ff df d: 4d 85 ff test %r15,%r15 10: 74 0d je 0x1f 12: 49 81 ff 01 f0 ff ff cmp $0xfffffffffffff001,%r15 19: 0f 82 a3 02 00 00 jb 0x2c2 1f: 49 83 ff f5 cmp $0xfffffffffffffff5,%r15 23: 0f 85 55 03 00 00 jne 0x37e * 29: 41 80 3e 00 cmpb $0x0,(%r14) <-- trapping instruction 2d: 74 0a je 0x39 2f: bf 05 00 00 00 mov $0x5,%edi 34: e8 28 df 18 00 call 0x18df61 39: 4c rex.WR 3a: 8b .byte 0x8b 3b: 34 25 xor $0x25,%al 3d: 05 .byte 0x5