BUG: unable to handle page fault for address: ffffed105b9865ff #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 23fff3067 P4D 23fff3067 PUD 23fff1067 PMD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 305 Comm: syz-executor359 Not tainted 5.4.219-syzkaller-00012-ga8aad8851131 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:fuse_dev_do_write+0x285b/0x4ed0 fs/fuse/dev.c:1939 Code: 7c 24 50 49 83 c4 48 4c 89 e0 48 c1 e8 03 8a 04 18 84 c0 0f 85 e3 21 00 00 45 8b 24 24 41 ff cc 4d 01 fc 4c 89 e0 48 c1 e8 03 <8a> 04 18 84 c0 0f 85 e5 21 00 00 41 c6 04 24 00 41 80 7c 1d 00 00 RSP: 0018:ffff8881dd3d77e0 EFLAGS: 00010a07 RAX: 1ffff1105b9865ff RBX: dffffc0000000000 RCX: ffff8881dd0a2f40 RDX: 0000000000000000 RSI: 00000000000007e0 RDI: ffff8881dcc9fd50 RBP: ffff8881dd3d7b30 R08: ffffffff81dc56ba R09: fffff94000fb083f R10: fffff94000fb083f R11: 1ffffd4000fb083e R12: ffff8882dcc32fff R13: 1ffff1103c486aba R14: ffff8881e24355d0 R15: ffff8881dcc33000 FS: 00007f2e481a9700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed105b9865ff CR3: 00000001dd343000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: fuse_dev_write+0x15a/0x1e0 fs/fuse/dev.c:1976 call_write_iter include/linux/fs.h:1976 [inline] new_sync_write fs/read_write.c:483 [inline] __vfs_write+0x5e3/0x780 fs/read_write.c:496 vfs_write+0x210/0x4f0 fs/read_write.c:558 ksys_write+0x198/0x2c0 fs/read_write.c:611 do_syscall_64+0xcb/0x1c0 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x5c/0xc1 Modules linked in: CR2: ffffed105b9865ff ---[ end trace 81fa6a46b75af09a ]--- RIP: 0010:fuse_dev_do_write+0x285b/0x4ed0 fs/fuse/dev.c:1939 Code: 7c 24 50 49 83 c4 48 4c 89 e0 48 c1 e8 03 8a 04 18 84 c0 0f 85 e3 21 00 00 45 8b 24 24 41 ff cc 4d 01 fc 4c 89 e0 48 c1 e8 03 <8a> 04 18 84 c0 0f 85 e5 21 00 00 41 c6 04 24 00 41 80 7c 1d 00 00 RSP: 0018:ffff8881dd3d77e0 EFLAGS: 00010a07 RAX: 1ffff1105b9865ff RBX: dffffc0000000000 RCX: ffff8881dd0a2f40 RDX: 0000000000000000 RSI: 00000000000007e0 RDI: ffff8881dcc9fd50 RBP: ffff8881dd3d7b30 R08: ffffffff81dc56ba R09: fffff94000fb083f R10: fffff94000fb083f R11: 1ffffd4000fb083e R12: ffff8882dcc32fff R13: 1ffff1103c486aba R14: ffff8881e24355d0 R15: ffff8881dcc33000 FS: 00007f2e481a9700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed105b9865ff CR3: 00000001dd343000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 7c 24 jl 0x26 2: 50 push %rax 3: 49 83 c4 48 add $0x48,%r12 7: 4c 89 e0 mov %r12,%rax a: 48 c1 e8 03 shr $0x3,%rax e: 8a 04 18 mov (%rax,%rbx,1),%al 11: 84 c0 test %al,%al 13: 0f 85 e3 21 00 00 jne 0x21fc 19: 45 8b 24 24 mov (%r12),%r12d 1d: 41 ff cc dec %r12d 20: 4d 01 fc add %r15,%r12 23: 4c 89 e0 mov %r12,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 8a 04 18 mov (%rax,%rbx,1),%al <-- trapping instruction 2d: 84 c0 test %al,%al 2f: 0f 85 e5 21 00 00 jne 0x221a 35: 41 c6 04 24 00 movb $0x0,(%r12) 3a: 41 80 7c 1d 00 00 cmpb $0x0,0x0(%r13,%rbx,1)