random: crng init done kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 2062 Comm: syz-executor945 Not tainted 4.9.194+ #0 task: 0000000006c6982f task.stack: 000000002c2c6ff1 RIP: 0010:[] [<000000004bf76611>] __read_once_size include/linux/compiler.h:264 [inline] RIP: 0010:[] [<000000004bf76611>] compound_head include/linux/page-flags.h:145 [inline] RIP: 0010:[] [<000000004bf76611>] get_page include/linux/mm.h:772 [inline] RIP: 0010:[] [<000000004bf76611>] submit_page_section fs/direct-io.c:826 [inline] RIP: 0010:[] [<000000004bf76611>] do_direct_IO fs/direct-io.c:1046 [inline] RIP: 0010:[] [<000000004bf76611>] do_blockdev_direct_IO fs/direct-io.c:1275 [inline] RIP: 0010:[] [<000000004bf76611>] __blockdev_direct_IO+0x1c55/0xd370 fs/direct-io.c:1361 RSP: 0018:ffff8801cec8f310 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffffea00073a341c RCX: 000000000000000c RDX: 0000000000000004 RSI: ffffffff815dd948 RDI: 0000000000000020 RBP: ffff8801cec8f650 R08: 0000000000000000 R09: ffff8801cedbb400 R10: ffffed0039db768d R11: ffff8801cedbb46f R12: ffffea00073a3400 R13: ffffea00073a3400 R14: 0000000000000000 R15: ffff8801ce858000 FS: 000000000229d880(0000) GS:ffff8801db600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020011000 CR3: 00000001d0005000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffffffff83cc9110 0000000000000003 1ffff1003a003df5 ffff8801d001efa8 ffff8801d001df00 ffff8801cec8f440 0005080000000000 0000000000001000 ffff8801ce858079 ffff8801d001df00 ffff8801da016d40 ffff880100000000 Call Trace: [<000000008947c2b7>] ext4_direct_IO_write fs/ext4/inode.c:3504 [inline] [<000000008947c2b7>] ext4_direct_IO+0xa1d/0x29b0 fs/ext4/inode.c:3660 [<0000000028e98604>] generic_file_direct_write+0x293/0x520 mm/filemap.c:2841 [<00000000cad6996d>] __generic_file_write_iter+0x20f/0x530 mm/filemap.c:3021 [<000000003dfa1ec0>] ext4_file_write_iter+0x6e7/0xcd0 fs/ext4/file.c:165 [<00000000e1003cc1>] vfs_iter_write+0x2e2/0x580 fs/read_write.c:390 [<0000000040df7024>] iter_file_splice_write+0x5a9/0xb10 fs/splice.c:768 [<0000000015913df0>] do_splice_from fs/splice.c:870 [inline] [<0000000015913df0>] do_splice fs/splice.c:1166 [inline] [<0000000015913df0>] SYSC_splice fs/splice.c:1416 [inline] [<0000000015913df0>] SyS_splice+0xe02/0x14c0 fs/splice.c:1399 [<000000007e315b0d>] do_syscall_64+0x1ad/0x5c0 arch/x86/entry/common.c:288 [<00000000828570e5>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Code: b2 81 e6 ff e9 b3 77 00 00 e8 b8 4d d4 ff 48 8b 84 24 f8 00 00 00 48 8d 78 20 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 bc 96 00 00 48 8b 84 24 f8 00 00 00 4c 8b 68 RIP [<000000004bf76611>] __read_once_size include/linux/compiler.h:264 [inline] RIP [<000000004bf76611>] compound_head include/linux/page-flags.h:145 [inline] RIP [<000000004bf76611>] get_page include/linux/mm.h:772 [inline] RIP [<000000004bf76611>] submit_page_section fs/direct-io.c:826 [inline] RIP [<000000004bf76611>] do_direct_IO fs/direct-io.c:1046 [inline] RIP [<000000004bf76611>] do_blockdev_direct_IO fs/direct-io.c:1275 [inline] RIP [<000000004bf76611>] __blockdev_direct_IO+0x1c55/0xd370 fs/direct-io.c:1361 RSP ---[ end trace 3c14d76101166677 ]---