Total swap = 0kB 524158 pages RAM 0 pages HighMem/MovableOnly 106452 pages reserved ================================================================== BUG: KASAN: null-ptr-deref in filemap_fault+0xac7/0x2170 Read of size 4 at addr 0000000000000028 by task syz-fuzzer/265 CPU: 0 PID: 265 Comm: syz-fuzzer Not tainted 6.3.0-rc2-next-20230315 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: dump_stack_lvl+0x91/0xf0 kasan_report+0xc0/0xf0 kasan_check_range+0x39/0x1d0 filemap_fault+0xac7/0x2170 __do_fault+0x10d/0x590 __handle_mm_fault+0x128d/0x33b0 handle_mm_fault+0x2ce/0xb40 do_user_addr_fault+0x5d3/0x12f0 exc_page_fault+0x9c/0x1a0 asm_exc_page_fault+0x26/0x30 RIP: 0033:0x4666e0 Code: Unable to access opcode bytes at 0x4666b6. RSP: 002b:000000c00056d7f0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 00000000000003d7 RCX: 00000000004666e0 RDX: 0000000000000080 RSI: 000000c00056d840 RDI: 0000000000000003 RBP: 000000c00056de40 R08: 0000000000000000 R09: 0000000000000000 R10: 00000000000003d7 R11: 0000000000000246 R12: 0000000000000003 R13: 000000c000083080 R14: 0000000000000004 R15: 0000000000000000 ================================================================== general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f] CPU: 0 PID: 265 Comm: syz-fuzzer Tainted: G B 6.3.0-rc2-next-20230315 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:filemap_fault+0xad8/0x2170 Code: 00 00 e8 6b e1 e8 ff 49 8d 5c 24 34 be 04 00 00 00 48 89 df e8 49 fa 1d 00 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 14 02 48 89 d8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 ad RSP: 0018:ffff88800da07bd8 EFLAGS: 00010216 RAX: dffffc0000000000 RBX: 0000000000000028 RCX: 0000000000000000 RDX: 0000000000000005 RSI: ffffffff81806968 RDI: 0000000000000007 RBP: 0000000000000056 R08: 0000000000000007 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: fffffffffffffff4 R13: ffff88800c732000 R14: 0000000000000001 R15: ffff88800da07da0 FS: 000000c00009d590(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000004666b6 CR3: 00000000161d6000 CR4: 0000000000350ef0 Call Trace: __do_fault+0x10d/0x590 __handle_mm_fault+0x128d/0x33b0 handle_mm_fault+0x2ce/0xb40 do_user_addr_fault+0x5d3/0x12f0 exc_page_fault+0x9c/0x1a0 asm_exc_page_fault+0x26/0x30 RIP: 0033:0x4666e0 Code: Unable to access opcode bytes at 0x4666b6. RSP: 002b:000000c00056d7f0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 00000000000003d7 RCX: 00000000004666e0 RDX: 0000000000000080 RSI: 000000c00056d840 RDI: 0000000000000003 RBP: 000000c00056de40 R08: 0000000000000000 R09: 0000000000000000 R10: 00000000000003d7 R11: 0000000000000246 R12: 0000000000000003 R13: 000000c000083080 R14: 0000000000000004 R15: 0000000000000000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:filemap_fault+0xad8/0x2170 Code: 00 00 e8 6b e1 e8 ff 49 8d 5c 24 34 be 04 00 00 00 48 89 df e8 49 fa 1d 00 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 14 02 48 89 d8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 ad RSP: 0018:ffff88800da07bd8 EFLAGS: 00010216 RAX: dffffc0000000000 RBX: 0000000000000028 RCX: 0000000000000000 RDX: 0000000000000005 RSI: ffffffff81806968 RDI: 0000000000000007 RBP: 0000000000000056 R08: 0000000000000007 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: fffffffffffffff4 R13: ffff88800c732000 R14: 0000000000000001 R15: ffff88800da07da0 FS: 000000c00009d590(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000004666b6 CR3: 00000000161d6000 CR4: 0000000000350ef0 blktrace: Concurrent blktraces are not allowed on sg0 blktrace: Concurrent blktraces are not allowed on sg0 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: e8 6b e1 e8 ff callq 0xffe8e172 7: 49 8d 5c 24 34 lea 0x34(%r12),%rbx c: be 04 00 00 00 mov $0x4,%esi 11: 48 89 df mov %rbx,%rdi 14: e8 49 fa 1d 00 callq 0x1dfa62 19: 48 89 da mov %rbx,%rdx 1c: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 23: fc ff df 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 0f b6 14 02 movzbl (%rdx,%rax,1),%edx <-- trapping instruction 2e: 48 89 d8 mov %rbx,%rax 31: 83 e0 07 and $0x7,%eax 34: 83 c0 03 add $0x3,%eax 37: 38 d0 cmp %dl,%al 39: 7c 08 jl 0x43 3b: 84 d2 test %dl,%dl 3d: 0f .byte 0xf 3e: 85 .byte 0x85 3f: ad lods %ds:(%rsi),%eax