Total swap = 0kB
524158 pages RAM
0 pages HighMem/MovableOnly
106452 pages reserved
==================================================================
BUG: KASAN: null-ptr-deref in filemap_fault+0xac7/0x2170
Read of size 4 at addr 0000000000000028 by task syz-fuzzer/265
CPU: 0 PID: 265 Comm: syz-fuzzer Not tainted 6.3.0-rc2-next-20230315 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0x91/0xf0
kasan_report+0xc0/0xf0
kasan_check_range+0x39/0x1d0
filemap_fault+0xac7/0x2170
__do_fault+0x10d/0x590
__handle_mm_fault+0x128d/0x33b0
handle_mm_fault+0x2ce/0xb40
do_user_addr_fault+0x5d3/0x12f0
exc_page_fault+0x9c/0x1a0
asm_exc_page_fault+0x26/0x30
RIP: 0033:0x4666e0
Code: Unable to access opcode bytes at 0x4666b6.
RSP: 002b:000000c00056d7f0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 00000000000003d7 RCX: 00000000004666e0
RDX: 0000000000000080 RSI: 000000c00056d840 RDI: 0000000000000003
RBP: 000000c00056de40 R08: 0000000000000000 R09: 0000000000000000
R10: 00000000000003d7 R11: 0000000000000246 R12: 0000000000000003
R13: 000000c000083080 R14: 0000000000000004 R15: 0000000000000000
==================================================================
general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]
CPU: 0 PID: 265 Comm: syz-fuzzer Tainted: G B 6.3.0-rc2-next-20230315 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:filemap_fault+0xad8/0x2170
Code: 00 00 e8 6b e1 e8 ff 49 8d 5c 24 34 be 04 00 00 00 48 89 df e8 49 fa 1d 00 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 14 02 48 89 d8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 ad
RSP: 0018:ffff88800da07bd8 EFLAGS: 00010216
RAX: dffffc0000000000 RBX: 0000000000000028 RCX: 0000000000000000
RDX: 0000000000000005 RSI: ffffffff81806968 RDI: 0000000000000007
RBP: 0000000000000056 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: fffffffffffffff4
R13: ffff88800c732000 R14: 0000000000000001 R15: ffff88800da07da0
FS: 000000c00009d590(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000004666b6 CR3: 00000000161d6000 CR4: 0000000000350ef0
Call Trace:
__do_fault+0x10d/0x590
__handle_mm_fault+0x128d/0x33b0
handle_mm_fault+0x2ce/0xb40
do_user_addr_fault+0x5d3/0x12f0
exc_page_fault+0x9c/0x1a0
asm_exc_page_fault+0x26/0x30
RIP: 0033:0x4666e0
Code: Unable to access opcode bytes at 0x4666b6.
RSP: 002b:000000c00056d7f0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 00000000000003d7 RCX: 00000000004666e0
RDX: 0000000000000080 RSI: 000000c00056d840 RDI: 0000000000000003
RBP: 000000c00056de40 R08: 0000000000000000 R09: 0000000000000000
R10: 00000000000003d7 R11: 0000000000000246 R12: 0000000000000003
R13: 000000c000083080 R14: 0000000000000004 R15: 0000000000000000
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:filemap_fault+0xad8/0x2170
Code: 00 00 e8 6b e1 e8 ff 49 8d 5c 24 34 be 04 00 00 00 48 89 df e8 49 fa 1d 00 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 14 02 48 89 d8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 ad
RSP: 0018:ffff88800da07bd8 EFLAGS: 00010216
RAX: dffffc0000000000 RBX: 0000000000000028 RCX: 0000000000000000
RDX: 0000000000000005 RSI: ffffffff81806968 RDI: 0000000000000007
RBP: 0000000000000056 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: fffffffffffffff4
R13: ffff88800c732000 R14: 0000000000000001 R15: ffff88800da07da0
FS: 000000c00009d590(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000004666b6 CR3: 00000000161d6000 CR4: 0000000000350ef0
blktrace: Concurrent blktraces are not allowed on sg0
blktrace: Concurrent blktraces are not allowed on sg0
----------------
Code disassembly (best guess):
0: 00 00 add %al,(%rax)
2: e8 6b e1 e8 ff callq 0xffe8e172
7: 49 8d 5c 24 34 lea 0x34(%r12),%rbx
c: be 04 00 00 00 mov $0x4,%esi
11: 48 89 df mov %rbx,%rdi
14: e8 49 fa 1d 00 callq 0x1dfa62
19: 48 89 da mov %rbx,%rdx
1c: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
23: fc ff df
26: 48 c1 ea 03 shr $0x3,%rdx
* 2a: 0f b6 14 02 movzbl (%rdx,%rax,1),%edx <-- trapping instruction
2e: 48 89 d8 mov %rbx,%rax
31: 83 e0 07 and $0x7,%eax
34: 83 c0 03 add $0x3,%eax
37: 38 d0 cmp %dl,%al
39: 7c 08 jl 0x43
3b: 84 d2 test %dl,%dl
3d: 0f .byte 0xf
3e: 85 .byte 0x85
3f: ad lods %ds:(%rsi),%eax