general protection fault, probably for non-canonical address 0xdffffc0004000018: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: probably user-memory-access in range [0x00000000200000c0-0x00000000200000c7]
CPU: 1 PID: 6297 Comm: syz-executor.2 Not tainted 6.3.0-rc3-next-20230327 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:do_iter_write+0x477/0x700
Code: 00 0f 85 fd 01 00 00 4d 8b 7c 24 28 e8 d2 05 c6 ff 48 8b 44 24 18 80 38 00 0f 85 68 01 00 00 48 8b 43 18 48 89 c2 48 c1 ea 03 <42> 80 3c 32 00 0f 85 3b 01 00 00 48 8b 4c 24 20 48 8b 30 80 39 00
RSP: 0018:ffff888041d17c70 EFLAGS: 00010216
RAX: 00000000200000c0 RBX: ffff888041d17d60 RCX: ffffc90001fd7000
RDX: 0000000004000018 RSI: ffffffff8185830e RDI: 0000000000000007
RBP: 0000000000000001 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff888009a30f00
R13: 0000000000000000 R14: dffffc0000000000 R15: ffffffff8491cda0
FS: 00007f987e2d9700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000040 CR3: 0000000040724000 CR4: 0000000000350ee0
Call Trace:
vfs_writev+0x1ae/0x660
__x64_sys_pwritev+0x233/0x310
do_syscall_64+0x3f/0x90
entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f9880d63b19
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f987e2d9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000128
RAX: ffffffffffffffda RBX: 00007f9880e76f60 RCX: 00007f9880d63b19
RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000005
RBP: 00007f9880dbdf6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffcff98f80f R14: 00007f987e2d9300 R15: 0000000000022000
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:do_iter_write+0x477/0x700
Code: 00 0f 85 fd 01 00 00 4d 8b 7c 24 28 e8 d2 05 c6 ff 48 8b 44 24 18 80 38 00 0f 85 68 01 00 00 48 8b 43 18 48 89 c2 48 c1 ea 03 <42> 80 3c 32 00 0f 85 3b 01 00 00 48 8b 4c 24 20 48 8b 30 80 39 00
RSP: 0018:ffff888041d17c70 EFLAGS: 00010216
RAX: 00000000200000c0 RBX: ffff888041d17d60 RCX: ffffc90001fd7000
RDX: 0000000004000018 RSI: ffffffff8185830e RDI: 0000000000000007
RBP: 0000000000000001 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff888009a30f00
R13: 0000000000000000 R14: dffffc0000000000 R15: ffffffff8491cda0
FS: 00007f987e2d9700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000040 CR3: 0000000040724000 CR4: 0000000000350ee0
general protection fault, probably for non-canonical address 0xdffffc0004000018: 0000 [#2] PREEMPT SMP KASAN NOPTI
KASAN: probably user-memory-access in range [0x00000000200000c0-0x00000000200000c7]
CPU: 1 PID: 6348 Comm: syz-executor.2 Tainted: G D 6.3.0-rc3-next-20230327 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:do_iter_write+0x477/0x700
Code: 00 0f 85 fd 01 00 00 4d 8b 7c 24 28 e8 d2 05 c6 ff 48 8b 44 24 18 80 38 00 0f 85 68 01 00 00 48 8b 43 18 48 89 c2 48 c1 ea 03 <42> 80 3c 32 00 0f 85 3b 01 00 00 48 8b 4c 24 20 48 8b 30 80 39 00
RSP: 0018:ffff8880435d7c70 EFLAGS: 00010216
RAX: 00000000200000c0 RBX: ffff8880435d7d60 RCX: ffffc90001fd7000
RDX: 0000000004000018 RSI: ffffffff8185830e RDI: 0000000000000007
RBP: 0000000000000001 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff888018252500
R13: 0000000000000000 R14: dffffc0000000000 R15: ffffffff8491cda0
FS: 00007f987e2d9700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000004 CR3: 000000000efee000 CR4: 0000000000350ee0
Call Trace:
vfs_writev+0x1ae/0x660
__x64_sys_pwritev+0x233/0x310
do_syscall_64+0x3f/0x90
entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f9880d63b19
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f987e2d9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000128
RAX: ffffffffffffffda RBX: 00007f9880e76f60 RCX: 00007f9880d63b19
RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000005
RBP: 00007f9880dbdf6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffcff98f80f R14: 00007f987e2d9300 R15: 0000000000022000
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:do_iter_write+0x477/0x700
Code: 00 0f 85 fd 01 00 00 4d 8b 7c 24 28 e8 d2 05 c6 ff 48 8b 44 24 18 80 38 00 0f 85 68 01 00 00 48 8b 43 18 48 89 c2 48 c1 ea 03 <42> 80 3c 32 00 0f 85 3b 01 00 00 48 8b 4c 24 20 48 8b 30 80 39 00
RSP: 0018:ffff888041d17c70 EFLAGS: 00010216
RAX: 00000000200000c0 RBX: ffff888041d17d60 RCX: ffffc90001fd7000
RDX: 0000000004000018 RSI: ffffffff8185830e RDI: 0000000000000007
RBP: 0000000000000001 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff888009a30f00
R13: 0000000000000000 R14: dffffc0000000000 R15: ffffffff8491cda0
FS: 00007f987e2d9700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000004 CR3: 000000000efee000 CR4: 0000000000350ee0
audit: type=1400 audit(1679917811.972:12): avc: denied { read } for pid=6455 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
random: crng reseeded on system resumption
audit: type=1400 audit(1679917812.375:13): avc: denied { watch_reads } for pid=6509 comm="syz-executor.0" path="/dev/bsg" dev="devtmpfs" ino=113 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir permissive=1
random: crng reseeded on system resumption
netlink: 'syz-executor.3': attribute type 1 has an invalid length.
netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'.
netlink: 'syz-executor.3': attribute type 1 has an invalid length.
netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'.
netlink: 'syz-executor.3': attribute type 1 has an invalid length.
netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'.
netlink: 'syz-executor.3': attribute type 1 has an invalid length.
netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'.
----------------
Code disassembly (best guess):
0: 00 0f add %cl,(%rdi)
2: 85 fd test %edi,%ebp
4: 01 00 add %eax,(%rax)
6: 00 4d 8b add %cl,-0x75(%rbp)
9: 7c 24 jl 0x2f
b: 28 e8 sub %ch,%al
d: d2 05 c6 ff 48 8b rolb %cl,-0x74b7003a(%rip) # 0x8b48ffd9
13: 44 24 18 rex.R and $0x18,%al
16: 80 38 00 cmpb $0x0,(%rax)
19: 0f 85 68 01 00 00 jne 0x187
1f: 48 8b 43 18 mov 0x18(%rbx),%rax
23: 48 89 c2 mov %rax,%rdx
26: 48 c1 ea 03 shr $0x3,%rdx
* 2a: 42 80 3c 32 00 cmpb $0x0,(%rdx,%r14,1) <-- trapping instruction
2f: 0f 85 3b 01 00 00 jne 0x170
35: 48 8b 4c 24 20 mov 0x20(%rsp),%rcx
3a: 48 8b 30 mov (%rax),%rsi
3d: 80 39 00 cmpb $0x0,(%rcx)