Oops: general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] CPU: 0 UID: 0 PID: 12017 Comm: syz.4.1515 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 RIP: 0010:kasan_byte_accessible+0x12/0x30 mm/kasan/generic.c:199 Code: 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 48 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <0f> b6 04 07 3c 08 0f 92 c0 c3 cc cc cc cc cc 66 66 66 66 66 66 2e RSP: 0018:ffffc9001cccf4b8 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: ffffffff8b7bcb2e RCX: 6b7589a18f5ce500 RDX: 0000000000000000 RSI: ffffffff8b7bcb2e RDI: 0000000000000003 RBP: ffffffff820ff67e R08: 0000000000000001 R09: 0000000000000000 R10: ffffc9001cccf70c R11: fffff52003999eea R12: 0000000000000000 R13: 0000000000000018 R14: 0000000000000018 R15: 0000000000000001 FS: 00007f83219f66c0(0000) GS:ffff888125c1c000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000047bf0000 CR4: 00000000003526f0 Call Trace: __kasan_check_byte+0x12/0x40 mm/kasan/common.c:567 kasan_check_byte include/linux/kasan.h:399 [inline] lock_acquire+0x8d/0x360 kernel/locking/lockdep.c:5842 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] __pte_offset_map_lock+0x13e/0x210 mm/pgtable-generic.c:401 pte_offset_map_lock include/linux/mm.h:3029 [inline] do_anonymous_page mm/memory.c:5030 [inline] do_pte_missing mm/memory.c:4232 [inline] handle_pte_fault mm/memory.c:6052 [inline] __handle_mm_fault+0x2327/0x5440 mm/memory.c:6195 handle_mm_fault+0x40a/0x8e0 mm/memory.c:6364 do_user_addr_fault+0x764/0x1390 arch/x86/mm/fault.c:1387 handle_page_fault arch/x86/mm/fault.c:1476 [inline] exc_page_fault+0x76/0xf0 arch/x86/mm/fault.c:1532 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0010:rep_movs_alternative+0x30/0x90 arch/x86/lib/copy_user_64.S:60 Code: 83 f9 08 73 25 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 e9 4d 0a 04 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 <48> 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 RSP: 0018:ffffc9001cccfa18 EFLAGS: 00050206 RAX: 00007ffffffff001 RBX: 0000000000000038 RCX: 0000000000000038 RDX: 0000000000000001 RSI: 000020000013e000 RDI: ffffc9001cccfaa0 RBP: ffffc9001cccfc30 R08: ffffc9001cccfad7 R09: 1ffff92003999f5a R10: dffffc0000000000 R11: fffff52003999f5b R12: 0000000000000002 R13: dffffc0000000000 R14: ffffc9001cccfaa0 R15: 000020000013e000 copy_user_generic arch/x86/include/asm/uaccess_64.h:126 [inline] raw_copy_from_user arch/x86/include/asm/uaccess_64.h:141 [inline] _inline_copy_from_user include/linux/uaccess.h:178 [inline] _copy_from_user+0x7a/0xb0 lib/usercopy.c:18 copy_from_user include/linux/uaccess.h:212 [inline] copy_msghdr_from_user net/socket.c:2544 [inline] recvmsg_copy_msghdr net/socket.c:2800 [inline] ___sys_recvmsg+0x12e/0x510 net/socket.c:2872 do_recvmmsg+0x307/0x770 net/socket.c:2971 __sys_recvmmsg net/socket.c:3045 [inline] __do_sys_recvmmsg net/socket.c:3068 [inline] __se_sys_recvmmsg net/socket.c:3061 [inline] __x64_sys_recvmmsg+0x190/0x240 net/socket.c:3061 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f832378ebe9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f83219f6038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: ffffffffffffffda RBX: 00007f83239b6090 RCX: 00007f832378ebe9 RDX: 0000000000010106 RSI: 00002000000000c0 RDI: 0000000000000003 RBP: 00007f8323811e19 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f83239b6128 R14: 00007f83239b6090 R15: 00007f8323adfa28 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:kasan_byte_accessible+0x12/0x30 mm/kasan/generic.c:199 Code: 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 48 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <0f> b6 04 07 3c 08 0f 92 c0 c3 cc cc cc cc cc 66 66 66 66 66 66 2e RSP: 0018:ffffc9001cccf4b8 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: ffffffff8b7bcb2e RCX: 6b7589a18f5ce500 RDX: 0000000000000000 RSI: ffffffff8b7bcb2e RDI: 0000000000000003 RBP: ffffffff820ff67e R08: 0000000000000001 R09: 0000000000000000 R10: ffffc9001cccf70c R11: fffff52003999eea R12: 0000000000000000 R13: 0000000000000018 R14: 0000000000000018 R15: 0000000000000001 FS: 00007f83219f66c0(0000) GS:ffff888125c1c000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000047bf0000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1) 7: 00 8: 90 nop 9: 90 nop a: 90 nop b: 90 nop c: 90 nop d: 90 nop e: 90 nop f: 90 nop 10: 90 nop 11: 90 nop 12: 90 nop 13: 90 nop 14: 90 nop 15: 90 nop 16: 90 nop 17: 90 nop 18: 66 0f 1f 00 nopw (%rax) 1c: 48 c1 ef 03 shr $0x3,%rdi 20: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 27: fc ff df * 2a: 0f b6 04 07 movzbl (%rdi,%rax,1),%eax <-- trapping instruction 2e: 3c 08 cmp $0x8,%al 30: 0f 92 c0 setb %al 33: c3 ret 34: cc int3 35: cc int3 36: cc int3 37: cc int3 38: cc int3 39: 66 data16 3a: 66 data16 3b: 66 data16 3c: 66 data16 3d: 66 data16 3e: 66 data16 3f: 2e cs