loop6: detected capacity change from 0 to 32768 ------------[ cut here ]------------ Oops: general protection fault, probably for non-canonical address 0xdffffc01116bae68: 0000 [#1] SMP KASAN PTI KASAN: probably user-memory-access in range [0x000000088b5d7340-0x000000088b5d7347] CPU: 1 UID: 0 PID: 392 Comm: syz.6.3446 Not tainted syzkaller #0 PREEMPT_{RT,(full)} Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:string_nocheck lib/vsprintf.c:655 [inline] RIP: 0010:string+0x1bb/0x2b0 lib/vsprintf.c:737 Code: 69 0c f7 eb b3 41 c1 fd 10 4c 89 6c 24 10 49 8d 5d ff 45 31 ed 4b 8d 3c 2c 48 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 60 4b 8d 2c 2e 47 0f b6 3c 2c 31 ff 44 89 fe RSP: 0018:ffffc90005abf1a0 EFLAGS: 00010002 RAX: 00000001116bae68 RBX: 00000000fffffffe RCX: dffffc0000000000 RDX: 0000000000000002 RSI: 00000000ffff0a00 RDI: 000000088b5d7340 RBP: ffffffff8d6bafdb R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000100 R11: 0000000000000007 R12: 000000088b5d7340 R13: 0000000000000000 R14: ffffc90005abf3b3 R15: 0000000000000010 FS: 00007f763585e6c0(0000) GS:ffff888126442000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb06d6bc000 CR3: 000000008ffea000 CR4: 00000000003526f0 Call Trace: vsnprintf+0x739/0xee0 lib/vsprintf.c:2948 vprintk_store+0x3dc/0xd80 kernel/printk/printk.c:2307 vprintk_emit+0x192/0x560 kernel/printk/printk.c:2455 __warn_printf lib/bug.c:190 [inline] __report_bug+0x38d/0x540 lib/bug.c:244 report_bug_entry+0x19a/0x290 lib/bug.c:269 handle_bug+0xca/0x200 arch/x86/kernel/traps.c:430 exc_invalid_op+0x1a/0x50 arch/x86/kernel/traps.c:489 asm_exc_invalid_op+0x1a/0x20 arch/x86/include/asm/idtentry.h:616 RIP: 0010:look_up_lock_class+0x9a/0x110 kernel/locking/lockdep.c:939 Code: 00 00 49 3b 46 18 0f 84 82 00 00 00 49 81 3e f0 a3 11 93 74 79 48 8d 3d 04 70 4b 04 49 8b 16 49 8b 76 18 48 8b 8b b8 00 00 00 <67> 48 0f b9 3a eb 5d 90 89 f3 e8 87 f9 77 f9 e8 92 0e 82 f6 48 c7 RSP: 0018:ffffc90005abf798 EFLAGS: 00010006 RAX: ffffffff8b5d7340 RBX: ffffffff92f8a470 RCX: ffffffff8b5d7340 RDX: ffffffff9960c2e0 RSI: 000000088b5d7340 RDI: ffffffff8f6d56c0 RBP: 0000000000000000 R08: 0000000000000001 R09: ffff888040b61c60 R10: ffffc90005abfaa0 R11: fffff52000b57f56 R12: 0000000000000001 R13: 0000000000000001 R14: ffff888040b61c60 R15: ffffffff9960c2e0 register_lock_class+0x31/0x2e0 kernel/locking/lockdep.c:1294 __lock_acquire+0xad/0x2cf0 kernel/locking/lockdep.c:5112 lock_acquire+0xf0/0x2e0 kernel/locking/lockdep.c:5868 down_read+0x97/0x200 kernel/locking/rwsem.c:1537 i_mmap_lock_read include/linux/fs.h:532 [inline] unmap_mapping_pages mm/memory.c:4329 [inline] unmap_mapping_range+0xb7/0x180 mm/memory.c:4368 truncate_pagecache mm/truncate.c:793 [inline] truncate_setsize+0xbd/0xf0 mm/truncate.c:819 jfs_setattr+0x4f0/0x760 fs/jfs/file.c:122 notify_change+0xc18/0xf60 fs/attr.c:556 do_truncate+0x1c2/0x250 fs/open.c:68 vfs_truncate+0x4b7/0x540 fs/open.c:118 do_sys_truncate+0xf3/0x1c0 fs/open.c:142 __do_sys_truncate fs/open.c:154 [inline] __se_sys_truncate fs/open.c:152 [inline] __x64_sys_truncate+0x5b/0x70 fs/open.c:152 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f763760c799 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f763585e028 EFLAGS: 00000246 ORIG_RAX: 000000000000004c RAX: ffffffffffffffda RBX: 00007f7637885fa0 RCX: 00007f763760c799 RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000200000000dc0 RBP: 00007f76376a2bd9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f7637886038 R14: 00007f7637885fa0 R15: 00007ffc4247c608 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:string_nocheck lib/vsprintf.c:655 [inline] RIP: 0010:string+0x1bb/0x2b0 lib/vsprintf.c:737 Code: 69 0c f7 eb b3 41 c1 fd 10 4c 89 6c 24 10 49 8d 5d ff 45 31 ed 4b 8d 3c 2c 48 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 60 4b 8d 2c 2e 47 0f b6 3c 2c 31 ff 44 89 fe RSP: 0018:ffffc90005abf1a0 EFLAGS: 00010002 RAX: 00000001116bae68 RBX: 00000000fffffffe RCX: dffffc0000000000 RDX: 0000000000000002 RSI: 00000000ffff0a00 RDI: 000000088b5d7340 RBP: ffffffff8d6bafdb R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000100 R11: 0000000000000007 R12: 000000088b5d7340 R13: 0000000000000000 R14: ffffc90005abf3b3 R15: 0000000000000010 FS: 00007f763585e6c0(0000) GS:ffff888126442000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb06d6bc000 CR3: 000000008ffea000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: 69 0c f7 eb b3 41 c1 imul $0xc141b3eb,(%rdi,%rsi,8),%ecx 7: fd std 8: 10 4c 89 6c adc %cl,0x6c(%rcx,%rcx,4) c: 24 10 and $0x10,%al e: 49 8d 5d ff lea -0x1(%r13),%rbx 12: 45 31 ed xor %r13d,%r13d 15: 4b 8d 3c 2c lea (%r12,%r13,1),%rdi 19: 48 89 f8 mov %rdi,%rax 1c: 48 c1 e8 03 shr $0x3,%rax 20: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx 27: fc ff df * 2a: 0f b6 04 08 movzbl (%rax,%rcx,1),%eax <-- trapping instruction 2e: 84 c0 test %al,%al 30: 75 60 jne 0x92 32: 4b 8d 2c 2e lea (%r14,%r13,1),%rbp 36: 47 0f b6 3c 2c movzbl (%r12,%r13,1),%r15d 3b: 31 ff xor %edi,%edi 3d: 44 89 fe mov %r15d,%esi