Oops: general protection fault, probably for non-canonical address 0xe3fffbfffe4c4a86: 0000 [#2] PREEMPT SMP KASAN PTI
KASAN: maybe wild-memory-access in range [0x1ffffffff2625430-0x1ffffffff2625437]
CPU: 1 UID: 0 PID: 8504 Comm: syz.0.510 Not tainted 6.11.0-rc4-next-20240820-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:string_nocheck lib/vsprintf.c:646 [inline]
RIP: 0010:string+0x1a5/0x2b0 lib/vsprintf.c:728
Code: 85 c0 0f 84 db 00 00 00 4c 89 7c 24 08 49 89 c7 49 ff cf 31 db 49 8d 3c 1c 48 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 5d 4c 8d 6c 1d 00 41 0f b6 2c 1c 31 ff 89 ee
RSP: 0000:ffffc900036a6a50 EFLAGS: 00010003
RAX: 03fffffffe4c4a86 RBX: 0000000000000000 RCX: dffffc0000000000
RDX: ffff888029e69e00 RSI: ffffffffffffffff RDI: 1ffffffff2625434
RBP: ffffc900036a6d53 R08: ffffffff8bb4b507 R09: ffffffff8bb47ba4
R10: 0000000000000012 R11: ffff888029e69e00 R12: 1ffffffff2625434
R13: 0000000000000000 R14: ffffc900036a6d53 R15: fffffffffffffffe
FS: 0000555580f3e500(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000110c3b0d62 CR3: 00000000208bc000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
vsnprintf+0x1101/0x1da0 lib/vsprintf.c:2824
vprintk_store+0x480/0x1160 kernel/printk/printk.c:2228
vprintk_emit+0x1e0/0x7c0 kernel/printk/printk.c:2329
_printk+0xd5/0x120 kernel/printk/printk.c:2373
pv_wait arch/x86/include/asm/paravirt.h:596 [inline]
pv_wait_head_or_lock kernel/locking/qspinlock_paravirt.h:466 [inline]
__pv_queued_spin_lock_slowpath+0x8d0/0xdb0 kernel/locking/qspinlock.c:508
pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:584 [inline]
queued_spin_lock_slowpath+0x18/0x30 arch/x86/include/asm/qspinlock.h:51
queued_spin_lock include/asm-generic/qspinlock.h:114 [inline]
oops_begin+0xaf/0xc0 arch/x86/kernel/dumpstack.c:347
page_fault_oops+0x21d/0xcc0 arch/x86/mm/fault.c:703
handle_page_fault arch/x86/mm/fault.c:1481 [inline]
exc_page_fault+0x5ed/0x8c0 arch/x86/mm/fault.c:1539
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623
RIP: 0010:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0018:ffffc900036a7430 EFLAGS: 00010046
RAX: 0000000000000000 RBX: 0000000000000001 RCX: ffff8880187e3c00
RDX: 0000000040000002 RSI: ffffffff8e7a4f80 RDI: 0000000000000009
RBP: 0000000000000001 R08: 0000000000000007 R09: ffffffff8140e8cd
R10: 0000000000000002 R11: ffff8880187e3c00 R12: 1ffffffff1d3ceb4
R13: 00000000fffffffd R14: dffffc0000000000 R15: ffffffff8e9e75a0
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:vsnprintf+0xf2/0x1da0 lib/vsprintf.c:2774
Code: 00 00 4b 8d 04 26 4c 39 f0 4c 89 f3 48 f7 d3 48 c7 c1 ff ff ff ff 48 0f 43 c8 48 89 4c 24 18 49 0f 43 dc 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 66 1c 00 00 45 0f b6 27 31 ff 44 89 e6
RSP: 0000:ffffc900036a7220 EFLAGS: 00010002 ORIG_RAX: ffffffff814217b0
RAX: 0000000000000010 RBX: 0000000000000008 RCX: ffffc900036a74b8
RDX: 0000000000010000 RSI: 0000000041b58ab3 RDI: ffffffff8e038f71
RBP: 0000000000000000 R08: 1ffff920006d4e82 R09: 0000000000000000
R10: ffffc900036a7388 R11: fffff520006d4e9d R12: ffffc900036a7410
R13: dffffc0000000000 R14: ffffc900036a74b0 R15: ffffffff814219cd
FS: 0000555580f3e500(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 00000000208bc000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 85 c0 test %eax,%eax
2: 0f 84 db 00 00 00 je 0xe3
8: 4c 89 7c 24 08 mov %r15,0x8(%rsp)
d: 49 89 c7 mov %rax,%r15
10: 49 ff cf dec %r15
13: 31 db xor %ebx,%ebx
15: 49 8d 3c 1c lea (%r12,%rbx,1),%rdi
19: 48 89 f8 mov %rdi,%rax
1c: 48 c1 e8 03 shr $0x3,%rax
20: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx
27: fc ff df
* 2a: 0f b6 04 08 movzbl (%rax,%rcx,1),%eax <-- trapping instruction
2e: 84 c0 test %al,%al
30: 75 5d jne 0x8f
32: 4c 8d 6c 1d 00 lea 0x0(%rbp,%rbx,1),%r13
37: 41 0f b6 2c 1c movzbl (%r12,%rbx,1),%ebp
3c: 31 ff xor %edi,%edi
3e: 89 ee mov %ebp,%esi