------------[ cut here ]------------
Voluntary context switch within RCU read-side critical section!
BUG: kernel NULL pointer dereference, address: 0000000000000001
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 800000002a18d067 P4D 800000002a18d067 PUD 1fcdc067 PMD 0
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 0 UID: 0 PID: 5444 Comm: syz.0.40 Not tainted 6.11.0-rc5-next-20240827-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:memcpy_orig+0x1e/0x140 arch/x86/lib/memcpy_64.S:65
Code: 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 48 89 f8 48 83 fa 20 0f 82 86 00 00 00 40 38 fe 7c 35 48 83 ea 20 48 83 ea 20 <4c> 8b 06 4c 8b 4e 08 4c 8b 56 10 4c 8b 5e 18 48 8d 76 20 4c 89 07
RSP: 0018:ffffc900047bdef8 EFLAGS: 00010046
RAX: ffffffff8e881f88 RBX: ffffffff8e881f88 RCX: ffffffff8173ba76
RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffff8e881f88
RBP: ffffc900047be150 R08: ffffffff8e881fc7 R09: 1ffffffff1d103f8
R10: dffffc0000000000 R11: fffffbfff1d103f9 R12: dffffc0000000000
R13: 0000000000000000 R14: 0000000000000001 R15: 0000000041b58ab3
FS: 0000555574f50500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000001 CR3: 000000001b71e000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
vprintk_store+0xaa6/0x1160 kernel/printk/printk.c:2316
vprintk_emit+0x39b/0xa10 kernel/printk/printk.c:2378
_printk+0xd5/0x120 kernel/printk/printk.c:2424
page_fault_oops+0x540/0xcc0 arch/x86/mm/fault.c:705
handle_page_fault arch/x86/mm/fault.c:1481 [inline]
exc_page_fault+0x5ed/0x8c0 arch/x86/mm/fault.c:1539
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623
RIP: 0010:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0018:ffffc900047be620 EFLAGS: 00010046
RAX: ffffc900047be8b0 RBX: 0000000000000045 RCX: ffffffff8bb93308
RDX: 0000000000000008 RSI: ffffffff8e0a80a5 RDI: ffffc900047be8b0
RBP: ffffc900047be710 R08: 3d3d3d3d3d3d3301 R09: 3d3d3d3d3d3d3301
R10: dffffc0000000000 R11: fffff520008f7d17 R12: ffffffff8e0a80ea
R13: dffffc0000000000 R14: ffffc900047be8b0 R15: ffffffff8e0a80a5
</TASK>
Modules linked in:
CR2: 0000000000000001
---[ end trace 0000000000000000 ]---
RIP: 0010:memcpy_orig+0x1e/0x140 arch/x86/lib/memcpy_64.S:65
Code: 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 48 89 f8 48 83 fa 20 0f 82 86 00 00 00 40 38 fe 7c 35 48 83 ea 20 48 83 ea 20 <4c> 8b 06 4c 8b 4e 08 4c 8b 56 10 4c 8b 5e 18 48 8d 76 20 4c 89 07
RSP: 0018:ffffc900047bdef8 EFLAGS: 00010046
RAX: ffffffff8e881f88 RBX: ffffffff8e881f88 RCX: ffffffff8173ba76
RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffff8e881f88
RBP: ffffc900047be150 R08: ffffffff8e881fc7 R09: 1ffffffff1d103f8
R10: dffffc0000000000 R11: fffffbfff1d103f9 R12: dffffc0000000000
R13: 0000000000000000 R14: 0000000000000001 R15: 0000000041b58ab3
FS: 0000555574f50500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 000000001b71e000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 90 nop
1: 90 nop
2: 90 nop
3: 90 nop
4: 90 nop
5: 90 nop
6: 90 nop
7: 90 nop
8: 90 nop
9: 90 nop
a: 90 nop
b: 90 nop
c: 66 0f 1f 00 nopw (%rax)
10: 48 89 f8 mov %rdi,%rax
13: 48 83 fa 20 cmp $0x20,%rdx
17: 0f 82 86 00 00 00 jb 0xa3
1d: 40 38 fe cmp %dil,%sil
20: 7c 35 jl 0x57
22: 48 83 ea 20 sub $0x20,%rdx
26: 48 83 ea 20 sub $0x20,%rdx
* 2a: 4c 8b 06 mov (%rsi),%r8 <-- trapping instruction
2d: 4c 8b 4e 08 mov 0x8(%rsi),%r9
31: 4c 8b 56 10 mov 0x10(%rsi),%r10
35: 4c 8b 5e 18 mov 0x18(%rsi),%r11
39: 48 8d 76 20 lea 0x20(%rsi),%rsi
3d: 4c 89 07 mov %r8,(%rdi)