BUG: unable to handle page fault for address: ffffc900049a1000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 10c00067 P4D 10c00067 PUD 10dbe067 PMD 1914e067 PTE 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 3 PID: 1885 Comm: kworker/3:2 Not tainted 5.16.0-rc5-syzkaller #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 Workqueue: events drm_fb_helper_damage_work RIP: 0010:rep_movs arch/x86/lib/iomem.c:12 [inline] RIP: 0010:memcpy_toio+0x83/0xe0 arch/x86/lib/iomem.c:57 Code: 79 fd 49 89 dd 31 ff 41 83 e5 02 4c 89 ee e8 e4 d7 79 fd 4d 85 ed 75 2e e8 4a d5 79 fd 48 89 e9 48 89 df 4c 89 e6 48 c1 e9 02 a5 40 f6 c5 02 74 02 66 a5 40 f6 c5 01 74 01 a4 5b 5d 41 5c 41 RSP: 0018:ffffc9000cedfbc8 EFLAGS: 00010206 RAX: 0000000000000000 RBX: ffffc900066fe000 RCX: 0000000000000400 RDX: ffff8880180a3a00 RSI: ffffc900049a1000 RDI: ffffc90006700000 RBP: 0000000000003000 R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff83fdd60c R11: 0000000000000000 R12: ffffc9000499f000 R13: 0000000000000000 R14: ffffc9000499f000 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff88802cd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc900049a1000 CR3: 000000004d0f7000 CR4: 0000000000150ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: dma_buf_map_memcpy_to include/linux/dma-buf-map.h:245 [inline] drm_fb_helper_damage_blit_real drivers/gpu/drm/drm_fb_helper.c:388 [inline] drm_fb_helper_damage_blit drivers/gpu/drm/drm_fb_helper.c:419 [inline] drm_fb_helper_damage_work+0x733/0xac0 drivers/gpu/drm/drm_fb_helper.c:450 process_one_work+0x9b2/0x1690 kernel/workqueue.c:2298 worker_thread+0x658/0x11f0 kernel/workqueue.c:2445 kthread+0x405/0x4f0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Modules linked in: CR2: ffffc900049a1000 ---[ end trace f71e2eae386bd37e ]--- RIP: 0010:rep_movs arch/x86/lib/iomem.c:12 [inline] RIP: 0010:memcpy_toio+0x83/0xe0 arch/x86/lib/iomem.c:57 Code: 79 fd 49 89 dd 31 ff 41 83 e5 02 4c 89 ee e8 e4 d7 79 fd 4d 85 ed 75 2e e8 4a d5 79 fd 48 89 e9 48 89 df 4c 89 e6 48 c1 e9 02 a5 40 f6 c5 02 74 02 66 a5 40 f6 c5 01 74 01 a4 5b 5d 41 5c 41 RSP: 0018:ffffc9000cedfbc8 EFLAGS: 00010206 RAX: 0000000000000000 RBX: ffffc900066fe000 RCX: 0000000000000400 RDX: ffff8880180a3a00 RSI: ffffc900049a1000 RDI: ffffc90006700000 RBP: 0000000000003000 R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff83fdd60c R11: 0000000000000000 R12: ffffc9000499f000 R13: 0000000000000000 R14: ffffc9000499f000 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff88802cd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc900049a1000 CR3: 000000004d0f7000 CR4: 0000000000150ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 79 fd jns 0xffffffff 2: 49 89 dd mov %rbx,%r13 5: 31 ff xor %edi,%edi 7: 41 83 e5 02 and $0x2,%r13d b: 4c 89 ee mov %r13,%rsi e: e8 e4 d7 79 fd callq 0xfd79d7f7 13: 4d 85 ed test %r13,%r13 16: 75 2e jne 0x46 18: e8 4a d5 79 fd callq 0xfd79d567 1d: 48 89 e9 mov %rbp,%rcx 20: 48 89 df mov %rbx,%rdi 23: 4c 89 e6 mov %r12,%rsi 26: 48 c1 e9 02 shr $0x2,%rcx * 2a: f3 a5 rep movsl %ds:(%rsi),%es:(%rdi) <-- trapping instruction 2c: 40 f6 c5 02 test $0x2,%bpl 30: 74 02 je 0x34 32: 66 a5 movsw %ds:(%rsi),%es:(%rdi) 34: 40 f6 c5 01 test $0x1,%bpl 38: 74 01 je 0x3b 3a: a4 movsb %ds:(%rsi),%es:(%rdi) 3b: 5b pop %rbx 3c: 5d pop %rbp 3d: 41 5c pop %r12 3f: 41 rex.B