Oops: general protection fault, probably for non-canonical address 0xdffffc000000044c: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: probably user-memory-access in range [0x0000000000002260-0x0000000000002267] CPU: 0 UID: 0 PID: 6081 Comm: kworker/u8:11 Not tainted 6.13.0-rc6-syzkaller-00059-g643e2e259c2b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: events_unbound flush_to_ldisc RIP: 0010:n_tty_receive_buf_common+0x693/0x18e0 drivers/tty/n_tty.c:1718 Code: 24 31 ff 48 8b 98 38 04 00 00 48 c1 eb 14 83 e3 01 89 de e8 df 39 8e fc 84 db 0f 85 43 0c 00 00 e8 32 3f 8e fc 48 8b 44 24 70 <80> 38 00 0f 85 78 0f 00 00 48 8b 44 24 10 48 8b a8 60 22 00 00 48 RSP: 0018:ffffc90004ed7ad8 EFLAGS: 00010293 RAX: dffffc000000044c RBX: 0000000000000001 RCX: dffffc0000000000 RDX: ffff888031088000 RSI: ffffffff850b133e RDI: dffffc000000044c RBP: 00000000000001dd R08: 0000000000000001 R09: ffffed100c719e50 R10: ffff8880638cf287 R11: 0000000000000004 R12: ffffffff850b25a0 R13: 0000000000000000 R14: ffff8880638cf000 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f9d6ac69ff8 CR3: 000000006da20000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: tty_ldisc_receive_buf+0xa2/0x190 drivers/tty/tty_buffer.c:387 tty_port_default_receive_buf+0x70/0xb0 drivers/tty/tty_port.c:37 receive_buf drivers/tty/tty_buffer.c:445 [inline] flush_to_ldisc+0x264/0x780 drivers/tty/tty_buffer.c:495 process_one_work+0x958/0x1b30 kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x6c8/0xf00 kernel/workqueue.c:3391 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:n_tty_receive_buf_common+0x693/0x18e0 drivers/tty/n_tty.c:1718 Code: 24 31 ff 48 8b 98 38 04 00 00 48 c1 eb 14 83 e3 01 89 de e8 df 39 8e fc 84 db 0f 85 43 0c 00 00 e8 32 3f 8e fc 48 8b 44 24 70 <80> 38 00 0f 85 78 0f 00 00 48 8b 44 24 10 48 8b a8 60 22 00 00 48 RSP: 0018:ffffc90004ed7ad8 EFLAGS: 00010293 RAX: dffffc000000044c RBX: 0000000000000001 RCX: dffffc0000000000 RDX: ffff888031088000 RSI: ffffffff850b133e RDI: dffffc000000044c RBP: 00000000000001dd R08: 0000000000000001 R09: ffffed100c719e50 R10: ffff8880638cf287 R11: 0000000000000004 R12: ffffffff850b25a0 R13: 0000000000000000 R14: ffff8880638cf000 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055f851a8e680 CR3: 000000000db7e000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 24 31 and $0x31,%al 2: ff 48 8b decl -0x75(%rax) 5: 98 cwtl 6: 38 04 00 cmp %al,(%rax,%rax,1) 9: 00 48 c1 add %cl,-0x3f(%rax) c: eb 14 jmp 0x22 e: 83 e3 01 and $0x1,%ebx 11: 89 de mov %ebx,%esi 13: e8 df 39 8e fc call 0xfc8e39f7 18: 84 db test %bl,%bl 1a: 0f 85 43 0c 00 00 jne 0xc63 20: e8 32 3f 8e fc call 0xfc8e3f57 25: 48 8b 44 24 70 mov 0x70(%rsp),%rax * 2a: 80 38 00 cmpb $0x0,(%rax) <-- trapping instruction 2d: 0f 85 78 0f 00 00 jne 0xfab 33: 48 8b 44 24 10 mov 0x10(%rsp),%rax 38: 48 8b a8 60 22 00 00 mov 0x2260(%rax),%rbp 3f: 48 rex.W