usbcore: registered new interface driver dln2 usbcore: registered new interface driver pn533_usb nfcsim 0.2 initialized usbcore: registered new interface driver port100 usbcore: registered new interface driver nfcmrvl Loading iSCSI transport class v2.0-870. scsi host0: Virtio SCSI HBA st: Version 20160209, fixed bufsize 32768, s/g segs 256 Rounding down aligned max_sectors from 4294967295 to 4294967288 db_root: cannot open: /etc/target slram: not enough parameters. ftl_cs: FTL header not found. wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. eql: Equalizer2002: Simon Janes (simon@ncm.com) and David S. Miller (davem@redhat.com) MACsec IEEE 802.1AE tun: Universal TUN/TAP device driver, 1.6 vcan: Virtual CAN interface driver vxcan: Virtual CAN Tunnel driver slcan: serial line CAN interface driver CAN device driver interface usbcore: registered new interface driver usb_8dev usbcore: registered new interface driver ems_usb usbcore: registered new interface driver gs_usb usbcore: registered new interface driver kvaser_usb usbcore: registered new interface driver mcba_usb usbcore: registered new interface driver peak_usb e100: Intel(R) PRO/100 Network Driver e100: Copyright(c) 1999-2006 Intel Corporation e1000: Intel(R) PRO/1000 Network Driver e1000: Copyright (c) 1999-2006 Intel Corporation. e1000e: Intel(R) PRO/1000 Network Driver e1000e: Copyright(c) 1999 - 2015 Intel Corporation. mkiss: AX.25 Multikiss, Hans Albas PE1AYX AX.25: 6pack driver, Revision: 0.3.0 AX.25: bpqether driver version 004 PPP generic driver version 2.4.2 PPP BSD Compression module registered PPP Deflate Compression module registered PPP MPPE Compression module registered NET: Registered PF_PPPOX protocol family PPTP driver version 0.8.5 SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256) (6 bit encapsulation enabled). CSLIP: code copyright 1989 Regents of the University of California. SLIP linefill/keepalive option. hdlc: HDLC support module revision 1.22 LAPB Ethernet driver version 0.02 usbcore: registered new interface driver ath9k_htc usbcore: registered new interface driver carl9170 usbcore: registered new interface driver ath6kl_usb general protection fault, probably for non-canonical address 0xffff000000000800: 0000 [#1] PREEMPT SMP KASAN KASAN: maybe wild-memory-access in range [0xfff8200000004000-0xfff8200000004007] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.0.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 RIP: 0010:slab_alloc mm/slub.c:3251 [inline] RIP: 0010:kmem_cache_alloc_trace+0x172/0x310 mm/slub.c:3282 Code: 84 d9 00 00 00 48 83 78 10 00 0f 84 ce 00 00 00 49 8b 2e 40 f6 c5 0f 0f 85 9f 01 00 00 40 84 ff 0f 84 98 01 00 00 41 8b 46 28 <49> 8b 5c 05 00 48 8d 4a 08 4c 89 e8 65 48 0f c7 4d 00 0f 94 c0 a8 RSP: 0000:ffffc90000067b68 EFLAGS: 00010202 RAX: 0000000000000800 RBX: 0000000000000dc0 RCX: 0000000000000000 RDX: 00000000000024a8 RSI: 0000000000000dc0 RDI: ffff888012042101 RBP: 000000000003d960 R08: dffffc0000000000 R09: fffffbfff1c4ade6 R10: fffffbfff1c4ade6 R11: 1ffffffff1c4ade5 R12: 0000000000000a20 R13: ffff000000000000 R14: ffff888012042140 R15: 0000000000000dc0 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88823ffff000 CR3: 000000000ca8e000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: kmalloc include/linux/slab.h:600 [inline] kzalloc include/linux/slab.h:733 [inline] kobject_uevent_env+0x33a/0x8e0 lib/kobject_uevent.c:524 driver_register+0x399/0x3e0 drivers/base/driver.c:248 usb_register_driver+0x205/0x3d0 drivers/usb/core/driver.c:1062 do_one_initcall+0xbd/0x2b0 init/main.c:1296 do_initcall_level+0x168/0x218 init/main.c:1369 do_initcalls+0x4b/0x8c init/main.c:1385 kernel_init_freeable+0x43a/0x5c3 init/main.c:1611 kernel_init+0x19/0x2b0 init/main.c:1500 ret_from_fork+0x1f/0x30 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:slab_alloc mm/slub.c:3251 [inline] RIP: 0010:kmem_cache_alloc_trace+0x172/0x310 mm/slub.c:3282 Code: 84 d9 00 00 00 48 83 78 10 00 0f 84 ce 00 00 00 49 8b 2e 40 f6 c5 0f 0f 85 9f 01 00 00 40 84 ff 0f 84 98 01 00 00 41 8b 46 28 <49> 8b 5c 05 00 48 8d 4a 08 4c 89 e8 65 48 0f c7 4d 00 0f 94 c0 a8 RSP: 0000:ffffc90000067b68 EFLAGS: 00010202 RAX: 0000000000000800 RBX: 0000000000000dc0 RCX: 0000000000000000 RDX: 00000000000024a8 RSI: 0000000000000dc0 RDI: ffff888012042101 RBP: 000000000003d960 R08: dffffc0000000000 R09: fffffbfff1c4ade6 R10: fffffbfff1c4ade6 R11: 1ffffffff1c4ade5 R12: 0000000000000a20 R13: ffff000000000000 R14: ffff888012042140 R15: 0000000000000dc0 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88823ffff000 CR3: 000000000ca8e000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 84 d9 test %bl,%cl 2: 00 00 add %al,(%rax) 4: 00 48 83 add %cl,-0x7d(%rax) 7: 78 10 js 0x19 9: 00 0f add %cl,(%rdi) b: 84 ce test %cl,%dh d: 00 00 add %al,(%rax) f: 00 49 8b add %cl,-0x75(%rcx) 12: 2e 40 f6 c5 0f cs test $0xf,%bpl 17: 0f 85 9f 01 00 00 jne 0x1bc 1d: 40 84 ff test %dil,%dil 20: 0f 84 98 01 00 00 je 0x1be 26: 41 8b 46 28 mov 0x28(%r14),%eax * 2a: 49 8b 5c 05 00 mov 0x0(%r13,%rax,1),%rbx <-- trapping instruction 2f: 48 8d 4a 08 lea 0x8(%rdx),%rcx 33: 4c 89 e8 mov %r13,%rax 36: 65 48 0f c7 4d 00 cmpxchg16b %gs:0x0(%rbp) 3c: 0f 94 c0 sete %al 3f: a8 .byte 0xa8