general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 0 PID: 7325 Comm: syz-executor.4 Not tainted 5.8.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__switch_to_asm+0x0/0x40 arch/x86/entry/entry_64.S:228 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90008327bb0 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: ffff8880ae635e18 RCX: 0000000000000000 RDX: 1ffff11015cc6bc2 RSI: ffff888056316380 RDI: ffff888059f5e240 RBP: ffffc90008327c80 R08: 0000000000000001 R09: ffff888059f5eb08 R10: fffffbfff155cb29 R11: 0000000000000000 R12: ffff8880ae635e00 R13: ffff888059f5e240 R14: ffff888056316380 R15: ffff888059f5e670 FS: 00000000016ff940(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000073d138 CR3: 0000000039871000 CR4: 00000000001426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: context_switch kernel/sched/core.c:3453 [inline] __schedule+0x8e1/0x1eb0 kernel/sched/core.c:4178 schedule+0xd0/0x2a0 kernel/sched/core.c:4253 freezable_schedule include/linux/freezer.h:172 [inline] do_nanosleep+0x222/0x650 kernel/time/hrtimer.c:1879 hrtimer_nanosleep+0x1f6/0x430 kernel/time/hrtimer.c:1932 __do_sys_nanosleep kernel/time/hrtimer.c:1966 [inline] __se_sys_nanosleep kernel/time/hrtimer.c:1953 [inline] __x64_sys_nanosleep+0x1dc/0x260 kernel/time/hrtimer.c:1953 do_syscall_64+0x60/0xe0 arch/x86/entry/common.c:359 entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: unable to handle page fault for address: 0000000040000000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 3a43d067 P4D 3a43d067 PUD 0 Oops: 0002 [#2] PREEMPT SMP KASAN CPU: 0 PID: 7325 Comm: syz-executor.4 Not tainted 5.8.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:in_gate_area_no_mm+0x0/0x6a arch/x86/entry/vsyscall/vsyscall_64.c:343 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90008327238 EFLAGS: 00010012 RAX: 0000000040000000 RBX: ffffc900083272d8 RCX: ffffffff816a5e70 RDX: ffff888059f5e240 RSI: ffffffff816a5e9b RDI: 000000000045b030 RBP: 000000000045b030 R08: ffffc900083273e8 R09: ffffffff8c8cc109 R10: 000000000045b030 R11: 0000000000000000 R12: ffffc900083273e8 R13: 0000000000000001 R14: 000000000045b030 R15: ffffc900083272f8 FS: 00000000016ff940(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000040000000 CR3: 0000000039871000 CR4: 00000000001426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: is_kernel include/linux/kallsyms.h:43 [inline] is_ksym_addr include/linux/kallsyms.h:49 [inline] kallsyms_lookup+0xc3/0x2e0 kernel/kallsyms.c:290 __sprint_symbol+0x9c/0x1c0 kernel/kallsyms.c:363 symbol_string+0x14c/0x370 lib/vsprintf.c:969 pointer+0x185/0x970 lib/vsprintf.c:2226 vsnprintf+0x5b2/0x14f0 lib/vsprintf.c:2624 vscnprintf+0x29/0x80 lib/vsprintf.c:2723 vprintk_store+0x44/0x4a0 kernel/printk/printk.c:1942 vprintk_emit+0x139/0x770 kernel/printk/printk.c:2003 vprintk_func+0x8f/0x1a6 kernel/printk/printk_safe.c:393 printk+0xba/0xed kernel/printk/printk.c:2070 show_ip+0x22/0x30 arch/x86/kernel/dumpstack.c:124 show_iret_regs+0x10/0x32 arch/x86/kernel/dumpstack.c:131 __show_regs+0x18/0x50 arch/x86/kernel/process_64.c:72 show_trace_log_lvl+0x255/0x2b4 arch/x86/kernel/dumpstack.c:274 show_regs arch/x86/kernel/dumpstack.c:408 [inline] __die_body arch/x86/kernel/dumpstack.c:393 [inline] die_addr.cold+0x8/0xd arch/x86/kernel/dumpstack.c:433 __exc_general_protection arch/x86/kernel/traps.c:593 [inline] exc_general_protection+0x193/0x2d0 arch/x86/kernel/traps.c:523 asm_exc_general_protection+0x1e/0x30 arch/x86/include/asm/idtentry.h:559 RIP: 0010:__switch_to_asm+0x0/0x40 arch/x86/entry/entry_64.S:228 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90008327bb0 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: ffff8880ae635e18 RCX: 0000000000000000 RDX: 1ffff11015cc6bc2 RSI: ffff888056316380 RDI: ffff888059f5e240 RBP: ffffc90008327c80 R08: 0000000000000001 R09: ffff888059f5eb08 R10: fffffbfff155cb29 R11: 0000000000000000 R12: ffff8880ae635e00 R13: ffff888059f5e240 R14: ffff888056316380 R15: ffff888059f5e670 context_switch kernel/sched/core.c:3453 [inline] __schedule+0x8e1/0x1eb0 kernel/sched/core.c:4178 schedule+0xd0/0x2a0 kernel/sched/core.c:4253 freezable_schedule include/linux/freezer.h:172 [inline] do_nanosleep+0x222/0x650 kernel/time/hrtimer.c:1879 hrtimer_nanosleep+0x1f6/0x430 kernel/time/hrtimer.c:1932 __do_sys_nanosleep kernel/time/hrtimer.c:1966 [inline] __se_sys_nanosleep kernel/time/hrtimer.c:1953 [inline] __x64_sys_nanosleep+0x1dc/0x260 kernel/time/hrtimer.c:1953 do_syscall_64+0x60/0xe0 arch/x86/entry/common.c:359 entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: unable to handle page fault for address: 0000000040000000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 3a43d067 P4D 3a43d067 PUD 0 Oops: 0002 [#3] PREEMPT SMP KASAN CPU: 0 PID: 7325 Comm: syz-executor.4 Not tainted 5.8.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:in_gate_area_no_mm+0x0/0x6a arch/x86/entry/vsyscall/vsyscall_64.c:343 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90008326720 EFLAGS: 00010012 RAX: 0000000040000000 RBX: ffffc900083267c0 RCX: ffffffff816a5e70 RDX: ffff888059f5e240 RSI: ffffffff816a5e9b RDI: 000000000045b030 RBP: 000000000045b030 R08: ffffc900083268d0 R09: ffff8880ae623f03 R10: 000000000045b030 R11: 0000000000000001 R12: ffffc900083268d0 R13: 0000000000000001 R14: 000000000045b030 R15: ffffc900083267e0 FS: 00000000016ff940(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000040000000 CR3: 0000000039871000 CR4: 00000000001426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: is_kernel include/linux/kallsyms.h:43 [inline] is_ksym_addr include/linux/kallsyms.h:49 [inline] kallsyms_lookup+0xc3/0x2e0 kernel/kallsyms.c:290 __sprint_symbol+0x9c/0x1c0 kernel/kallsyms.c:363 symbol_string+0x14c/0x370 lib/vsprintf.c:969 pointer+0x185/0x970 lib/vsprintf.c:2226 vsnprintf+0x5b2/0x14f0 lib/vsprintf.c:2624 vscnprintf+0x29/0x80 lib/vsprintf.c:2723 printk_safe_log_store+0xf5/0x250 kernel/printk/printk_safe.c:94 vprintk_safe kernel/printk/printk_safe.c:347 [inline] vprintk_func+0xef/0x1a6 kernel/printk/printk_safe.c:390 printk+0xba/0xed kernel/printk/printk.c:2070 show_ip+0x22/0x30 arch/x86/kernel/dumpstack.c:124 show_iret_regs+0x10/0x32 arch/x86/kernel/dumpstack.c:131 __show_regs+0x18/0x50 arch/x86/kernel/process_64.c:72 show_trace_log_lvl+0x255/0x2b4 arch/x86/kernel/dumpstack.c:274 show_regs arch/x86/kernel/dumpstack.c:447 [inline] __die_body arch/x86/kernel/dumpstack.c:393 [inline] __die+0x51/0x90 arch/x86/kernel/dumpstack.c:407 no_context+0x56b/0x9f0 arch/x86/mm/fault.c:695 __bad_area_nosemaphore+0xa9/0x480 arch/x86/mm/fault.c:789 do_user_addr_fault+0x783/0xd00 arch/x86/mm/fault.c:1171 handle_page_fault arch/x86/mm/fault.c:1365 [inline] exc_page_fault+0xab/0x170 arch/x86/mm/fault.c:1418 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:565 RIP: 0010:in_gate_area_no_mm+0x0/0x6a arch/x86/entry/vsyscall/vsyscall_64.c:343 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90008327238 EFLAGS: 00010012 RAX: 0000000040000000 RBX: ffffc900083272d8 RCX: ffffffff816a5e70 RDX: ffff888059f5e240 RSI: ffffffff816a5e9b RDI: 000000000045b030 RBP: 000000000045b030 R08: ffffc900083273e8 R09: ffffffff8c8cc109 R10: 000000000045b030 R11: 0000000000000000 R12: ffffc900083273e8 R13: 0000000000000001 R14: 000000000045b030 R15: ffffc900083272f8 is_kernel include/linux/kallsyms.h:43 [inline] is_ksym_addr include/linux/kallsyms.h:49 [inline] kallsyms_lookup+0xc3/0x2e0 kernel/kallsyms.c:290 __sprint_symbol+0x9c/0x1c0 kernel/kallsyms.c:363 symbol_string+0x14c/0x370 lib/vsprintf.c:969 pointer+0x185/0x970 lib/vsprintf.c:2226 vsnprintf+0x5b2/0x14f0 lib/vsprintf.c:2624 vscnprintf+0x29/0x80 lib/vsprintf.c:2723 vprintk_store+0x44/0x4a0 kernel/printk/printk.c:1942 vprintk_emit+0x139/0x770 kernel/printk/printk.c:2003 vprintk_func+0x8f/0x1a6 kernel/printk/printk_safe.c:393 printk+0xba/0xed kernel/printk/printk.c:2070 show_ip+0x22/0x30 arch/x86/kernel/dumpstack.c:124 show_iret_regs+0x10/0x32 arch/x86/kernel/dumpstack.c:131 __show_regs+0x18/0x50 arch/x86/kernel/process_64.c:72 show_trace_log_lvl+ Lost 64 message(s)!