Oops: general protection fault, probably for non-canonical address 0xe3fffbfffe4c4a86: 0000 [#2] PREEMPT SMP KASAN PTI KASAN: maybe wild-memory-access in range [0x1ffffffff2625430-0x1ffffffff2625437] CPU: 1 UID: 0 PID: 8504 Comm: syz.0.510 Not tainted 6.11.0-rc4-next-20240820-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:string_nocheck lib/vsprintf.c:646 [inline] RIP: 0010:string+0x1a5/0x2b0 lib/vsprintf.c:728 Code: 85 c0 0f 84 db 00 00 00 4c 89 7c 24 08 49 89 c7 49 ff cf 31 db 49 8d 3c 1c 48 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 5d 4c 8d 6c 1d 00 41 0f b6 2c 1c 31 ff 89 ee RSP: 0000:ffffc900036a6a50 EFLAGS: 00010003 RAX: 03fffffffe4c4a86 RBX: 0000000000000000 RCX: dffffc0000000000 RDX: ffff888029e69e00 RSI: ffffffffffffffff RDI: 1ffffffff2625434 RBP: ffffc900036a6d53 R08: ffffffff8bb4b507 R09: ffffffff8bb47ba4 R10: 0000000000000012 R11: ffff888029e69e00 R12: 1ffffffff2625434 R13: 0000000000000000 R14: ffffc900036a6d53 R15: fffffffffffffffe FS: 0000555580f3e500(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c3b0d62 CR3: 00000000208bc000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: vsnprintf+0x1101/0x1da0 lib/vsprintf.c:2824 vprintk_store+0x480/0x1160 kernel/printk/printk.c:2228 vprintk_emit+0x1e0/0x7c0 kernel/printk/printk.c:2329 _printk+0xd5/0x120 kernel/printk/printk.c:2373 pv_wait arch/x86/include/asm/paravirt.h:596 [inline] pv_wait_head_or_lock kernel/locking/qspinlock_paravirt.h:466 [inline] __pv_queued_spin_lock_slowpath+0x8d0/0xdb0 kernel/locking/qspinlock.c:508 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:584 [inline] queued_spin_lock_slowpath+0x18/0x30 arch/x86/include/asm/qspinlock.h:51 queued_spin_lock include/asm-generic/qspinlock.h:114 [inline] oops_begin+0xaf/0xc0 arch/x86/kernel/dumpstack.c:347 page_fault_oops+0x21d/0xcc0 arch/x86/mm/fault.c:703 handle_page_fault arch/x86/mm/fault.c:1481 [inline] exc_page_fault+0x5ed/0x8c0 arch/x86/mm/fault.c:1539 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0010:0x0 Code: Unable to access opcode bytes at 0xffffffffffffffd6. RSP: 0018:ffffc900036a7430 EFLAGS: 00010046 RAX: 0000000000000000 RBX: 0000000000000001 RCX: ffff8880187e3c00 RDX: 0000000040000002 RSI: ffffffff8e7a4f80 RDI: 0000000000000009 RBP: 0000000000000001 R08: 0000000000000007 R09: ffffffff8140e8cd R10: 0000000000000002 R11: ffff8880187e3c00 R12: 1ffffffff1d3ceb4 R13: 00000000fffffffd R14: dffffc0000000000 R15: ffffffff8e9e75a0 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:vsnprintf+0xf2/0x1da0 lib/vsprintf.c:2774 Code: 00 00 4b 8d 04 26 4c 39 f0 4c 89 f3 48 f7 d3 48 c7 c1 ff ff ff ff 48 0f 43 c8 48 89 4c 24 18 49 0f 43 dc 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 66 1c 00 00 45 0f b6 27 31 ff 44 89 e6 RSP: 0000:ffffc900036a7220 EFLAGS: 00010002 ORIG_RAX: ffffffff814217b0 RAX: 0000000000000010 RBX: 0000000000000008 RCX: ffffc900036a74b8 RDX: 0000000000010000 RSI: 0000000041b58ab3 RDI: ffffffff8e038f71 RBP: 0000000000000000 R08: 1ffff920006d4e82 R09: 0000000000000000 R10: ffffc900036a7388 R11: fffff520006d4e9d R12: ffffc900036a7410 R13: dffffc0000000000 R14: ffffc900036a74b0 R15: ffffffff814219cd FS: 0000555580f3e500(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 00000000208bc000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 85 c0 test %eax,%eax 2: 0f 84 db 00 00 00 je 0xe3 8: 4c 89 7c 24 08 mov %r15,0x8(%rsp) d: 49 89 c7 mov %rax,%r15 10: 49 ff cf dec %r15 13: 31 db xor %ebx,%ebx 15: 49 8d 3c 1c lea (%r12,%rbx,1),%rdi 19: 48 89 f8 mov %rdi,%rax 1c: 48 c1 e8 03 shr $0x3,%rax 20: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx 27: fc ff df * 2a: 0f b6 04 08 movzbl (%rax,%rcx,1),%eax <-- trapping instruction 2e: 84 c0 test %al,%al 30: 75 5d jne 0x8f 32: 4c 8d 6c 1d 00 lea 0x0(%rbp,%rbx,1),%r13 37: 41 0f b6 2c 1c movzbl (%r12,%rbx,1),%ebp 3c: 31 ff xor %edi,%edi 3e: 89 ee mov %ebp,%esi