Oops: general protection fault, probably for non-canonical address 0xe000[ 1316.220201][T12744] Oops: general protection fault, probably for non-canonical address 0xe000abc800000038: 0000 [#1] SMP KASAN PTI KASAN: maybe wild-memory-access in range [0x00057e40000001c0-0x00057e40000001c7] CPU: 1 UID: 0 PID: 12744 Comm: syz.2.1544 Not tainted syzkaller #0 PREEMPT_{RT,(full)} Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 RIP: 0010:kernfs_root+0xcb/0x230 fs/kernfs/kernfs-internal.h:76 Code: a0 cb 1b 8b be 4b 03 00 00 48 c7 c2 e0 cb 1b 8b e8 ba 3f 49 ff 49 bc 00 00 00 00 00 fc ff df 4d 8d 7e 30 4c 89 f8 48 c1 e8 03 <42> 80 3c 20 00 74 08 4c 89 ff e8 76 c6 ca ff 4d 8b 3f e8 ee 4c a4 RSP: 0018:ffffc9000125fa28 EFLAGS: 00010202 RAX: 0000afc800000038 RBX: ffffffff8252eaec RCX: 0000000000080000 RDX: ffffc9000e563000 RSI: 00000000000005c5 RDI: 00000000000005c6 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: fffffbfff1e3ac47 R12: dffffc0000000000 R13: dffffc0000000000 R14: 00057e4000000190 R15: 00057e40000001c0 FS: 00007f958b5266c0(0000) GS:ffff8881269bc000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000008000 CR3: 000000005837e000 CR4: 00000000003526f0 Call Trace: kernfs_remove_by_name_ns+0x2b/0x130 fs/kernfs/dir.c:1711 remove_bind_files drivers/base/bus.c:605 [inline] bus_remove_driver+0x19b/0x300 drivers/base/bus.c:743 comedi_device_detach_locked+0x175/0x750 drivers/comedi/drivers.c:207 do_devconfig_ioctl drivers/comedi/comedi_fops.c:848 [inline] comedi_unlocked_ioctl+0xce4/0x1020 drivers/comedi/comedi_fops.c:2178 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:598 [inline] __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:584 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f958d2beec9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f958b526038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f958d515fa0 RCX: 00007f958d2beec9 RDX: 0000000000000000 RSI: 0000000040946400 RDI: 0000000000000006 RBP: 00007f958d341f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f958d516038 R14: 00007f958d515fa0 R15: 00007ffd2b96be48 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:kernfs_root+0xcb/0x230 fs/kernfs/kernfs-internal.h:76 Code: a0 cb 1b 8b be 4b 03 00 00 48 c7 c2 e0 cb 1b 8b e8 ba 3f 49 ff 49 bc 00 00 00 00 00 fc ff df 4d 8d 7e 30 4c 89 f8 48 c1 e8 03 <42> 80 3c 20 00 74 08 4c 89 ff e8 76 c6 ca ff 4d 8b 3f e8 ee 4c a4 RSP: 0018:ffffc9000125fa28 EFLAGS: 00010202 RAX: 0000afc800000038 RBX: ffffffff8252eaec RCX: 0000000000080000 RDX: ffffc9000e563000 RSI: 00000000000005c5 RDI: 00000000000005c6 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: fffffbfff1e3ac47 R12: dffffc0000000000 R13: dffffc0000000000 R14: 00057e4000000190 R15: 00057e40000001c0 FS: 00007f958b5266c0(0000) GS:ffff8881268bc000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b31c16ff8 CR3: 000000005837e000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: a0 cb 1b 8b be 4b 03 movabs 0x34bbe8b1bcb,%al 7: 00 00 9: 48 c7 c2 e0 cb 1b 8b mov $0xffffffff8b1bcbe0,%rdx 10: e8 ba 3f 49 ff call 0xff493fcf 15: 49 bc 00 00 00 00 00 movabs $0xdffffc0000000000,%r12 1c: fc ff df 1f: 4d 8d 7e 30 lea 0x30(%r14),%r15 23: 4c 89 f8 mov %r15,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 4c 89 ff mov %r15,%rdi 34: e8 76 c6 ca ff call 0xffcac6af 39: 4d 8b 3f mov (%r15),%r15 3c: e8 .byte 0xe8 3d: ee out %al,(%dx) 3e: 4c a4 rex.WR movsb %ds:(%rsi),%es:(%rdi)