Unable to handle kernel access to user memory without uaccess routines at virtual address 00000000200033c0 Oops [#1] Modules linked in: CPU: 0 PID: 3586 Comm: syz-executor.1 Not tainted 5.12.0-rc2-syzkaller #0 Hardware name: riscv-virtio,qemu (DT) epc : sock_ioctl+0x4c4/0x66c net/socket.c:1124 ra : sock_ioctl+0x4c4/0x66c net/socket.c:1124 epc : ffffffe0020e2068 ra : ffffffe0020e2068 sp : ffffffe02052bda0 gp : ffffffe004588910 tp : ffffffe0084b0000 t0 : 0000000000000000 t1 : 0000000000000001 t2 : 00000000000f4240 s0 : ffffffe02052be30 s1 : 0000000000040000 a0 : 0000000000000000 a1 : 0000000000000007 a2 : 1ffffffc01096000 a3 : ffffffe002a8f8e6 a4 : 0000000000000000 a5 : 0000000000000000 a6 : 0000000000f00000 a7 : ffffffe000084ac8 s2 : 0000000000000000 s3 : 0000000000008902 s4 : 00000000200033c0 s5 : ffffffe00458c0d0 s6 : ffffffe00d094000 s7 : ffffffe0098b8000 s8 : 0000000000008903 s9 : ffffffe00d0940c0 s10: 0000000000000000 s11: 0000000000020000 t3 : 17e9ece8e855be00 t4 : ffffffc403f357b2 t5 : ffffffc403f357ba t6 : 0000000000040000 status: 0000000000000120 badaddr: 00000000200033c0 cause: 000000000000000f Call Trace: [] sock_ioctl+0x4c4/0x66c net/socket.c:1124 [] vfs_ioctl fs/ioctl.c:48 [inline] [] __do_sys_ioctl fs/ioctl.c:753 [inline] [] sys_ioctl+0x5c2/0xd56 fs/ioctl.c:739 [] ret_from_syscall+0x0/0x2 ---[ end trace a5ff619773c91c80 ]---