general protection fault, probably for non-canonical address 0xffff000000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: maybe wild-memory-access in range [0xfff8200000000000-0xfff8200000000007] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.19.0-syzkaller-14184-g69dac8e431af #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 RIP: 0010:rcu_do_batch kernel/rcu/tree.c:2245 [inline] RIP: 0010:rcu_core+0x7b3/0x1890 kernel/rcu/tree.c:2505 Code: 83 ae f7 ff 48 8d 7d 08 5e 48 89 f8 48 c1 e8 03 42 80 3c 20 00 0f 85 e1 0c 00 00 48 8b 45 08 48 89 ef 48 c7 45 08 00 00 00 00 d0 48 c7 c6 74 cc 67 81 48 c7 c7 20 91 f8 8b e8 c8 a6 f7 ff 65 RSP: 0018:ffffc90000007e60 EFLAGS: 00010246 RAX: ffff000000000000 RBX: 0000000000000006 RCX: 71d72b93dae56797 RDX: 1ffff1102802c14e RSI: ffffffff8167cc11 RDI: ffff88801faeeda8 RBP: ffff88801faeeda8 R08: 0000000000000000 R09: ffffffff908dc95f R10: fffffbfff211b92b R11: 0000000000000001 R12: dffffc0000000000 R13: 0000000000000000 R14: ffffc90000007ed8 R15: 0000000000000005 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88823ffff000 CR3: 000000000bc8e000 CR4: 0000000000350ef0 Call Trace: __do_softirq+0x1d3/0x9c6 kernel/softirq.c:571 invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:check_kcov_mode kernel/kcov.c:166 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x7/0x60 kernel/kcov.c:200 Code: 4b 00 5d be 03 00 00 00 e9 86 04 81 02 66 0f 1f 44 00 00 48 8b be a8 01 00 00 e8 b4 ff ff ff 31 c0 c3 90 65 8b 05 29 68 86 7e <89> c1 48 8b 34 24 81 e1 00 01 00 00 65 48 8b 14 25 80 6f 02 00 a9 RSP: 0018:ffffc90000067ac0 EFLAGS: 00000202 RAX: 0000000080000000 RBX: 000000000000000e RCX: ffffffff842345a1 RDX: ffff888140160000 RSI: 0000000000000000 RDI: 0000000000000007 RBP: ffffffff8a62d0a5 R08: 0000000000000007 R09: 0000000000000000 R10: 000000000000000e R11: 0000000000000000 R12: ffff88801f49342d R13: 000000000000000d R14: 0000000000000000 R15: ffffc90000067c80 vsnprintf+0x28b/0x14f0 lib/vsprintf.c:2854 kvasprintf+0xd3/0x150 lib/kasprintf.c:29 kasprintf+0xbb/0xf0 lib/kasprintf.c:59 make_driver_name drivers/base/module.c:16 [inline] module_add_driver+0xec/0x370 drivers/base/module.c:63 bus_add_driver+0x3d0/0x640 drivers/base/bus.c:622 driver_register+0x220/0x3a0 drivers/base/driver.c:240 mlx4_init+0x223/0x262 drivers/net/ethernet/mellanox/mlx4/main.c:4528 do_one_initcall+0xfe/0x650 init/main.c:1296 do_initcall_level init/main.c:1369 [inline] do_initcalls init/main.c:1385 [inline] do_basic_setup init/main.c:1404 [inline] kernel_init_freeable+0x6b1/0x73a init/main.c:1611 kernel_init+0x1a/0x1d0 init/main.c:1500 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 Modules linked in: ---------------- Code disassembly (best guess): 0: 83 ae f7 ff 48 8d 7d subl $0x7d,-0x72b70009(%rsi) 7: 08 5e 48 or %bl,0x48(%rsi) a: 89 f8 mov %edi,%eax c: 48 c1 e8 03 shr $0x3,%rax 10: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) 15: 0f 85 e1 0c 00 00 jne 0xcfc 1b: 48 8b 45 08 mov 0x8(%rbp),%rax 1f: 48 89 ef mov %rbp,%rdi 22: 48 c7 45 08 00 00 00 movq $0x0,0x8(%rbp) 29: 00 * 2a: ff d0 callq *%rax <-- trapping instruction 2c: 48 c7 c6 74 cc 67 81 mov $0xffffffff8167cc74,%rsi 33: 48 c7 c7 20 91 f8 8b mov $0xffffffff8bf89120,%rdi 3a: e8 c8 a6 f7 ff callq 0xfff7a707 3f: 65 gs