BUG: unable to handle page fault for address: ffffc9000683904c #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 10c00067 P4D 10c00067 PUD 10dbe067 PMD 1a6d7067 PTE 0 Oops: 0002 [#1] PREEMPT SMP KASAN CPU: 0 PID: 4470 Comm: kworker/0:15 Not tainted 5.16.0-rc4-syzkaller #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 Workqueue: events drm_fb_helper_damage_work RIP: 0010:rep_movs arch/x86/lib/iomem.c:12 [inline] RIP: 0010:memcpy_toio+0x83/0xe0 arch/x86/lib/iomem.c:57 Code: 79 fd 49 89 dd 31 ff 41 83 e5 02 4c 89 ee e8 f4 f5 79 fd 4d 85 ed 75 2e e8 5a f3 79 fd 48 89 e9 48 89 df 4c 89 e6 48 c1 e9 02 a5 40 f6 c5 02 74 02 66 a5 40 f6 c5 01 74 01 a4 5b 5d 41 5c 41 RSP: 0018:ffffc90004547bc8 EFLAGS: 00010202 RAX: 0000000000000000 RBX: ffffc9000683904c RCX: 00000000000008c2 RDX: ffff888019ae0000 RSI: ffffc900049ea04c RDI: ffffc9000683904c RBP: 0000000000002308 R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff83fdb78c R11: 0000000000000000 R12: ffffc900049ea04c R13: 0000000000000000 R14: ffffc900049ea04c R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff88802ca00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000683904c CR3: 000000005b413000 CR4: 0000000000150ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: dma_buf_map_memcpy_to include/linux/dma-buf-map.h:245 [inline] drm_fb_helper_damage_blit_real drivers/gpu/drm/drm_fb_helper.c:388 [inline] drm_fb_helper_damage_blit drivers/gpu/drm/drm_fb_helper.c:419 [inline] drm_fb_helper_damage_work+0x733/0xac0 drivers/gpu/drm/drm_fb_helper.c:450 process_one_work+0x9b2/0x1690 kernel/workqueue.c:2298 worker_thread+0x658/0x11f0 kernel/workqueue.c:2445 kthread+0x405/0x4f0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Modules linked in: CR2: ffffc9000683904c ---[ end trace caa0780c9ce7b167 ]--- RIP: 0010:rep_movs arch/x86/lib/iomem.c:12 [inline] RIP: 0010:memcpy_toio+0x83/0xe0 arch/x86/lib/iomem.c:57 Code: 79 fd 49 89 dd 31 ff 41 83 e5 02 4c 89 ee e8 f4 f5 79 fd 4d 85 ed 75 2e e8 5a f3 79 fd 48 89 e9 48 89 df 4c 89 e6 48 c1 e9 02 a5 40 f6 c5 02 74 02 66 a5 40 f6 c5 01 74 01 a4 5b 5d 41 5c 41 RSP: 0018:ffffc90004547bc8 EFLAGS: 00010202 RAX: 0000000000000000 RBX: ffffc9000683904c RCX: 00000000000008c2 RDX: ffff888019ae0000 RSI: ffffc900049ea04c RDI: ffffc9000683904c RBP: 0000000000002308 R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff83fdb78c R11: 0000000000000000 R12: ffffc900049ea04c R13: 0000000000000000 R14: ffffc900049ea04c R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff88802ca00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000683904c CR3: 000000005b413000 CR4: 0000000000150ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 79 fd jns 0xffffffff 2: 49 89 dd mov %rbx,%r13 5: 31 ff xor %edi,%edi 7: 41 83 e5 02 and $0x2,%r13d b: 4c 89 ee mov %r13,%rsi e: e8 f4 f5 79 fd callq 0xfd79f607 13: 4d 85 ed test %r13,%r13 16: 75 2e jne 0x46 18: e8 5a f3 79 fd callq 0xfd79f377 1d: 48 89 e9 mov %rbp,%rcx 20: 48 89 df mov %rbx,%rdi 23: 4c 89 e6 mov %r12,%rsi 26: 48 c1 e9 02 shr $0x2,%rcx * 2a: f3 a5 rep movsl %ds:(%rsi),%es:(%rdi) <-- trapping instruction 2c: 40 f6 c5 02 test $0x2,%bpl 30: 74 02 je 0x34 32: 66 a5 movsw %ds:(%rsi),%es:(%rdi) 34: 40 f6 c5 01 test $0x1,%bpl 38: 74 01 je 0x3b 3a: a4 movsb %ds:(%rsi),%es:(%rdi) 3b: 5b pop %rbx 3c: 5d pop %rbp 3d: 41 5c pop %r12 3f: 41 rex.B