general protection fault, probably for non-canonical address 0xffff000000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: maybe wild-memory-access in range [0xfff8200000000000-0xfff8200000000007] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 6.0.0-rc1-syzkaller-00049-g4e55e22d3d9a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 RIP: 0010:rcu_do_batch kernel/rcu/tree.c:2245 [inline] RIP: 0010:rcu_core+0x7af/0x1780 kernel/rcu/tree.c:2505 Code: 07 f3 f7 ff 49 8d 7f 08 5e 48 89 f8 48 c1 e8 03 42 80 3c 20 00 0f 85 f8 0b 00 00 49 8b 47 08 4c 89 ff 49 c7 47 08 00 00 00 00 d0 48 c7 c6 f0 2f 32 81 48 c7 c7 c0 4e a9 87 e8 4c eb f7 ff 65 RSP: 0000:ffffc90000178e68 EFLAGS: 00010246 RAX: ffff000000000000 RBX: 0000000000000000 RCX: 603ad66270707a3c RDX: 1ffff1102005513e RSI: ffffffff81322f8d RDI: ffff88810e7082b0 RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffff8b0766df R10: fffffbfff160ecdb R11: 0000000000000001 R12: dffffc0000000000 R13: ffffc90000178ed8 R14: 0000000000000006 R15: ffff88810e7082b0 FS: 0000000000000000(0000) GS:ffff8881f6900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000007825000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __do_softirq+0x1c0/0x9a9 kernel/softirq.c:571 invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x113/0x170 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:iowrite32+0x5a/0xb0 lib/iomap.c:204 Code: 7c dd 2e ff e8 77 dd 2e ff 4c 89 e6 bf 00 00 01 00 e8 4a da 2e ff 49 81 fc 00 00 01 00 76 13 e8 5c dd 2e ff 89 d8 44 89 e2 ef <5b> 41 5c e9 4e dd 2e ff e8 49 dd 2e ff 8b 1d 73 e3 c3 05 31 ff 89 RSP: 0000:ffffc9000001f770 EFLAGS: 00000293 RAX: 000000000010e780 RBX: 000000000010e780 RCX: 0000000000000000 RDX: 000000000001c048 RSI: ffffffff82172b94 RDI: 0000000000000007 RBP: ffff88810cbdb000 R08: 0000000000000007 R09: 0000000000010000 R10: 000000000001c048 R11: 0000000000000000 R12: 000000000001c048 R13: 0000000000000004 R14: ffff88810cbdb528 R15: 0000000000000003 setup_vq+0x1af/0x2d0 drivers/virtio/virtio_pci_legacy.c:154 vp_setup_vq+0xbc/0x3c0 drivers/virtio/virtio_pci_common.c:190 vp_find_vqs_msix+0x7d8/0xea0 drivers/virtio/virtio_pci_common.c:329 vp_find_vqs+0x5a/0x540 drivers/virtio/virtio_pci_common.c:407 virtio_find_vqs_ctx_size include/linux/virtio_config.h:252 [inline] virtnet_find_vqs+0x6cd/0xf00 drivers/net/virtio_net.c:3518 init_vqs drivers/net/virtio_net.c:3606 [inline] virtnet_probe+0x11c0/0x30f0 drivers/net/virtio_net.c:3904 virtio_dev_probe+0x577/0x870 drivers/virtio/virtio.c:305 call_driver_probe drivers/base/dd.c:530 [inline] really_probe+0x249/0xb90 drivers/base/dd.c:609 __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:748 driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:778 __driver_attach+0x223/0x550 drivers/base/dd.c:1150 bus_for_each_dev+0x147/0x1d0 drivers/base/bus.c:301 bus_add_driver+0x4c9/0x640 drivers/base/bus.c:618 driver_register+0x220/0x3a0 drivers/base/driver.c:240 virtio_net_driver_init+0x93/0xd2 drivers/net/virtio_net.c:4108 do_one_initcall+0xfe/0x650 init/main.c:1296 do_initcall_level init/main.c:1369 [inline] do_initcalls init/main.c:1385 [inline] do_basic_setup init/main.c:1404 [inline] kernel_init_freeable+0x6ac/0x735 init/main.c:1611 kernel_init+0x1a/0x1d0 init/main.c:1500 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:rcu_do_batch kernel/rcu/tree.c:2245 [inline] RIP: 0010:rcu_core+0x7af/0x1780 kernel/rcu/tree.c:2505 Code: 07 f3 f7 ff 49 8d 7f 08 5e 48 89 f8 48 c1 e8 03 42 80 3c 20 00 0f 85 f8 0b 00 00 49 8b 47 08 4c 89 ff 49 c7 47 08 00 00 00 00 d0 48 c7 c6 f0 2f 32 81 48 c7 c7 c0 4e a9 87 e8 4c eb f7 ff 65 RSP: 0000:ffffc90000178e68 EFLAGS: 00010246 RAX: ffff000000000000 RBX: 0000000000000000 RCX: 603ad66270707a3c RDX: 1ffff1102005513e RSI: ffffffff81322f8d RDI: ffff88810e7082b0 RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffff8b0766df R10: fffffbfff160ecdb R11: 0000000000000001 R12: dffffc0000000000 R13: ffffc90000178ed8 R14: 0000000000000006 R15: ffff88810e7082b0 FS: 0000000000000000(0000) GS:ffff8881f6900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000007825000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: f3 f7 ff repz idiv %edi 3: 49 8d 7f 08 lea 0x8(%r15),%rdi 7: 5e pop %rsi 8: 48 89 f8 mov %rdi,%rax b: 48 c1 e8 03 shr $0x3,%rax f: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) 14: 0f 85 f8 0b 00 00 jne 0xc12 1a: 49 8b 47 08 mov 0x8(%r15),%rax 1e: 4c 89 ff mov %r15,%rdi 21: 49 c7 47 08 00 00 00 movq $0x0,0x8(%r15) 28: 00 * 29: ff d0 callq *%rax <-- trapping instruction 2b: 48 c7 c6 f0 2f 32 81 mov $0xffffffff81322ff0,%rsi 32: 48 c7 c7 c0 4e a9 87 mov $0xffffffff87a94ec0,%rdi 39: e8 4c eb f7 ff callq 0xfff7eb8a 3e: 65 gs