Unable to handle kernel access to user memory without uaccess routines at virtual address 00000000200000c0 Oops [#1] Modules linked in: CPU: 0 PID: 3604 Comm: syz-executor.0 Not tainted 5.12.0-rc5-syzkaller-00715-ga5e13c6df0e4 #0 Hardware name: riscv-virtio,qemu (DT) epc : sock_ioctl+0x4c4/0x66c net/socket.c:1124 ra : sock_ioctl+0x4c4/0x66c net/socket.c:1124 epc : ffffffe0020e60a2 ra : ffffffe0020e60a2 sp : ffffffe022563da0 gp : ffffffe004588b08 tp : ffffffe0093917c0 t0 : 0000000000000000 t1 : 0000000000000001 t2 : 00000000000f4240 s0 : ffffffe022563e30 s1 : 0000000000040000 a0 : 0000000000000000 a1 : 0000000000000007 a2 : 1ffffffc012722f8 a3 : ffffffe002a94d2e a4 : 0000000000000000 a5 : 0000000000000000 a6 : 0000000000f00000 a7 : ffffffe000084f3a s2 : 0000000000000000 s3 : 0000000000008902 s4 : 00000000200000c0 s5 : ffffffe00458c0d0 s6 : ffffffe00d0824c0 s7 : ffffffe01ed50000 s8 : 0000000000008904 s9 : ffffffe00d082580 s10: 0000000000000000 s11: 0000000000020000 t3 : a4ff50318d838600 t4 : ffffffc403d8dfb2 t5 : ffffffc403d8dfba t6 : 0000000000040000 status: 0000000000000120 badaddr: 00000000200000c0 cause: 000000000000000f Call Trace: [] sock_ioctl+0x4c4/0x66c net/socket.c:1124 [] vfs_ioctl fs/ioctl.c:48 [inline] [] __do_sys_ioctl fs/ioctl.c:753 [inline] [] sys_ioctl+0x5c2/0xd56 fs/ioctl.c:739 [] ret_from_syscall+0x0/0x2 ---[ end trace 62a60038aa1753c1 ]---