Oops: general protection fault, probably for non-canonical address 0xdffffc000000044c: 0000 [#1] SMP KASAN NOPTI KASAN: probably user-memory-access in range [0x0000000000002260-0x0000000000002267] CPU: 2 UID: 0 PID: 1234 Comm: kworker/u32:11 Not tainted 6.16.0-rc5-syzkaller-00224-g379f604cc3dc #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: events_unbound flush_to_ldisc RIP: 0010:n_tty_receive_buf_common+0xf3/0x1980 drivers/tty/n_tty.c:1702 Code: 00 00 00 00 00 00 00 48 89 7c 24 68 48 89 4c 24 70 89 9c 24 94 00 00 00 48 89 84 24 a0 00 00 00 e8 42 94 69 fc 48 8b 44 24 68 <80> 38 00 0f 85 b6 15 00 00 48 8b 44 24 18 48 8b a8 60 22 00 00 48 RSP: 0018:ffffc900065dfa68 EFLAGS: 00010293 RAX: dffffc000000044c RBX: 0000000000000001 RCX: dffffc0000000000 RDX: ffff8880291fa440 RSI: ffffffff855262ce RDI: dffffc000000044c RBP: 0000000000000003 R08: 0000000000000001 R09: ffffed1006d41c50 R10: ffff888036a0e287 R11: 0000000000000001 R12: ffff888029282025 R13: 0000000000000000 R14: ffff888036a0e000 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880d6913000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fa3c17726e0 CR3: 000000004e9f1000 CR4: 0000000000352ef0 Call Trace: tty_ldisc_receive_buf+0xa7/0x1a0 drivers/tty/tty_buffer.c:387 tty_port_default_receive_buf+0x70/0xb0 drivers/tty/tty_port.c:37 receive_buf drivers/tty/tty_buffer.c:445 [inline] flush_to_ldisc+0x268/0x780 drivers/tty/tty_buffer.c:495 process_one_work+0x9cf/0x1b70 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3321 [inline] worker_thread+0x6c8/0xf10 kernel/workqueue.c:3402 kthread+0x3c5/0x780 kernel/kthread.c:464 ret_from_fork+0x5d7/0x6f0 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:n_tty_receive_buf_common+0xf3/0x1980 drivers/tty/n_tty.c:1702 Code: 00 00 00 00 00 00 00 48 89 7c 24 68 48 89 4c 24 70 89 9c 24 94 00 00 00 48 89 84 24 a0 00 00 00 e8 42 94 69 fc 48 8b 44 24 68 <80> 38 00 0f 85 b6 15 00 00 48 8b 44 24 18 48 8b a8 60 22 00 00 48 RSP: 0018:ffffc900065dfa68 EFLAGS: 00010293 RAX: dffffc000000044c RBX: 0000000000000001 RCX: dffffc0000000000 RDX: ffff8880291fa440 RSI: ffffffff855262ce RDI: dffffc000000044c RBP: 0000000000000003 R08: 0000000000000001 R09: ffffed1006d41c50 R10: ffff888036a0e287 R11: 0000000000000001 R12: ffff888029282025 R13: 0000000000000000 R14: ffff888036a0e000 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880d6713000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f29acf7f2d8 CR3: 000000000e382000 CR4: 0000000000352ef0 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 00 00 add %al,(%rax) 2: 00 00 add %al,(%rax) 4: 00 00 add %al,(%rax) 6: 48 89 7c 24 68 mov %rdi,0x68(%rsp) b: 48 89 4c 24 70 mov %rcx,0x70(%rsp) 10: 89 9c 24 94 00 00 00 mov %ebx,0x94(%rsp) 17: 48 89 84 24 a0 00 00 mov %rax,0xa0(%rsp) 1e: 00 1f: e8 42 94 69 fc call 0xfc699466 24: 48 8b 44 24 68 mov 0x68(%rsp),%rax * 29: 80 38 00 cmpb $0x0,(%rax) <-- trapping instruction 2c: 0f 85 b6 15 00 00 jne 0x15e8 32: 48 8b 44 24 18 mov 0x18(%rsp),%rax 37: 48 8b a8 60 22 00 00 mov 0x2260(%rax),%rbp 3e: 48 rex.W