Oops: general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] CPU: 1 UID: 0 PID: 8177 Comm: vhci_tx Tainted: G L syzkaller #0 PREEMPT_{RT,(full)} Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 RIP: 0010:setup_cmd_submit_pdu drivers/usb/usbip/vhci_tx.c:16 [inline] RIP: 0010:vhci_send_cmd_submit drivers/usb/usbip/vhci_tx.c:95 [inline] RIP: 0010:vhci_tx_loop+0x5fc/0x1c50 drivers/usb/usbip/vhci_tx.c:241 Code: e8 03 42 80 3c 38 00 74 08 48 89 df e8 ad 94 f2 fa 4c 8b 23 49 8d 5c 24 18 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 df e8 86 94 f2 fa 4c 8b 33 48 b8 00 00 00 RSP: 0018:ffffc900052dfa40 EFLAGS: 00010206 RAX: 0000000000000003 RBX: 0000000000000018 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc900052dfe18 R08: 0000000000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: fffffbfff1f59a7f R12: 0000000000000000 R13: fffff52000a5bf64 R14: ffff88802a124e00 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff888125dc7000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fae09193fa8 CR3: 000000002aa36000 CR4: 00000000003526f0 Call Trace: kthread+0x388/0x470 kernel/kthread.c:436 ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:setup_cmd_submit_pdu drivers/usb/usbip/vhci_tx.c:16 [inline] RIP: 0010:vhci_send_cmd_submit drivers/usb/usbip/vhci_tx.c:95 [inline] RIP: 0010:vhci_tx_loop+0x5fc/0x1c50 drivers/usb/usbip/vhci_tx.c:241 Code: e8 03 42 80 3c 38 00 74 08 48 89 df e8 ad 94 f2 fa 4c 8b 23 49 8d 5c 24 18 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 48 89 df e8 86 94 f2 fa 4c 8b 33 48 b8 00 00 00 RSP: 0018:ffffc900052dfa40 EFLAGS: 00010206 RAX: 0000000000000003 RBX: 0000000000000018 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc900052dfe18 R08: 0000000000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: fffffbfff1f59a7f R12: 0000000000000000 R13: fffff52000a5bf64 R14: ffff88802a124e00 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff888125dc7000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fae09193fa8 CR3: 000000002aa36000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: e8 03 42 80 3c call 0x3c804208 5: 38 00 cmp %al,(%rax) 7: 74 08 je 0x11 9: 48 89 df mov %rbx,%rdi c: e8 ad 94 f2 fa call 0xfaf294be 11: 4c 8b 23 mov (%rbx),%r12 14: 49 8d 5c 24 18 lea 0x18(%r12),%rbx 19: 48 89 d8 mov %rbx,%rax 1c: 48 c1 e8 03 shr $0x3,%rax 20: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx 27: fc ff df * 2a: 80 3c 08 00 cmpb $0x0,(%rax,%rcx,1) <-- trapping instruction 2e: 74 08 je 0x38 30: 48 89 df mov %rbx,%rdi 33: e8 86 94 f2 fa call 0xfaf294be 38: 4c 8b 33 mov (%rbx),%r14 3b: 48 rex.W 3c: b8 .byte 0xb8 3d: 00 00 add %al,(%rax)