general protection fault, probably for non-canonical address 0xe0ce3c3ae0000340: 0000 [#1] PREEMPT SMP KASAN
KASAN: maybe wild-memory-access in range [0x067201d700001a00-0x067201d700001a07]
CPU: 1 PID: 6656 Comm: syz-executor.1 Not tainted 6.4.0-rc7-syzkaller-00234-g547cc9be86f4 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
RIP: 0010:__debug_check_no_obj_freed lib/debugobjects.c:1012 [inline]
RIP: 0010:debug_check_no_obj_freed+0x1d7/0x420 lib/debugobjects.c:1054
Code: 39 00 0f 85 0f 02 00 00 48 89 45 08 4d 89 30 4c 89 c7 4d 89 68 08 e8 d8 cb ff ff 48 85 ed 74 2c 49 89 e8 4c 89 c0 48 c1 e8 03 <42> 80 3c 38 00 0f 84 2e ff ff ff 4c 89 c7 4c 89 44 24 38 e8 81 4d
RSP: 0018:ffffc900037cf908 EFLAGS: 00010012
RAX: 00ce403ae0000340 RBX: ffff88803ec9bba0 RCX: ffffffff816652c4
RDX: 1ffffffff23fc3e9 RSI: 0000000000000004 RDI: ffff88819e541360
RBP: 067201d700001a00 R08: 067201d700001a00 R09: ffff888100000000
R10: fffff520006f9f0f R11: 0000000000094001 R12: 0000000000000009
R13: dead000000000122 R14: dead000000000100 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055556ffffdc0 CR3: 000000007a3a9000 CR4: 0000000000350ee0
Call Trace:
<TASK>
slab_free_hook mm/slub.c:1756 [inline]
slab_free_freelist_hook+0xeb/0x1c0 mm/slub.c:1807
slab_free mm/slub.c:3786 [inline]
kmem_cache_free+0xe9/0x480 mm/slub.c:3808
pgtable_pte_page_dtor include/linux/mm.h:2785 [inline]
___pte_free_tlb+0x1d/0x1a0 arch/x86/mm/pgtable.c:55
__pte_free_tlb arch/x86/include/asm/pgalloc.h:61 [inline]
free_pte_range mm/memory.c:193 [inline]
free_pmd_range mm/memory.c:211 [inline]
free_pud_range mm/memory.c:245 [inline]
free_p4d_range mm/memory.c:279 [inline]
free_pgd_range+0x497/0xbf0 mm/memory.c:359
free_pgtables+0x68a/0x930 mm/memory.c:404
exit_mmap+0x29e/0x930 mm/mmap.c:3118
__mmput+0x128/0x4c0 kernel/fork.c:1351
mmput+0x60/0x70 kernel/fork.c:1373
exit_mm kernel/exit.c:567 [inline]
do_exit+0x9b0/0x29b0 kernel/exit.c:861
do_group_exit+0xd4/0x2a0 kernel/exit.c:1024
__do_sys_exit_group kernel/exit.c:1035 [inline]
__se_sys_exit_group kernel/exit.c:1033 [inline]
__x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1033
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fb218e8c389
Code: Unable to access opcode bytes at 0x7fb218e8c35f.
RSP: 002b:00007fffb8e89478 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000005652a400 RCX: 00007fb218e8c389
RDX: 00007fb218e45391 RSI: 0000000000000000 RDI: 000000000000000b
RBP: 000000000000000b R08: 00007fffb8e89960 R09: 000000005652a400
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fffb8e89bb0
R13: 0000000000000000 R14: 0000000000000020 R15: ffffffffffffffff
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:__debug_check_no_obj_freed lib/debugobjects.c:1012 [inline]
RIP: 0010:debug_check_no_obj_freed+0x1d7/0x420 lib/debugobjects.c:1054
Code: 39 00 0f 85 0f 02 00 00 48 89 45 08 4d 89 30 4c 89 c7 4d 89 68 08 e8 d8 cb ff ff 48 85 ed 74 2c 49 89 e8 4c 89 c0 48 c1 e8 03 <42> 80 3c 38 00 0f 84 2e ff ff ff 4c 89 c7 4c 89 44 24 38 e8 81 4d
RSP: 0018:ffffc900037cf908 EFLAGS: 00010012
RAX: 00ce403ae0000340 RBX: ffff88803ec9bba0 RCX: ffffffff816652c4
RDX: 1ffffffff23fc3e9 RSI: 0000000000000004 RDI: ffff88819e541360
RBP: 067201d700001a00 R08: 067201d700001a00 R09: ffff888100000000
R10: fffff520006f9f0f R11: 0000000000094001 R12: 0000000000000009
R13: dead000000000122 R14: dead000000000100 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055556ffffdc0 CR3: 000000007a3a9000 CR4: 0000000000350ee0
----------------
Code disassembly (best guess):
0: 39 00 cmp %eax,(%rax)
2: 0f 85 0f 02 00 00 jne 0x217
8: 48 89 45 08 mov %rax,0x8(%rbp)
c: 4d 89 30 mov %r14,(%r8)
f: 4c 89 c7 mov %r8,%rdi
12: 4d 89 68 08 mov %r13,0x8(%r8)
16: e8 d8 cb ff ff callq 0xffffcbf3
1b: 48 85 ed test %rbp,%rbp
1e: 74 2c je 0x4c
20: 49 89 e8 mov %rbp,%r8
23: 4c 89 c0 mov %r8,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1) <-- trapping instruction
2f: 0f 84 2e ff ff ff je 0xffffff63
35: 4c 89 c7 mov %r8,%rdi
38: 4c 89 44 24 38 mov %r8,0x38(%rsp)
3d: e8 .byte 0xe8
3e: 81 .byte 0x81
3f: 4d rex.WRB