Oops: general protection fault, probably for non-canonical address 0xffff11014dcd7c00: 0000 [#1] SMP KASAN PTI KASAN: maybe wild-memory-access in range [0xfff8a80a6e6be000-0xfff8a80a6e6be007] CPU: 0 UID: 0 PID: 6259 Comm: udevd Not tainted 6.15.0-rc7-syzkaller-00099-g94305e83eccb #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:percpu_ref_get_many+0xa3/0x140 include/linux/percpu-refcount.h:205 Code: 32 76 ff 49 bc 00 00 00 00 00 fc ff df 4c 89 f8 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 ff e8 c4 8e f7 ff 49 8b 07 a8 03 75 62 <65> 4c 01 30 e8 a4 46 27 09 85 c0 74 3a e8 cb e0 7e ff 84 c0 75 31 RSP: 0018:ffffc9001b0bf518 EFLAGS: 00010046 RAX: ffff888027be1c00 RBX: ffffffff82283719 RCX: ca2c516810d2cd00 RDX: 0000000000000000 RSI: ffffffff8bc120a0 RDI: ffffffff8bc12060 RBP: ffffc9001b0bf638 R08: 0000000000000000 R09: 0000000000080000 R10: 0000000000000000 R11: ffffffff82283719 R12: dffffc0000000000 R13: ffff8880338cf400 R14: 0000000000000001 R15: ffff8880338cf400 FS: 00007f156d782880(0000) GS:ffff8881260f6000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f156d76a000 CR3: 000000002875c000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: percpu_ref_get include/linux/percpu-refcount.h:222 [inline] obj_cgroup_get include/linux/memcontrol.h:760 [inline] replace_stock_objcg mm/memcontrol.c:2774 [inline] refill_obj_stock+0x265/0x790 mm/memcontrol.c:2952 obj_cgroup_uncharge mm/memcontrol.c:3015 [inline] __memcg_slab_free_hook+0x1ff/0x330 mm/memcontrol.c:3102 memcg_slab_free_hook mm/slub.c:2205 [inline] slab_free mm/slub.c:4639 [inline] kmem_cache_free+0x21b/0x3f0 mm/slub.c:4744 anon_vma_chain_free mm/rmap.c:147 [inline] unlink_anon_vmas+0x2cc/0x670 mm/rmap.c:421 free_pgtables+0x224/0x710 mm/memory.c:370 vms_clear_ptes+0x424/0x540 mm/vma.c:1189 vms_complete_munmap_vmas+0x206/0x8a0 mm/vma.c:1233 do_vmi_align_munmap+0x358/0x420 mm/vma.c:1492 do_vmi_munmap+0x253/0x2e0 mm/vma.c:1540 __vm_munmap+0x23b/0x3d0 mm/vma.c:3013 __do_sys_munmap mm/mmap.c:1084 [inline] __se_sys_munmap mm/mmap.c:1081 [inline] __x64_sys_munmap+0x60/0x70 mm/mmap.c:1081 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f156d11e097 Code: 73 01 c3 48 8b 0d 61 2d 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 31 2d 0d 00 f7 d8 64 89 01 48 RSP: 002b:00007ffd45c64178 EFLAGS: 00000246 ORIG_RAX: 000000000000000b RAX: ffffffffffffffda RBX: 0000562b6a4b1d70 RCX: 00007f156d11e097 RDX: 0000562b6a4bbeb0 RSI: 0000000000000200 RDI: 00007f156d76c000 RBP: 0000562b6a4bbeb0 R08: 0000000000000030 R09: 00007ffd45c64150 R10: 0000562b6a4bbea0 R11: 0000000000000246 R12: 00007f156d8a71e0 R13: 00007f156d8a939c R14: 0000000000000031 R15: 0000000000000001 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:percpu_ref_get_many+0xa3/0x140 include/linux/percpu-refcount.h:205 Code: 32 76 ff 49 bc 00 00 00 00 00 fc ff df 4c 89 f8 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 ff e8 c4 8e f7 ff 49 8b 07 a8 03 75 62 <65> 4c 01 30 e8 a4 46 27 09 85 c0 74 3a e8 cb e0 7e ff 84 c0 75 31 RSP: 0018:ffffc9001b0bf518 EFLAGS: 00010046 RAX: ffff888027be1c00 RBX: ffffffff82283719 RCX: ca2c516810d2cd00 RDX: 0000000000000000 RSI: ffffffff8bc120a0 RDI: ffffffff8bc12060 RBP: ffffc9001b0bf638 R08: 0000000000000000 R09: 0000000000080000 R10: 0000000000000000 R11: ffffffff82283719 R12: dffffc0000000000 R13: ffff8880338cf400 R14: 0000000000000001 R15: ffff8880338cf400 FS: 00007f156d782880(0000) GS:ffff8881260f6000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f156d76a000 CR3: 000000002875c000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 32 76 ff xor -0x1(%rsi),%dh 3: 49 bc 00 00 00 00 00 movabs $0xdffffc0000000000,%r12 a: fc ff df d: 4c 89 f8 mov %r15,%rax 10: 48 c1 e8 03 shr $0x3,%rax 14: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) 19: 74 08 je 0x23 1b: 4c 89 ff mov %r15,%rdi 1e: e8 c4 8e f7 ff call 0xfff78ee7 23: 49 8b 07 mov (%r15),%rax 26: a8 03 test $0x3,%al 28: 75 62 jne 0x8c * 2a: 65 4c 01 30 add %r14,%gs:(%rax) <-- trapping instruction 2e: e8 a4 46 27 09 call 0x92746d7 33: 85 c0 test %eax,%eax 35: 74 3a je 0x71 37: e8 cb e0 7e ff call 0xff7ee107 3c: 84 c0 test %al,%al 3e: 75 31 jne 0x71