Oops: general protection fault, probably for non-canonical address 0xffff1101161d2400: 0000 [#1] SMP KASAN NOPTI KASAN: maybe wild-memory-access in range [0xfff8a808b0e92000-0xfff8a808b0e92007] CPU: 0 UID: 0 PID: 14846 Comm: kworker/u32:6 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: kvfree_rcu_reclaim kfree_rcu_work RIP: 0010:percpu_ref_get_many include/linux/percpu-refcount.h:205 [inline] RIP: 0010:percpu_ref_get include/linux/percpu-refcount.h:222 [inline] RIP: 0010:obj_cgroup_get include/linux/memcontrol.h:760 [inline] RIP: 0010:replace_stock_objcg mm/memcontrol.c:2774 [inline] RIP: 0010:refill_obj_stock+0x1e1/0x7d0 mm/memcontrol.c:2952 Code: 02 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 80 3c 02 00 0f 85 96 05 00 00 49 8b 04 24 a8 03 0f 85 23 03 00 00 <65> 48 ff 00 e8 86 40 ff ff 49 8d 7c 24 18 be 04 00 00 00 48 89 7c RSP: 0018:ffffc90005167a08 EFLAGS: 00010046 RAX: ffff88803f7f1400 RBX: ffffffff93a53cc0 RCX: 00000000c4c43cac RDX: 1ffffffff35f3098 RSI: ffffffff8bf48320 RDI: ffffffff8dcedd00 RBP: ffffffff908526b4 R08: 1aac5474ee26c3ae R09: 0000000000000000 R10: 0000000000000004 R11: 0000000000000000 R12: ffffffff9af984c0 R13: 0000000000000060 R14: ffff88806a434cc0 R15: ffff88806a434d08 FS: 0000000000000000(0000) GS:ffff8880d69e1000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f3a5f687e9c CR3: 0000000028357000 CR4: 0000000000352ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: obj_cgroup_uncharge mm/memcontrol.c:3015 [inline] __memcg_slab_free_hook+0x226/0x5b0 mm/memcontrol.c:3102 memcg_slab_free_hook mm/slub.c:2205 [inline] slab_free_bulk mm/slub.c:4660 [inline] kmem_cache_free_bulk.part.0+0x671/0x7f0 mm/slub.c:5243 kfree_bulk include/linux/slab.h:794 [inline] kvfree_rcu_bulk+0x1bb/0x1f0 mm/slab_common.c:1516 kfree_rcu_work+0x124/0x1a0 mm/slab_common.c:1594 process_one_work+0x9cc/0x1b70 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x6c8/0xf10 kernel/workqueue.c:3400 kthread+0x3c2/0x780 kernel/kthread.c:464 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:153 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:percpu_ref_get_many include/linux/percpu-refcount.h:205 [inline] RIP: 0010:percpu_ref_get include/linux/percpu-refcount.h:222 [inline] RIP: 0010:obj_cgroup_get include/linux/memcontrol.h:760 [inline] RIP: 0010:replace_stock_objcg mm/memcontrol.c:2774 [inline] RIP: 0010:refill_obj_stock+0x1e1/0x7d0 mm/memcontrol.c:2952 Code: 02 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 80 3c 02 00 0f 85 96 05 00 00 49 8b 04 24 a8 03 0f 85 23 03 00 00 <65> 48 ff 00 e8 86 40 ff ff 49 8d 7c 24 18 be 04 00 00 00 48 89 7c RSP: 0018:ffffc90005167a08 EFLAGS: 00010046 RAX: ffff88803f7f1400 RBX: ffffffff93a53cc0 RCX: 00000000c4c43cac RDX: 1ffffffff35f3098 RSI: ffffffff8bf48320 RDI: ffffffff8dcedd00 RBP: ffffffff908526b4 R08: 1aac5474ee26c3ae R09: 0000000000000000 R10: 0000000000000004 R11: 0000000000000000 R12: ffffffff9af984c0 R13: 0000000000000060 R14: ffff88806a434cc0 R15: ffff88806a434d08 FS: 0000000000000000(0000) GS:ffff8880d69e1000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f3a5f687e9c CR3: 0000000028357000 CR4: 0000000000352ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 00 00 add %al,(%rax) 2: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 9: fc ff df c: 4c 89 e2 mov %r12,%rdx f: 48 c1 ea 03 shr $0x3,%rdx 13: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 17: 0f 85 96 05 00 00 jne 0x5b3 1d: 49 8b 04 24 mov (%r12),%rax 21: a8 03 test $0x3,%al 23: 0f 85 23 03 00 00 jne 0x34c * 29: 65 48 ff 00 incq %gs:(%rax) <-- trapping instruction 2d: e8 86 40 ff ff call 0xffff40b8 32: 49 8d 7c 24 18 lea 0x18(%r12),%rdi 37: be 04 00 00 00 mov $0x4,%esi 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 7c .byte 0x7c