general protection fault, probably for non-canonical address 0xea85f200150c00a1: 0000 [#1] PREEMPT SMP KASAN KASAN: maybe wild-memory-access in range [0x542fb000a8600508-0x542fb000a860050f] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 5.9.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events_unbound call_usermodehelper_exec_work RIP: 0010:htab_elem_free kernel/bpf/hashtab.c:769 [inline] RIP: 0010:htab_elem_free_rcu+0x4a/0x110 kernel/bpf/hashtab.c:779 Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 bc 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 6b f8 48 8d 7d 18 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 82 00 00 00 44 8b 65 18 bf 05 RSP: 0018:ffffc90000da8e50 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffff888034800010 RCX: 00000000ffcf5cb6 RDX: 0a85f600150c00a1 RSI: ffffffff81876bfe RDI: 542fb000a8600508 RBP: 542fb000a86004f0 R08: 0000000000000000 R09: ffffffff8c6009ff R10: fffffbfff18c013f R11: ffffffff89bda388 R12: ffffc90000da8ed8 R13: ffff888034800000 R14: 0000000000000000 R15: ffff8880a95de1c0 FS: 0000000000000000(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4f13ca9db8 CR3: 0000000087d43000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_do_batch kernel/rcu/tree.c:2428 [inline] rcu_core+0x5ca/0x1130 kernel/rcu/tree.c:2656 __do_softirq+0x1f7/0xa91 kernel/softirq.c:298 asm_call_on_stack+0xf/0x20 arch/x86/entry/entry_64.S:706 __run_on_irqstack arch/x86/include/asm/irq_stack.h:22 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:48 [inline] do_softirq_own_stack+0x9d/0xd0 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:393 [inline] __irq_exit_rcu kernel/softirq.c:423 [inline] irq_exit_rcu+0x235/0x280 kernel/softirq.c:435 sysvec_apic_timer_interrupt+0x51/0xf0 arch/x86/kernel/apic/apic.c:1091 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:581 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:770 [inline] RIP: 0010:seqcount_lockdep_reader_access include/linux/seqlock.h:104 [inline] RIP: 0010:read_seqcount_t_begin include/linux/seqlock.h:311 [inline] RIP: 0010:read_seqbegin include/linux/seqlock.h:752 [inline] RIP: 0010:zone_span_seqbegin include/linux/memory_hotplug.h:80 [inline] RIP: 0010:page_outside_zone_boundaries+0x100/0x340 mm/page_alloc.c:561 Code: 08 48 c7 c0 88 3c b6 89 48 c1 e8 03 80 3c 28 00 0f 85 f4 01 00 00 48 83 3d 44 8d 0a 08 00 0f 84 0e 01 00 00 48 8b 3c 24 57 9d <0f> 1f 44 00 00 4c 8d 8b 98 00 00 00 4c 89 c8 48 c1 e8 03 0f b6 04 RSP: 0018:ffffc90000cdf508 EFLAGS: 00000282 RAX: 1ffffffff136c791 RBX: ffff88812fffb700 RCX: 0000000000000006 RDX: ffffffff81ac432b RSI: 0000000000000000 RDI: 0000000000000282 RBP: dffffc0000000000 R08: 0000000000000001 R09: ffffffff8c6009ff R10: 1ffffffff136c792 R11: 0000000000000000 R12: 00000000000473af R13: fffffbfff136c790 R14: 0000000000000000 R15: ffff88812fffb7a0 bad_range mm/page_alloc.c:590 [inline] rmqueue mm/page_alloc.c:3409 [inline] get_page_from_freelist+0x86b/0x3720 mm/page_alloc.c:3828 __alloc_pages_nodemask+0x2cf/0x790 mm/page_alloc.c:4882 alloc_pages_current+0x187/0x280 mm/mempolicy.c:2275 alloc_pages include/linux/gfp.h:545 [inline] __vmalloc_area_node+0x3e3/0x7a0 mm/vmalloc.c:2445 __vmalloc_node_range+0xec/0x170 mm/vmalloc.c:2511 alloc_thread_stack_node kernel/fork.c:243 [inline] dup_task_struct kernel/fork.c:862 [inline] copy_process+0x8e6/0x6a00 kernel/fork.c:1916 _do_fork+0xe8/0xb10 kernel/fork.c:2428 kernel_thread+0xb5/0xf0 kernel/fork.c:2480 call_usermodehelper_exec_work kernel/umh.c:163 [inline] call_usermodehelper_exec_work+0xcc/0x180 kernel/umh.c:149 process_one_work+0x94c/0x1670 kernel/workqueue.c:2269 worker_thread+0x64c/0x1120 kernel/workqueue.c:2415 kthread+0x3b5/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294 Modules linked in: ---[ end trace fd297a76eb3e498e ]--- RIP: 0010:htab_elem_free kernel/bpf/hashtab.c:769 [inline] RIP: 0010:htab_elem_free_rcu+0x4a/0x110 kernel/bpf/hashtab.c:779 Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 bc 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 6b f8 48 8d 7d 18 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 82 00 00 00 44 8b 65 18 bf 05 RSP: 0018:ffffc90000da8e50 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffff888034800010 RCX: 00000000ffcf5cb6 RDX: 0a85f600150c00a1 RSI: ffffffff81876bfe RDI: 542fb000a8600508 RBP: 542fb000a86004f0 R08: 0000000000000000 R09: ffffffff8c6009ff R10: fffffbfff18c013f R11: ffffffff89bda388 R12: ffffc90000da8ed8 R13: ffff888034800000 R14: 0000000000000000 R15: ffff8880a95de1c0 FS: 0000000000000000(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4f13ca9db8 CR3: 0000000087d43000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400