general protection fault, probably for non-canonical address 0xffff000000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: maybe wild-memory-access in range [0xfff8200000000000-0xfff8200000000007] CPU: 0 PID: 266 Comm: kworker/u4:1 Not tainted 6.0.0-rc1-syzkaller-00049-g4e55e22d3d9a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 RIP: 0010:rcu_do_batch kernel/rcu/tree.c:2245 [inline] RIP: 0010:rcu_core+0x7af/0x1780 kernel/rcu/tree.c:2505 Code: 07 f3 f7 ff 49 8d 7f 08 5e 48 89 f8 48 c1 e8 03 42 80 3c 20 00 0f 85 f8 0b 00 00 49 8b 47 08 4c 89 ff 49 c7 47 08 00 00 00 00 d0 48 c7 c6 f0 2f 32 81 48 c7 c7 c0 4e a9 87 e8 4c eb f7 ff 65 RSP: 0000:ffffc90000007e68 EFLAGS: 00010246 RAX: ffff000000000000 RBX: 0000000000000000 RCX: 603ad66270707a3c RDX: 1ffff11021cf4bee RSI: ffffffff81322f8d RDI: ffff88810e739428 RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffff8b0766df R10: fffffbfff160ecdb R11: 0000000000000001 R12: dffffc0000000000 R13: ffffc90000007ed8 R14: 0000000000000006 R15: ffff88810e739428 FS: 0000000000000000(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88823ffff000 CR3: 0000000007825000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __do_softirq+0x1c0/0x9a9 kernel/softirq.c:571 invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x113/0x170 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:on_stack arch/x86/include/asm/stacktrace.h:56 [inline] RIP: 0010:stack_access_ok+0x6d/0x1d0 arch/x86/kernel/unwind_orc.c:342 Code: 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 2c 01 00 00 48 8d 7b 10 4c 8b 6b 08 48 b8 00 00 00 00 00 fc ff df <48> 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 13 01 00 00 49 39 ed 48 8b RSP: 0000:ffffc9000180f7c8 EFLAGS: 00000246 RAX: dffffc0000000000 RBX: ffffc9000180f870 RCX: 0000000000000001 RDX: 1ffff92000301f0f RSI: ffffc9000180ff30 RDI: ffffc9000180f880 RBP: ffffc9000180ff30 R08: ffffffff892ba62e R09: ffffc9000180f8a4 R10: fffff52000301f19 R11: ffffc9000180ff50 R12: 0000000000000008 R13: ffffc90001808000 R14: ffffc9000180ff30 R15: ffffffff892ba632 deref_stack_reg arch/x86/kernel/unwind_orc.c:352 [inline] unwind_next_frame+0x12b4/0x1cc0 arch/x86/kernel/unwind_orc.c:600 arch_stack_walk+0x7d/0xe0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:122 save_stack+0x151/0x1e0 mm/page_owner.c:127 __reset_page_owner+0x59/0x170 mm/page_owner.c:148 reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1449 [inline] free_pcp_prepare+0x5d2/0xb80 mm/page_alloc.c:1499 free_unref_page_prepare mm/page_alloc.c:3380 [inline] free_unref_page_list+0x176/0x900 mm/page_alloc.c:3522 release_pages+0xb79/0x11b0 mm/swap.c:1012 tlb_batch_pages_flush+0xa8/0x1a0 mm/mmu_gather.c:58 tlb_flush_mmu_free mm/mmu_gather.c:255 [inline] tlb_flush_mmu mm/mmu_gather.c:262 [inline] tlb_finish_mmu+0x147/0x7e0 mm/mmu_gather.c:353 exit_mmap+0x1d2/0x490 mm/mmap.c:3115 __mmput kernel/fork.c:1187 [inline] mmput+0xcc/0x410 kernel/fork.c:1208 free_bprm+0x65/0x2e0 fs/exec.c:1492 kernel_execve+0x3fa/0x500 fs/exec.c:2011 call_usermodehelper_exec_async+0x2e3/0x580 kernel/umh.c:112 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:rcu_do_batch kernel/rcu/tree.c:2245 [inline] RIP: 0010:rcu_core+0x7af/0x1780 kernel/rcu/tree.c:2505 Code: 07 f3 f7 ff 49 8d 7f 08 5e 48 89 f8 48 c1 e8 03 42 80 3c 20 00 0f 85 f8 0b 00 00 49 8b 47 08 4c 89 ff 49 c7 47 08 00 00 00 00 d0 48 c7 c6 f0 2f 32 81 48 c7 c7 c0 4e a9 87 e8 4c eb f7 ff 65 RSP: 0000:ffffc90000007e68 EFLAGS: 00010246 RAX: ffff000000000000 RBX: 0000000000000000 RCX: 603ad66270707a3c RDX: 1ffff11021cf4bee RSI: ffffffff81322f8d RDI: ffff88810e739428 RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffff8b0766df R10: fffffbfff160ecdb R11: 0000000000000001 R12: dffffc0000000000 R13: ffffc90000007ed8 R14: 0000000000000006 R15: ffff88810e739428 FS: 0000000000000000(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88823ffff000 CR3: 0000000007825000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: f3 f7 ff repz idiv %edi 3: 49 8d 7f 08 lea 0x8(%r15),%rdi 7: 5e pop %rsi 8: 48 89 f8 mov %rdi,%rax b: 48 c1 e8 03 shr $0x3,%rax f: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) 14: 0f 85 f8 0b 00 00 jne 0xc12 1a: 49 8b 47 08 mov 0x8(%r15),%rax 1e: 4c 89 ff mov %r15,%rdi 21: 49 c7 47 08 00 00 00 movq $0x0,0x8(%r15) 28: 00 * 29: ff d0 callq *%rax <-- trapping instruction 2b: 48 c7 c6 f0 2f 32 81 mov $0xffffffff81322ff0,%rsi 32: 48 c7 c7 c0 4e a9 87 mov $0xffffffff87a94ec0,%rdi 39: e8 4c eb f7 ff callq 0xfff7eb8a 3e: 65 gs