general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] CPU: 0 PID: 1251 Comm: syz-executor.4 Not tainted 5.13.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:_compound_head include/linux/page-flags.h:185 [inline] RIP: 0010:PageSwapCache include/linux/page-flags.h:402 [inline] RIP: 0010:free_swap_cache+0x28/0x310 mm/swap_state.c:291 Code: 00 90 41 57 41 56 41 55 41 54 49 89 fc 55 4d 8d 6c 24 08 53 e8 b9 c1 c1 ff 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 8f 02 00 00 49 8b 6c 24 08 31 ff 48 89 eb 83 e3 RSP: 0018:ffffc90016b7f6e8 EFLAGS: 00010212 RAX: dffffc0000000000 RBX: ffff888000110270 RCX: 0000000000000000 RDX: 0000000000000001 RSI: ffffffff81b3c877 RDI: 0000000000000000 RBP: 000000000000004c R08: 00000000000001fe R09: 0000000000000000 R10: ffffffff81b3ce42 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000008 R14: dffffc0000000000 R15: ffffc90016b7fab0 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000004bfbc5 CR3: 0000000000114000 CR4: 0000000000350ef0 Call Trace: free_pages_and_swap_cache+0x58/0x90 mm/swap_state.c:319 tlb_batch_pages_flush mm/mmu_gather.c:49 [inline] tlb_flush_mmu_free mm/mmu_gather.c:242 [inline] tlb_flush_mmu+0xe9/0x6b0 mm/mmu_gather.c:249 zap_pte_range mm/memory.c:1335 [inline] zap_pmd_range mm/memory.c:1384 [inline] zap_pud_range mm/memory.c:1413 [inline] zap_p4d_range mm/memory.c:1434 [inline] unmap_page_range+0x1b86/0x2890 mm/memory.c:1455 unmap_single_vma+0x198/0x300 mm/memory.c:1500 unmap_vmas+0x16d/0x2f0 mm/memory.c:1532 exit_mmap+0x1d0/0x620 mm/mmap.c:3202 __mmput+0x122/0x470 kernel/fork.c:1101 mmput+0x58/0x60 kernel/fork.c:1122 exit_mm kernel/exit.c:501 [inline] do_exit+0xae2/0x2a50 kernel/exit.c:812 do_group_exit+0x125/0x310 kernel/exit.c:922 get_signal+0x47f/0x2150 kernel/signal.c:2796 arch_do_signal_or_restart+0x2a9/0x1eb0 arch/x86/kernel/signal.c:789 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:209 __syscall_exit_to_user_mode_work kernel/entry/common.c:291 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:302 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x4665d9 Code: Unable to access opcode bytes at RIP 0x4665af. RSP: 002b:00007fec249b8218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 000000000056c040 RCX: 00000000004665d9 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000056c044 RBP: 000000000056c038 R08: 000000000000000e R09: 0000000000000000 R10: 000000000000003c R11: 0000000000000246 R12: 000000000056c044 R13: 00007ffc47a8ec6f R14: 00007fec249b8300 R15: 0000000000022000 Modules linked in: ---[ end trace 8eeaa5c881505178 ]--- RIP: 0010:_compound_head include/linux/page-flags.h:185 [inline] RIP: 0010:PageSwapCache include/linux/page-flags.h:402 [inline] RIP: 0010:free_swap_cache+0x28/0x310 mm/swap_state.c:291 Code: 00 90 41 57 41 56 41 55 41 54 49 89 fc 55 4d 8d 6c 24 08 53 e8 b9 c1 c1 ff 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 8f 02 00 00 49 8b 6c 24 08 31 ff 48 89 eb 83 e3 RSP: 0018:ffffc90016b7f6e8 EFLAGS: 00010212 RAX: dffffc0000000000 RBX: ffff888000110270 RCX: 0000000000000000 RDX: 0000000000000001 RSI: ffffffff81b3c877 RDI: 0000000000000000 RBP: 000000000000004c R08: 00000000000001fe R09: 0000000000000000 R10: ffffffff81b3ce42 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000008 R14: dffffc0000000000 R15: ffffc90016b7fab0 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f0a40bbf000 CR3: 000000001df44000 CR4: 0000000000350ee0