Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 0 UID: 0 PID: 5442 Comm: syz.1.26 Not tainted 6.11.0-rc4-next-20240823-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:____rb_erase_color lib/rbtree.c:354 [inline] RIP: 0010:__rb_erase_color+0x2d7/0xa30 lib/rbtree.c:413 Code: 73 02 00 00 49 8d 5c 24 10 48 89 dd 48 c1 ed 03 42 80 7c 35 00 00 74 08 48 89 df e8 13 d8 44 f6 4c 8b 2b 4d 89 ef 49 c1 ef 03 <43> 80 3c 37 00 74 08 4c 89 ef e8 fa d7 44 f6 41 f6 45 00 01 48 89 RSP: 0018:ffffc900044670a0 EFLAGS: 00010046 RAX: 000000000016e360 RBX: ffff888017ab3ca0 RCX: dffffc0000000000 RDX: ffffffff81680dc0 RSI: ffff8880b913eb48 RDI: ffff888017ab3c90 RBP: 1ffff11002f56794 R08: ffff88807a0b1827 R09: 0000000000000000 R10: ffff88807a0b1818 R11: ffffffff81671a40 R12: ffff888017ab3c90 R13: 0000000000000000 R14: dffffc0000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c3c64dd CR3: 0000000064442000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rb_erase_augmented include/linux/rbtree_augmented.h:331 [inline] rb_erase_augmented_cached include/linux/rbtree_augmented.h:340 [inline] __dequeue_entity+0x953/0xd30 kernel/sched/fair.c:863 set_next_entity+0xfe/0x4c0 kernel/sched/fair.c:5559 set_next_task_fair+0x1dd/0x540 kernel/sched/fair.c:13151 set_next_task kernel/sched/sched.h:2434 [inline] pick_next_task kernel/sched/core.c:6085 [inline] __schedule+0x250c/0x4b30 kernel/sched/core.c:6632 preempt_schedule_common+0x84/0xd0 kernel/sched/core.c:6856 preempt_schedule+0xe1/0xf0 kernel/sched/core.c:6880 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12 __raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline] _raw_spin_unlock+0x3e/0x50 kernel/locking/spinlock.c:186 spin_unlock include/linux/spinlock.h:391 [inline] zap_pte_range mm/memory.c:1688 [inline] zap_pmd_range mm/memory.c:1736 [inline] zap_pud_range mm/memory.c:1765 [inline] zap_p4d_range mm/memory.c:1786 [inline] unmap_page_range+0x36b1/0x40e0 mm/memory.c:1807 unmap_vmas+0x3cc/0x5f0 mm/memory.c:1897 exit_mmap+0x275/0xc40 mm/mmap.c:1912 __mmput+0x115/0x390 kernel/fork.c:1347 exit_mm+0x220/0x310 kernel/exit.c:571 do_exit+0x9b2/0x28e0 kernel/exit.c:926 do_group_exit+0x207/0x2c0 kernel/exit.c:1088 __do_sys_exit_group kernel/exit.c:1099 [inline] __se_sys_exit_group kernel/exit.c:1097 [inline] __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1097 x64_sys_call+0x26a8/0x26b0 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f0e11179e79 Code: Unable to access opcode bytes at 0x7f0e11179e4f. RSP: 002b:00007fffe056e378 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0e11179e79 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fffe056e3cc R08: 00007fffe056e45f R09: 000000000001271b R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000032 R13: 000000000001271b R14: 00000000000126b7 R15: 00007fffe056e420 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:____rb_erase_color lib/rbtree.c:354 [inline] RIP: 0010:__rb_erase_color+0x2d7/0xa30 lib/rbtree.c:413 Code: 73 02 00 00 49 8d 5c 24 10 48 89 dd 48 c1 ed 03 42 80 7c 35 00 00 74 08 48 89 df e8 13 d8 44 f6 4c 8b 2b 4d 89 ef 49 c1 ef 03 <43> 80 3c 37 00 74 08 4c 89 ef e8 fa d7 44 f6 41 f6 45 00 01 48 89 RSP: 0018:ffffc900044670a0 EFLAGS: 00010046 RAX: 000000000016e360 RBX: ffff888017ab3ca0 RCX: dffffc0000000000 RDX: ffffffff81680dc0 RSI: ffff8880b913eb48 RDI: ffff888017ab3c90 RBP: 1ffff11002f56794 R08: ffff88807a0b1827 R09: 0000000000000000 R10: ffff88807a0b1818 R11: ffffffff81671a40 R12: ffff888017ab3c90 R13: 0000000000000000 R14: dffffc0000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c3c64dd CR3: 0000000064442000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 73 02 jae 0x4 2: 00 00 add %al,(%rax) 4: 49 8d 5c 24 10 lea 0x10(%r12),%rbx 9: 48 89 dd mov %rbx,%rbp c: 48 c1 ed 03 shr $0x3,%rbp 10: 42 80 7c 35 00 00 cmpb $0x0,0x0(%rbp,%r14,1) 16: 74 08 je 0x20 18: 48 89 df mov %rbx,%rdi 1b: e8 13 d8 44 f6 call 0xf644d833 20: 4c 8b 2b mov (%rbx),%r13 23: 4d 89 ef mov %r13,%r15 26: 49 c1 ef 03 shr $0x3,%r15 * 2a: 43 80 3c 37 00 cmpb $0x0,(%r15,%r14,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 4c 89 ef mov %r13,%rdi 34: e8 fa d7 44 f6 call 0xf644d833 39: 41 f6 45 00 01 testb $0x1,0x0(%r13) 3e: 48 rex.W 3f: 89 .byte 0x89