Oops: general protection fault, probably for non-canonical address 0xdffffc0000000014: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x00000000000000a0-0x00000000000000a7] CPU: 0 UID: 0 PID: 5979 Comm: syz.0.116 Not tainted 6.11.0-rc4-next-20240823-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:is_same_group kernel/sched/fair.c:411 [inline] RIP: 0010:find_matching_se kernel/sched/fair.c:448 [inline] RIP: 0010:check_preempt_wakeup_fair+0x471/0xb00 kernel/sched/fair.c:8679 Code: 00 00 00 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 ff e8 d0 80 95 00 4d 8b 3f 49 8d ae a0 00 00 00 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 b0 80 95 00 48 8b 5d 00 49 8d af RSP: 0000:ffffc900034dede0 EFLAGS: 00010006 RAX: 0000000000000014 RBX: ffff8880b913eb00 RCX: ffffffff81670e88 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88802be7da00 RBP: 00000000000000a0 R08: ffff88802be7da07 R09: 1ffff110057cfb40 R10: dffffc0000000000 R11: ffffed10057cfb41 R12: ffff8880b903ea40 R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f488c00894c CR3: 000000005f41e000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: wakeup_preempt+0xd8/0x2a0 kernel/sched/core.c:2128 ttwu_do_activate+0x1f8/0x7e0 kernel/sched/core.c:3666 ttwu_queue kernel/sched/core.c:3940 [inline] try_to_wake_up+0x8bc/0x1480 kernel/sched/core.c:4266 swake_up_locked kernel/sched/swait.c:29 [inline] swake_up_one+0x70/0x160 kernel/sched/swait.c:52 rcu_report_unblock_qs_rnp kernel/rcu/tree.c:2376 [inline] rcu_preempt_deferred_qs_irqrestore+0x9f8/0xc70 kernel/rcu/tree_plugin.h:568 rcu_read_unlock_special+0x497/0x570 kernel/rcu/tree_plugin.h:692 __rcu_read_unlock+0xa1/0x110 kernel/rcu/tree_plugin.h:437 rcu_read_unlock include/linux/rcupdate.h:882 [inline] pte_unmap include/linux/pgtable.h:115 [inline] zap_pte_range mm/memory.c:1688 [inline] zap_pmd_range mm/memory.c:1736 [inline] zap_pud_range mm/memory.c:1765 [inline] zap_p4d_range mm/memory.c:1786 [inline] unmap_page_range+0x3753/0x40e0 mm/memory.c:1807 unmap_vmas+0x3cc/0x5f0 mm/memory.c:1897 exit_mmap+0x275/0xc40 mm/mmap.c:1912 __mmput+0x115/0x390 kernel/fork.c:1347 exit_mm+0x220/0x310 kernel/exit.c:571 do_exit+0x9b2/0x28e0 kernel/exit.c:926 do_group_exit+0x207/0x2c0 kernel/exit.c:1088 get_signal+0x176f/0x1810 kernel/signal.c:2936 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xc9/0x370 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fd6caf79e79 Code: Unable to access opcode bytes at 0x7fd6caf79e4f. RSP: 002b:00007fd6cbcd30e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007fd6cb116060 RCX: 00007fd6caf79e79 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fd6cb116060 RBP: 00007fd6cb116058 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd6cb116064 R13: 0000000000000000 R14: 00007ffc4f858450 R15: 00007ffc4f858538 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:is_same_group kernel/sched/fair.c:411 [inline] RIP: 0010:find_matching_se kernel/sched/fair.c:448 [inline] RIP: 0010:check_preempt_wakeup_fair+0x471/0xb00 kernel/sched/fair.c:8679 Code: 00 00 00 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 ff e8 d0 80 95 00 4d 8b 3f 49 8d ae a0 00 00 00 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 b0 80 95 00 48 8b 5d 00 49 8d af RSP: 0000:ffffc900034dede0 EFLAGS: 00010006 RAX: 0000000000000014 RBX: ffff8880b913eb00 RCX: ffffffff81670e88 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88802be7da00 RBP: 00000000000000a0 R08: ffff88802be7da07 R09: 1ffff110057cfb40 R10: dffffc0000000000 R11: ffffed10057cfb41 R12: ffff8880b903ea40 R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f488c00894c CR3: 000000005f41e000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: 00 4c 89 f8 add %cl,-0x8(%rcx,%rcx,4) 6: 48 c1 e8 03 shr $0x3,%rax a: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) f: 74 08 je 0x19 11: 4c 89 ff mov %r15,%rdi 14: e8 d0 80 95 00 call 0x9580e9 19: 4d 8b 3f mov (%r15),%r15 1c: 49 8d ae a0 00 00 00 lea 0xa0(%r14),%rbp 23: 48 89 e8 mov %rbp,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 48 89 ef mov %rbp,%rdi 34: e8 b0 80 95 00 call 0x9580e9 39: 48 8b 5d 00 mov 0x0(%rbp),%rbx 3d: 49 rex.WB 3e: 8d .byte 0x8d 3f: af scas %es:(%rdi),%eax