general protection fault, probably for non-canonical address 0xe0ce3c3ae0000340: 0000 [#1] PREEMPT SMP KASAN KASAN: maybe wild-memory-access in range [0x067201d700001a00-0x067201d700001a07] CPU: 1 PID: 6656 Comm: syz-executor.1 Not tainted 6.4.0-rc7-syzkaller-00234-g547cc9be86f4 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 RIP: 0010:__debug_check_no_obj_freed lib/debugobjects.c:1012 [inline] RIP: 0010:debug_check_no_obj_freed+0x1d7/0x420 lib/debugobjects.c:1054 Code: 39 00 0f 85 0f 02 00 00 48 89 45 08 4d 89 30 4c 89 c7 4d 89 68 08 e8 d8 cb ff ff 48 85 ed 74 2c 49 89 e8 4c 89 c0 48 c1 e8 03 <42> 80 3c 38 00 0f 84 2e ff ff ff 4c 89 c7 4c 89 44 24 38 e8 81 4d RSP: 0018:ffffc900037cf908 EFLAGS: 00010012 RAX: 00ce403ae0000340 RBX: ffff88803ec9bba0 RCX: ffffffff816652c4 RDX: 1ffffffff23fc3e9 RSI: 0000000000000004 RDI: ffff88819e541360 RBP: 067201d700001a00 R08: 067201d700001a00 R09: ffff888100000000 R10: fffff520006f9f0f R11: 0000000000094001 R12: 0000000000000009 R13: dead000000000122 R14: dead000000000100 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055556ffffdc0 CR3: 000000007a3a9000 CR4: 0000000000350ee0 Call Trace: slab_free_hook mm/slub.c:1756 [inline] slab_free_freelist_hook+0xeb/0x1c0 mm/slub.c:1807 slab_free mm/slub.c:3786 [inline] kmem_cache_free+0xe9/0x480 mm/slub.c:3808 pgtable_pte_page_dtor include/linux/mm.h:2785 [inline] ___pte_free_tlb+0x1d/0x1a0 arch/x86/mm/pgtable.c:55 __pte_free_tlb arch/x86/include/asm/pgalloc.h:61 [inline] free_pte_range mm/memory.c:193 [inline] free_pmd_range mm/memory.c:211 [inline] free_pud_range mm/memory.c:245 [inline] free_p4d_range mm/memory.c:279 [inline] free_pgd_range+0x497/0xbf0 mm/memory.c:359 free_pgtables+0x68a/0x930 mm/memory.c:404 exit_mmap+0x29e/0x930 mm/mmap.c:3118 __mmput+0x128/0x4c0 kernel/fork.c:1351 mmput+0x60/0x70 kernel/fork.c:1373 exit_mm kernel/exit.c:567 [inline] do_exit+0x9b0/0x29b0 kernel/exit.c:861 do_group_exit+0xd4/0x2a0 kernel/exit.c:1024 __do_sys_exit_group kernel/exit.c:1035 [inline] __se_sys_exit_group kernel/exit.c:1033 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1033 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fb218e8c389 Code: Unable to access opcode bytes at 0x7fb218e8c35f. RSP: 002b:00007fffb8e89478 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 000000005652a400 RCX: 00007fb218e8c389 RDX: 00007fb218e45391 RSI: 0000000000000000 RDI: 000000000000000b RBP: 000000000000000b R08: 00007fffb8e89960 R09: 000000005652a400 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fffb8e89bb0 R13: 0000000000000000 R14: 0000000000000020 R15: ffffffffffffffff Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__debug_check_no_obj_freed lib/debugobjects.c:1012 [inline] RIP: 0010:debug_check_no_obj_freed+0x1d7/0x420 lib/debugobjects.c:1054 Code: 39 00 0f 85 0f 02 00 00 48 89 45 08 4d 89 30 4c 89 c7 4d 89 68 08 e8 d8 cb ff ff 48 85 ed 74 2c 49 89 e8 4c 89 c0 48 c1 e8 03 <42> 80 3c 38 00 0f 84 2e ff ff ff 4c 89 c7 4c 89 44 24 38 e8 81 4d RSP: 0018:ffffc900037cf908 EFLAGS: 00010012 RAX: 00ce403ae0000340 RBX: ffff88803ec9bba0 RCX: ffffffff816652c4 RDX: 1ffffffff23fc3e9 RSI: 0000000000000004 RDI: ffff88819e541360 RBP: 067201d700001a00 R08: 067201d700001a00 R09: ffff888100000000 R10: fffff520006f9f0f R11: 0000000000094001 R12: 0000000000000009 R13: dead000000000122 R14: dead000000000100 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055556ffffdc0 CR3: 000000007a3a9000 CR4: 0000000000350ee0 ---------------- Code disassembly (best guess): 0: 39 00 cmp %eax,(%rax) 2: 0f 85 0f 02 00 00 jne 0x217 8: 48 89 45 08 mov %rax,0x8(%rbp) c: 4d 89 30 mov %r14,(%r8) f: 4c 89 c7 mov %r8,%rdi 12: 4d 89 68 08 mov %r13,0x8(%r8) 16: e8 d8 cb ff ff callq 0xffffcbf3 1b: 48 85 ed test %rbp,%rbp 1e: 74 2c je 0x4c 20: 49 89 e8 mov %rbp,%r8 23: 4c 89 c0 mov %r8,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1) <-- trapping instruction 2f: 0f 84 2e ff ff ff je 0xffffff63 35: 4c 89 c7 mov %r8,%rdi 38: 4c 89 44 24 38 mov %r8,0x38(%rsp) 3d: e8 .byte 0xe8 3e: 81 .byte 0x81 3f: 4d rex.WRB