general protection fault, probably for non-canonical address 0xffff000000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: maybe wild-memory-access in range [0xfff8200000000000-0xfff8200000000007] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.0.0-rc1-syzkaller-00049-g4e55e22d3d9a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 RIP: 0010:rcu_do_batch kernel/rcu/tree.c:2245 [inline] RIP: 0010:rcu_core+0x7af/0x1780 kernel/rcu/tree.c:2505 Code: 07 f3 f7 ff 49 8d 7f 08 5e 48 89 f8 48 c1 e8 03 42 80 3c 20 00 0f 85 f8 0b 00 00 49 8b 47 08 4c 89 ff 49 c7 47 08 00 00 00 00 d0 48 c7 c6 f0 2f 32 81 48 c7 c7 c0 4e a9 87 e8 4c eb f7 ff 65 RSP: 0000:ffffc90000007e68 EFLAGS: 00010246 RAX: ffff000000000000 RBX: 0000000000000000 RCX: 603ad66270707a3c RDX: 1ffffffff0f0a66e RSI: ffffffff81322f8d RDI: ffff88810e6e9428 RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffff8b0766df R10: fffffbfff160ecdb R11: 0000000000000001 R12: dffffc0000000000 R13: ffffc90000007ed8 R14: 0000000000000005 R15: ffff88810e6e9428 FS: 0000000000000000(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88823ffff000 CR3: 0000000007825000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __do_softirq+0x1c0/0x9a9 kernel/softirq.c:571 invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x113/0x170 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:native_save_fl arch/x86/include/asm/irqflags.h:29 [inline] RIP: 0010:arch_local_save_flags arch/x86/include/asm/irqflags.h:70 [inline] RIP: 0010:arch_irqs_disabled arch/x86/include/asm/irqflags.h:130 [inline] RIP: 0010:acpi_safe_halt+0x6f/0xb0 drivers/acpi/processor_idle.c:113 Code: fb 84 db 74 06 5b e9 50 41 50 fb e8 4b 41 50 fb e8 36 ae 56 fb 66 90 e8 3f 41 50 fb 0f 00 2d a8 52 76 00 e8 33 41 50 fb fb f4 <9c> 5b 81 e3 00 02 00 00 fa 31 ff 48 89 de e8 fe 3d 50 fb 48 85 db RSP: 0000:ffffffff87807d38 EFLAGS: 00000293 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffffffff87852980 RSI: ffffffff85f5c7bd RDI: 0000000000000000 RBP: ffff8881099c1064 R08: 0000000000000001 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000001 R13: 0000000000000001 R14: ffff8881099c1000 R15: ffff8881008a9004 acpi_idle_do_entry drivers/acpi/processor_idle.c:555 [inline] acpi_idle_enter+0x524/0x6a0 drivers/acpi/processor_idle.c:692 cpuidle_enter_state+0x1ab/0xd30 drivers/cpuidle/cpuidle.c:239 cpuidle_enter+0x4a/0xa0 drivers/cpuidle/cpuidle.c:356 call_cpuidle kernel/sched/idle.c:155 [inline] cpuidle_idle_call kernel/sched/idle.c:236 [inline] do_idle+0x3e8/0x590 kernel/sched/idle.c:303 cpu_startup_entry+0x14/0x20 kernel/sched/idle.c:400 rest_init+0x169/0x270 init/main.c:727 arch_call_rest_init+0xf/0x14 init/main.c:883 start_kernel+0x46e/0x48f init/main.c:1138 secondary_startup_64_no_verify+0xce/0xdb Modules linked in: ---------------- Code disassembly (best guess), 1 bytes skipped: 0: f3 f7 ff repz idiv %edi 3: 49 8d 7f 08 lea 0x8(%r15),%rdi 7: 5e pop %rsi 8: 48 89 f8 mov %rdi,%rax b: 48 c1 e8 03 shr $0x3,%rax f: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) 14: 0f 85 f8 0b 00 00 jne 0xc12 1a: 49 8b 47 08 mov 0x8(%r15),%rax 1e: 4c 89 ff mov %r15,%rdi 21: 49 c7 47 08 00 00 00 movq $0x0,0x8(%r15) 28: 00 * 29: ff d0 callq *%rax <-- trapping instruction 2b: 48 c7 c6 f0 2f 32 81 mov $0xffffffff81322ff0,%rsi 32: 48 c7 c7 c0 4e a9 87 mov $0xffffffff87a94ec0,%rdi 39: e8 4c eb f7 ff callq 0xfff7eb8a 3e: 65 gs