general protection fault, probably for non-canonical address 0xffff000000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: maybe wild-memory-access in range [0xfff8200000000000-0xfff8200000000007] CPU: 0 PID: 217 Comm: kworker/u4:3 Not tainted 6.0.0-rc1-syzkaller-00047-g10174220f55a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 Workqueue: events_unbound call_usermodehelper_exec_work RIP: 0010:rcu_do_batch kernel/rcu/tree.c:2245 [inline] RIP: 0010:rcu_core+0x7af/0x1780 kernel/rcu/tree.c:2505 Code: 07 f3 f7 ff 49 8d 7f 08 5e 48 89 f8 48 c1 e8 03 42 80 3c 20 00 0f 85 f8 0b 00 00 49 8b 47 08 4c 89 ff 49 c7 47 08 00 00 00 00 d0 48 c7 c6 f0 2f 32 81 48 c7 c7 c0 4e a9 87 e8 4c eb f7 ff 65 RSP: 0000:ffffc90000007e68 EFLAGS: 00010246 RAX: ffff000000000000 RBX: 0000000000000000 RCX: 603ad66270707a3c RDX: 1ffff11021c954ce RSI: ffffffff81322f8d RDI: ffff88810e771428 RBP: 0000000000000008 R08: 0000000000000000 R09: ffffffff8b0766df R10: fffffbfff160ecdb R11: 0000000000000001 R12: dffffc0000000000 R13: ffffc90000007ed8 R14: 0000000000000007 R15: ffff88810e771428 FS: 0000000000000000(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88823ffff000 CR3: 0000000007825000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __do_softirq+0x1c0/0x9a9 kernel/softirq.c:571 invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x113/0x170 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:unwind_next_frame+0x359/0x1cc0 arch/x86/kernel/unwind_orc.c:456 Code: 00 00 00 00 00 fc ff df 4c 89 fa 48 c1 ea 03 0f b6 04 02 4c 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 a7 08 00 00 41 0f b6 40 04 0f 0f 85 b5 00 00 00 49 8d 78 05 48 b8 00 00 00 00 00 fc ff df RSP: 0000:ffffc900016bf518 EFLAGS: 00000246 RAX: 0000000000000015 RBX: 0000000000000001 RCX: ffffffff8114d2e6 RDX: 0000000000000004 RSI: ffffffff892af17e RDI: ffffffff88e54bb0 RBP: ffffc900016bf5d0 R08: ffffffff892af1a8 R09: ffffc900016bf5bc R10: fffff520002d7ebc R11: 0000000000052040 R12: ffffc900016bf5bd R13: ffffc900016bf588 R14: ffffffff8114d2e6 R15: ffffffff892af1ac arch_stack_walk+0x7d/0xe0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:45 [inline] set_alloc_info mm/kasan/common.c:437 [inline] __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:470 kasan_slab_alloc include/linux/kasan.h:224 [inline] slab_post_alloc_hook mm/slab.h:727 [inline] slab_alloc_node mm/slub.c:3243 [inline] kmem_cache_alloc_node+0x309/0x3c0 mm/slub.c:3293 alloc_task_struct_node kernel/fork.c:172 [inline] dup_task_struct kernel/fork.c:969 [inline] copy_process+0x4ce/0x6de0 kernel/fork.c:2087 kernel_clone+0xe7/0xab0 kernel/fork.c:2673 user_mode_thread+0xad/0xe0 kernel/fork.c:2742 call_usermodehelper_exec_work kernel/umh.c:174 [inline] call_usermodehelper_exec_work+0xcc/0x180 kernel/umh.c:160 process_one_work+0x991/0x1610 kernel/workqueue.c:2289 worker_thread+0x665/0x1080 kernel/workqueue.c:2436 kthread+0x2ea/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:rcu_do_batch kernel/rcu/tree.c:2245 [inline] RIP: 0010:rcu_core+0x7af/0x1780 kernel/rcu/tree.c:2505 Code: 07 f3 f7 ff 49 8d 7f 08 5e 48 89 f8 48 c1 e8 03 42 80 3c 20 00 0f 85 f8 0b 00 00 49 8b 47 08 4c 89 ff 49 c7 47 08 00 00 00 00 d0 48 c7 c6 f0 2f 32 81 48 c7 c7 c0 4e a9 87 e8 4c eb f7 ff 65 RSP: 0000:ffffc90000007e68 EFLAGS: 00010246 RAX: ffff000000000000 RBX: 0000000000000000 RCX: 603ad66270707a3c RDX: 1ffff11021c954ce RSI: ffffffff81322f8d RDI: ffff88810e771428 RBP: 0000000000000008 R08: 0000000000000000 R09: ffffffff8b0766df R10: fffffbfff160ecdb R11: 0000000000000001 R12: dffffc0000000000 R13: ffffc90000007ed8 R14: 0000000000000007 R15: ffff88810e771428 FS: 0000000000000000(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88823ffff000 CR3: 0000000007825000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: f3 f7 ff repz idiv %edi 3: 49 8d 7f 08 lea 0x8(%r15),%rdi 7: 5e pop %rsi 8: 48 89 f8 mov %rdi,%rax b: 48 c1 e8 03 shr $0x3,%rax f: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) 14: 0f 85 f8 0b 00 00 jne 0xc12 1a: 49 8b 47 08 mov 0x8(%r15),%rax 1e: 4c 89 ff mov %r15,%rdi 21: 49 c7 47 08 00 00 00 movq $0x0,0x8(%r15) 28: 00 * 29: ff d0 callq *%rax <-- trapping instruction 2b: 48 c7 c6 f0 2f 32 81 mov $0xffffffff81322ff0,%rsi 32: 48 c7 c7 c0 4e a9 87 mov $0xffffffff87a94ec0,%rdi 39: e8 4c eb f7 ff callq 0xfff7eb8a 3e: 65 gs