general protection fault, probably for non-canonical address 0xf4edd9001e380066: 0000 [#1] PREEMPT SMP KASAN KASAN: maybe wild-memory-access in range [0xa76ee800f1c00330-0xa76ee800f1c00337] CPU: 0 PID: 17506 Comm: syz-executor.0 Not tainted 5.9.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:htab_elem_free kernel/bpf/hashtab.c:769 [inline] RIP: 0010:htab_elem_free_rcu+0x4a/0x110 kernel/bpf/hashtab.c:779 Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 bc 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 6b f8 48 8d 7d 18 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 82 00 00 00 44 8b 65 18 bf 05 RSP: 0000:ffffc90000007e50 EFLAGS: 00010a07 RAX: dffffc0000000000 RBX: ffff88804dc00010 RCX: 00000000ffceddbc RDX: 14eddd001e380066 RSI: ffffffff81876bfe RDI: a76ee800f1c00335 RBP: a76ee800f1c0031d R08: 0000000000000000 R09: ffffffff8c6009f7 R10: fffffbfff18c013e R11: 0000000000000001 R12: ffffc90000007ed8 R13: ffff88804dc00000 R14: 0000000000000000 R15: ffff88808c4d0580 FS: 000000000195a940(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f895ecbdd90 CR3: 000000008fddf000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_do_batch kernel/rcu/tree.c:2428 [inline] rcu_core+0x5ca/0x1130 kernel/rcu/tree.c:2656 __do_softirq+0x1f7/0xa91 kernel/softirq.c:298 asm_call_on_stack+0xf/0x20 arch/x86/entry/entry_64.S:706 __run_on_irqstack arch/x86/include/asm/irq_stack.h:22 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:48 [inline] do_softirq_own_stack+0x9d/0xd0 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:393 [inline] __irq_exit_rcu kernel/softirq.c:423 [inline] irq_exit_rcu+0x235/0x280 kernel/softirq.c:435 sysvec_apic_timer_interrupt+0x51/0xf0 arch/x86/kernel/apic/apic.c:1091 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:581 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:770 [inline] RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] RIP: 0010:_raw_spin_unlock_irqrestore+0x4d/0x90 kernel/locking/spinlock.c:191 Code: 48 c7 c0 88 3c b6 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 3c 48 83 3d 52 b5 bd 01 00 74 29 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 e4 31 57 f9 65 8b 05 2d 77 09 78 RSP: 0000:ffffc9001591fcc0 EFLAGS: 00000282 RAX: 1ffffffff136c791 RBX: 0000000000000282 RCX: 0000000000000006 RDX: dffffc0000000000 RSI: 0000000000000003 RDI: 0000000000000282 RBP: ffff88812ffffcc0 R08: 0000000000000001 R09: ffffffff8c6009ff R10: fffffbfff18c013f R11: 0000000000000000 R12: 000000000000000f R13: ffff8880ae631e90 R14: ffff88812fffb000 R15: dffffc0000000000 spin_unlock_irqrestore include/linux/spinlock.h:409 [inline] pagevec_lru_move_fn+0x1be/0x280 mm/swap.c:230 __pagevec_lru_add mm/swap.c:1031 [inline] lru_cache_add+0x616/0xb00 mm/swap.c:473 do_anonymous_page mm/memory.c:3389 [inline] handle_pte_fault mm/memory.c:4198 [inline] __handle_mm_fault mm/memory.c:4335 [inline] handle_mm_fault+0x2e2e/0x46d0 mm/memory.c:4433 do_user_addr_fault+0x598/0xbf0 arch/x86/mm/fault.c:1294 handle_page_fault arch/x86/mm/fault.c:1351 [inline] exc_page_fault+0xa8/0x190 arch/x86/mm/fault.c:1404 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:538 RIP: 0033:0x4149cf Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 RSP: 002b:00007fff9ffa7ff0 EFLAGS: 00010206 RAX: 00007f895ec9d000 RBX: 0000000000020000 RCX: 000000000045d60a RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 RBP: 00007fff9ffa80d0 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff9ffa81d0 R13: 00007f895ecbd700 R14: 000000000000006a R15: 000000000118cfec Modules linked in: ---[ end trace e22e28ecec5b4a39 ]--- RIP: 0010:htab_elem_free kernel/bpf/hashtab.c:769 [inline] RIP: 0010:htab_elem_free_rcu+0x4a/0x110 kernel/bpf/hashtab.c:779 Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 bc 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 6b f8 48 8d 7d 18 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 82 00 00 00 44 8b 65 18 bf 05 RSP: 0000:ffffc90000007e50 EFLAGS: 00010a07 RAX: dffffc0000000000 RBX: ffff88804dc00010 RCX: 00000000ffceddbc RDX: 14eddd001e380066 RSI: ffffffff81876bfe RDI: a76ee800f1c00335 RBP: a76ee800f1c0031d R08: 0000000000000000 R09: ffffffff8c6009f7 R10: fffffbfff18c013e R11: 0000000000000001 R12: ffffc90000007ed8 R13: ffff88804dc00000 R14: 0000000000000000 R15: ffff88808c4d0580 FS: 000000000195a940(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f895ecbdd90 CR3: 000000008fddf000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400