Oops: general protection fault, probably for non-canonical address 0xdffffc0000000014: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x00000000000000a0-0x00000000000000a7]
CPU: 1 UID: 0 PID: 5523 Comm: syz.1.52 Not tainted 6.11.0-rc4-next-20240822-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:is_same_group kernel/sched/fair.c:411 [inline]
RIP: 0010:find_matching_se kernel/sched/fair.c:448 [inline]
RIP: 0010:check_preempt_wakeup_fair+0x471/0xb00 kernel/sched/fair.c:8679
Code: 00 00 00 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 ff e8 30 71 95 00 4d 8b 3f 49 8d ae a0 00 00 00 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 10 71 95 00 48 8b 5d 00 49 8d af
RSP: 0018:ffffc90000a18aa0 EFLAGS: 00010006
RAX: 0000000000000014 RBX: ffff8880b913eb00 RCX: ffffffff81671258
RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff888023805a00
RBP: 00000000000000a0 R08: ffff888023805a07 R09: 1ffff11004700b40
R10: dffffc0000000000 R11: ffffed1004700b41 R12: ffff8880b903ea40
R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000
FS: 00007f2657fc86c0(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8a3dfffd00 CR3: 000000002e910000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
wakeup_preempt+0xd8/0x2a0 kernel/sched/core.c:2128
ttwu_do_activate+0x1f8/0x7e0 kernel/sched/core.c:3666
ttwu_queue kernel/sched/core.c:3940 [inline]
try_to_wake_up+0x8bc/0x1480 kernel/sched/core.c:4266
swake_up_locked kernel/sched/swait.c:29 [inline]
complete_with_flags kernel/sched/completion.c:24 [inline]
complete+0xac/0x1c0 kernel/sched/completion.c:47
random_recv_done+0x138/0x1e0 drivers/char/hw_random/virtio-rng.c:48
vring_interrupt+0x21d/0x380 drivers/virtio/virtio_ring.c:2595
__handle_irq_event_percpu+0x29a/0xa80 kernel/irq/handle.c:158
handle_irq_event_percpu kernel/irq/handle.c:193 [inline]
handle_irq_event+0x89/0x1f0 kernel/irq/handle.c:210
handle_edge_irq+0x25f/0xc20 kernel/irq/chip.c:831
generic_handle_irq_desc include/linux/irqdesc.h:173 [inline]
handle_irq arch/x86/kernel/irq.c:247 [inline]
call_irq_handler arch/x86/kernel/irq.c:259 [inline]
__common_interrupt+0x136/0x230 arch/x86/kernel/irq.c:285
common_interrupt+0xb4/0xd0 arch/x86/kernel/irq.c:278
asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693
RIP: 0010:get_current arch/x86/include/asm/current.h:49 [inline]
RIP: 0010:write_comp_data kernel/kcov.c:245 [inline]
RIP: 0010:__sanitizer_cov_trace_const_cmp8+0x8/0x90 kernel/kcov.c:321
Code: 44 0a 20 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 4c 8b 04 24 <65> 48 8b 0c 25 80 d7 03 00 65 8b 05 30 d2 6f 7e 25 00 01 ff 00 74
RSP: 0018:ffffc90004ca6ea0 EFLAGS: 00000246
RAX: 1ffffffff29fe7a9 RBX: 0000000000000001 RCX: 0000000000040000
RDX: 0000000000000005 RSI: 0000000000000001 RDI: 0000000000000000
RBP: 0000000000000092 R08: ffffffff81f9273b R09: ffffffff81f924f3
R10: 0000000000000005 R11: ffff888074445a00 R12: ffffc90004ca6f70
R13: ffffffff94ff3d48 R14: dffffc0000000000 R15: 0000000000140cca
find_first_bit include/linux/find.h:207 [inline]
__first_node include/linux/nodemask.h:266 [inline]
policy_nodemask+0x29b/0x7e0 mm/mempolicy.c:2053
alloc_pages_mpol_noprof+0xb8/0x680 mm/mempolicy.c:2227
folio_alloc_mpol_noprof+0x36/0x50 mm/mempolicy.c:2283
shmem_alloc_folio mm/shmem.c:1765 [inline]
shmem_alloc_and_add_folio+0x49b/0x13d0 mm/shmem.c:1804
shmem_get_folio_gfp+0x58d/0x2060 mm/shmem.c:2312
shmem_fault+0x252/0x6f0 mm/shmem.c:2512
__do_fault+0x135/0x460 mm/memory.c:4651
do_read_fault mm/memory.c:5057 [inline]
do_fault mm/memory.c:5187 [inline]
do_pte_missing mm/memory.c:3947 [inline]
handle_pte_fault+0x2cf4/0x67c0 mm/memory.c:5522
__handle_mm_fault mm/memory.c:5665 [inline]
handle_mm_fault+0x1029/0x1980 mm/memory.c:5833
faultin_page mm/gup.c:1174 [inline]
__get_user_pages+0x1b2e/0x4900 mm/gup.c:1472
populate_vma_page_range+0x264/0x330 mm/gup.c:1910
__mm_populate+0x27a/0x460 mm/gup.c:2013
mm_populate include/linux/mm.h:3308 [inline]
vm_mmap_pgoff+0x2c3/0x3d0 mm/util.c:593
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f2657179e79
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f2657fc8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 00007f2657316058 RCX: 00007f2657179e79
RDX: b635773f06ebbeee RSI: 0000000000b36000 RDI: 0000000020000000
RBP: 00007f26571e7916 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000008031 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f2657316058 R15: 00007ffcd028e1f8
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:is_same_group kernel/sched/fair.c:411 [inline]
RIP: 0010:find_matching_se kernel/sched/fair.c:448 [inline]
RIP: 0010:check_preempt_wakeup_fair+0x471/0xb00 kernel/sched/fair.c:8679
Code: 00 00 00 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 ff e8 30 71 95 00 4d 8b 3f 49 8d ae a0 00 00 00 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 10 71 95 00 48 8b 5d 00 49 8d af
RSP: 0018:ffffc90000a18aa0 EFLAGS: 00010006
RAX: 0000000000000014 RBX: ffff8880b913eb00 RCX: ffffffff81671258
RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff888023805a00
RBP: 00000000000000a0 R08: ffff888023805a07 R09: 1ffff11004700b40
R10: dffffc0000000000 R11: ffffed1004700b41 R12: ffff8880b903ea40
R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000
FS: 00007f2657fc86c0(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8a3dfffd00 CR3: 000000002e910000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 00 00 add %al,(%rax)
2: 00 4c 89 f8 add %cl,-0x8(%rcx,%rcx,4)
6: 48 c1 e8 03 shr $0x3,%rax
a: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1)
f: 74 08 je 0x19
11: 4c 89 ff mov %r15,%rdi
14: e8 30 71 95 00 call 0x957149
19: 4d 8b 3f mov (%r15),%r15
1c: 49 8d ae a0 00 00 00 lea 0xa0(%r14),%rbp
23: 48 89 e8 mov %rbp,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) <-- trapping instruction
2f: 74 08 je 0x39
31: 48 89 ef mov %rbp,%rdi
34: e8 10 71 95 00 call 0x957149
39: 48 8b 5d 00 mov 0x0(%rbp),%rbx
3d: 49 rex.WB
3e: 8d .byte 0x8d
3f: af scas %es:(%rdi),%eax