Oops: general protection fault, probably for non-canonical address 0xdffffc0000000014: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x00000000000000a0-0x00000000000000a7] CPU: 1 UID: 0 PID: 5523 Comm: syz.1.52 Not tainted 6.11.0-rc4-next-20240822-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:is_same_group kernel/sched/fair.c:411 [inline] RIP: 0010:find_matching_se kernel/sched/fair.c:448 [inline] RIP: 0010:check_preempt_wakeup_fair+0x471/0xb00 kernel/sched/fair.c:8679 Code: 00 00 00 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 ff e8 30 71 95 00 4d 8b 3f 49 8d ae a0 00 00 00 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 10 71 95 00 48 8b 5d 00 49 8d af RSP: 0018:ffffc90000a18aa0 EFLAGS: 00010006 RAX: 0000000000000014 RBX: ffff8880b913eb00 RCX: ffffffff81671258 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff888023805a00 RBP: 00000000000000a0 R08: ffff888023805a07 R09: 1ffff11004700b40 R10: dffffc0000000000 R11: ffffed1004700b41 R12: ffff8880b903ea40 R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 00007f2657fc86c0(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8a3dfffd00 CR3: 000000002e910000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: wakeup_preempt+0xd8/0x2a0 kernel/sched/core.c:2128 ttwu_do_activate+0x1f8/0x7e0 kernel/sched/core.c:3666 ttwu_queue kernel/sched/core.c:3940 [inline] try_to_wake_up+0x8bc/0x1480 kernel/sched/core.c:4266 swake_up_locked kernel/sched/swait.c:29 [inline] complete_with_flags kernel/sched/completion.c:24 [inline] complete+0xac/0x1c0 kernel/sched/completion.c:47 random_recv_done+0x138/0x1e0 drivers/char/hw_random/virtio-rng.c:48 vring_interrupt+0x21d/0x380 drivers/virtio/virtio_ring.c:2595 __handle_irq_event_percpu+0x29a/0xa80 kernel/irq/handle.c:158 handle_irq_event_percpu kernel/irq/handle.c:193 [inline] handle_irq_event+0x89/0x1f0 kernel/irq/handle.c:210 handle_edge_irq+0x25f/0xc20 kernel/irq/chip.c:831 generic_handle_irq_desc include/linux/irqdesc.h:173 [inline] handle_irq arch/x86/kernel/irq.c:247 [inline] call_irq_handler arch/x86/kernel/irq.c:259 [inline] __common_interrupt+0x136/0x230 arch/x86/kernel/irq.c:285 common_interrupt+0xb4/0xd0 arch/x86/kernel/irq.c:278 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693 RIP: 0010:get_current arch/x86/include/asm/current.h:49 [inline] RIP: 0010:write_comp_data kernel/kcov.c:245 [inline] RIP: 0010:__sanitizer_cov_trace_const_cmp8+0x8/0x90 kernel/kcov.c:321 Code: 44 0a 20 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 4c 8b 04 24 <65> 48 8b 0c 25 80 d7 03 00 65 8b 05 30 d2 6f 7e 25 00 01 ff 00 74 RSP: 0018:ffffc90004ca6ea0 EFLAGS: 00000246 RAX: 1ffffffff29fe7a9 RBX: 0000000000000001 RCX: 0000000000040000 RDX: 0000000000000005 RSI: 0000000000000001 RDI: 0000000000000000 RBP: 0000000000000092 R08: ffffffff81f9273b R09: ffffffff81f924f3 R10: 0000000000000005 R11: ffff888074445a00 R12: ffffc90004ca6f70 R13: ffffffff94ff3d48 R14: dffffc0000000000 R15: 0000000000140cca find_first_bit include/linux/find.h:207 [inline] __first_node include/linux/nodemask.h:266 [inline] policy_nodemask+0x29b/0x7e0 mm/mempolicy.c:2053 alloc_pages_mpol_noprof+0xb8/0x680 mm/mempolicy.c:2227 folio_alloc_mpol_noprof+0x36/0x50 mm/mempolicy.c:2283 shmem_alloc_folio mm/shmem.c:1765 [inline] shmem_alloc_and_add_folio+0x49b/0x13d0 mm/shmem.c:1804 shmem_get_folio_gfp+0x58d/0x2060 mm/shmem.c:2312 shmem_fault+0x252/0x6f0 mm/shmem.c:2512 __do_fault+0x135/0x460 mm/memory.c:4651 do_read_fault mm/memory.c:5057 [inline] do_fault mm/memory.c:5187 [inline] do_pte_missing mm/memory.c:3947 [inline] handle_pte_fault+0x2cf4/0x67c0 mm/memory.c:5522 __handle_mm_fault mm/memory.c:5665 [inline] handle_mm_fault+0x1029/0x1980 mm/memory.c:5833 faultin_page mm/gup.c:1174 [inline] __get_user_pages+0x1b2e/0x4900 mm/gup.c:1472 populate_vma_page_range+0x264/0x330 mm/gup.c:1910 __mm_populate+0x27a/0x460 mm/gup.c:2013 mm_populate include/linux/mm.h:3308 [inline] vm_mmap_pgoff+0x2c3/0x3d0 mm/util.c:593 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f2657179e79 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f2657fc8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007f2657316058 RCX: 00007f2657179e79 RDX: b635773f06ebbeee RSI: 0000000000b36000 RDI: 0000000020000000 RBP: 00007f26571e7916 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000008031 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f2657316058 R15: 00007ffcd028e1f8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:is_same_group kernel/sched/fair.c:411 [inline] RIP: 0010:find_matching_se kernel/sched/fair.c:448 [inline] RIP: 0010:check_preempt_wakeup_fair+0x471/0xb00 kernel/sched/fair.c:8679 Code: 00 00 00 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 ff e8 30 71 95 00 4d 8b 3f 49 8d ae a0 00 00 00 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 10 71 95 00 48 8b 5d 00 49 8d af RSP: 0018:ffffc90000a18aa0 EFLAGS: 00010006 RAX: 0000000000000014 RBX: ffff8880b913eb00 RCX: ffffffff81671258 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff888023805a00 RBP: 00000000000000a0 R08: ffff888023805a07 R09: 1ffff11004700b40 R10: dffffc0000000000 R11: ffffed1004700b41 R12: ffff8880b903ea40 R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 00007f2657fc86c0(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8a3dfffd00 CR3: 000000002e910000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: 00 4c 89 f8 add %cl,-0x8(%rcx,%rcx,4) 6: 48 c1 e8 03 shr $0x3,%rax a: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) f: 74 08 je 0x19 11: 4c 89 ff mov %r15,%rdi 14: e8 30 71 95 00 call 0x957149 19: 4d 8b 3f mov (%r15),%r15 1c: 49 8d ae a0 00 00 00 lea 0xa0(%r14),%rbp 23: 48 89 e8 mov %rbp,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 48 89 ef mov %rbp,%rdi 34: e8 10 71 95 00 call 0x957149 39: 48 8b 5d 00 mov 0x0(%rbp),%rbx 3d: 49 rex.WB 3e: 8d .byte 0x8d 3f: af scas %es:(%rdi),%eax