general protection fault, probably for non-canonical address 0xe0403c4040404040: 0000 [#1] PREEMPT SMP KASAN KASAN: maybe wild-memory-access in range [0x0202020202020200-0x0202020202020207] CPU: 1 PID: 12940 Comm: syz-executor.1 Not tainted 5.14.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:unlink_anon_vmas+0x63/0x860 mm/rmap.c:398 Code: 3c 02 00 0f 85 b9 07 00 00 48 8b 44 24 10 48 8b 58 78 48 b8 00 00 00 00 00 fc ff df 48 8d 6b f0 48 89 da 49 89 df 48 c1 ea 03 <80> 3c 02 00 0f 85 81 07 00 00 48 8b 03 48 39 5c 24 08 4c 8d 68 f0 RSP: 0018:ffffc900189d7978 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0202020202020202 RCX: 0000000000000000 RDX: 0040404040404040 RSI: ffffffff81af9fab RDI: ffff888000103e70 RBP: 02020202020201f2 R08: 00000000f5504000 R09: ffff88806a7bf76f R10: ffffffff81a9fff7 R11: 000000000000003f R12: ffff888000103e70 R13: 00000000f5504000 R14: 0202020202020202 R15: 0202020202020202 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000009671404 CR3: 0000000058058000 CR4: 00000000001526e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: free_pgtables+0xe2/0x2f0 mm/memory.c:412 exit_mmap+0x1df/0x620 mm/mmap.c:3202 __mmput+0x122/0x470 kernel/fork.c:1101 mmput+0x58/0x60 kernel/fork.c:1122 exit_mm kernel/exit.c:501 [inline] do_exit+0xae2/0x2a60 kernel/exit.c:812 do_group_exit+0x125/0x310 kernel/exit.c:922 get_signal+0x47f/0x2160 kernel/signal.c:2808 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:865 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:209 __syscall_exit_to_user_mode_work kernel/entry/common.c:291 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:302 __do_fast_syscall_32+0x72/0xf0 arch/x86/entry/common.c:181 do_fast_syscall_32+0x2f/0x70 arch/x86/entry/common.c:203 entry_SYSENTER_compat_after_hwframe+0x4d/0x5c RIP: 0023:0xf7f09549 Code: Unable to access opcode bytes at RIP 0xf7f0951f. RSP: 002b:00000000f550367c EFLAGS: 00000296 ORIG_RAX: 00000000000000f0 RAX: fffffffffffffe00 RBX: 000000000819afc8 RCX: 0000000000000080 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000819afcc RBP: 0000000000000081 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Modules linked in: ---[ end trace 5b30340c546b5233 ]--- RIP: 0010:unlink_anon_vmas+0x63/0x860 mm/rmap.c:398 Code: 3c 02 00 0f 85 b9 07 00 00 48 8b 44 24 10 48 8b 58 78 48 b8 00 00 00 00 00 fc ff df 48 8d 6b f0 48 89 da 49 89 df 48 c1 ea 03 <80> 3c 02 00 0f 85 81 07 00 00 48 8b 03 48 39 5c 24 08 4c 8d 68 f0 RSP: 0018:ffffc900189d7978 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0202020202020202 RCX: 0000000000000000 RDX: 0040404040404040 RSI: ffffffff81af9fab RDI: ffff888000103e70 RBP: 02020202020201f2 R08: 00000000f5504000 R09: ffff88806a7bf76f R10: ffffffff81a9fff7 R11: 000000000000003f R12: ffff888000103e70 R13: 00000000f5504000 R14: 0202020202020202 R15: 0202020202020202 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 00000000085a0004 CR3: 000000008c011000 CR4: 00000000001526e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 3c 02 cmp $0x2,%al 2: 00 0f add %cl,(%rdi) 4: 85 b9 07 00 00 48 test %edi,0x48000007(%rcx) a: 8b 44 24 10 mov 0x10(%rsp),%eax e: 48 8b 58 78 mov 0x78(%rax),%rbx 12: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 19: fc ff df 1c: 48 8d 6b f0 lea -0x10(%rbx),%rbp 20: 48 89 da mov %rbx,%rdx 23: 49 89 df mov %rbx,%r15 26: 48 c1 ea 03 shr $0x3,%rdx 2a: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2e: 0f 85 81 07 00 00 jne 0x7b5 34: 48 8b 03 mov (%rbx),%rax 37: 48 39 5c 24 08 cmp %rbx,0x8(%rsp) 3c: 4c 8d 68 f0 lea -0x10(%rax),%r13