general protection fault, probably for non-canonical address 0xdffffc0040000000: 0000 [#1] PREEMPT SMP KASAN KASAN: probably user-memory-access in range [0x0000000200000000-0x0000000200000007] CPU: 0 PID: 5466 Comm: sed Not tainted 6.5.0-rc2-next-20230721-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 RIP: 0010:__debug_check_no_obj_freed lib/debugobjects.c:1021 [inline] RIP: 0010:debug_check_no_obj_freed+0x1fe/0x4c0 lib/debugobjects.c:1063 Code: 02 00 00 48 be 00 01 00 00 00 00 ad de 48 89 53 08 48 89 c7 48 89 30 4c 89 68 08 e8 ec d2 ff ff 48 89 d8 48 89 c2 48 c1 ea 03 <42> 80 3c 22 00 0f 84 27 ff ff ff 48 89 c7 48 89 44 24 50 e8 ba fa RSP: 0018:ffffc900053a77a0 EFLAGS: 00010006 RAX: 0000000200000001 RBX: 0000000200000001 RCX: ffffffff816850de RDX: 0000000040000000 RSI: ffff88807d948200 RDI: ffff8880701f2e50 RBP: 0000000000000001 R08: 0000000000000001 R09: fffff52000a74ee2 R10: 0000000000000003 R11: 0000000000094000 R12: dffffc0000000000 R13: dead000000000122 R14: ffff88807d948200 R15: ffff88807d948300 FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffa30c7fba8 CR3: 0000000070adf000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: slab_free_hook mm/slub.c:1775 [inline] slab_free_freelist_hook+0x18c/0x1e0 mm/slub.c:1826 slab_free mm/slub.c:3809 [inline] kmem_cache_free+0xf0/0x490 mm/slub.c:3831 mt_free_rcu lib/maple_tree.c:176 [inline] mt_destroy_walk+0x1121/0x14f0 lib/maple_tree.c:5401 mte_destroy_walk lib/maple_tree.c:5422 [inline] mte_destroy_walk lib/maple_tree.c:5413 [inline] __mt_destroy+0x257/0x2a0 lib/maple_tree.c:6448 do_vmi_align_munmap+0x11fd/0x1710 mm/mmap.c:2552 do_vmi_munmap+0x20e/0x450 mm/mmap.c:2611 mmap_region+0x194/0x2640 mm/mmap.c:2661 do_mmap+0x87c/0xed0 mm/mmap.c:1353 vm_mmap_pgoff+0x1a6/0x3b0 mm/util.c:543 ksys_mmap_pgoff+0x422/0x5b0 mm/mmap.c:1399 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7ffa30f26b74 Code: 63 08 44 89 e8 5b 41 5c 41 5d c3 41 89 ca 41 f7 c1 ff 0f 00 00 74 0c c7 05 f5 46 01 00 16 00 00 00 eb 17 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 0c f7 d8 89 05 dc 46 01 00 48 83 c8 ff c3 0f RSP: 002b:00007ffe3945a408 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007ffe3945a4b8 RCX: 00007ffa30f26b74 RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007ffa30c5c000 RBP: 00007ffe3945a7a0 R08: 0000000000000003 R09: 0000000000052000 R10: 0000000000000812 R11: 0000000000000246 R12: 00007ffa30f0a570 R13: 00007ffe3945a828 R14: 0000000000052120 R15: 0000000000000000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__debug_check_no_obj_freed lib/debugobjects.c:1021 [inline] RIP: 0010:debug_check_no_obj_freed+0x1fe/0x4c0 lib/debugobjects.c:1063 Code: 02 00 00 48 be 00 01 00 00 00 00 ad de 48 89 53 08 48 89 c7 48 89 30 4c 89 68 08 e8 ec d2 ff ff 48 89 d8 48 89 c2 48 c1 ea 03 <42> 80 3c 22 00 0f 84 27 ff ff ff 48 89 c7 48 89 44 24 50 e8 ba fa RSP: 0018:ffffc900053a77a0 EFLAGS: 00010006 RAX: 0000000200000001 RBX: 0000000200000001 RCX: ffffffff816850de RDX: 0000000040000000 RSI: ffff88807d948200 RDI: ffff8880701f2e50 RBP: 0000000000000001 R08: 0000000000000001 R09: fffff52000a74ee2 R10: 0000000000000003 R11: 0000000000094000 R12: dffffc0000000000 R13: dead000000000122 R14: ffff88807d948200 R15: ffff88807d948300 FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffa30c7fba8 CR3: 0000000070adf000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 00 00 add %al,(%rax) 2: 48 be 00 01 00 00 00 movabs $0xdead000000000100,%rsi 9: 00 ad de c: 48 89 53 08 mov %rdx,0x8(%rbx) 10: 48 89 c7 mov %rax,%rdi 13: 48 89 30 mov %rsi,(%rax) 16: 4c 89 68 08 mov %r13,0x8(%rax) 1a: e8 ec d2 ff ff call 0xffffd30b 1f: 48 89 d8 mov %rbx,%rax 22: 48 89 c2 mov %rax,%rdx 25: 48 c1 ea 03 shr $0x3,%rdx * 29: 42 80 3c 22 00 cmpb $0x0,(%rdx,%r12,1) <-- trapping instruction 2e: 0f 84 27 ff ff ff je 0xffffff5b 34: 48 89 c7 mov %rax,%rdi 37: 48 89 44 24 50 mov %rax,0x50(%rsp) 3c: e8 .byte 0xe8 3d: ba .byte 0xba 3e: fa cli