Oops: general protection fault, probably for non-canonical address 0xffff11012966e400: 0000 [#1] SMP KASAN NOPTI KASAN: maybe wild-memory-access in range [0xfff8a8094b372000-0xfff8a8094b372007] CPU: 0 UID: 0 PID: 12129 Comm: dhcpcd-run-hook Not tainted 6.15.0-rc6-syzkaller-00105-g088d13246a46 #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 RIP: 0010:percpu_ref_get_many include/linux/percpu-refcount.h:205 [inline] RIP: 0010:percpu_ref_get include/linux/percpu-refcount.h:222 [inline] RIP: 0010:obj_cgroup_get include/linux/memcontrol.h:760 [inline] RIP: 0010:replace_stock_objcg mm/memcontrol.c:2774 [inline] RIP: 0010:refill_obj_stock+0x1e1/0x7d0 mm/memcontrol.c:2952 Code: 02 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 80 3c 02 00 0f 85 96 05 00 00 49 8b 04 24 a8 03 0f 85 23 03 00 00 <65> 48 ff 00 e8 86 40 ff ff 49 8d 7c 24 18 be 04 00 00 00 48 89 7c RSP: 0018:ffffc9000669f688 EFLAGS: 00010046 RAX: ffff888052c8f400 RBX: ffffffff93a55cc0 RCX: 00000000044fde6d RDX: 1ffff11008442600 RSI: ffffffff8bf48a20 RDI: ffffffff8dceed20 RBP: ffffffff908530b4 R08: 285806afc3f7d22a R09: 0000000000000000 R10: 0000000000000004 R11: 0000000000000000 R12: ffff888042213000 R13: 0000000000000078 R14: ffff88806a434cc0 R15: ffff88806a434d08 FS: 0000000000000000(0000) GS:ffff8880d69df000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4c17d04286 CR3: 0000000048594000 CR4: 0000000000352ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: obj_cgroup_uncharge mm/memcontrol.c:3015 [inline] __memcg_slab_free_hook+0x226/0x5b0 mm/memcontrol.c:3102 memcg_slab_free_hook mm/slub.c:2205 [inline] slab_free mm/slub.c:4639 [inline] kmem_cache_free+0x381/0x4d0 mm/slub.c:4744 anon_vma_chain_free mm/rmap.c:147 [inline] unlink_anon_vmas+0x458/0x820 mm/rmap.c:447 free_pgtables+0x2d4/0x810 mm/memory.c:391 exit_mmap+0x3fb/0xb90 mm/mmap.c:1295 __mmput+0x12a/0x410 kernel/fork.c:1379 mmput+0x62/0x70 kernel/fork.c:1401 exec_mmap fs/exec.c:1009 [inline] begin_new_exec+0x15a7/0x38b0 fs/exec.c:1264 load_elf_binary+0x88c/0x4eb0 fs/binfmt_elf.c:1002 search_binary_handler fs/exec.c:1778 [inline] exec_binprm fs/exec.c:1810 [inline] bprm_execve fs/exec.c:1862 [inline] bprm_execve+0x8c3/0x1650 fs/exec.c:1838 do_execveat_common.isra.0+0x4a5/0x610 fs/exec.c:1968 do_execve fs/exec.c:2042 [inline] __do_sys_execve fs/exec.c:2118 [inline] __se_sys_execve fs/exec.c:2113 [inline] __x64_sys_execve+0x8e/0xb0 fs/exec.c:2113 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f4c17c4a107 Code: Unable to access opcode bytes at 0x7f4c17c4a0dd. RSP: 002b:00007fff3960e108 EFLAGS: 00000246 ORIG_RAX: 000000000000003b RAX: ffffffffffffffda RBX: 00005616e65a7da0 RCX: 00007f4c17c4a107 RDX: 00005616e65a7dc0 RSI: 00005616e65a7da0 RDI: 00005616e65a7e48 RBP: 00005616e65a7e48 R08: 00007fff39610e34 R09: 0000000000000000 R10: 0000000000000008 R11: 0000000000000246 R12: 00005616e65a7dc0 R13: 00007f4c17e0fe8b R14: 00005616e65a7dc0 R15: 0000000000000000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:percpu_ref_get_many include/linux/percpu-refcount.h:205 [inline] RIP: 0010:percpu_ref_get include/linux/percpu-refcount.h:222 [inline] RIP: 0010:obj_cgroup_get include/linux/memcontrol.h:760 [inline] RIP: 0010:replace_stock_objcg mm/memcontrol.c:2774 [inline] RIP: 0010:refill_obj_stock+0x1e1/0x7d0 mm/memcontrol.c:2952 Code: 02 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 80 3c 02 00 0f 85 96 05 00 00 49 8b 04 24 a8 03 0f 85 23 03 00 00 <65> 48 ff 00 e8 86 40 ff ff 49 8d 7c 24 18 be 04 00 00 00 48 89 7c RSP: 0018:ffffc9000669f688 EFLAGS: 00010046 RAX: ffff888052c8f400 RBX: ffffffff93a55cc0 RCX: 00000000044fde6d RDX: 1ffff11008442600 RSI: ffffffff8bf48a20 RDI: ffffffff8dceed20 RBP: ffffffff908530b4 R08: 285806afc3f7d22a R09: 0000000000000000 R10: 0000000000000004 R11: 0000000000000000 R12: ffff888042213000 R13: 0000000000000078 R14: ffff88806a434cc0 R15: ffff88806a434d08 FS: 0000000000000000(0000) GS:ffff8880d69df000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4c17c4a0dd CR3: 0000000048594000 CR4: 0000000000352ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 00 00 add %al,(%rax) 2: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 9: fc ff df c: 4c 89 e2 mov %r12,%rdx f: 48 c1 ea 03 shr $0x3,%rdx 13: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 17: 0f 85 96 05 00 00 jne 0x5b3 1d: 49 8b 04 24 mov (%r12),%rax 21: a8 03 test $0x3,%al 23: 0f 85 23 03 00 00 jne 0x34c * 29: 65 48 ff 00 incq %gs:(%rax) <-- trapping instruction 2d: e8 86 40 ff ff call 0xffff40b8 32: 49 8d 7c 24 18 lea 0x18(%r12),%rdi 37: be 04 00 00 00 mov $0x4,%esi 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 7c .byte 0x7c