------------[ cut here ]------------ kernel BUG at mm/page_table_check.c:83! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 20454 Comm: syz-executor.0 Not tainted 6.4.0-rc4-syzkaller-00031-g8b817fded42d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 RIP: 0010:page_table_check_clear+0x411/0x4f0 mm/page_table_check.c:83 Code: 75 f6 ff ff e8 40 cb 9c ff e9 66 fc ff ff e8 36 cb 9c ff 48 ff cb 49 89 df e9 0f fe ff ff e8 26 cb 9c ff 0f 0b e8 1f cb 9c ff <0f> 0b e8 18 cb 9c ff 0f 0b e8 11 cb 9c ff 0f 0b e8 0a cb 9c ff 0f RSP: 0018:ffffc90015ce73b8 EFLAGS: 00010293 RAX: ffffffff81eeb201 RBX: ffff888013ca7a40 RCX: ffff88808da05940 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: 0000000000000001 R08: ffffffff81eeb09d R09: ffffed1002794f49 R10: 0000000000000000 R11: dffffc0000000001 R12: ffff888013ca7a00 R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd56c5ad988 CR3: 000000007c4db000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: zap_pte_range mm/memory.c:1413 [inline] zap_pmd_range mm/memory.c:1563 [inline] zap_pud_range mm/memory.c:1592 [inline] zap_p4d_range mm/memory.c:1613 [inline] unmap_page_range+0x1d10/0x2a30 mm/memory.c:1634 unmap_vmas+0x347/0x4e0 mm/memory.c:1719 exit_mmap+0x255/0xaf0 mm/mmap.c:3111 __mmput+0x115/0x3c0 kernel/fork.c:1351 exit_mm+0x227/0x310 kernel/exit.c:564 do_exit+0x612/0x2290 kernel/exit.c:858 do_group_exit+0x206/0x2c0 kernel/exit.c:1021 get_signal+0x1701/0x17e0 kernel/signal.c:2874 arch_do_signal_or_restart+0x91/0x670 arch/x86/kernel/signal.c:306 exit_to_user_mode_loop+0x6a/0x100 kernel/entry/common.c:168 exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:204 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline] syscall_exit_to_user_mode+0x64/0x280 kernel/entry/common.c:297 do_syscall_64+0x4d/0xc0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fd56c48c169 Code: Unable to access opcode bytes at 0x7fd56c48c13f. RSP: 002b:00007fd56d1fb218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007fd56c5abf88 RCX: 00007fd56c48c169 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fd56c5abf88 RBP: 00007fd56c5abf80 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd56c5abf8c R13: 00007ffd6471e1df R14: 00007fd56d1fb300 R15: 0000000000022000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:page_table_check_clear+0x411/0x4f0 mm/page_table_check.c:83 Code: 75 f6 ff ff e8 40 cb 9c ff e9 66 fc ff ff e8 36 cb 9c ff 48 ff cb 49 89 df e9 0f fe ff ff e8 26 cb 9c ff 0f 0b e8 1f cb 9c ff <0f> 0b e8 18 cb 9c ff 0f 0b e8 11 cb 9c ff 0f 0b e8 0a cb 9c ff 0f RSP: 0018:ffffc90015ce73b8 EFLAGS: 00010293 RAX: ffffffff81eeb201 RBX: ffff888013ca7a40 RCX: ffff88808da05940 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: 0000000000000001 R08: ffffffff81eeb09d R09: ffffed1002794f49 R10: 0000000000000000 R11: dffffc0000000001 R12: ffff888013ca7a00 R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd56c5ad988 CR3: 000000007c4db000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400