./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2695850052
<...>
forked to background, child pid 3190
no interfaces have a carri[ 23.518283][ T3191] 8021q: adding VLAN 0 to HW filter on device bond0
er
[ 23.530484][ T3191] eql: remember to turn off Van-Jacobson compression on your slave devices
Starting sshd: OK
syzkaller
Warning: Permanently added '10.128.0.4' (ECDSA) to the list of known hosts.
execve("./syz-executor2695850052", ["./syz-executor2695850052"], 0x7ffd0527b530 /* 10 vars */) = 0
brk(NULL) = 0x555557432000
brk(0x555557432c40) = 0x555557432c40
arch_prctl(ARCH_SET_FS, 0x555557432300) = 0
uname({sysname="Linux", nodename="syzkaller", ...}) = 0
readlink("/proc/self/exe", "/root/syz-executor2695850052", 4096) = 28
brk(0x555557453c40) = 0x555557453c40
brk(0x555557454000) = 0x555557454000
mprotect(0x7fb77689c000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
getpid() = 3611
openat(AT_FDCWD, "/sys/kernel/debug/x86/nmi_longest_ns", O_WRONLY|O_CLOEXEC) = 3
write(3, "10000000000", 11) = 11
close(3) = 0
openat(AT_FDCWD, "/proc/sys/kernel/hung_task_check_interval_secs", O_WRONLY|O_CLOEXEC) = 3
write(3, "20", 2) = 2
close(3) = 0
openat(AT_FDCWD, "/proc/sys/net/core/bpf_jit_kallsyms", O_WRONLY|O_CLOEXEC) = 3
write(3, "1", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/proc/sys/net/core/bpf_jit_harden", O_WRONLY|O_CLOEXEC) = 3
write(3, "0", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/proc/sys/kernel/kptr_restrict", O_WRONLY|O_CLOEXEC) = 3
write(3, "0", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/proc/sys/kernel/softlockup_all_cpu_backtrace", O_WRONLY|O_CLOEXEC) = 3
write(3, "1", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/proc/sys/fs/mount-max", O_WRONLY|O_CLOEXEC) = 3
write(3, "100", 3) = 3
close(3) = 0
openat(AT_FDCWD, "/proc/sys/vm/oom_dump_tasks", O_WRONLY|O_CLOEXEC) = 3
write(3, "0", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/proc/sys/debug/exception-trace", O_WRONLY|O_CLOEXEC) = 3
write(3, "0", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/proc/sys/kernel/printk", O_WRONLY|O_CLOEXEC) = 3
write(3, "7 4 1 3", 7) = 7
close(3) = 0
openat(AT_FDCWD, "/proc/sys/kernel/keys/gc_delay", O_WRONLY|O_CLOEXEC) = 3
write(3, "1", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/proc/sys/vm/oom_kill_allocating_task", O_WRONLY|O_CLOEXEC) = 3
write(3, "1", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/proc/sys/kernel/ctrl-alt-del", O_WRONLY|O_CLOEXEC) = 3
write(3, "0", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/proc/sys/kernel/cad_pid", O_WRONLY|O_CLOEXEC) = 3
write(3, "3611", 4) = 4
close(3) = 0
openat(AT_FDCWD, "/sys/kernel/debug/failslab/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3
write(3, "N", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/sys/kernel/debug/fail_futex/ignore-private", O_WRONLY|O_CLOEXEC) = 3
write(3, "N", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-highmem", O_WRONLY|O_CLOEXEC) = 3
write(3, "N", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3
write(3, "N", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/min-order", O_WRONLY|O_CLOEXEC) = 3
write(3, "0", 1) = 1
close(3) = 0
socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) = 3
socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) = 4
sendto(4, [{nlmsg_len=36, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x03\x00\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36
recvfrom(4, [{nlmsg_len=680, nlmsg_type=nlctrl, nlmsg_flags=0, nlmsg_seq=0, nlmsg_pid=3611}, "\x01\x02\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00\x06\x00\x01\x00\x1c\x00\x00\x00\x08\x00\x03\x00\x01\x00\x00\x00\x08\x00\x04\x00\x00\x00\x00\x00\x08\x00\x05\x00\x25\x00\x00\x00\x48\x02\x06\x00\x14\x00\x01\x00\x08\x00\x01\x00\x01\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x02\x00\x08\x00\x01\x00\x05\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x03\x00"...], 4096, 0, NULL, NULL) = 680
recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=3611}, {error=0, msg={nlmsg_len=36, nlmsg_type=nlctrl, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36
access("/proc/net", R_OK) = 0
access("/proc/net/unix", R_OK) = 0
socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5
ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0
close(5) = 0
sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0b\x00\x00\x00\x06\x00\x0a\x00\xa0\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36
recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=3611}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36
socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5
ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0
close(5) = 0
sendto(3, [{nlmsg_len=44, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x00\x00\x00\x00\x0b\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x0c\x00\x01\x00\x02\x00\xaa\xaa\xaa\xaa\xaa\xaa"], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44
recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=3611}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36
sendto(3, [{nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=0, ifi_flags=0, ifi_change=0}, [[{nla_len=11, nla_type=IFLA_IFNAME}, "lowpan0"...], [{nla_len=16, nla_type=IFLA_LINKINFO}, [{nla_len=10, nla_type=IFLA_INFO_KIND}, "lowpan"...]], [{nla_len=8, nla_type=IFLA_LINK}, 11]]], 68, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 68
recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=3611}, {error=0, msg={nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36
socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5
ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0
close(5) = 0
sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0c\x00\x00\x00\x06\x00\x0a\x00\xa1\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36
recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=3611}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36
socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5
ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0
close(5) = 0
sendto(3, [{nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=if_nametoindex("wpan1"), ifi_flags=IFF_UP, ifi_change=0x1}, [{nla_len=12, nla_type=IFLA_ADDRESS}, 02:01:aa:aa:aa:aa:aa]], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44
recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=3611}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36
close(3) = 0
close(4) = 0
userfaultfd(UFFD_USER_MODE_ONLY|O_CLOEXEC) = 3
ioctl(3, UFFDIO_API, {api=0xaa, features=UFFD_FEATURE_EVENT_REMAP|UFFD_FEATURE_EVENT_REMOVE => features=UFFD_FEATURE_PAGEFAULT_FLAG_WP|UFFD_FEATURE_EVENT_FORK|UFFD_FEATURE_EVENT_REMAP|UFFD_FEATURE_EVENT_REMOVE|UFFD_FEATURE_MISSING_HUGETLBFS|UFFD_FEATURE_MISSING_SHMEM|UFFD_FEATURE_EVENT_UNMAP|UFFD_FEATURE_SIGBUS|UFFD_FEATURE_THREAD_ID|UFFD_FEATURE_MINOR_HUGETLBFS|UFFD_FEATURE_MINOR_SHMEM|0x800, ioctls=1<<_UFFDIO_REGISTER|1<<_UFFDIO_UNREGISTER|1<<_UFFDIO_API}) = 0
ioctl(3, UFFDIO_REGISTER, {range={start=0x200e2000, len=0xc00000}, mode=UFFDIO_REGISTER_MODE_MISSING, ioctls=1<<_UFFDIO_WAKE|1<<_UFFDIO_COPY|1<<_UFFDIO_ZEROPAGE}) = 0
openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR) = 4
write(4, "14", 2) = 2
mremap(0x205de000, 16384, 53248, MREMAP_MAYMOVE|MREMAP_FIXED, 0x20440000) = -1 ENOMEM (Cannot allocate memory)
exit_group(0) = ?
syzkaller login: [ 39.903631][ T3611] ==================================================================
[ 39.911725][ T3611] BUG: KASAN: use-after-free in anon_vma_interval_tree_remove+0xc7d/0xf30
[ 39.920233][ T3611] Read of size 8 at addr ffff88801882dde8 by task syz-executor269/3611
[ 39.928475][ T3611]
[ 39.930783][ T3611] CPU: 0 PID: 3611 Comm: syz-executor269 Not tainted 6.0.0-rc6-next-20220923-syzkaller #0
[ 39.940655][ T3611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
[ 39.950696][ T3611] Call Trace:
[ 39.953986][ T3611]
[ 39.956912][ T3611] dump_stack_lvl+0xcd/0x134
[ 39.961608][ T3611] print_report+0x15e/0x45d
[ 39.966127][ T3611] ? __phys_addr+0xc4/0x140
[ 39.970645][ T3611] ? anon_vma_interval_tree_remove+0xc7d/0xf30
[ 39.976816][ T3611] kasan_report+0xbb/0x1f0
[ 39.981259][ T3611] ? anon_vma_interval_tree_remove+0xc7d/0xf30
[ 39.987437][ T3611] anon_vma_interval_tree_remove+0xc7d/0xf30
[ 39.993438][ T3611] ? mas_find+0x20d/0xce0
[ 39.997781][ T3611] unlink_anon_vmas+0x218/0x860
[ 40.002669][ T3611] free_pgtables+0x24d/0x420
[ 40.007292][ T3611] ? free_pgd_range+0xbf0/0xbf0
[ 40.012168][ T3611] exit_mmap+0x1ec/0x7a0
[ 40.016417][ T3611] ? __ia32_sys_remap_file_pages+0x150/0x150
[ 40.022418][ T3611] __mmput+0x128/0x4c0
[ 40.026496][ T3611] mmput+0x5c/0x70
[ 40.030223][ T3611] do_exit+0xa39/0x2a20
[ 40.034386][ T3611] ? lock_downgrade+0x6e0/0x6e0
[ 40.039245][ T3611] ? do_raw_spin_lock+0x120/0x2a0
[ 40.044274][ T3611] ? mm_update_next_owner+0x7b0/0x7b0
[ 40.049660][ T3611] ? rwlock_bug.part.0+0x90/0x90
[ 40.054618][ T3611] do_group_exit+0xd0/0x2a0
[ 40.059122][ T3611] __x64_sys_exit_group+0x3a/0x50
[ 40.064162][ T3611] do_syscall_64+0x35/0xb0
[ 40.068599][ T3611] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 40.074512][ T3611] RIP: 0033:0x7fb77682f739
[ 40.078936][ T3611] Code: Unable to access opcode bytes at 0x7fb77682f70f.
[ 40.085963][ T3611] RSP: 002b:00007ffec26f9018 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[ 40.094390][ T3611] RAX: ffffffffffffffda RBX: 00007fb7768a23d0 RCX: 00007fb77682f739
[ 40.102455][ T3611] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
[ 40.110439][ T3611] RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000000000000000
[ 40.118415][ T3611] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fb7768a23d0
[ 40.126388][ T3611] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
[ 40.134373][ T3611]
[ 40.137396][ T3611]
[ 40.139712][ T3611] Allocated by task 3611:
[ 40.144041][ T3611] kasan_save_stack+0x1e/0x40
[ 40.148742][ T3611] kasan_set_track+0x21/0x30
[ 40.153349][ T3611] __kasan_slab_alloc+0x7e/0x80
[ 40.158215][ T3611] kmem_cache_alloc+0x2b7/0x3d0
[ 40.163078][ T3611] vm_area_dup+0x81/0x380
[ 40.167426][ T3611] copy_vma+0x376/0x880
[ 40.171584][ T3611] move_vma+0x449/0xf60
[ 40.175738][ T3611] __do_sys_mremap+0x487/0x16b0
[ 40.180591][ T3611] do_syscall_64+0x35/0xb0
[ 40.185008][ T3611] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 40.190931][ T3611]
[ 40.193251][ T3611] Freed by task 3611:
[ 40.197225][ T3611] kasan_save_stack+0x1e/0x40
[ 40.201910][ T3611] kasan_set_track+0x21/0x30
[ 40.206545][ T3611] kasan_save_free_info+0x2a/0x40
[ 40.211569][ T3611] ____kasan_slab_free+0x160/0x1c0
[ 40.216696][ T3611] slab_free_freelist_hook+0x8b/0x1c0
[ 40.222098][ T3611] kmem_cache_free+0xea/0x5b0
[ 40.226798][ T3611] copy_vma+0x6bc/0x880
[ 40.230958][ T3611] move_vma+0x449/0xf60
[ 40.235114][ T3611] __do_sys_mremap+0x487/0x16b0
[ 40.239970][ T3611] do_syscall_64+0x35/0xb0
[ 40.244388][ T3611] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 40.250303][ T3611]
[ 40.252621][ T3611] The buggy address belongs to the object at ffff88801882dd80
[ 40.252621][ T3611] which belongs to the cache vm_area_struct of size 152
[ 40.266967][ T3611] The buggy address is located 104 bytes inside of
[ 40.266967][ T3611] 152-byte region [ffff88801882dd80, ffff88801882de18)
[ 40.280242][ T3611]
[ 40.282556][ T3611] The buggy address belongs to the physical page:
[ 40.288956][ T3611] page:ffffea0000620b40 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffffea00009b7780 pfn:0x1882d
[ 40.300416][ T3611] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff)
[ 40.307975][ T3611] raw: 00fff00000000200 ffff8880119d3b40 dead000080120012 0000000000000000
[ 40.316559][ T3611] raw: ffffea00009b7780 0000000000000004 00000001ffffffff 0000000000000000
[ 40.325139][ T3611] page dumped because: kasan: bad access detected
[ 40.331553][ T3611] page_owner tracks the page as allocated
[ 40.337257][ T3611] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 3316, tgid 3316 (dhcpcd-run-hook), ts 24222634229, free_ts 24219362572
[ 40.355856][ T3611] get_page_from_freelist+0x1092/0x2d20
[ 40.361418][ T3611] __alloc_pages+0x1c7/0x5a0
[ 40.366018][ T3611] alloc_pages+0x1a6/0x270
[ 40.370453][ T3611] allocate_slab+0x213/0x300
[ 40.375058][ T3611] ___slab_alloc+0xac1/0x1430
[ 40.379747][ T3611] __slab_alloc.constprop.0+0x4d/0xa0
[ 40.385136][ T3611] kmem_cache_alloc+0x31c/0x3d0
[ 40.390005][ T3611] vm_area_alloc+0x1c/0xf0
[ 40.394431][ T3611] mmap_region+0x448/0x1bf0
[ 40.398935][ T3611] do_mmap+0x825/0xf50
[ 40.403003][ T3611] vm_mmap_pgoff+0x1ab/0x270
[ 40.407599][ T3611] ksys_mmap_pgoff+0x79/0x5a0
[ 40.412294][ T3611] do_syscall_64+0x35/0xb0
[ 40.416712][ T3611] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 40.422630][ T3611] page last free stack trace:
[ 40.427294][ T3611] free_pcp_prepare+0x65c/0xd90
[ 40.432158][ T3611] free_unref_page_list+0x172/0xc40
[ 40.437357][ T3611] release_pages+0xc8c/0x1360
[ 40.442033][ T3611] tlb_batch_pages_flush+0xa8/0x1a0
[ 40.447232][ T3611] tlb_finish_mmu+0x147/0x7e0
[ 40.451906][ T3611] exit_mmap+0x1fe/0x7a0
[ 40.456189][ T3611] __mmput+0x128/0x4c0
[ 40.460273][ T3611] mmput+0x5c/0x70
[ 40.464007][ T3611] do_exit+0xa39/0x2a20
[ 40.468198][ T3611] do_group_exit+0xd0/0x2a0
[ 40.472699][ T3611] __x64_sys_exit_group+0x3a/0x50
[ 40.477735][ T3611] do_syscall_64+0x35/0xb0
[ 40.482148][ T3611] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 40.488054][ T3611]
[ 40.490372][ T3611] Memory state around the buggy address:
[ 40.496005][ T3611] ffff88801882dc80: fc fc fc fc fc fa fb fb fb fb fb fb fb fb fb fb
[ 40.504070][ T3611] ffff88801882dd00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 40.512141][ T3611] >ffff88801882dd80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 40.520205][ T3611] ^
[ 40.527658][ T3611] ffff88801882de00: fb fb fb fc fc fc fc fc fc fc fc fa fb fb fb fb
[ 40.535716][ T3611] ffff88801882de80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc
[ 40.543795][ T3611] ==================================================================
[ 40.556517][ T3611] Kernel panic - not syncing: panic_on_warn set ...
[ 40.563113][ T3611] CPU: 0 PID: 3611 Comm: syz-executor269 Not tainted 6.0.0-rc6-next-20220923-syzkaller #0
[ 40.572990][ T3611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
[ 40.583039][ T3611] Call Trace:
[ 40.586303][ T3611]
[ 40.589219][ T3611] dump_stack_lvl+0xcd/0x134
[ 40.593807][ T3611] panic+0x2c8/0x622
[ 40.597687][ T3611] ? panic_print_sys_info.part.0+0x110/0x110
[ 40.603652][ T3611] ? preempt_schedule_common+0x59/0xc0
[ 40.609097][ T3611] ? preempt_schedule_thunk+0x16/0x18
[ 40.614467][ T3611] end_report.part.0+0x3f/0x7c
[ 40.619218][ T3611] ? anon_vma_interval_tree_remove+0xc7d/0xf30
[ 40.625371][ T3611] kasan_report.cold+0xa/0xf
[ 40.629962][ T3611] ? anon_vma_interval_tree_remove+0xc7d/0xf30
[ 40.636118][ T3611] anon_vma_interval_tree_remove+0xc7d/0xf30
[ 40.642146][ T3611] ? mas_find+0x20d/0xce0
[ 40.646469][ T3611] unlink_anon_vmas+0x218/0x860
[ 40.651329][ T3611] free_pgtables+0x24d/0x420
[ 40.655913][ T3611] ? free_pgd_range+0xbf0/0xbf0
[ 40.660762][ T3611] exit_mmap+0x1ec/0x7a0
[ 40.665013][ T3611] ? __ia32_sys_remap_file_pages+0x150/0x150
[ 40.670985][ T3611] __mmput+0x128/0x4c0
[ 40.675047][ T3611] mmput+0x5c/0x70
[ 40.678761][ T3611] do_exit+0xa39/0x2a20
[ 40.682904][ T3611] ? lock_downgrade+0x6e0/0x6e0
[ 40.687746][ T3611] ? do_raw_spin_lock+0x120/0x2a0
[ 40.692771][ T3611] ? mm_update_next_owner+0x7b0/0x7b0
[ 40.698147][ T3611] ? rwlock_bug.part.0+0x90/0x90
[ 40.703087][ T3611] do_group_exit+0xd0/0x2a0
[ 40.707582][ T3611] __x64_sys_exit_group+0x3a/0x50
[ 40.712594][ T3611] do_syscall_64+0x35/0xb0
[ 40.717012][ T3611] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 40.722899][ T3611] RIP: 0033:0x7fb77682f739
[ 40.727301][ T3611] Code: Unable to access opcode bytes at 0x7fb77682f70f.
[ 40.734322][ T3611] RSP: 002b:00007ffec26f9018 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[ 40.742729][ T3611] RAX: ffffffffffffffda RBX: 00007fb7768a23d0 RCX: 00007fb77682f739
[ 40.750688][ T3611] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
[ 40.758659][ T3611] RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000000000000000
[ 40.766622][ T3611] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fb7768a23d0
[ 40.774578][ T3611] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
[ 40.782574][ T3611]
[ 40.785649][ T3611] Kernel Offset: disabled
[ 40.789975][ T3611] Rebooting in 86400 seconds..