BUG: Bad page state in process jfsCommit pfn:791d3 page:ffffea0001e474c0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x28 pfn:0x791d3 flags: 0xfff00000002007(locked|referenced|uptodate|private|node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000002007 dead000000000100 dead000000000122 0000000000000000 raw: 0000000000000028 ffff888066234000 00000000ffffffff 0000000000000000 page dumped because: PAGE_FLAGS_CHECK_AT_FREE flag(s) set page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x100c40(GFP_NOFS|__GFP_HARDWALL), pid 4631, ts 92005732299, free_ts 91964834842 prep_new_page mm/page_alloc.c:2426 [inline] get_page_from_freelist+0x322a/0x33c0 mm/page_alloc.c:4159 __alloc_pages+0x272/0x700 mm/page_alloc.c:5423 __page_cache_alloc+0xd4/0x4a0 mm/filemap.c:1022 pagecache_get_page+0xa91/0x1010 mm/filemap.c:1940 find_or_create_page include/linux/pagemap.h:420 [inline] grab_cache_page include/linux/pagemap.h:502 [inline] __get_metapage+0x2a4/0x1070 fs/jfs/jfs_metapage.c:614 dtSplitRoot+0x2ab/0x1920 fs/jfs/jfs_dtree.c:1907 dtSplitUp fs/jfs/jfs_dtree.c:990 [inline] dtInsert+0x12f6/0x6b00 fs/jfs/jfs_dtree.c:868 jfs_rename+0xafa/0x1cb0 fs/jfs/namei.c:1224 vfs_rename+0xd32/0x10f0 fs/namei.c:4832 do_renameat2+0xe0f/0x1700 fs/namei.c:4985 __do_sys_rename fs/namei.c:5031 [inline] __se_sys_rename fs/namei.c:5029 [inline] __x64_sys_rename+0x82/0x90 fs/namei.c:5029 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 page last free stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1340 [inline] free_pcp_prepare mm/page_alloc.c:1391 [inline] free_unref_page_prepare+0xc34/0xcf0 mm/page_alloc.c:3317 free_unref_page+0x95/0x2d0 mm/page_alloc.c:3396 do_slab_free mm/slub.c:3487 [inline] ___cache_free+0xe3/0x100 mm/slub.c:3506 qlist_free_all+0x36/0x90 mm/kasan/quarantine.c:176 kasan_quarantine_reduce+0x162/0x180 mm/kasan/quarantine.c:283 __kasan_slab_alloc+0x2f/0xc0 mm/kasan/common.c:444 kasan_slab_alloc include/linux/kasan.h:254 [inline] slab_post_alloc_hook+0x53/0x380 mm/slab.h:519 slab_alloc_node mm/slub.c:3220 [inline] kmem_cache_alloc_node+0x121/0x2c0 mm/slub.c:3256 __alloc_skb+0xdd/0x590 net/core/skbuff.c:415 alloc_skb include/linux/skbuff.h:1167 [inline] alloc_skb_with_frags+0xa3/0x780 net/core/skbuff.c:6170 sock_alloc_send_pskb+0x915/0xa50 net/core/sock.c:2530 unix_dgram_sendmsg+0x6fd/0x2090 net/unix/af_unix.c:1798 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] __sys_sendto+0x564/0x720 net/socket.c:2058 __do_sys_sendto net/socket.c:2070 [inline] __se_sys_sendto net/socket.c:2066 [inline] __x64_sys_sendto+0xda/0xf0 net/socket.c:2066 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 Modules linked in: CPU: 0 PID: 275 Comm: jfsCommit Not tainted 5.15.167-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e3/0x2d0 lib/dump_stack.c:106 bad_page+0x14b/0x170 mm/page_alloc.c:652 check_free_page_bad mm/page_alloc.c:1199 [inline] check_free_page mm/page_alloc.c:1209 [inline] free_pages_prepare mm/page_alloc.c:1334 [inline] free_pcp_prepare mm/page_alloc.c:1391 [inline] free_unref_page_prepare+0x48d/0xcf0 mm/page_alloc.c:3317 free_unref_page+0x95/0x2d0 mm/page_alloc.c:3396 txUnlock+0x282/0xca0 fs/jfs/jfs_txnmgr.c:932 txLazyCommit fs/jfs/jfs_txnmgr.c:2716 [inline] jfs_lazycommit+0x5cd/0xc30 fs/jfs/jfs_txnmgr.c:2766 kthread+0x3f6/0x4f0 kernel/kthread.c:334 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 page:ffffea0001e474c0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x28 pfn:0x791d3 flags: 0xfff00000002007(locked|referenced|uptodate|private|node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000002007 dead000000000100 dead000000000122 0000000000000000 raw: 0000000000000028 ffff888066234000 00000000ffffffff 0000000000000000 page dumped because: VM_BUG_ON_PAGE(((unsigned int) page_ref_count(page) + 127u <= 127u)) page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x100c40(GFP_NOFS|__GFP_HARDWALL), pid 4631, ts 92005732299, free_ts 91964834842 prep_new_page mm/page_alloc.c:2426 [inline] get_page_from_freelist+0x322a/0x33c0 mm/page_alloc.c:4159 __alloc_pages+0x272/0x700 mm/page_alloc.c:5423 __page_cache_alloc+0xd4/0x4a0 mm/filemap.c:1022 pagecache_get_page+0xa91/0x1010 mm/filemap.c:1940 find_or_create_page include/linux/pagemap.h:420 [inline] grab_cache_page include/linux/pagemap.h:502 [inline] __get_metapage+0x2a4/0x1070 fs/jfs/jfs_metapage.c:614 dtSplitRoot+0x2ab/0x1920 fs/jfs/jfs_dtree.c:1907 dtSplitUp fs/jfs/jfs_dtree.c:990 [inline] dtInsert+0x12f6/0x6b00 fs/jfs/jfs_dtree.c:868 jfs_rename+0xafa/0x1cb0 fs/jfs/namei.c:1224 vfs_rename+0xd32/0x10f0 fs/namei.c:4832 do_renameat2+0xe0f/0x1700 fs/namei.c:4985 __do_sys_rename fs/namei.c:5031 [inline] __se_sys_rename fs/namei.c:5029 [inline] __x64_sys_rename+0x82/0x90 fs/namei.c:5029 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 page last free stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1340 [inline] free_pcp_prepare mm/page_alloc.c:1391 [inline] free_unref_page_prepare+0xc34/0xcf0 mm/page_alloc.c:3317 free_unref_page+0x95/0x2d0 mm/page_alloc.c:3396 do_slab_free mm/slub.c:3487 [inline] ___cache_free+0xe3/0x100 mm/slub.c:3506 qlist_free_all+0x36/0x90 mm/kasan/quarantine.c:176 kasan_quarantine_reduce+0x162/0x180 mm/kasan/quarantine.c:283 __kasan_slab_alloc+0x2f/0xc0 mm/kasan/common.c:444 kasan_slab_alloc include/linux/kasan.h:254 [inline] slab_post_alloc_hook+0x53/0x380 mm/slab.h:519 slab_alloc_node mm/slub.c:3220 [inline] kmem_cache_alloc_node+0x121/0x2c0 mm/slub.c:3256 __alloc_skb+0xdd/0x590 net/core/skbuff.c:415 alloc_skb include/linux/skbuff.h:1167 [inline] alloc_skb_with_frags+0xa3/0x780 net/core/skbuff.c:6170 sock_alloc_send_pskb+0x915/0xa50 net/core/sock.c:2530 unix_dgram_sendmsg+0x6fd/0x2090 net/unix/af_unix.c:1798 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] __sys_sendto+0x564/0x720 net/socket.c:2058 __do_sys_sendto net/socket.c:2070 [inline] __se_sys_sendto net/socket.c:2066 [inline] __x64_sys_sendto+0xda/0xf0 net/socket.c:2066 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 ------------[ cut here ]------------ kernel BUG at include/linux/mm.h:1213! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 275 Comm: jfsCommit Tainted: G B 5.15.167-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:get_page include/linux/mm.h:1213 [inline] RIP: 0010:put_metapage+0x283/0x290 fs/jfs/jfs_metapage.c:722 Code: 03 38 c1 0f 8c f8 fe ff ff 4c 89 ff e8 46 3f e5 fe e9 eb fe ff ff e8 2c 75 9b fe 4c 89 e7 48 c7 c6 60 62 c1 8a e8 8d c6 d1 fe <0f> 0b 66 2e 0f 1f 84 00 00 00 00 00 90 55 41 57 41 56 41 55 41 54 RSP: 0018:ffffc90002d17cc0 EFLAGS: 00010246 RAX: 7c26ad7f7e5dde00 RBX: 000000000000007f RCX: ffff88801e183b80 RDX: 0000000000000000 RSI: 000000000000ffff RDI: 000000000000ffff RBP: ffff888066234000 R08: ffffffff81d0e734 R09: ffffed10172067a8 R10: 0000000000000000 R11: dffffc0000000001 R12: ffffea0001e474c0 R13: ffff888066234028 R14: 1ffff1100cc46805 R15: ffffea0001e474f4 FS: 0000000000000000(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fbc1e9fa178 CR3: 00000000795c6000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: txUnlock+0x42f/0xca0 fs/jfs/jfs_txnmgr.c:947 txLazyCommit fs/jfs/jfs_txnmgr.c:2716 [inline] jfs_lazycommit+0x5cd/0xc30 fs/jfs/jfs_txnmgr.c:2766 kthread+0x3f6/0x4f0 kernel/kthread.c:334 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 Modules linked in: ---[ end trace 475063441a334002 ]--- RIP: 0010:get_page include/linux/mm.h:1213 [inline] RIP: 0010:put_metapage+0x283/0x290 fs/jfs/jfs_metapage.c:722 Code: 03 38 c1 0f 8c f8 fe ff ff 4c 89 ff e8 46 3f e5 fe e9 eb fe ff ff e8 2c 75 9b fe 4c 89 e7 48 c7 c6 60 62 c1 8a e8 8d c6 d1 fe <0f> 0b 66 2e 0f 1f 84 00 00 00 00 00 90 55 41 57 41 56 41 55 41 54 RSP: 0018:ffffc90002d17cc0 EFLAGS: 00010246 RAX: 7c26ad7f7e5dde00 RBX: 000000000000007f RCX: ffff88801e183b80 RDX: 0000000000000000 RSI: 000000000000ffff RDI: 000000000000ffff RBP: ffff888066234000 R08: ffffffff81d0e734 R09: ffffed10172067a8 R10: 0000000000000000 R11: dffffc0000000001 R12: ffffea0001e474c0 R13: ffff888066234028 R14: 1ffff1100cc46805 R15: ffffea0001e474f4 FS: 0000000000000000(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fbc1e9fa178 CR3: 00000000795c6000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400