------------[ cut here ]------------ kernel BUG at mm/page_table_check.c:157! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 6833 Comm: syz.1.131 Not tainted 6.10.0-rc7-syzkaller-gc912bf709078 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __page_table_check_zero+0x248/0x254 mm/page_table_check.c:157 lr : __page_table_check_zero+0x248/0x254 mm/page_table_check.c:157 sp : ffff80009fca7630 x29: ffff80009fca7630 x28: ffff800093c9a000 x27: 0000000000000000 x26: dfff800000000000 x25: 0000000000000000 x24: ffff0000c07b0384 x23: 1ffff000127935e0 x22: dfff800000000000 x21: 0000000000000002 x20: ffff0000c07b0380 x19: 0000000000000002 x18: ffff80009fca7400 x17: 00000000000217cd x16: ffff80008032b884 x15: 0000000000000001 x14: 1fffe000180f6070 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000040000 x10: 0000000000005c61 x9 : ffff8000a162b000 x8 : 0000000000005c62 x7 : ffff800080af98e4 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff800080af9d10 x2 : 0000000000000000 x1 : 0000000000000004 x0 : 0000000000000001 Call trace: __page_table_check_zero+0x248/0x254 mm/page_table_check.c:157 page_table_check_free include/linux/page_table_check.h:41 [inline] free_pages_prepare mm/page_alloc.c:1094 [inline] free_unref_page+0xc6c/0xda8 mm/page_alloc.c:2588 __free_pages+0x18c/0x1a4 mm/page_alloc.c:4770 free_pages+0xcc/0x110 mm/page_alloc.c:4783 hcd_buffer_free_pages+0xf0/0x15c drivers/usb/core/buffer.c:210 dec_usb_memory_use_count+0x250/0x330 drivers/usb/core/devio.c:198 usbdev_vm_close+0x44/0x54 drivers/usb/core/devio.c:222 mmap_region+0xef4/0x17d8 mm/mmap.c:3005 do_mmap+0x788/0xd90 mm/mmap.c:1397 vm_mmap_pgoff+0x1a0/0x38c mm/util.c:573 ksys_mmap_pgoff+0x3a4/0x5c8 mm/mmap.c:1443 __do_sys_mmap arch/arm64/kernel/sys.c:28 [inline] __se_sys_mmap arch/arm64/kernel/sys.c:21 [inline] __arm64_sys_mmap+0xf8/0x110 arch/arm64/kernel/sys.c:21 __invoke_syscall arch/arm64/kernel/syscall.c:34 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:48 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:131 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:150 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 Code: d4210000 97e94800 d4210000 97e947fe (d4210000) ---[ end trace 0000000000000000 ]---