------------[ cut here ]------------
VFS: brelse: Trying to free free buffer
WARNING: CPU: 0 PID: 5075 at fs/buffer.c:1235 __brelse fs/buffer.c:1235 [inline]
WARNING: CPU: 0 PID: 5075 at fs/buffer.c:1235 brelse include/linux/buffer_head.h:309 [inline]
WARNING: CPU: 0 PID: 5075 at fs/buffer.c:1235 __invalidate_bh_lrus fs/buffer.c:1487 [inline]
WARNING: CPU: 0 PID: 5075 at fs/buffer.c:1235 invalidate_bh_lru+0x102/0x1b0 fs/buffer.c:1500
Modules linked in:
CPU: 0 PID: 5075 Comm: udevd Not tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
RIP: 0010:__brelse fs/buffer.c:1235 [inline]
RIP: 0010:brelse include/linux/buffer_head.h:309 [inline]
RIP: 0010:__invalidate_bh_lrus fs/buffer.c:1487 [inline]
RIP: 0010:invalidate_bh_lru+0x102/0x1b0 fs/buffer.c:1500
Code: 34 4f dd ff f0 ff 0b eb 25 e8 2a 3b 7c ff 41 80 3c 2e 00 75 2a eb 30 e8 1c 3b 7c ff 90 48 c7 c7 c0 dc d8 8b e8 9f b7 3e ff 90 <0f> 0b 90 90 48 bd 00 00 00 00 00 fc ff df 41 80 3c 2e 00 74 08 4c
RSP: 0000:ffffc90000007f30 EFLAGS: 00010046
RAX: 12af0dae7dbd1700 RBX: ffff8880799b6060 RCX: ffff8880294abc00
RDX: 0000000080010001 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffff81587f92 R09: fffffbfff1c39b48
R10: dffffc0000000000 R11: fffffbfff1c39b48 R12: ffff8880b9439370
R13: 0000000000000000 R14: 1ffff1101728726e R15: ffff8880b9439370
FS: 00007fe9540c7c80(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe953db4c20 CR3: 000000007b7e4000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
csd_do_func kernel/smp.c:133 [inline]
__flush_smp_call_function_queue+0x3fc/0x1690 kernel/smp.c:511
__sysvec_call_function_single+0xb8/0x430 arch/x86/kernel/smp.c:271
instr_sysvec_call_function_single arch/x86/kernel/smp.c:266 [inline]
sysvec_call_function_single+0x9e/0xc0 arch/x86/kernel/smp.c:266
asm_sysvec_call_function_single+0x1a/0x20 arch/x86/include/asm/idtentry.h:709
RIP: 0010:rcu_read_unlock include/linux/rcupdate.h:810 [inline]
RIP: 0010:count_memcg_event_mm+0x334/0x420 include/linux/memcontrol.h:1121
Code: f2 5a b6 ff 4c 8b 6c 24 18 eb 1f e8 e6 5a b6 ff e8 61 49 97 09 4d 85 f6 74 84 e8 d7 5a b6 ff fb 49 be 00 00 00 00 00 fc ff df e7 4f 97 09 89 c3 31 ff 89 c6 e8 fc 5e b6 ff 85 db 74 10 e8 03
RSP: 0000:ffffc9000375fda0 EFLAGS: 00000293
RAX: ffffffff81dfa599 RBX: 0000000000000000 RCX: ffff8880294abc00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000375fe70 R08: ffffffff81dfa509 R09: 1ffffffff25df6b3
R10: dffffc0000000000 R11: fffffbfff25df6b4 R12: 0000000000000046
R13: ffffffff81dfa304 R14: dffffc0000000000 R15: 1ffff920006ebfb8
mm_account_fault mm/memory.c:5475 [inline]
handle_mm_fault+0x3d5/0x770 mm/memory.c:5622
do_user_addr_fault arch/x86/mm/fault.c:1362 [inline]
handle_page_fault arch/x86/mm/fault.c:1505 [inline]
exc_page_fault+0x446/0x8e0 arch/x86/mm/fault.c:1563
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623
RIP: 0033:0x7fe953ccb481
Code: 1e ff ff ff 48 81 c4 48 08 00 00 5b 5d 41 5c 41 5d 41 5e 41 5f c3 41 57 41 56 41 55 41 54 55 48 89 fd 53 48 81 ec 18 01 00 00 <0f> b6 1e 84 db 0f 84 0f 02 00 00 49 89 f4 89 de e8 ca bd fa ff 48
RSP: 002b:00007ffccec866a0 EFLAGS: 00010206
RAX: 000055d5d918d0f0 RBX: 000055d59bcc172e RCX: 00007fe953d169a4
RDX: 00000000fbad2484 RSI: 00007fe953db4c20 RDI: 000055d59bcc172f
RBP: 000055d59bcc172f R08: 0000000000000004 R09: 0000000000000001
R10: 00000000000001b6 R11: 0000000000000246 R12: 000055d59bcbf185
R13: 000055d5d918d0f0 R14: 0000000000000001 R15: 000055d5d916a910
----------------
Code disassembly (best guess):
0: f2 5a repnz pop %rdx
2: b6 ff mov $0xff,%dh
4: 4c 8b 6c 24 18 mov 0x18(%rsp),%r13
9: eb 1f jmp 0x2a
b: e8 e6 5a b6 ff call 0xffb65af6
10: e8 61 49 97 09 call 0x9974976
15: 4d 85 f6 test %r14,%r14
18: 74 84 je 0xffffff9e
1a: e8 d7 5a b6 ff call 0xffb65af6
1f: fb sti
20: 49 be 00 00 00 00 00 movabs $0xdffffc0000000000,%r14
27: fc ff df
* 2a: e8 e7 4f 97 09 call 0x9975016 <-- trapping instruction
2f: 89 c3 mov %eax,%ebx
31: 31 ff xor %edi,%edi
33: 89 c6 mov %eax,%esi
35: e8 fc 5e b6 ff call 0xffb65f36
3a: 85 db test %ebx,%ebx
3c: 74 10 je 0x4e
3e: e8 .byte 0xe8
3f: 03 .byte 0x3