------------[ cut here ]------------
VFS: brelse: Trying to free free buffer
WARNING: CPU: 1 PID: 3502 at fs/buffer.c:1148 __brelse fs/buffer.c:1148 [inline]
WARNING: CPU: 1 PID: 3502 at fs/buffer.c:1148 brelse include/linux/buffer_head.h:325 [inline]
WARNING: CPU: 1 PID: 3502 at fs/buffer.c:1148 __invalidate_bh_lrus fs/buffer.c:1394 [inline]
WARNING: CPU: 1 PID: 3502 at fs/buffer.c:1148 invalidate_bh_lru+0xf8/0x1a0 fs/buffer.c:1407
Modules linked in:
CPU: 1 PID: 3502 Comm: syz-executor407 Not tainted 5.15.162-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
RIP: 0010:__brelse fs/buffer.c:1148 [inline]
RIP: 0010:brelse include/linux/buffer_head.h:325 [inline]
RIP: 0010:__invalidate_bh_lrus fs/buffer.c:1394 [inline]
RIP: 0010:invalidate_bh_lru+0xf8/0x1a0 fs/buffer.c:1407
Code: 00 e8 6c 69 e4 ff f0 ff 0b eb 21 e8 d2 98 9a ff 41 80 3c 2e 00 75 26 eb 2c e8 c4 98 9a ff 48 c7 c7 20 6c 97 8a e8 e8 40 66 ff <0f> 0b 48 bd 00 00 00 00 00 fc ff df 41 80 3c 2e 00 74 08 4c 89 ff
RSP: 0000:ffffc90000dd0f60 EFLAGS: 00010046
RAX: 0f4749c744a60600 RBX: ffff888073797318 RCX: ffff888015df5940
RDX: 0000000080010002 RSI: 0000000080010002 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffff816683dc R09: ffffed1017364f24
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8880b9b36578
R13: 0000000000000058 R14: 1ffff11017366cba R15: ffff8880b9b365d0
FS: 000055555639f380(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f5e9cd8a050 CR3: 0000000076155000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
flush_smp_call_function_queue+0x2b5/0x760 kernel/smp.c:628
__sysvec_call_function_single+0x9a/0x250 arch/x86/kernel/smp.c:248
sysvec_call_function_single+0x89/0xb0 arch/x86/kernel/smp.c:243
asm_sysvec_call_function_single+0x16/0x20 arch/x86/include/asm/idtentry.h:646
RIP: 0010:check_kcov_mode kernel/kcov.c:165 [inline]
RIP: 0010:write_comp_data kernel/kcov.c:218 [inline]
RIP: 0010:__sanitizer_cov_trace_const_cmp1+0x2a/0x80 kernel/kcov.c:270
Code: 4c 8b 04 24 65 48 8b 15 f4 11 82 7e 65 8b 05 f5 11 82 7e a9 00 01 ff 00 74 10 a9 00 01 00 00 74 5b 83 ba 34 16 00 00 00 74 52 <8b> 82 10 16 00 00 83 f8 03 75 47 48 8b 8a 18 16 00 00 44 8b 92 14
RSP: 0000:ffffc900021a7950 EFLAGS: 00000246
RAX: 0000000080000001 RBX: 0000000000000000 RCX: ffffffff81bd4d48
RDX: ffff888015df5940 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000001 R08: ffffffff81bd4d6c R09: fffff94000381237
R10: 0000000000000000 R11: dffffc0000000001 R12: ffffea0001c09180
R13: dffffc0000000000 R14: ffff888078836200 R15: 0000000000000000
arch_atomic_inc_and_test arch/x86/include/asm/atomic.h:137 [inline]
atomic_inc_and_test include/linux/atomic/atomic-instrumented.h:550 [inline]
page_add_file_rmap+0x76c/0x980 mm/rmap.c:1245
do_set_pte+0x45b/0x660 mm/memory.c:4039
filemap_map_pages+0xf5e/0x15c0 mm/filemap.c:3344
do_fault_around mm/memory.c:4213 [inline]
do_read_fault mm/memory.c:4228 [inline]
do_fault mm/memory.c:4362 [inline]
handle_pte_fault mm/memory.c:4621 [inline]
__handle_mm_fault mm/memory.c:4756 [inline]
handle_mm_fault+0x341b/0x5950 mm/memory.c:4854
do_user_addr_fault arch/x86/mm/fault.c:1357 [inline]
handle_page_fault arch/x86/mm/fault.c:1445 [inline]
exc_page_fault+0x271/0x700 arch/x86/mm/fault.c:1501
asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:568
RIP: 0033:0x7f5e9cd8a050
Code: Unable to access opcode bytes at RIP 0x7f5e9cd8a026.
RSP: 002b:00007fff3dfea708 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 00007f5e9cdab0a0 RCX: 00007f5e9cd634bd
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 00007f5e9cde1e60
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff3dfea72c
R13: 0000000000000001 R14: 431bde82d7b634db R15: 00007fff3dfea760
----------------
Code disassembly (best guess):
0: 4c 8b 04 24 mov (%rsp),%r8
4: 65 48 8b 15 f4 11 82 mov %gs:0x7e8211f4(%rip),%rdx # 0x7e821200
b: 7e
c: 65 8b 05 f5 11 82 7e mov %gs:0x7e8211f5(%rip),%eax # 0x7e821208
13: a9 00 01 ff 00 test $0xff0100,%eax
18: 74 10 je 0x2a
1a: a9 00 01 00 00 test $0x100,%eax
1f: 74 5b je 0x7c
21: 83 ba 34 16 00 00 00 cmpl $0x0,0x1634(%rdx)
28: 74 52 je 0x7c
* 2a: 8b 82 10 16 00 00 mov 0x1610(%rdx),%eax <-- trapping instruction
30: 83 f8 03 cmp $0x3,%eax
33: 75 47 jne 0x7c
35: 48 8b 8a 18 16 00 00 mov 0x1618(%rdx),%rcx
3c: 44 rex.R
3d: 8b .byte 0x8b
3e: 92 xchg %eax,%edx
3f: 14 .byte 0x14