------------[ cut here ]------------ VFS: brelse: Trying to free free buffer WARNING: CPU: 1 PID: 3502 at fs/buffer.c:1148 __brelse fs/buffer.c:1148 [inline] WARNING: CPU: 1 PID: 3502 at fs/buffer.c:1148 brelse include/linux/buffer_head.h:325 [inline] WARNING: CPU: 1 PID: 3502 at fs/buffer.c:1148 __invalidate_bh_lrus fs/buffer.c:1394 [inline] WARNING: CPU: 1 PID: 3502 at fs/buffer.c:1148 invalidate_bh_lru+0xf8/0x1a0 fs/buffer.c:1407 Modules linked in: CPU: 1 PID: 3502 Comm: syz-executor407 Not tainted 5.15.162-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 RIP: 0010:__brelse fs/buffer.c:1148 [inline] RIP: 0010:brelse include/linux/buffer_head.h:325 [inline] RIP: 0010:__invalidate_bh_lrus fs/buffer.c:1394 [inline] RIP: 0010:invalidate_bh_lru+0xf8/0x1a0 fs/buffer.c:1407 Code: 00 e8 6c 69 e4 ff f0 ff 0b eb 21 e8 d2 98 9a ff 41 80 3c 2e 00 75 26 eb 2c e8 c4 98 9a ff 48 c7 c7 20 6c 97 8a e8 e8 40 66 ff <0f> 0b 48 bd 00 00 00 00 00 fc ff df 41 80 3c 2e 00 74 08 4c 89 ff RSP: 0000:ffffc90000dd0f60 EFLAGS: 00010046 RAX: 0f4749c744a60600 RBX: ffff888073797318 RCX: ffff888015df5940 RDX: 0000000080010002 RSI: 0000000080010002 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffff816683dc R09: ffffed1017364f24 R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8880b9b36578 R13: 0000000000000058 R14: 1ffff11017366cba R15: ffff8880b9b365d0 FS: 000055555639f380(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f5e9cd8a050 CR3: 0000000076155000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: flush_smp_call_function_queue+0x2b5/0x760 kernel/smp.c:628 __sysvec_call_function_single+0x9a/0x250 arch/x86/kernel/smp.c:248 sysvec_call_function_single+0x89/0xb0 arch/x86/kernel/smp.c:243 asm_sysvec_call_function_single+0x16/0x20 arch/x86/include/asm/idtentry.h:646 RIP: 0010:check_kcov_mode kernel/kcov.c:165 [inline] RIP: 0010:write_comp_data kernel/kcov.c:218 [inline] RIP: 0010:__sanitizer_cov_trace_const_cmp1+0x2a/0x80 kernel/kcov.c:270 Code: 4c 8b 04 24 65 48 8b 15 f4 11 82 7e 65 8b 05 f5 11 82 7e a9 00 01 ff 00 74 10 a9 00 01 00 00 74 5b 83 ba 34 16 00 00 00 74 52 <8b> 82 10 16 00 00 83 f8 03 75 47 48 8b 8a 18 16 00 00 44 8b 92 14 RSP: 0000:ffffc900021a7950 EFLAGS: 00000246 RAX: 0000000080000001 RBX: 0000000000000000 RCX: ffffffff81bd4d48 RDX: ffff888015df5940 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000001 R08: ffffffff81bd4d6c R09: fffff94000381237 R10: 0000000000000000 R11: dffffc0000000001 R12: ffffea0001c09180 R13: dffffc0000000000 R14: ffff888078836200 R15: 0000000000000000 arch_atomic_inc_and_test arch/x86/include/asm/atomic.h:137 [inline] atomic_inc_and_test include/linux/atomic/atomic-instrumented.h:550 [inline] page_add_file_rmap+0x76c/0x980 mm/rmap.c:1245 do_set_pte+0x45b/0x660 mm/memory.c:4039 filemap_map_pages+0xf5e/0x15c0 mm/filemap.c:3344 do_fault_around mm/memory.c:4213 [inline] do_read_fault mm/memory.c:4228 [inline] do_fault mm/memory.c:4362 [inline] handle_pte_fault mm/memory.c:4621 [inline] __handle_mm_fault mm/memory.c:4756 [inline] handle_mm_fault+0x341b/0x5950 mm/memory.c:4854 do_user_addr_fault arch/x86/mm/fault.c:1357 [inline] handle_page_fault arch/x86/mm/fault.c:1445 [inline] exc_page_fault+0x271/0x700 arch/x86/mm/fault.c:1501 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:568 RIP: 0033:0x7f5e9cd8a050 Code: Unable to access opcode bytes at RIP 0x7f5e9cd8a026. RSP: 002b:00007fff3dfea708 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 00007f5e9cdab0a0 RCX: 00007f5e9cd634bd RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 00007f5e9cde1e60 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff3dfea72c R13: 0000000000000001 R14: 431bde82d7b634db R15: 00007fff3dfea760 ---------------- Code disassembly (best guess): 0: 4c 8b 04 24 mov (%rsp),%r8 4: 65 48 8b 15 f4 11 82 mov %gs:0x7e8211f4(%rip),%rdx # 0x7e821200 b: 7e c: 65 8b 05 f5 11 82 7e mov %gs:0x7e8211f5(%rip),%eax # 0x7e821208 13: a9 00 01 ff 00 test $0xff0100,%eax 18: 74 10 je 0x2a 1a: a9 00 01 00 00 test $0x100,%eax 1f: 74 5b je 0x7c 21: 83 ba 34 16 00 00 00 cmpl $0x0,0x1634(%rdx) 28: 74 52 je 0x7c * 2a: 8b 82 10 16 00 00 mov 0x1610(%rdx),%eax <-- trapping instruction 30: 83 f8 03 cmp $0x3,%eax 33: 75 47 jne 0x7c 35: 48 8b 8a 18 16 00 00 mov 0x1618(%rdx),%rcx 3c: 44 rex.R 3d: 8b .byte 0x8b 3e: 92 xchg %eax,%edx 3f: 14 .byte 0x14