------------[ cut here ]------------
VFS: brelse: Trying to free free buffer
WARNING: CPU: 0 PID: 13804 at fs/buffer.c:1145 __brelse fs/buffer.c:1145 [inline]
WARNING: CPU: 0 PID: 13804 at fs/buffer.c:1145 brelse include/linux/buffer_head.h:326 [inline]
WARNING: CPU: 0 PID: 13804 at fs/buffer.c:1145 __invalidate_bh_lrus fs/buffer.c:1380 [inline]
WARNING: CPU: 0 PID: 13804 at fs/buffer.c:1145 invalidate_bh_lru+0xf8/0x1a0 fs/buffer.c:1393
Modules linked in:
CPU: 0 PID: 13804 Comm: dhcpcd-run-hook Not tainted 6.1.119-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
RIP: 0010:__brelse fs/buffer.c:1145 [inline]
RIP: 0010:brelse include/linux/buffer_head.h:326 [inline]
RIP: 0010:__invalidate_bh_lrus fs/buffer.c:1380 [inline]
RIP: 0010:invalidate_bh_lru+0xf8/0x1a0 fs/buffer.c:1393
Code: 00 e8 bc 8e e0 ff f0 ff 0b eb 21 e8 f2 03 89 ff 41 80 3c 2e 00 75 26 eb 2c e8 e4 03 89 ff 48 c7 c7 20 0f 1a 8b e8 e8 1d 51 ff <0f> 0b 48 bd 00 00 00 00 00 fc ff df 41 80 3c 2e 00 74 08 4c 89 ff
RSP: 0000:ffffc90000007f38 EFLAGS: 00010046
RAX: 0024a315fbe2cc00 RBX: ffff888073d4f888 RCX: ffff88807cc68000
RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffff8152b88e R09: ffffed10171c4f1c
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8880b8e368f8
R13: 0000000000000000 R14: 1ffff110171c6d1f R15: ffff8880b8e368f8
FS: 00007f586d97f380(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f586dad793a CR3: 000000002495c000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 00000000e08e000e DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
__flush_smp_call_function_queue+0x2d9/0xd00 kernel/smp.c:641
__sysvec_call_function_single+0xbb/0x360 arch/x86/kernel/smp.c:267
instr_sysvec_call_function_single arch/x86/kernel/smp.c:262 [inline]
sysvec_call_function_single+0x98/0xc0 arch/x86/kernel/smp.c:262
asm_sysvec_call_function_single+0x16/0x20 arch/x86/include/asm/idtentry.h:699
RIP: 0010:kasan_mem_to_shadow include/linux/kasan.h:59 [inline]
RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:128 [inline]
RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline]
RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline]
RIP: 0010:kasan_check_range+0x33/0x290 mm/kasan/generic.c:189
Code: 85 f6 0f 84 9a 01 00 00 48 89 fd 48 01 f5 0f 82 5a 02 00 00 48 89 fd 48 c1 ed 2f 81 fd ff ff 01 00 0f 82 47 02 00 00 48 89 fb <48> c1 eb 03 49 b8 00 00 00 00 00 fc ff df 4e 8d 0c 03 4c 8d 54 37
RSP: 0000:ffffc90003cdf7b8 EFLAGS: 00000246
RAX: 0000000000000001 RBX: ffffffff8e9af7a8 RCX: ffffffff816aa1fb
RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff8e9af7a8
RBP: 000000000001ffff R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff9200079bf04
R13: dffffc0000000000 R14: 0000000000000000 R15: ffffea0002e3a0c0
instrument_atomic_read include/linux/instrumented.h:72 [inline]
_test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]
cpumask_test_cpu include/linux/cpumask.h:444 [inline]
cpu_online include/linux/cpumask.h:1030 [inline]
trace_lock_acquire include/trace/events/lock.h:24 [inline]
lock_acquire+0xeb/0x5a0 kernel/locking/lockdep.c:5633
rcu_lock_acquire include/linux/rcupdate.h:350 [inline]
rcu_read_lock include/linux/rcupdate.h:791 [inline]
page_ext_get+0x39/0x2a0 mm/page_ext.c:157
page_table_check_set+0x52/0x6d0 mm/page_table_check.c:112
page_table_check_pte_set include/linux/page_table_check.h:83 [inline]
set_pte_at arch/x86/include/asm/pgtable.h:1009 [inline]
do_set_pte+0x584/0x590 mm/memory.c:4424
filemap_map_pages+0xc7c/0x12c0 mm/filemap.c:3480
do_fault_around mm/memory.c:4598 [inline]
do_read_fault mm/memory.c:4624 [inline]
do_fault mm/memory.c:4758 [inline]
handle_pte_fault mm/memory.c:5029 [inline]
__handle_mm_fault mm/memory.c:5171 [inline]
handle_mm_fault+0x33e0/0x5340 mm/memory.c:5292
do_user_addr_fault arch/x86/mm/fault.c:1340 [inline]
handle_page_fault arch/x86/mm/fault.c:1431 [inline]
exc_page_fault+0x26f/0x620 arch/x86/mm/fault.c:1487
asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:608
RIP: 0033:0x7f586dad793a
Code: Unable to access opcode bytes at 0x7f586dad7910.
RSP: 002b:00007ffeb7dab608 EFLAGS: 00010206
RAX: 00007f586dbb6458 RBX: 0000000000000001 RCX: ffffffffffffff90
RDX: ffffffffffffff88 RSI: 00007ffeb7dab610 RDI: 0000000000000003
RBP: 00007ffeb7dab8d0 R08: 000000000000ffff R09: 000000000000000d
R10: 00007f586da0db74 R11: 0000000000000206 R12: 0000000000000000
R13: 000001a4f2dfda81 R14: 0000000000000000 R15: 00007f586dcb22a0
----------------
Code disassembly (best guess):
0: 85 f6 test %esi,%esi
2: 0f 84 9a 01 00 00 je 0x1a2
8: 48 89 fd mov %rdi,%rbp
b: 48 01 f5 add %rsi,%rbp
e: 0f 82 5a 02 00 00 jb 0x26e
14: 48 89 fd mov %rdi,%rbp
17: 48 c1 ed 2f shr $0x2f,%rbp
1b: 81 fd ff ff 01 00 cmp $0x1ffff,%ebp
21: 0f 82 47 02 00 00 jb 0x26e
27: 48 89 fb mov %rdi,%rbx
* 2a: 48 c1 eb 03 shr $0x3,%rbx <-- trapping instruction
2e: 49 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%r8
35: fc ff df
38: 4e 8d 0c 03 lea (%rbx,%r8,1),%r9
3c: 4c rex.WR
3d: 8d .byte 0x8d
3e: 54 push %rsp
3f: 37 (bad)