Injecting memory failure for pfn 0x104000 at process virtual address 0x20000000 ------------[ cut here ]------------ WARNING: CPU: 1 PID: 6700 at mm/memory-failure.c:2391 memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 Modules linked in: CPU: 1 UID: 0 PID: 6700 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 lr : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 sp : ffff8000a41478c0 x29: ffff8000a41479a0 x28: 05ffc00000200868 x27: ffff700014828f20 x26: 1fffffbff8620001 x25: 05ffc0000020086d x24: 1fffffbff8620000 x23: fffffdffc3100008 x22: fffffdffc3100000 x21: fffffdffc3100000 x20: 0000000000000023 x19: dfff800000000000 x18: 1fffe00033793888 x17: ffff80008f7ee000 x16: ffff80008052aa64 x15: 0000000000000001 x14: 1fffffbff8620000 x13: 0000000000000000 x12: 0000000000000000 x11: ffff7fbff8620001 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000d7eedb80 x7 : ffff800080428910 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff800080cf5438 x2 : 0000000000000001 x1 : 0000000000000040 x0 : 0000000000000000 Call trace: memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 (P) madvise_inject_error mm/madvise.c:1475 [inline] madvise_do_behavior+0x2c8/0x7c4 mm/madvise.c:1875 do_madvise+0x190/0x248 mm/madvise.c:1978 __do_sys_madvise mm/madvise.c:1987 [inline] __se_sys_madvise mm/madvise.c:1985 [inline] __arm64_sys_madvise+0xa4/0xc0 mm/madvise.c:1985 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x254 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:763 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 irq event stamp: 1544 hardirqs last enabled at (1543): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] hardirqs last enabled at (1543): [] _raw_spin_unlock_irq+0x30/0x80 kernel/locking/spinlock.c:202 hardirqs last disabled at (1544): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:434 softirqs last enabled at (1528): [] softirq_handle_end kernel/softirq.c:425 [inline] softirqs last enabled at (1528): [] handle_softirqs+0xaf8/0xc88 kernel/softirq.c:607 softirqs last disabled at (1397): [] __do_softirq+0x14/0x20 kernel/softirq.c:613 ---[ end trace 0000000000000000 ]--- Memory failure: 0x104000: recovery action for huge page: Recovered Injecting memory failure for pfn 0x131e00 at process virtual address 0x20200000 ------------[ cut here ]------------ WARNING: CPU: 1 PID: 6700 at mm/memory-failure.c:2391 memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 Modules linked in: CPU: 1 UID: 0 PID: 6700 Comm: syz.0.17 Tainted: G W syzkaller #0 PREEMPT Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 lr : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 sp : ffff8000a41478c0 x29: ffff8000a41479a0 x28: 05ffc00000200868 x27: ffff700014828f20 x26: 1fffffbff878f001 x25: 05ffc0000020086d x24: 1fffffbff878f000 x23: fffffdffc3c78008 x22: fffffdffc3c78000 x21: fffffdffc3c78000 x20: 0000000000000023 x19: dfff800000000000 x18: 00000000ffffffff x17: ffff80009353a000 x16: ffff80008052aa64 x15: 0000000000000001 x14: 1fffffbff878f000 x13: 0000000000000000 x12: 0000000000000000 x11: ffff7fbff878f001 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000d7eedb80 x7 : ffff800080a549a8 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff800080cf5438 x2 : 0000000000000001 x1 : 0000000000000040 x0 : 0000000000000000 Call trace: memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 (P) madvise_inject_error mm/madvise.c:1475 [inline] madvise_do_behavior+0x2c8/0x7c4 mm/madvise.c:1875 do_madvise+0x190/0x248 mm/madvise.c:1978 __do_sys_madvise mm/madvise.c:1987 [inline] __se_sys_madvise mm/madvise.c:1985 [inline] __arm64_sys_madvise+0xa4/0xc0 mm/madvise.c:1985 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x254 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:763 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 irq event stamp: 2162 hardirqs last enabled at (2161): [] __folio_split+0xf7c/0x1438 mm/huge_memory.c:3856 hardirqs last disabled at (2162): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:434 softirqs last enabled at (1726): [] softirq_handle_end kernel/softirq.c:425 [inline] softirqs last enabled at (1726): [] handle_softirqs+0xaf8/0xc88 kernel/softirq.c:607 softirqs last disabled at (1547): [] __do_softirq+0x14/0x20 kernel/softirq.c:613 ---[ end trace 0000000000000000 ]--- Memory failure: 0x131e00: recovery action for huge page: Recovered Injecting memory failure for pfn 0x134200 at process virtual address 0x20400000 ------------[ cut here ]------------ WARNING: CPU: 1 PID: 6700 at mm/memory-failure.c:2391 memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 Modules linked in: CPU: 1 UID: 0 PID: 6700 Comm: syz.0.17 Tainted: G W syzkaller #0 PREEMPT Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 lr : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 sp : ffff8000a41478c0 x29: ffff8000a41479a0 x28: 05ffc00000200868 x27: ffff700014828f20 x26: 1fffffbff87a1001 x25: 05ffc0000020086d x24: 1fffffbff87a1000 x23: fffffdffc3d08008 x22: fffffdffc3d08000 x21: fffffdffc3d08000 x20: 0000000000000023 x19: dfff800000000000 x18: 1fffe00033793888 x17: 646461206c617574 x16: ffff80008052aa64 x15: 0000000000000001 x14: 1fffffbff87a1000 x13: 0000000000000000 x12: 0000000000000000 x11: ffff7fbff87a1001 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000d7eedb80 x7 : ffff800080a549a8 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff800080cf5438 x2 : 0000000000000001 x1 : 0000000000000040 x0 : 0000000000000000 Call trace: memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 (P) madvise_inject_error mm/madvise.c:1475 [inline] madvise_do_behavior+0x2c8/0x7c4 mm/madvise.c:1875 do_madvise+0x190/0x248 mm/madvise.c:1978 __do_sys_madvise mm/madvise.c:1987 [inline] __se_sys_madvise mm/madvise.c:1985 [inline] __arm64_sys_madvise+0xa4/0xc0 mm/madvise.c:1985 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x254 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:763 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 irq event stamp: 2768 hardirqs last enabled at (2767): [] __folio_split+0xf7c/0x1438 mm/huge_memory.c:3856 hardirqs last disabled at (2768): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:434 softirqs last enabled at (2364): [] softirq_handle_end kernel/softirq.c:425 [inline] softirqs last enabled at (2364): [] handle_softirqs+0xaf8/0xc88 kernel/softirq.c:607 softirqs last disabled at (2321): [] __do_softirq+0x14/0x20 kernel/softirq.c:613 ---[ end trace 0000000000000000 ]--- Memory failure: 0x134200: recovery action for huge page: Recovered Injecting memory failure for pfn 0x129000 at process virtual address 0x20600000 ------------[ cut here ]------------ WARNING: CPU: 1 PID: 6700 at mm/memory-failure.c:2391 memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 Modules linked in: CPU: 1 UID: 0 PID: 6700 Comm: syz.0.17 Tainted: G W syzkaller #0 PREEMPT Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 lr : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 sp : ffff8000a41478c0 x29: ffff8000a41479a0 x28: 05ffc00000200868 x27: ffff700014828f20 x26: 1fffffbff8748001 x25: 05ffc0000020086d x24: 1fffffbff8748000 x23: fffffdffc3a40008 x22: fffffdffc3a40000 x21: fffffdffc3a40000 x20: 0000000000000023 x19: dfff800000000000 x18: 1fffe00033793888 x17: 646461206c617574 x16: ffff80008052aa64 x15: 0000000000000001 x14: 1fffffbff8748000 x13: 0000000000000000 x12: 0000000000000000 x11: ffff7fbff8748001 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000d7eedb80 x7 : ffff800080a549a8 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff800080cf5438 x2 : 0000000000000001 x1 : 0000000000000040 x0 : 0000000000000000 Call trace: memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 (P) madvise_inject_error mm/madvise.c:1475 [inline] madvise_do_behavior+0x2c8/0x7c4 mm/madvise.c:1875 do_madvise+0x190/0x248 mm/madvise.c:1978 __do_sys_madvise mm/madvise.c:1987 [inline] __se_sys_madvise mm/madvise.c:1985 [inline] __arm64_sys_madvise+0xa4/0xc0 mm/madvise.c:1985 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x254 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:763 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 irq event stamp: 3024 hardirqs last enabled at (3023): [] __folio_split+0xf7c/0x1438 mm/huge_memory.c:3856 hardirqs last disabled at (3024): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:434 softirqs last enabled at (2986): [] softirq_handle_end kernel/softirq.c:425 [inline] softirqs last enabled at (2986): [] handle_softirqs+0xaf8/0xc88 kernel/softirq.c:607 softirqs last disabled at (2771): [] __do_softirq+0x14/0x20 kernel/softirq.c:613 ---[ end trace 0000000000000000 ]--- Memory failure: 0x129000: recovery action for huge page: Recovered Injecting memory failure for pfn 0x134600 at process virtual address 0x20800000 ------------[ cut here ]------------ WARNING: CPU: 1 PID: 6700 at mm/memory-failure.c:2391 memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 Modules linked in: CPU: 1 UID: 0 PID: 6700 Comm: syz.0.17 Tainted: G W syzkaller #0 PREEMPT Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 lr : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 sp : ffff8000a41478c0 x29: ffff8000a41479a0 x28: 05ffc0000020086c x27: ffff700014828f20 x26: 1fffffbff87a3001 x25: 05ffc0000020186d x24: 1fffffbff87a3000 x23: fffffdffc3d18008 x22: fffffdffc3d18000 x21: fffffdffc3d18000 x20: 0000000000000023 x19: dfff800000000000 x18: 1fffe00033793888 x17: ffff80009353a000 x16: ffff80008052aa64 x15: 0000000000000001 x14: 1fffffbff87a3000 x13: 0000000000000000 x12: 0000000000000000 x11: ffff7fbff87a3001 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000d7eedb80 x7 : ffff800080a549a8 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff800080cf5438 x2 : 0000000000000001 x1 : 0000000000000040 x0 : 0000000000000000 Call trace: memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 (P) madvise_inject_error mm/madvise.c:1475 [inline] madvise_do_behavior+0x2c8/0x7c4 mm/madvise.c:1875 do_madvise+0x190/0x248 mm/madvise.c:1978 __do_sys_madvise mm/madvise.c:1987 [inline] __se_sys_madvise mm/madvise.c:1985 [inline] __arm64_sys_madvise+0xa4/0xc0 mm/madvise.c:1985 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x254 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:763 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 irq event stamp: 3462 hardirqs last enabled at (3461): [] __folio_split+0xf7c/0x1438 mm/huge_memory.c:3856 hardirqs last disabled at (3462): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:434 softirqs last enabled at (3064): [] softirq_handle_end kernel/softirq.c:425 [inline] softirqs last enabled at (3064): [] handle_softirqs+0xaf8/0xc88 kernel/softirq.c:607 softirqs last disabled at (3027): [] __do_softirq+0x14/0x20 kernel/softirq.c:613 ---[ end trace 0000000000000000 ]--- Memory failure: 0x134600: recovery action for huge page: Recovered Injecting memory failure for pfn 0x134800 at proces Injecting memory failure for pfn 0x134800 at process virtual address 0x20a00000 ------------[ cut here ]------------ WARNING: CPU: 0 PID: 6700 at mm/memory-failure.c:2391 memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 Modules linked in: CPU: 0 UID: 0 PID: 6700 Comm: syz.0.17 Tainted: G W syzkaller #0 PREEMPT Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 lr : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 sp : ffff8000a41478c0 x29: ffff8000a41479a0 x28: 05ffc0000020086c x27: ffff700014828f20 x26: 1fffffbff87a4001 x25: 05ffc0000020186d x24: 1fffffbff87a4000 x23: fffffdffc3d20008 x22: fffffdffc3d20000 x21: fffffdffc3d20000 x20: 0000000000000023 x19: dfff800000000000 x18: 1fffe0003378f088 x17: ffff80008f7ee000 x16: ffff80008052aa64 x15: 0000000000000001 x14: 1fffffbff87a4000 x13: 0000000000000000 x12: 0000000000000000 x11: ffff7fbff87a4001 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000d7eedb80 x7 : ffff800080a549a8 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff800080cf5438 x2 : 0000000000000001 x1 : 0000000000000040 x0 : 0000000000000000 Call trace: memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 (P) madvise_inject_error mm/madvise.c:1475 [inline] madvise_do_behavior+0x2c8/0x7c4 mm/madvise.c:1875 do_madvise+0x190/0x248 mm/madvise.c:1978 __do_sys_madvise mm/madvise.c:1987 [inline] __se_sys_madvise mm/madvise.c:1985 [inline] __arm64_sys_madvise+0xa4/0xc0 mm/madvise.c:1985 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x254 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:763 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 irq event stamp: 3538 hardirqs last enabled at (3537): [] __folio_split+0xf7c/0x1438 mm/huge_memory.c:3856 hardirqs last disabled at (3538): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:434 softirqs last enabled at (3500): [] softirq_handle_end kernel/softirq.c:425 [inline] softirqs last enabled at (3500): [] handle_softirqs+0xaf8/0xc88 kernel/softirq.c:607 softirqs last disabled at (3465): [] __do_softirq+0x14/0x20 kernel/softirq.c:613 ---[ end trace 0000000000000000 ]--- Memory failure: 0x134800: recovery action for huge page: Recovered