BUG: Bad page state in process syz.4.320 pfn:122847 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff89865 pfn:0x122847 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: 0000000ffff89865 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Not tainted 6.11.0-rc7-syzkaller-g5f5673607153 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:12d6ac page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000ed6acdc0 pfn:0x12d6ac flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000ed6acdc0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:1117ad page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d17ad000 pfn:0x1117ad flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d17ad000 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:1072fd page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000c72fd280 pfn:0x1072fd flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000c72fd280 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:117bff page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x1a pfn:0x117bff flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: 000000000000001a 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:10ce2d page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000cce2d4b0 pfn:0x10ce2d flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000cce2d4b0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:10bd82 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000cbd82dc0 pfn:0x10bd82 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000cbd82dc0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:134b9d page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000f4b9df00 pfn:0x134b9d flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000f4b9df00 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:10bad2 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000cbad2dc0 pfn:0x10bad2 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000cbad2dc0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:12b57e page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000eb57ed20 pfn:0x12b57e flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000eb57ed20 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:116a29 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d6a29dc0 pfn:0x116a29 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d6a29dc0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:116dee page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d6dee0f0 pfn:0x116dee flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d6dee0f0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:12b1e2 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000eb1e2960 pfn:0x12b1e2 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000eb1e2960 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:116328 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d6328000 pfn:0x116328 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d6328000 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:125b3a page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000e5b3adc0 pfn:0x125b3a flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000e5b3adc0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:118eb7 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d8eb7dc0 pfn:0x118eb7 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d8eb7dc0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:108cef page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000c8cefdc0 pfn:0x108cef flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000c8cefdc0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:116a28 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d6a280d8 pfn:0x116a28 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d6a280d8 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:129dbf page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000e9dbfdc0 pfn:0x129dbf flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000e9dbfdc0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:10ce23 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000cce23000 pfn:0x10ce23 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000cce23000 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:1151fd page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d51fdc30 pfn:0x1151fd flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d51fdc30 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:10643b page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000c643b000 pfn:0x10643b flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000c643b000 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:11b497 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000db497870 pfn:0x11b497 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000db497870 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:1087a8 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000c87a84b0 pfn:0x1087a8 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000c87a84b0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:1061b3 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000c61b32d0 pfn:0x1061b3 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000c61b32d0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:116ada page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d6adaf00 pfn:0x116ada flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d6adaf00 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:110001 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d00011e0 pfn:0x110001 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d00011e0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:110a7c page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d0a7c2d0 pfn:0x110a7c flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d0a7c2d0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:116162 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d61623c0 pfn:0x116162 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d61623c0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:1086fc page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000c86fc000 pfn:0x1086fc flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000c86fc000 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:12cc91 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000ecc91000 pfn:0x12cc91 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000ecc91000 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:11212e page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d212e2d0 pfn:0x11212e flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d212e2d0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:1119e7 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d19e7000 pfn:0x1119e7 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d19e7000 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:1157d5 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d57d5000 pfn:0x1157d5 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d57d5000 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:1142ca page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d42ca780 pfn:0x1142ca flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d42ca780 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:11894b page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d894b000 pfn:0x11894b flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d894b000 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:120ff0 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000e0ff00d8 pfn:0x120ff0 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000e0ff00d8 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:1051fe page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000c51fee58 pfn:0x1051fe flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000c51fee58 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:1210e7 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000e10e7000 pfn:0x1210e7 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000e10e7000 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:106480 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000c6480dc0 pfn:0x106480 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000c6480dc0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:116513 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d6513f00 pfn:0x116513 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d6513f00 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:1122e7 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x3 pfn:0x1122e7 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: 0000000000000003 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:110a30 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x1 pfn:0x110a30 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: 0000000000000001 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:10eaf6 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000ceaf6dc0 pfn:0x10eaf6 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000ceaf6dc0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:1155e3 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x4 pfn:0x1155e3 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: 0000000000000004 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x428/0x754 net/core/dev.c:5742 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:11fe75 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000dfe754b0 pfn:0x11fe75 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000dfe754b0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x6e0/0x754 net/core/dev.c:5752 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:129559 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff000000000004 pfn:0x129559 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff000000000004 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x6e0/0x754 net/core/dev.c:5752 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:1108a5 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d08a5f00 pfn:0x1108a5 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d08a5f00 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x6e0/0x754 net/core/dev.c:5752 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:11e777 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x3 pfn:0x11e777 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: 0000000000000003 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x6e0/0x754 net/core/dev.c:5752 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:117a37 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d7a37c30 pfn:0x117a37 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d7a37c30 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x6e0/0x754 net/core/dev.c:5752 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:109797 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000c9797dc0 pfn:0x109797 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000c9797dc0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x6e0/0x754 net/core/dev.c:5752 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:10bf24 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000cbf24000 pfn:0x10bf24 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000cbf24000 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x6e0/0x754 net/core/dev.c:5752 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:120011 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x2 pfn:0x120011 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: 0000000000000002 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x6e0/0x754 net/core/dev.c:5752 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:111036 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d10361e0 pfn:0x111036 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000d10361e0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x6e0/0x754 net/core/dev.c:5752 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:10d2a7 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000cd2a7f00 pfn:0x10d2a7 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000cd2a7f00 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x6e0/0x754 net/core/dev.c:5752 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:113544 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x516 pfn:0x113544 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: 0000000000000516 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x6e0/0x754 net/core/dev.c:5752 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:105ffb page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000c5ffb780 pfn:0x105ffb flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000c5ffb780 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x6e0/0x754 net/core/dev.c:5752 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:132e5b page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000f2e5bf00 pfn:0x132e5b flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000f2e5bf00 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x6e0/0x754 net/core/dev.c:5752 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:132ef6 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000f2ef63c0 pfn:0x132ef6 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000f2ef63c0 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x6e0/0x754 net/core/dev.c:5752 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 BUG: Bad page state in process syz.4.320 pfn:130459 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000f0459b40 pfn:0x130459 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 dead000000000040 ffff0000edb80000 0000000000000000 raw: ffff0000f0459b40 0000000000000001 00000000ffffffff 0000000000000000 page dumped because: page_pool leak Modules linked in: CPU: 1 UID: 0 PID: 8803 Comm: syz.4.320 Tainted: G B 6.11.0-rc7-syzkaller-g5f5673607153 #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326 __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:119 dump_stack+0x1c/0x28 lib/dump_stack.c:128 bad_page+0x1cc/0x238 mm/page_alloc.c:498 free_page_is_bad_report+0x124/0x1a8 mm/page_alloc.c:905 free_page_is_bad mm/page_alloc.c:915 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_page+0xcd8/0xda8 mm/page_alloc.c:2619 page_frag_free+0x198/0x19c mm/page_alloc.c:4940 skb_free_frag include/linux/skbuff.h:3383 [inline] skb_free_head+0x168/0x1bc net/core/skbuff.c:1094 skb_release_data+0x484/0x618 net/core/skbuff.c:1123 skb_release_all net/core/skbuff.c:1188 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0x1bc/0x498 net/core/skbuff.c:1240 packet_rcv+0x148/0x112c net/packet/af_packet.c:2290 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x6e0/0x754 net/core/dev.c:5752 __netif_receive_skb_list net/core/dev.c:5804 [inline] netif_receive_skb_list_internal+0x844/0xb34 net/core/dev.c:5896 netif_receive_skb_list+0x64/0x644 net/core/dev.c:5948 xdp_recv_frames net/bpf/test_run.c:279 [inline] xdp_test_run_batch net/bpf/test_run.c:360 [inline] bpf_test_run_xdp_live+0x1574/0x1a7c net/bpf/test_run.c:389 bpf_prog_test_run_xdp+0x6a4/0xfbc net/bpf/test_run.c:1317 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4313 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5728 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5815 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598