BUG: Bad page state in process syz-executor687 pfn:3203b
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3203b
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479171932, free_ts 44477123809
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:3203e
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3203e
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479163907, free_ts 44477137328
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:3203c
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3203c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479155997, free_ts 44477144505
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:28a21
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888028a21000 pfn:0x28a21
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: ffff888028a21000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479147994, free_ts 44477151465
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:35dc4
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x35dc4
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479139930, free_ts 44477158486
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:2b20d
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff88802b20dca8 pfn:0x2b20d
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: ffff88802b20dca8 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479131997, free_ts 44477165469
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:27024
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x27024
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479124091, free_ts 44477172344
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:33bf6
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x33bf6
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479116204, free_ts 44477179310
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:32815
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff8880328151f0 pfn:0x32815
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: ffff8880328151f0 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479108216, free_ts 44477187340
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:25295
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x25295
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479100029, free_ts 44477194555
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:2833f
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2833f
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479091942, free_ts 44477201660
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:282fc
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x282fc
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479083843, free_ts 44477209094
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:282ff
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x282ff
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479075859, free_ts 44477216085
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:33186
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x33186
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479067615, free_ts 44477223154
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:3094f
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3094f
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479059207, free_ts 44477230559
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:35c87
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x35c87
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479050892, free_ts 44477237540
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:23056
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x23056
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479043419, free_ts 44477244574
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:35947
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x35947
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479035619, free_ts 44477251696
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:3479a
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3479a
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44479026113, free_ts 44477259405
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:2df84
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2df84
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478996986, free_ts 44477265768
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:2cab8
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2cab8
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478989058, free_ts 44477272619
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:3250c
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff88803250ce88 pfn:0x3250c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: ffff88803250ce88 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478980999, free_ts 44477279756
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:321f3
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x321f3
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478972283, free_ts 44477287163
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:2a23d
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a23d
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478964298, free_ts 44477294471
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:2a0c2
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff88802a0c2ca8 pfn:0x2a0c2
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: ffff88802a0c2ca8 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478956169, free_ts 44477301476
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:2a23e
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a23e
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478947864, free_ts 44477308430
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:318f2
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff8880318f26c8 pfn:0x318f2
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: ffff8880318f26c8 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478939554, free_ts 44477315358
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:3235a
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3235a
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478916974, free_ts 44477322214
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:20dfb
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x20dfb
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478907357, free_ts 44477329411
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:26bcb
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x26bcb
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478876962, free_ts 44477336409
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:252e5
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888000000004 pfn:0x252e5
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: ffff888000000004 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478828126, free_ts 44477344486
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:34443
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x34443
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478818307, free_ts 44477351353
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:3458a
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3458a
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478794769, free_ts 44477358309
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:31fff
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x31fff
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478786101, free_ts 44477365282
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:275fa
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff8880275fa800 pfn:0x275fa
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: ffff8880275fa800 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478777276, free_ts 44477372282
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:31edc
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888031edde00 pfn:0x31edc
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: ffff888031edde00 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478754166, free_ts 44477379394
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:31856
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x31856
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478744870, free_ts 44477386489
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:34661
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x8 pfn:0x34661
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000008 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478710446, free_ts 44477393688
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:2a31b
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff88802a31baf8 pfn:0x2a31b
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: ffff88802a31baf8 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478701882, free_ts 44477418520
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:3177d
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff88803177df00 pfn:0x3177d
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: ffff88803177df00 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478693266, free_ts 44477425851
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:30b62
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888030b62f00 pfn:0x30b62
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: ffff888030b62f00 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478684813, free_ts 44477433511
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:3452a
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3452a
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478676409, free_ts 44477440572
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:31bd4
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888031bd4b00 pfn:0x31bd4
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: ffff888031bd4b00 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478667662, free_ts 44477447586
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:32025
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888032025e58 pfn:0x32025
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: ffff888032025e58 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478659264, free_ts 44477454475
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:2aa5b
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2aa5b
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478650573, free_ts 44477461222
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:28366
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x28366
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478642067, free_ts 44477468175
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:26c22
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888026c22e58 pfn:0x26c22
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: ffff888026c22e58 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478633670, free_ts 44477475188
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:3210a
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3210a
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478619141, free_ts 44477482488
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:2727c
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2727c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478610627, free_ts 44477511373
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:358af
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x358af
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478602137, free_ts 44477519372
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:27cf2
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888027cf2600 pfn:0x27cf2
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: ffff888027cf2600 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478593245, free_ts 44477526430
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126
xdp_test_run_teardown net/bpf/test_run.c:218 [inline]
bpf_test_run_xdp_live+0x3a1/0x500 net/bpf/test_run.c:395
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Modules linked in:
CPU: 3 UID: 0 PID: 5957 Comm: syz-executor687 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
bad_page+0xb3/0x1f0 mm/page_alloc.c:501
free_page_is_bad_report mm/page_alloc.c:908 [inline]
free_page_is_bad mm/page_alloc.c:918 [inline]
free_pages_prepare mm/page_alloc.c:1100 [inline]
free_unref_page+0x657/0xdc0 mm/page_alloc.c:2638
skb_free_frag include/linux/skbuff.h:3399 [inline]
skb_free_head+0xa0/0x1d0 net/core/skbuff.c:1096
skb_release_data+0x560/0x730 net/core/skbuff.c:1125
skb_release_all net/core/skbuff.c:1190 [inline]
__kfree_skb net/core/skbuff.c:1204 [inline]
sk_skb_reason_drop+0x129/0x1a0 net/core/skbuff.c:1242
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
__netif_receive_skb_core.constprop.0+0x592/0x4330 net/core/dev.c:5640
__netif_receive_skb_list_core+0x357/0x950 net/core/dev.c:5741
__netif_receive_skb_list net/core/dev.c:5808 [inline]
netif_receive_skb_list_internal+0x753/0xdb0 net/core/dev.c:5899
netif_receive_skb_list+0x4f/0x4a0 net/core/dev.c:5951
xdp_recv_frames net/bpf/test_run.c:279 [inline]
xdp_test_run_batch.constprop.0+0x138d/0x1960 net/bpf/test_run.c:360
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1bf86dbe99
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f1bf8696228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f1bf8766328 RCX: 00007f1bf86dbe99
RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a
RBP: 00007f1bf8766320 R08: 00007f1bf86966c0 R09: 00007f1bf86966c0
R10: 00007f1bf86966c0 R11: 0000000000000246 R12: 00007f1bf8733074
R13: 0000000020000eb8 R14: 2caa1414ac000000 R15: 00007ffe730b5808
BUG: Bad page state in process syz-executor687 pfn:3441c
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3441c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 dead000000000040 ffff888032d1e000 0000000000000000
raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000
page dumped because: page_pool leak
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2820(GFP_ATOMIC|__GFP_NOWARN), pid 5957, tgid 5955 (syz-executor687), ts 44478584872, free_ts 44477533432
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x2d1/0x350 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x101e/0x3070 mm/page_alloc.c:3457
__alloc_pages_noprof+0x223/0x25a0 mm/page_alloc.c:4733
alloc_pages_bulk_noprof+0x77c/0x1110 mm/page_alloc.c:4681
alloc_pages_bulk_array_node_noprof include/linux/gfp.h:239 [inline]
__page_pool_alloc_pages_slow+0x18f/0x770 net/core/page_pool.c:538
page_pool_alloc_netmem net/core/page_pool.c:590 [inline]
page_pool_alloc_netmem+0xc4/0x160 net/core/page_pool.c:577
page_pool_alloc_pages+0x1a/0x60 net/core/page_pool.c:597
page_pool_dev_alloc_pages include/net/page_pool/helpers.h:96 [inline]
xdp_test_run_batch.constprop.0+0x3a8/0x1960 net/bpf/test_run.c:305
bpf_test_run_xdp_live+0x365/0x500 net/bpf/test_run.c:389
bpf_prog_test_run_xdp+0x827/0x1580 net/bpf/test_run.c:1317
bpf_prog_test_run kernel/bpf/syscall.c:4266 [inline]
__sys_bpf+0xfc6/0x49a0 kernel/bpf/syscall.c:5671
__do_sys_bpf kernel/bpf/syscall.c:5760 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5758 [inline]
__x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5758
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5958 tgid 5952 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0x5f4/0xdc0 mm/page_alloc.c:2638
__folio_put+0x30d/0x3d0 mm/swap.c:126
folio_put include/linux/mm.h:1478 [inline]
put_page+0x21e/0x280 include/linux/mm.h:1550
page_pool_return_page+0x400/0x520 net/core/page_pool.c:692
page_pool_empty_alloc_cache_once net/core/page_pool.c:1034 [inline]
page_pool_scrub net/core/page_pool.c:1040 [inline]
page_pool_release+0xf4/0x7d0 net/core/page_pool.c:1053
page_pool_destroy+0x10a/0x4c0 net/core/page_pool.c:1126