swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:00138067 addr:00000000676bbded vm_flags:180400fb anon_vma: (null) mapping:00000000cdf3efa0 index:65 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 1 PID: 19681 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 dup_mm kernel/fork.c:1301 [inline] copy_mm kernel/fork.c:1341 [inline] copy_process.part.0+0x662a/0x8260 kernel/fork.c:1913 copy_process kernel/fork.c:1710 [inline] _do_fork+0x22f/0xf30 kernel/fork.c:2219 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f1aeaf70eb9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f1ae98e6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f1aeb083f60 RCX: 00007f1aeaf70eb9 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000081100080 RBP: 00007f1aeafcb08d R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe0d7dad1f R14: 00007f1ae98e6300 R15: 0000000000022000 swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:00138067 addr:000000001db66174 vm_flags:180400fb anon_vma: (null) mapping:00000000cdf3efa0 index:dc file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 1 PID: 19681 Comm: syz-executor.3 Tainted: G B 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 dup_mm kernel/fork.c:1301 [inline] copy_mm kernel/fork.c:1341 [inline] copy_process.part.0+0x662a/0x8260 kernel/fork.c:1913 copy_process kernel/fork.c:1710 [inline] _do_fork+0x22f/0xf30 kernel/fork.c:2219 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f1aeaf70eb9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f1ae98e6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f1aeb083f60 RCX: 00007f1aeaf70eb9 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000081100080 RBP: 00007f1aeafcb08d R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe0d7dad1f R14: 00007f1ae98e6300 R15: 0000000000022000 EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:00139067 addr:000000007042c713 vm_flags:180400fb anon_vma: (null) mapping:00000000cdf3efa0 index:153 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 1 PID: 19855 Comm: syz-executor.3 Tainted: G B 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 dup_mm kernel/fork.c:1301 [inline] copy_mm kernel/fork.c:1341 [inline] copy_process.part.0+0x662a/0x8260 kernel/fork.c:1913 copy_process kernel/fork.c:1710 [inline] _do_fork+0x22f/0xf30 kernel/fork.c:2219 swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:0013a067 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f1aeaf70eb9 addr:00000000c8019ab5 vm_flags:180400fb anon_vma: (null) mapping:00000000cdf3efa0 index:12f Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f1ae98e6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) RAX: ffffffffffffffda RBX: 00007f1aeb083f60 RCX: 00007f1aeaf70eb9 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000081100080 RBP: 00007f1aeafcb08d R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe0d7dad1f R14: 00007f1ae98e6300 R15: 0000000000022000 CPU: 0 PID: 19681 Comm: syz-executor.3 Tainted: G B 4.19.211-syzkaller #0 swap_info_get: Bad swap file entry 2003ffffffffffff Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:00139067 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 addr:0000000071e3aaa0 vm_flags:180400fb anon_vma: (null) mapping:00000000cdf3efa0 index:1ca zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 dup_mm kernel/fork.c:1301 [inline] copy_mm kernel/fork.c:1341 [inline] copy_process.part.0+0x662a/0x8260 kernel/fork.c:1913 copy_process kernel/fork.c:1710 [inline] _do_fork+0x22f/0xf30 kernel/fork.c:2219 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f1aeaf70eb9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f1ae98e6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f1aeb083f60 RCX: 00007f1aeaf70eb9 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000081100080 RBP: 00007f1aeafcb08d R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe0d7dad1f R14: 00007f1ae98e6300 R15: 0000000000022000 BUG: Bad page map in process syz-executor.3 pte:777777774d923007 pmd:0013a067 CPU: 1 PID: 19855 Comm: syz-executor.3 Tainted: G B 4.19.211-syzkaller #0 addr:00000000ecf07143 vm_flags:180400fb anon_vma: (null) mapping:00000000cdf3efa0 index:16a Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 dup_mm kernel/fork.c:1301 [inline] copy_mm kernel/fork.c:1341 [inline] copy_process.part.0+0x662a/0x8260 kernel/fork.c:1913 copy_process kernel/fork.c:1710 [inline] _do_fork+0x22f/0xf30 kernel/fork.c:2219 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f1aeaf70eb9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f1ae98e6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f1aeb083f60 RCX: 00007f1aeaf70eb9 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000081100080 RBP: 00007f1aeafcb08d R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe0d7dad1f R14: 00007f1ae98e6300 R15: 0000000000022000 CPU: 0 PID: 19681 Comm: syz-executor.3 Tainted: G B 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 _vm_normal_page+0x21e/0x510 mm/memory.c:897 zap_pte_range mm/memory.c:1323 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1141/0x2c50 mm/memory.c:1534 swap_info_get: Bad swap file entry 2003ffffffffffff unmap_single_vma+0x198/0x300 mm/memory.c:1579 BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:00139067 unmap_vmas+0xa9/0x180 mm/memory.c:1609 addr:0000000090b96615 vm_flags:180400fb anon_vma: (null) mapping:00000000cdf3efa0 index:41 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 dup_mm kernel/fork.c:1301 [inline] copy_mm kernel/fork.c:1341 [inline] copy_process.part.0+0x662a/0x8260 kernel/fork.c:1913 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) copy_process kernel/fork.c:1710 [inline] _do_fork+0x22f/0xf30 kernel/fork.c:2219 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f1aeaf70eb9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f1ae98e6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f1aeb083f60 RCX: 00007f1aeaf70eb9 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000081100080 RBP: 00007f1aeafcb08d R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe0d7dad1f R14: 00007f1ae98e6300 R15: 0000000000022000 CPU: 1 PID: 19855 Comm: syz-executor.3 Tainted: G B 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 dup_mm kernel/fork.c:1301 [inline] copy_mm kernel/fork.c:1341 [inline] copy_process.part.0+0x662a/0x8260 kernel/fork.c:1913 copy_process kernel/fork.c:1710 [inline] _do_fork+0x22f/0xf30 kernel/fork.c:2219 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f1aeaf70eb9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f1ae98e6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 netlink: 'syz-executor.0': attribute type 4 has an invalid length. RAX: ffffffffffffffda RBX: 00007f1aeb083f60 RCX: 00007f1aeaf70eb9 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000081100080 RBP: 00007f1aeafcb08d R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe0d7dad1f R14: 00007f1ae98e6300 R15: 0000000000022000 swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:00139067 addr:00000000991b36ad vm_flags:180400fb anon_vma: (null) mapping:00000000cdf3efa0 index:b8 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 1 PID: 19855 Comm: syz-executor.3 Tainted: G B 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 dup_mm kernel/fork.c:1301 [inline] copy_mm kernel/fork.c:1341 [inline] copy_process.part.0+0x662a/0x8260 kernel/fork.c:1913 copy_process kernel/fork.c:1710 [inline] _do_fork+0x22f/0xf30 kernel/fork.c:2219 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f1aeaf70eb9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f1ae98e6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f1aeb083f60 RCX: 00007f1aeaf70eb9 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000081100080 RBP: 00007f1aeafcb08d R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe0d7dad1f R14: 00007f1ae98e6300 R15: 0000000000022000 BUG: Bad rss-counter state mm:00000000b3ab8741 idx:0 val:5 BUG: Bad rss-counter state mm:00000000b3ab8741 idx:2 val:-3 EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) BUG: Bad rss-counter state mm:00000000b7a17d24 idx:0 val:4 BUG: Bad rss-counter state mm:00000000b7a17d24 idx:2 val:-4 EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) ieee802154 phy0 wpan0: encryption failed: -22 ieee802154 phy1 wpan1: encryption failed: -22 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: ff c3 inc %ebx 2: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) 9: 00 00 00 c: 0f 1f 40 00 nopl 0x0(%rax) 10: 48 89 f8 mov %rdi,%rax 13: 48 89 f7 mov %rsi,%rdi 16: 48 89 d6 mov %rdx,%rsi 19: 48 89 ca mov %rcx,%rdx 1c: 4d 89 c2 mov %r8,%r10 1f: 4d 89 c8 mov %r9,%r8 22: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 27: 0f 05 syscall * 29: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction 2f: 73 01 jae 0x32 31: c3 retq 32: 48 c7 c1 bc ff ff ff mov $0xffffffffffffffbc,%rcx 39: f7 d8 neg %eax 3b: 64 89 01 mov %eax,%fs:(%rcx) 3e: 48 rex.W