do_group_exit+0xb4/0x250 kernel/exit.c:1012 __do_sys_exit_group kernel/exit.c:1023 [inline] __se_sys_exit_group kernel/exit.c:1021 [inline] __x64_sys_exit_group+0x39/0x40 kernel/exit.c:1021 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd ------------[ cut here ]------------ kernel BUG at mm/mmu_gather.c:139! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 5657 Comm: dhcpcd-run-hook Not tainted 6.2.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 RIP: 0010:__tlb_remove_page_size+0x1e2/0x3f0 mm/mmu_gather.c:139 Code: 03 38 d0 7c 08 84 d2 0f 85 a9 01 00 00 8b 45 0c e9 21 ff ff ff 0f 0b 4c 89 ef 48 c7 c6 a0 d9 76 89 48 83 e7 fc e8 0e 21 fb ff <0f> 0b 4c 8d 73 24 48 b8 00 00 00 00 00 fc ff df 4c 89 f2 48 c1 ea RSP: 0018:ffffc900048bf648 EFLAGS: 00010283 RAX: 0000000000000000 RBX: ffffc900048bf9e8 RCX: ffffc900048bf518 RDX: 1ffff1100f545c25 RSI: ffffffff896b87a0 RDI: ffffffff89c27080 RBP: ffff888023efe000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000 R13: ffffea0001c2c940 R14: 0000000000000001 R15: ffffc900048bfa10 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f98ab9359ee CR3: 000000001d782000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __tlb_remove_page include/asm-generic/tlb.h:472 [inline] zap_pte_range mm/memory.c:1409 [inline] zap_pmd_range mm/memory.c:1529 [inline] zap_pud_range mm/memory.c:1558 [inline] zap_p4d_range mm/memory.c:1579 [inline] unmap_page_range+0xdfa/0x2d70 mm/memory.c:1600 unmap_vmas+0x21b/0x360 mm/memory.c:1685 exit_mmap+0x169/0x620 mm/mmap.c:3089 __mmput+0xf3/0x440 kernel/fork.c:1207 exec_mmap fs/exec.c:1033 [inline] begin_new_exec+0xd54/0x28a0 fs/exec.c:1292 load_elf_binary+0x677/0x4370 fs/binfmt_elf.c:996 search_binary_handler fs/exec.c:1735 [inline] exec_binprm fs/exec.c:1777 [inline] bprm_execve fs/exec.c:1851 [inline] bprm_execve+0x669/0x1560 fs/exec.c:1808 do_execveat_common+0x5fa/0x7b0 fs/exec.c:1956 do_execve fs/exec.c:2030 [inline] __do_sys_execve fs/exec.c:2106 [inline] __se_sys_execve fs/exec.c:2101 [inline] __x64_sys_execve+0x8e/0xc0 fs/exec.c:2101 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f98ab882337 Code: Unable to access opcode bytes at 0x7f98ab88230d. RSP: 002b:00007ffdff710ce8 EFLAGS: 00000246 ORIG_RAX: 000000000000003b RAX: ffffffffffffffda RBX: 000055ddde16de60 RCX: 00007f98ab882337 RDX: 000055ddde16de80 RSI: 000055ddde16de60 RDI: 000055ddde16df08 RBP: 000055ddde16df08 R08: 000055ddde16df0d R09: 0000000000000000 R10: 0000000000000008 R11: 0000000000000246 R12: 000055ddde16de80 R13: 00007f98aba27ff4 R14: 000055ddde16de80 R15: 0000000000000000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__tlb_remove_page_size+0x1e2/0x3f0 mm/mmu_gather.c:139 Code: 03 38 d0 7c 08 84 d2 0f 85 a9 01 00 00 8b 45 0c e9 21 ff ff ff 0f 0b 4c 89 ef 48 c7 c6 a0 d9 76 89 48 83 e7 fc e8 0e 21 fb ff <0f> 0b 4c 8d 73 24 48 b8 00 00 00 00 00 fc ff df 4c 89 f2 48 c1 ea RSP: 0018:ffffc900048bf648 EFLAGS: 00010283 RAX: 0000000000000000 RBX: ffffc900048bf9e8 RCX: ffffc900048bf518 RDX: 1ffff1100f545c25 RSI: ffffffff896b87a0 RDI: ffffffff89c27080 RBP: ffff888023efe000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000 R13: ffffea0001c2c940 R14: 0000000000000001 R15: ffffc900048bfa10 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f98ab88230d CR3: 000000001d782000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400