Injecting memory failure for pfn 0x126e00 at process virtual address 0x20000000 ------------[ cut here ]------------ WARNING: CPU: 0 PID: 7066 at mm/memory-failure.c:2391 memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 Modules linked in: CPU: 0 UID: 0 PID: 7066 Comm: syz.1.71 Not tainted syzkaller #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 lr : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 sp : ffff80009d2578c0 x29: ffff80009d2579a0 x28: 05ffc00000200868 x27: ffff700013a4af20 x26: 1fffffbff8737001 x25: 05ffc0000020086d x24: 1fffffbff8737000 x23: fffffdffc39b8008 x22: fffffdffc39b8000 x21: fffffdffc39b8000 x20: 0000000000000023 x19: dfff800000000000 x18: 00000000ffffffff x17: ffff800093605000 x16: ffff80008052b264 x15: 0000000000000001 x14: 1fffffbff8737000 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000080000 x10: 000000000001c528 x9 : ffff8000a4e3a000 x8 : 000000000001c529 x7 : ffff800080429110 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff800080ce8ff0 x2 : 0000000000000001 x1 : 0000000000000040 x0 : 0000000000000000 Call trace: memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 (P) madvise_inject_error mm/madvise.c:1475 [inline] madvise_do_behavior+0x2c8/0x7c4 mm/madvise.c:1875 do_madvise+0x190/0x248 mm/madvise.c:1978 __do_sys_madvise mm/madvise.c:1987 [inline] __se_sys_madvise mm/madvise.c:1985 [inline] __arm64_sys_madvise+0xa4/0xc0 mm/madvise.c:1985 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x254 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:763 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 irq event stamp: 942 hardirqs last enabled at (941): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] hardirqs last enabled at (941): [] _raw_spin_unlock_irq+0x30/0x80 kernel/locking/spinlock.c:202 hardirqs last disabled at (942): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:434 softirqs last enabled at (464): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32 softirqs last disabled at (462): [] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19 ---[ end trace 0000000000000000 ]--- Memory failure: 0x126e00: recovery action for huge page: Recovered Injecting memory failure for pfn 0x13c600 at process virtual address 0x20200000 ------------[ cut here ]------------ WARNING: CPU: 0 PID: 7066 at mm/memory-failure.c:2391 memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 Modules linked in: CPU: 0 UID: 0 PID: 7066 Comm: syz.1.71 Tainted: G W syzkaller #0 PREEMPT Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 lr : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 sp : ffff80009d2578c0 x29: ffff80009d2579a0 x28: 05ffc00000200868 x27: ffff700013a4af20 x26: 1fffffbff87e3001 x25: 05ffc0000020086d x24: 1fffffbff87e3000 x23: fffffdffc3f18008 x22: fffffdffc3f18000 x21: fffffdffc3f18000 x20: 0000000000000023 x19: dfff800000000000 x18: 1fffe00033771c88 x17: ffff80008f85e000 x16: ffff80008052b264 x15: 0000000000000001 x14: 1fffffbff87e3000 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000080000 x10: 000000000004ba21 x9 : ffff8000a4e3a000 x8 : 000000000004ba22 x7 : ffff8000831119d4 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff800080ce8ff0 x2 : 0000000000000001 x1 : 0000000000000040 x0 : 0000000000000000 Call trace: memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 (P) madvise_inject_error mm/madvise.c:1475 [inline] madvise_do_behavior+0x2c8/0x7c4 mm/madvise.c:1875 do_madvise+0x190/0x248 mm/madvise.c:1978 __do_sys_madvise mm/madvise.c:1987 [inline] __se_sys_madvise mm/madvise.c:1985 [inline] __arm64_sys_madvise+0xa4/0xc0 mm/madvise.c:1985 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x254 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:763 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 irq event stamp: 1498 hardirqs last enabled at (1497): [] class_irqsave_destructor include/linux/irqflags.h:266 [inline] hardirqs last enabled at (1497): [] __free_object+0x508/0x720 lib/debugobjects.c:524 hardirqs last disabled at (1498): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:434 softirqs last enabled at (1076): [] softirq_handle_end kernel/softirq.c:425 [inline] softirqs last enabled at (1076): [] handle_softirqs+0xaf8/0xc88 kernel/softirq.c:607 softirqs last disabled at (945): [] __do_softirq+0x14/0x20 kernel/softirq.c:613 ---[ end trace 0000000000000000 ]--- Memory failure: 0x13c600: recovery action for huge page: Recovered Injecting memory failure for pfn 0x13c000 at process virtual address 0x20400000 ------------[ cut here ]------------ WARNING: CPU: 0 PID: 7066 at mm/memory-failure.c:2391 memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 Modules linked in: CPU: 0 UID: 0 PID: 7066 Comm: syz.1.71 Tainted: G W syzkaller #0 PREEMPT Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 lr : memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 sp : ffff80009d2578c0 x29: ffff80009d2579a0 x28: 05ffc00000200868 x27: ffff700013a4af20 x26: 1fffffbff87e0001 x25: 05ffc0000020086d x24: 1fffffbff87e0000 x23: fffffdffc3f00008 x22: fffffdffc3f00000 x21: fffffdffc3f00000 x20: 0000000000000023 x19: dfff800000000000 x18: 1fffe00033771c88 x17: ffff80008f85e000 x16: ffff80008052b264 x15: 0000000000000001 x14: 1fffffbff87e0000 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000080000 x10: 000000000007b2af x9 : ffff8000a4e3a000 x8 : 000000000007b2b0 x7 : ffff8000831119d4 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff800080ce8ff0 x2 : 0000000000000001 x1 : 0000000000000040 x0 : 0000000000000000 Call trace: memory_failure+0x18ec/0x1db4 mm/memory-failure.c:2391 (P) madvise_inject_error mm/madvise.c:1475 [inline] madvise_do_behavior+0x2c8/0x7c4 mm/madvise.c:1875 do_madvise+0x190/0x248 mm/madvise.c:1978 __do_sys_madvise mm/madvise.c:1987 [inline] __se_sys_madvise mm/madvise.c:1985 [inline] __arm64_sys_madvise+0xa4/0xc0 mm/madvise.c:1985 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x254 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:763 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 irq event stamp: 2254 hardirqs last enabled at (2253): [] irqentry_exit+0xd8/0x108 kernel/entry/common.c:214 hardirqs last disabled at (2254): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:434 softirqs last enabled at (1808): [] softirq_handle_end kernel/softirq.c:425 [inline] softirqs last enabled at (1808): [] handle_softirqs+0xaf8/0xc88 kernel/softirq.c:607 softirqs last disabled at (1501): [] __do_softirq+0x14/0x20 kernel/softirq.c:613 ---[ end trace 0000000000000000 ]--- Memory failure: 0x13c000: recovery action for huge page: Recovered