------------[ cut here ]------------ kernel BUG at mm/hugetlb.c:1131! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 11979 Comm: syz.1.1020 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:resv_map_release+0x1e7/0x1f0 mm/hugetlb.c:1131 Code: af 5b a0 ff 48 85 db 75 1b e8 c5 56 a0 ff 4c 89 f7 48 83 c4 28 5b 41 5c 41 5d 41 5e 41 5f 5d e9 6f 1f fb ff e8 aa 56 a0 ff 90 <0f> 0b 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffc90004517728 EFLAGS: 00010293 RAX: ffffffff81ff2d76 RBX: 0000000000000001 RCX: ffff88802cb19e00 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: dffffc0000000000 R08: ffffffff81ff2d51 R09: 1ffffffff2854916 R10: dffffc0000000000 R11: fffffbfff2854917 R12: ffff88806de21860 R13: dead000000000122 R14: ffff88806de21800 R15: 1ffff1100c27de00 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff51ce185a0 CR3: 000000005e3b8000 CR4: 00000000003526f0 DR0: 0000000000000003 DR1: 0000000000000004 DR2: 0000000100000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: vma_close mm/internal.h:147 [inline] remove_vma+0x8d/0x160 mm/vma.c:380 exit_mmap+0x5c4/0xc20 mm/mmap.c:1692 __mmput+0x115/0x3c0 kernel/fork.c:1348 exit_mm+0x220/0x310 kernel/exit.c:570 do_exit+0x9ad/0x28e0 kernel/exit.c:925 do_group_exit+0x207/0x2c0 kernel/exit.c:1087 get_signal+0x16b2/0x1750 kernel/signal.c:3017 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xce/0x340 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fb0a0d85d29 Code: Unable to access opcode bytes at 0x7fb0a0d85cff. RSP: 002b:00007fb0a1b710e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007fb0a0f75fa8 RCX: 00007fb0a0d85d29 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fb0a0f75fa8 RBP: 00007fb0a0f75fa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb0a0f75fac R13: 0000000000000000 R14: 00007fb0a109f940 R15: 00007fb0a109fa28 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:resv_map_release+0x1e7/0x1f0 mm/hugetlb.c:1131 Code: af 5b a0 ff 48 85 db 75 1b e8 c5 56 a0 ff 4c 89 f7 48 83 c4 28 5b 41 5c 41 5d 41 5e 41 5f 5d e9 6f 1f fb ff e8 aa 56 a0 ff 90 <0f> 0b 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffc90004517728 EFLAGS: 00010293 RAX: ffffffff81ff2d76 RBX: 0000000000000001 RCX: ffff88802cb19e00 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: dffffc0000000000 R08: ffffffff81ff2d51 R09: 1ffffffff2854916 R10: dffffc0000000000 R11: fffffbfff2854917 R12: ffff88806de21860 R13: dead000000000122 R14: ffff88806de21800 R15: 1ffff1100c27de00 FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055d2b74d2950 CR3: 000000002ed26000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400