BUG: unable to handle page fault for address: fffffffffffffff1 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 72ac067 P4D 72ac067 PUD 72ae067 PMD 0 Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 26254 Comm: syz.2.8812 Not tainted 6.12.30-syzkaller-ge2bf362ee23b #0 e1c904518e9113895a28c59b25a6002cdacb68bf Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:filemap_read_folio+0xda/0x2c0 mm/filemap.c:2408 Code: 44 24 40 00 00 00 00 48 81 e3 00 02 00 00 0f 85 86 01 00 00 e8 67 ee c8 ff 48 8b 7c 24 18 4c 89 f6 4d 89 fb 41 ba 65 d3 f7 e1 <45> 03 53 f1 74 02 0f 0b 41 ff d3 0f 1f 00 41 89 c7 31 ff 44 89 fe RSP: 0018:ffffc90002157920 EFLAGS: 00010287 RAX: ffffffff81bcb4c9 RBX: 0000000000000000 RCX: 0000000000080000 RDX: ffffc90003291000 RSI: ffffea00047be540 RDI: ffff888116c77280 RBP: ffffc900021579e0 R08: ffffea00047be547 R09: 1ffffd40008f7ca8 R10: 00000000e1f7d365 R11: 0000000000000000 R12: 1ffff9200042af28 R13: 1ffffd40008f7ca8 R14: ffffea00047be540 R15: 0000000000000000 FS: 00007fd8704966c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffff1 CR3: 00000001184d8000 CR4: 00000000003526b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 000000000000093d DR6: 00000000ffff0ff0 DR7: 0000000000000400 Call Trace: do_read_cache_folio+0x2b8/0x4d0 mm/filemap.c:3898 read_cache_folio+0x54/0x90 mm/filemap.c:3930 freader_get_folio+0x471/0x700 lib/buildid.c:77 freader_fetch+0xa4/0x590 lib/buildid.c:120 __build_id_parse+0x131/0x790 lib/buildid.c:305 build_id_parse+0x2e/0x40 lib/buildid.c:359 do_procmap_query fs/proc/task_mmu.c:546 [inline] procfs_procmap_ioctl+0x7f6/0xd10 fs/proc/task_mmu.c:625 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0x132/0x1b0 fs/ioctl.c:893 __x64_sys_ioctl+0x7f/0xa0 fs/ioctl.c:893 x64_sys_call+0x1878/0x2ee0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x58/0xf0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7fd86f58e929 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fd870496038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fd86f7b5fa0 RCX: 00007fd86f58e929 RDX: 0000200000000180 RSI: 00000000c0686611 RDI: 0000000000000009 RBP: 00007fd86f610b39 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fd86f7b5fa0 R15: 00007ffe45202bc8 Modules linked in: CR2: fffffffffffffff1 ---[ end trace 0000000000000000 ]--- RIP: 0010:filemap_read_folio+0xda/0x2c0 mm/filemap.c:2408 Code: 44 24 40 00 00 00 00 48 81 e3 00 02 00 00 0f 85 86 01 00 00 e8 67 ee c8 ff 48 8b 7c 24 18 4c 89 f6 4d 89 fb 41 ba 65 d3 f7 e1 <45> 03 53 f1 74 02 0f 0b 41 ff d3 0f 1f 00 41 89 c7 31 ff 44 89 fe RSP: 0018:ffffc90002157920 EFLAGS: 00010287 RAX: ffffffff81bcb4c9 RBX: 0000000000000000 RCX: 0000000000080000 RDX: ffffc90003291000 RSI: ffffea00047be540 RDI: ffff888116c77280 RBP: ffffc900021579e0 R08: ffffea00047be547 R09: 1ffffd40008f7ca8 R10: 00000000e1f7d365 R11: 0000000000000000 R12: 1ffff9200042af28 R13: 1ffffd40008f7ca8 R14: ffffea00047be540 R15: 0000000000000000 FS: 00007fd8704966c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffff1 CR3: 00000001184d8000 CR4: 00000000003526b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 000000000000093d DR6: 00000000ffff0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 44 24 40 rex.R and $0x40,%al 3: 00 00 add %al,(%rax) 5: 00 00 add %al,(%rax) 7: 48 81 e3 00 02 00 00 and $0x200,%rbx e: 0f 85 86 01 00 00 jne 0x19a 14: e8 67 ee c8 ff call 0xffc8ee80 19: 48 8b 7c 24 18 mov 0x18(%rsp),%rdi 1e: 4c 89 f6 mov %r14,%rsi 21: 4d 89 fb mov %r15,%r11 24: 41 ba 65 d3 f7 e1 mov $0xe1f7d365,%r10d * 2a: 45 03 53 f1 add -0xf(%r11),%r10d <-- trapping instruction 2e: 74 02 je 0x32 30: 0f 0b ud2 32: 41 ff d3 call *%r11 35: 0f 1f 00 nopl (%rax) 38: 41 89 c7 mov %eax,%r15d 3b: 31 ff xor %edi,%edi 3d: 44 89 fe mov %r15d,%esi