__do_fault+0x138/0x390 mm/memory.c:5320 do_read_fault mm/memory.c:5755 [inline] do_fault mm/memory.c:5889 [inline] do_pte_missing+0x2206/0x3330 mm/memory.c:4401 handle_pte_fault mm/memory.c:6273 [inline] __handle_mm_fault mm/memory.c:6411 [inline] handle_mm_fault+0x1b26/0x32b0 mm/memory.c:6580 do_user_addr_fault+0x764/0x1380 arch/x86/mm/fault.c:1387 handle_page_fault arch/x86/mm/fault.c:1476 [inline] exc_page_fault+0x82/0x100 arch/x86/mm/fault.c:1532 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 ------------[ cut here ]------------ kernel BUG at mm/filemap.c:3579! Oops: invalid opcode: 0000 [#1] SMP KASAN PTI CPU: 0 UID: 0 PID: 14583 Comm: syz.1.2155 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:filemap_fault+0x1215/0x1290 mm/filemap.c:3579 Code: 38 c1 0f 8c 8e fc ff ff 4c 89 e7 e8 b5 f2 2c 00 e9 81 fc ff ff e8 1b a1 c6 ff 48 89 df 48 c7 c6 80 a9 74 8b e8 dc f7 2c ff 90 <0f> 0b e8 04 a1 c6 ff 48 8b 3c 24 48 c7 c6 00 b0 74 8b e8 c4 f7 2c RSP: 0018:ffffc90003457280 EFLAGS: 00010246 RAX: dfbdd04ed8649a00 RBX: ffffea0000d22000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8d7867c7 RDI: 00000000ffffffff RBP: ffffc900034573b8 R08: ffffffff8f817677 R09: 1ffffffff1f02ece R10: dffffc0000000000 R11: fffffbfff1f02ecf R12: dffffc0000000000 R13: 1ffffd40001a4401 R14: ffffea0000d22018 R15: ffffea0000d22008 FS: 00007f848cc716c0(0000) GS:ffff888125e44000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd42f1156c0 CR3: 000000002fc32000 CR4: 00000000003526f0 Call Trace: __do_fault+0x138/0x390 mm/memory.c:5320 do_shared_fault mm/memory.c:5819 [inline] do_fault mm/memory.c:5893 [inline] do_pte_missing+0x6ad/0x3330 mm/memory.c:4401 handle_pte_fault mm/memory.c:6273 [inline] __handle_mm_fault mm/memory.c:6411 [inline] handle_mm_fault+0x1b26/0x32b0 mm/memory.c:6580 do_user_addr_fault+0x764/0x1380 arch/x86/mm/fault.c:1387 handle_page_fault arch/x86/mm/fault.c:1476 [inline] exc_page_fault+0x82/0x100 arch/x86/mm/fault.c:1532 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 RIP: 0010:__put_user_nocheck_4+0x3/0x10 arch/x86/lib/putuser.S:104 Code: d9 0f 01 cb 89 01 31 c9 0f 01 ca c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 01 cb <89> 01 31 c9 0f 01 ca e9 c1 75 03 00 90 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffc900034578b8 EFLAGS: 00050202 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000200000042270 RDX: ffff888053410000 RSI: 0000000000000002 RDI: 00000000ffffffff RBP: ffffc90003457a30 R08: ffffc90003457667 R09: 1ffff9200068aecc R10: dffffc0000000000 R11: fffff5200068aecd R12: 0000000000000002 R13: dffffc0000000000 R14: 0000000000000000 R15: 0000200000042240 ____sys_recvmsg+0x2ab/0x460 net/socket.c:2825 ___sys_recvmsg+0x1b5/0x510 net/socket.c:2854 do_recvmmsg+0x307/0x770 net/socket.c:2949 __sys_recvmmsg net/socket.c:3023 [inline] __do_sys_recvmmsg net/socket.c:3046 [inline] __se_sys_recvmmsg net/socket.c:3039 [inline] __x64_sys_recvmmsg+0x190/0x240 net/socket.c:3039 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f848bd8f749 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f848cc71038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: ffffffffffffffda RBX: 00007f848bfe6090 RCX: 00007f848bd8f749 RDX: 0000000000010106 RSI: 00002000000000c0 RDI: 0000000000000003 RBP: 00007f848be13f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f848bfe6128 R14: 00007f848bfe6090 R15: 00007f848c10fa28 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:filemap_fault+0x1215/0x1290 mm/filemap.c:3579 Code: 38 c1 0f 8c 8e fc ff ff 4c 89 e7 e8 b5 f2 2c 00 e9 81 fc ff ff e8 1b a1 c6 ff 48 89 df 48 c7 c6 80 a9 74 8b e8 dc f7 2c ff 90 <0f> 0b e8 04 a1 c6 ff 48 8b 3c 24 48 c7 c6 00 b0 74 8b e8 c4 f7 2c RSP: 0018:ffffc90003457280 EFLAGS: 00010246 RAX: dfbdd04ed8649a00 RBX: ffffea0000d22000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8d7867c7 RDI: 00000000ffffffff RBP: ffffc900034573b8 R08: ffffffff8f817677 R09: 1ffffffff1f02ece R10: dffffc0000000000 R11: fffffbfff1f02ecf R12: dffffc0000000000 R13: 1ffffd40001a4401 R14: ffffea0000d22018 R15: ffffea0000d22008 FS: 00007f848cc716c0(0000) GS:ffff888125f44000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd42e5b7198 CR3: 000000002fc32000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000006800 DR2: 0000000000009951 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: d9 0f (bad) (%rdi) 2: 01 cb add %ecx,%ebx 4: 89 01 mov %eax,(%rcx) 6: 31 c9 xor %ecx,%ecx 8: 0f 01 ca clac b: c3 ret c: cc int3 d: cc int3 e: cc int3 f: cc int3 10: 90 nop 11: 90 nop 12: 90 nop 13: 90 nop 14: 90 nop 15: 90 nop 16: 90 nop 17: 90 nop 18: 90 nop 19: 90 nop 1a: 90 nop 1b: 90 nop 1c: 90 nop 1d: 90 nop 1e: 90 nop 1f: 90 nop 20: 90 nop 21: 90 nop 22: 90 nop 23: 90 nop 24: 90 nop 25: 90 nop 26: 90 nop 27: 0f 01 cb stac * 2a: 89 01 mov %eax,(%rcx) <-- trapping instruction 2c: 31 c9 xor %ecx,%ecx 2e: 0f 01 ca clac 31: e9 c1 75 03 00 jmp 0x375f7 36: 90 nop 37: 90 nop 38: 90 nop 39: 90 nop 3a: 90 nop 3b: 90 nop 3c: 90 nop 3d: 90 nop 3e: 90 nop 3f: 90 nop