vmalloc_user_noprof+0xad/0xf0 mm/vmalloc.c:4038 xskq_create+0xbf/0x170 net/xdp/xsk_queue.c:49 xsk_init_queue+0xb0/0x110 net/xdp/xsk.c:1022 xsk_setsockopt+0x4de/0x710 net/xdp/xsk.c:1367 do_sock_setsockopt+0x25a/0x3e0 net/socket.c:2296 __sys_setsockopt net/socket.c:2321 [inline] __do_sys_setsockopt net/socket.c:2327 [inline] __se_sys_setsockopt net/socket.c:2324 [inline] __x64_sys_setsockopt+0x18b/0x220 net/socket.c:2324 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f ------------[ cut here ]------------ kernel BUG at mm/filemap.c:868! Oops: invalid opcode: 0000 [#1] SMP KASAN PTI CPU: 1 UID: 0 PID: 20734 Comm: syz.5.4157 Not tainted 6.16.0-rc4-syzkaller-00013-g66701750d556 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:__filemap_add_folio+0x11ad/0x12f0 mm/filemap.c:867 Code: fe c8 ff 4c 89 e7 48 c7 c6 20 37 94 8b e8 4b 99 0e 00 90 0f 0b e8 03 fe c8 ff 4c 89 e7 48 c7 c6 00 2e 94 8b e8 34 99 0e 00 90 <0f> 0b e8 ec fd c8 ff 4c 89 e7 48 c7 c6 20 37 94 8b e8 1d 99 0e 00 RSP: 0018:ffffc9000bca71a0 EFLAGS: 00010246 RAX: b5e15350bb275d00 RBX: 0000000000000002 RCX: 0000000000000000 RDX: 0000000000000007 RSI: ffffffff8d96e77b RDI: 00000000ffffffff RBP: ffffc9000bca7308 R08: ffffffff8f9fdaf7 R09: 1ffffffff1f3fb5e R10: dffffc0000000000 R11: fffffbfff1f3fb5f R12: ffffea0001627600 R13: dffffc0000000000 R14: ffffea0001627608 R15: 0000000000000004 FS: 00007f17362746c0(0000) GS:ffff888125d84000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c26c7f4 CR3: 000000003265e000 CR4: 00000000003526f0 Call Trace: filemap_add_folio+0xd5/0x270 mm/filemap.c:969 ra_alloc_folio mm/readahead.c:448 [inline] page_cache_ra_order+0x74c/0xc70 mm/readahead.c:509 do_async_mmap_readahead mm/filemap.c:3299 [inline] filemap_fault+0x59e/0x1200 mm/filemap.c:3398 __do_fault+0x135/0x390 mm/memory.c:5169 do_read_fault mm/memory.c:5590 [inline] do_fault mm/memory.c:5724 [inline] do_pte_missing mm/memory.c:4251 [inline] handle_pte_fault mm/memory.c:6069 [inline] __handle_mm_fault+0x37ed/0x5620 mm/memory.c:6212 handle_mm_fault+0x2d5/0x7f0 mm/memory.c:6381 do_user_addr_fault+0x764/0x1390 arch/x86/mm/fault.c:1387 handle_page_fault arch/x86/mm/fault.c:1476 [inline] exc_page_fault+0x76/0xf0 arch/x86/mm/fault.c:1532 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0010:rep_movs_alternative+0x30/0x90 arch/x86/lib/copy_user_64.S:60 Code: 83 f9 08 73 25 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 e9 3d 00 04 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 <48> 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 RSP: 0018:ffffc9000bca7a18 EFLAGS: 00050206 RAX: 00007ffffffff001 RBX: 0000000000000038 RCX: 0000000000000038 RDX: 0000000000000001 RSI: 00002000001ab000 RDI: ffffc9000bca7aa0 RBP: ffffc9000bca7c30 R08: ffffc9000bca7ad7 R09: 1ffff92001794f5a R10: dffffc0000000000 R11: fffff52001794f5b R12: 0000000000000002 R13: dffffc0000000000 R14: ffffc9000bca7aa0 R15: 00002000001ab000 copy_user_generic arch/x86/include/asm/uaccess_64.h:126 [inline] raw_copy_from_user arch/x86/include/asm/uaccess_64.h:141 [inline] _inline_copy_from_user include/linux/uaccess.h:178 [inline] _copy_from_user+0x7a/0xb0 lib/usercopy.c:18 copy_from_user include/linux/uaccess.h:212 [inline] copy_msghdr_from_user net/socket.c:2496 [inline] recvmsg_copy_msghdr net/socket.c:2752 [inline] ___sys_recvmsg+0x12e/0x510 net/socket.c:2824 do_recvmmsg+0x307/0x770 net/socket.c:2923 __sys_recvmmsg net/socket.c:2997 [inline] __do_sys_recvmmsg net/socket.c:3020 [inline] __se_sys_recvmmsg net/socket.c:3013 [inline] __x64_sys_recvmmsg+0x190/0x240 net/socket.c:3013 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f173538e929 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f1736274038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: ffffffffffffffda RBX: 00007f17355b6080 RCX: 00007f173538e929 RDX: 0000000000010106 RSI: 00002000000000c0 RDI: 0000000000000003 RBP: 00007f1735410b39 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f17355b6080 R15: 00007ffdc3433188 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__filemap_add_folio+0x11ad/0x12f0 mm/filemap.c:867 Code: fe c8 ff 4c 89 e7 48 c7 c6 20 37 94 8b e8 4b 99 0e 00 90 0f 0b e8 03 fe c8 ff 4c 89 e7 48 c7 c6 00 2e 94 8b e8 34 99 0e 00 90 <0f> 0b e8 ec fd c8 ff 4c 89 e7 48 c7 c6 20 37 94 8b e8 1d 99 0e 00 RSP: 0018:ffffc9000bca71a0 EFLAGS: 00010246 RAX: b5e15350bb275d00 RBX: 0000000000000002 RCX: 0000000000000000 RDX: 0000000000000007 RSI: ffffffff8d96e77b RDI: 00000000ffffffff RBP: ffffc9000bca7308 R08: ffffffff8f9fdaf7 R09: 1ffffffff1f3fb5e R10: dffffc0000000000 R11: fffffbfff1f3fb5f R12: ffffea0001627600 R13: dffffc0000000000 R14: ffffea0001627608 R15: 0000000000000004 FS: 00007f17362746c0(0000) GS:ffff888125d84000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f7ce83f6d58 CR3: 000000003265e000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: 83 f9 08 cmp $0x8,%ecx 3: 73 25 jae 0x2a 5: 85 c9 test %ecx,%ecx 7: 74 0f je 0x18 9: 8a 06 mov (%rsi),%al b: 88 07 mov %al,(%rdi) d: 48 ff c7 inc %rdi 10: 48 ff c6 inc %rsi 13: 48 ff c9 dec %rcx 16: 75 f1 jne 0x9 18: e9 3d 00 04 00 jmp 0x4005a 1d: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1) 24: 00 00 00 27: 0f 1f 00 nopl (%rax) * 2a: 48 8b 06 mov (%rsi),%rax <-- trapping instruction 2d: 48 89 07 mov %rax,(%rdi) 30: 48 83 c6 08 add $0x8,%rsi 34: 48 83 c7 08 add $0x8,%rdi 38: 83 e9 08 sub $0x8,%ecx 3b: 74 db je 0x18 3d: 83 f9 08 cmp $0x8,%ecx