kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4148 [inline] slab_alloc_node mm/slub.c:4197 [inline] __do_kmalloc_node mm/slub.c:4327 [inline] __kvmalloc_node_noprof+0x2b0/0x5f0 mm/slub.c:5015 alloc_netdev_mqs+0xa6/0x11e0 net/core/dev.c:11711 rtnl_create_link+0x31f/0xd10 net/core/rtnetlink.c:3631 rtnl_newlink_create+0x25c/0xb00 net/core/rtnetlink.c:3813 __rtnl_newlink net/core/rtnetlink.c:3940 [inline] rtnl_newlink+0x16d6/0x1c70 net/core/rtnetlink.c:4055 rtnetlink_rcv_msg+0x7cc/0xb70 net/core/rtnetlink.c:6944 netlink_rcv_skb+0x205/0x470 net/netlink/af_netlink.c:2534 netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline] netlink_unicast+0x758/0x8d0 net/netlink/af_netlink.c:1339 netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1883 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg+0x219/0x270 net/socket.c:727 ____sys_sendmsg+0x505/0x830 net/socket.c:2566 ------------[ cut here ]------------ kernel BUG at mm/filemap.c:868! Oops: invalid opcode: 0000 [#1] SMP KASAN PTI CPU: 0 UID: 0 PID: 28693 Comm: syz.0.5307 Not tainted 6.16.0-rc4-syzkaller-00013-g66701750d556 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:__filemap_add_folio+0x11ad/0x12f0 mm/filemap.c:867 Code: fe c8 ff 4c 89 e7 48 c7 c6 20 37 94 8b e8 4b 99 0e 00 90 0f 0b e8 03 fe c8 ff 4c 89 e7 48 c7 c6 00 2e 94 8b e8 34 99 0e 00 90 <0f> 0b e8 ec fd c8 ff 4c 89 e7 48 c7 c6 20 37 94 8b e8 1d 99 0e 00 RSP: 0018:ffffc90003a77320 EFLAGS: 00010246 RAX: 4ff884c5bdf4eb00 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 0000000000000007 RSI: ffffffff8d96e77b RDI: 00000000ffffffff RBP: ffffc90003a77488 R08: ffffffff8f9fdaf7 R09: 1ffffffff1f3fb5e R10: dffffc0000000000 R11: fffffbfff1f3fb5f R12: ffffea0001033700 R13: dffffc0000000000 R14: ffffea0001033708 R15: 0000000000000004 FS: 00007fa5998666c0(0000) GS:ffff888125c84000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fcd43437f98 CR3: 000000002b2fc000 CR4: 00000000003526f0 Call Trace: filemap_add_folio+0xd5/0x270 mm/filemap.c:969 ra_alloc_folio mm/readahead.c:448 [inline] page_cache_ra_order+0x74c/0xc70 mm/readahead.c:509 do_async_mmap_readahead mm/filemap.c:3299 [inline] filemap_fault+0x59e/0x1200 mm/filemap.c:3398 __do_fault+0x135/0x390 mm/memory.c:5169 do_shared_fault mm/memory.c:5654 [inline] do_fault mm/memory.c:5728 [inline] do_pte_missing mm/memory.c:4251 [inline] handle_pte_fault mm/memory.c:6069 [inline] __handle_mm_fault+0x198b/0x5620 mm/memory.c:6212 handle_mm_fault+0x2d5/0x7f0 mm/memory.c:6381 do_user_addr_fault+0x764/0x1390 arch/x86/mm/fault.c:1387 handle_page_fault arch/x86/mm/fault.c:1476 [inline] exc_page_fault+0x76/0xf0 arch/x86/mm/fault.c:1532 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0010:rep_movs_alternative+0x33/0x90 arch/x86/lib/copy_user_64.S:61 Code: 73 25 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 e9 3d 00 04 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 <48> 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 73 e8 eb RSP: 0018:ffffc90003a77b88 EFLAGS: 00050246 RAX: 0000000000000000 RBX: 0000000000000008 RCX: 0000000000000008 RDX: 0000000000000000 RSI: ffffc90003a77c20 RDI: 0000200000019680 RBP: ffffc90003a77c90 R08: ffffc90003a77c27 R09: 1ffff9200074ef84 R10: dffffc0000000000 R11: fffff5200074ef85 R12: 0000200000019688 R13: 00007ffffffff000 R14: ffffc90003a77c20 R15: 0000200000019680 copy_user_generic arch/x86/include/asm/uaccess_64.h:126 [inline] raw_copy_to_user arch/x86/include/asm/uaccess_64.h:147 [inline] _inline_copy_to_user include/linux/uaccess.h:197 [inline] _copy_to_user+0x8a/0xb0 lib/usercopy.c:26 copy_to_user include/linux/uaccess.h:225 [inline] msr_read+0x177/0x250 arch/x86/kernel/msr.c:69 vfs_read+0x1fd/0x980 fs/read_write.c:570 ksys_read+0x145/0x250 fs/read_write.c:715 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fa59898e929 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa599866038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 00007fa598bb6080 RCX: 00007fa59898e929 RDX: 0000000000018ff0 RSI: 0000200000019680 RDI: 0000000000000007 RBP: 00007fa598a10b39 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fa598bb6080 R15: 00007ffffd65a288 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__filemap_add_folio+0x11ad/0x12f0 mm/filemap.c:867 Code: fe c8 ff 4c 89 e7 48 c7 c6 20 37 94 8b e8 4b 99 0e 00 90 0f 0b e8 03 fe c8 ff 4c 89 e7 48 c7 c6 00 2e 94 8b e8 34 99 0e 00 90 <0f> 0b e8 ec fd c8 ff 4c 89 e7 48 c7 c6 20 37 94 8b e8 1d 99 0e 00 RSP: 0018:ffffc90003a77320 EFLAGS: 00010246 RAX: 4ff884c5bdf4eb00 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 0000000000000007 RSI: ffffffff8d96e77b RDI: 00000000ffffffff RBP: ffffc90003a77488 R08: ffffffff8f9fdaf7 R09: 1ffffffff1f3fb5e R10: dffffc0000000000 R11: fffffbfff1f3fb5f R12: ffffea0001033700 R13: dffffc0000000000 R14: ffffea0001033708 R15: 0000000000000004 FS: 00007fa5998666c0(0000) GS:ffff888125d84000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000002b2fc000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 00000000000032e7 DR6: 00000000ffff0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 73 25 jae 0x27 2: 85 c9 test %ecx,%ecx 4: 74 0f je 0x15 6: 8a 06 mov (%rsi),%al 8: 88 07 mov %al,(%rdi) a: 48 ff c7 inc %rdi d: 48 ff c6 inc %rsi 10: 48 ff c9 dec %rcx 13: 75 f1 jne 0x6 15: e9 3d 00 04 00 jmp 0x40057 1a: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1) 21: 00 00 00 24: 0f 1f 00 nopl (%rax) 27: 48 8b 06 mov (%rsi),%rax * 2a: 48 89 07 mov %rax,(%rdi) <-- trapping instruction 2d: 48 83 c6 08 add $0x8,%rsi 31: 48 83 c7 08 add $0x8,%rdi 35: 83 e9 08 sub $0x8,%ecx 38: 74 db je 0x15 3a: 83 f9 08 cmp $0x8,%ecx 3d: 73 e8 jae 0x27 3f: eb .byte 0xeb