worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 ------------[ cut here ]------------ kernel BUG at mm/filemap.c:868! Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI CPU: 0 UID: 0 PID: 12228 Comm: syz.1.1315 Not tainted 6.17.0-rc2-syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 RIP: 0010:__filemap_add_folio+0x11ad/0x12f0 mm/filemap.c:867 Code: 4f c9 ff 4c 89 e7 48 c7 c6 60 3b 94 8b e8 4b a1 31 ff 90 0f 0b e8 b3 4f c9 ff 4c 89 e7 48 c7 c6 40 32 94 8b e8 34 a1 31 ff 90 <0f> 0b e8 9c 4f c9 ff 4c 89 e7 48 c7 c6 60 3b 94 8b e8 1d a1 31 ff RSP: 0018:ffffc9000423ef40 EFLAGS: 00010246 RAX: 7528f153cf107900 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8be33460 RDI: 00000000ffffffff RBP: ffffc9000423f0b0 R08: ffffffff8fa38137 R09: 1ffffffff1f47026 R10: dffffc0000000000 R11: fffffbfff1f47027 R12: ffffea000104e040 R13: dffffc0000000000 R14: ffffea000104e048 R15: 0000000000000002 FS: 00007f8a1260a6c0(0000) GS:ffff888125c1b000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fa222b716c0 CR3: 0000000029a29000 CR4: 0000000000350ef0 Call Trace: filemap_add_folio+0xd5/0x270 mm/filemap.c:969 ra_alloc_folio mm/readahead.c:448 [inline] page_cache_ra_order+0x643/0xd40 mm/readahead.c:506 do_sync_mmap_readahead+0x25e/0x7a0 mm/filemap.c:-1 filemap_fault+0x62c/0x1200 mm/filemap.c:3445 __do_fault+0x138/0x390 mm/memory.c:5152 do_shared_fault mm/memory.c:5637 [inline] do_fault mm/memory.c:5711 [inline] do_pte_missing mm/memory.c:4234 [inline] handle_pte_fault mm/memory.c:6052 [inline] __handle_mm_fault+0x1847/0x5440 mm/memory.c:6195 handle_mm_fault+0x40a/0x8e0 mm/memory.c:6364 do_user_addr_fault+0x764/0x1390 arch/x86/mm/fault.c:1387 handle_page_fault arch/x86/mm/fault.c:1476 [inline] exc_page_fault+0x76/0xf0 arch/x86/mm/fault.c:1532 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0010:__put_user_nocheck_4+0x3/0x10 arch/x86/lib/putuser.S:104 Code: d9 0f 01 cb 89 01 31 c9 0f 01 ca e9 12 3a 97 f5 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 01 cb <89> 01 31 c9 0f 01 ca e9 ec 39 97 f5 90 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffc9000423f8b8 EFLAGS: 00050202 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00002000001a0e30 RDX: ffff88802fe23c00 RSI: 0000000000000002 RDI: 00000000ffffffff RBP: ffffc9000423fa30 R08: ffffc9000423f667 R09: 1ffff92000847ecc R10: dffffc0000000000 R11: fffff52000847ecd R12: 0000000000000002 R13: dffffc0000000000 R14: 0000000000000000 R15: 00002000001a0e00 ____sys_recvmsg+0x2ab/0x460 net/socket.c:2847 ___sys_recvmsg+0x1b5/0x510 net/socket.c:2876 do_recvmmsg+0x307/0x770 net/socket.c:2971 __sys_recvmmsg net/socket.c:3045 [inline] __do_sys_recvmmsg net/socket.c:3068 [inline] __se_sys_recvmmsg net/socket.c:3061 [inline] __x64_sys_recvmmsg+0x190/0x240 net/socket.c:3061 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f8a1178ebe9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f8a1260a038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: ffffffffffffffda RBX: 00007f8a119b6090 RCX: 00007f8a1178ebe9 RDX: 0000000000010106 RSI: 00002000000000c0 RDI: 0000000000000003 RBP: 00007f8a11811e19 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f8a119b6128 R14: 00007f8a119b6090 R15: 00007ffdf983fc88 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__filemap_add_folio+0x11ad/0x12f0 mm/filemap.c:867 Code: 4f c9 ff 4c 89 e7 48 c7 c6 60 3b 94 8b e8 4b a1 31 ff 90 0f 0b e8 b3 4f c9 ff 4c 89 e7 48 c7 c6 40 32 94 8b e8 34 a1 31 ff 90 <0f> 0b e8 9c 4f c9 ff 4c 89 e7 48 c7 c6 60 3b 94 8b e8 1d a1 31 ff RSP: 0018:ffffc9000423ef40 EFLAGS: 00010246 RAX: 7528f153cf107900 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8be33460 RDI: 00000000ffffffff RBP: ffffc9000423f0b0 R08: ffffffff8fa38137 R09: 1ffffffff1f47026 R10: dffffc0000000000 R11: fffffbfff1f47027 R12: ffffea000104e040 R13: dffffc0000000000 R14: ffffea000104e048 R15: 0000000000000002 FS: 00007f8a1260a6c0(0000) GS:ffff888125c1b000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f3c5ecdeff0 CR3: 0000000029a29000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: d9 0f (bad) (%rdi) 2: 01 cb add %ecx,%ebx 4: 89 01 mov %eax,(%rcx) 6: 31 c9 xor %ecx,%ecx 8: 0f 01 ca clac b: e9 12 3a 97 f5 jmp 0xf5973a22 10: 90 nop 11: 90 nop 12: 90 nop 13: 90 nop 14: 90 nop 15: 90 nop 16: 90 nop 17: 90 nop 18: 90 nop 19: 90 nop 1a: 90 nop 1b: 90 nop 1c: 90 nop 1d: 90 nop 1e: 90 nop 1f: 90 nop 20: 90 nop 21: 90 nop 22: 90 nop 23: 90 nop 24: 90 nop 25: 90 nop 26: 90 nop 27: 0f 01 cb stac * 2a: 89 01 mov %eax,(%rcx) <-- trapping instruction 2c: 31 c9 xor %ecx,%ecx 2e: 0f 01 ca clac 31: e9 ec 39 97 f5 jmp 0xf5973a22 36: 90 nop 37: 90 nop 38: 90 nop 39: 90 nop 3a: 90 nop 3b: 90 nop 3c: 90 nop 3d: 90 nop 3e: 90 nop 3f: 90 nop