process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x599/0xb30 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 ------------[ cut here ]------------ kernel BUG at mm/filemap.c:3579! Oops: invalid opcode: 0000 [#1] SMP KASAN PTI CPU: 0 UID: 0 PID: 3774 Comm: syz.1.6741 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:filemap_fault+0x1215/0x1290 mm/filemap.c:3579 Code: 38 c1 0f 8c 8e fc ff ff 4c 89 e7 e8 b5 f2 2c 00 e9 81 fc ff ff e8 1b a1 c6 ff 48 89 df 48 c7 c6 80 a9 74 8b e8 dc f7 2c ff 90 <0f> 0b e8 04 a1 c6 ff 48 8b 3c 24 48 c7 c6 00 b0 74 8b e8 c4 f7 2c RSP: 0018:ffffc900033f75e0 EFLAGS: 00010246 RAX: c958e8162a866000 RBX: ffffea0002382400 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8d7867c7 RDI: 00000000ffffffff RBP: ffffc900033f7718 R08: ffffffff8f817677 R09: 1ffffffff1f02ece R10: dffffc0000000000 R11: fffffbfff1f02ecf R12: dffffc0000000000 R13: 1ffffd4000470481 R14: ffffea0002382418 R15: ffffea0002382408 FS: 00007f1f9bda66c0(0000) GS:ffff888125e44000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f074a851762 CR3: 000000001ef04000 CR4: 00000000003526f0 Call Trace: __do_fault+0x138/0x390 mm/memory.c:5320 do_read_fault mm/memory.c:5755 [inline] do_fault mm/memory.c:5889 [inline] do_pte_missing+0x2206/0x3330 mm/memory.c:4401 handle_pte_fault mm/memory.c:6273 [inline] __handle_mm_fault mm/memory.c:6411 [inline] handle_mm_fault+0x1b26/0x32b0 mm/memory.c:6580 faultin_page mm/gup.c:1126 [inline] __get_user_pages+0x1650/0x29f0 mm/gup.c:1428 populate_vma_page_range+0x29f/0x3a0 mm/gup.c:1860 __mm_populate+0x24c/0x380 mm/gup.c:1963 mm_populate include/linux/mm.h:3701 [inline] vm_mmap_pgoff+0x387/0x4d0 mm/util.c:586 ksys_mmap_pgoff+0x51f/0x760 mm/mmap.c:604 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f1f9af8f749 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f1f9bda6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007f1f9b1e5fa0 RCX: 00007f1f9af8f749 RDX: 0000000003000002 RSI: 0000000000b36000 RDI: 0000200000000000 RBP: 00007f1f9b013f91 R08: 0000000000000004 R09: 0000000000000000 R10: 0000000000028011 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f1f9b1e6038 R14: 00007f1f9b1e5fa0 R15: 00007f1f9b30fa28 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:filemap_fault+0x1215/0x1290 mm/filemap.c:3579 Code: 38 c1 0f 8c 8e fc ff ff 4c 89 e7 e8 b5 f2 2c 00 e9 81 fc ff ff e8 1b a1 c6 ff 48 89 df 48 c7 c6 80 a9 74 8b e8 dc f7 2c ff 90 <0f> 0b e8 04 a1 c6 ff 48 8b 3c 24 48 c7 c6 00 b0 74 8b e8 c4 f7 2c RSP: 0018:ffffc900033f75e0 EFLAGS: 00010246 RAX: c958e8162a866000 RBX: ffffea0002382400 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8d7867c7 RDI: 00000000ffffffff RBP: ffffc900033f7718 R08: ffffffff8f817677 R09: 1ffffffff1f02ece R10: dffffc0000000000 R11: fffffbfff1f02ecf R12: dffffc0000000000 R13: 1ffffd4000470481 R14: ffffea0002382418 R15: ffffea0002382408 FS: 00007f1f9bda66c0(0000) GS:ffff888125f44000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb586bb9358 CR3: 000000001ef04000 CR4: 00000000003526f0