release_pages+0x4b4/0x520 mm/swap.c:1042 io_free_region+0xb3/0x240 io_uring/memmap.c:102 io_rings_free io_uring/io_uring.c:2740 [inline] io_ring_ctx_free+0x2de/0x530 io_uring/io_uring.c:2846 io_ring_exit_work+0x8a0/0x910 io_uring/io_uring.c:3060 process_one_work+0x93a/0x15a0 kernel/workqueue.c:3279 process_scheduled_works kernel/workqueue.c:3362 [inline] worker_thread+0x9b0/0xee0 kernel/workqueue.c:3443 kthread+0x389/0x480 kernel/kthread.c:467 ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 ------------[ cut here ]------------ kernel BUG at mm/filemap.c:3579! Oops: invalid opcode: 0000 [#1] SMP KASAN PTI CPU: 0 UID: 0 PID: 4927 Comm: syz.5.8047 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:filemap_fault+0x1215/0x1290 mm/filemap.c:3579 Code: 38 c1 0f 8c 8e fc ff ff 4c 89 e7 e8 25 29 2d 00 e9 81 fc ff ff e8 1b 54 c6 ff 48 89 df 48 c7 c6 c0 b6 94 8b e8 9c f3 2c ff 90 <0f> 0b e8 04 54 c6 ff 48 8b 3c 24 48 c7 c6 40 bd 94 8b e8 84 f3 2c RSP: 0018:ffffc9000d837740 EFLAGS: 00010246 RAX: 8857f9fb80c5a300 RBX: ffffea0002847f00 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8dabab01 RDI: 00000000ffffffff RBP: ffffc9000d837878 R08: ffffffff8fc47af7 R09: 1ffffffff1f88f5e R10: dffffc0000000000 R11: fffffbfff1f88f5f R12: dffffc0000000000 R13: 1ffffd4000508fe1 R14: ffffea0002847f18 R15: ffffea0002847f08 FS: 00007f4b6dfda6c0(0000) GS:ffff8881259ad000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000078ada000 CR4: 00000000003526f0 DR0: ffffffffffffffff DR1: 00000000000001f8 DR2: 0000000000000083 DR3: ffffffffefffff15 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Call Trace: __do_fault+0x138/0x390 mm/memory.c:5302 do_read_fault mm/memory.c:5737 [inline] do_fault mm/memory.c:5871 [inline] do_pte_missing+0x2206/0x3330 mm/memory.c:4416 handle_pte_fault mm/memory.c:6255 [inline] __handle_mm_fault mm/memory.c:6393 [inline] handle_mm_fault+0x1b26/0x32b0 mm/memory.c:6562 do_user_addr_fault+0x764/0x1380 arch/x86/mm/fault.c:1387 handle_page_fault arch/x86/mm/fault.c:1476 [inline] exc_page_fault+0x71/0xd0 arch/x86/mm/fault.c:1532 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 RIP: 0010:rep_movs_alternative+0x30/0x90 arch/x86/lib/copy_user_64.S:60 Code: 83 f9 08 73 25 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 e9 cd 40 04 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 <48> 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 RSP: 0018:ffffc9000d837d60 EFLAGS: 00050202 RAX: 00007ffffffff001 RBX: 0000000000000028 RCX: 0000000000000028 RDX: 0000000000000001 RSI: 0000200000000440 RDI: ffffc9000d837e00 RBP: 0000000000000000 R08: ffffc9000d837e27 R09: 1ffff92001b06fc4 R10: dffffc0000000000 R11: fffff52001b06fc5 R12: ffff888059cbdad0 R13: dffffc0000000000 R14: ffffc9000d837e00 R15: 0000200000000440 copy_user_generic arch/x86/include/asm/uaccess_64.h:126 [inline] raw_copy_from_user arch/x86/include/asm/uaccess_64.h:141 [inline] _inline_copy_from_user include/linux/uaccess.h:185 [inline] _copy_from_user+0x7a/0xb0 lib/usercopy.c:18 copy_from_user include/linux/uaccess.h:223 [inline] get_user_ifreq+0x6c/0x180 net/socket.c:3368 sock_ioctl+0x6dd/0x790 net/socket.c:1313 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:597 [inline] __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:583 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xec/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f4b6d18f749 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f4b6dfda038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f4b6d3e6180 RCX: 00007f4b6d18f749 RDX: 0000200000000440 RSI: 00000000000089f1 RDI: 0000000000000003 RBP: 00007f4b6d213f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f4b6d3e6218 R14: 00007f4b6d3e6180 R15: 00007ffe06f54b08 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:filemap_fault+0x1215/0x1290 mm/filemap.c:3579 Code: 38 c1 0f 8c 8e fc ff ff 4c 89 e7 e8 25 29 2d 00 e9 81 fc ff ff e8 1b 54 c6 ff 48 89 df 48 c7 c6 c0 b6 94 8b e8 9c f3 2c ff 90 <0f> 0b e8 04 54 c6 ff 48 8b 3c 24 48 c7 c6 40 bd 94 8b e8 84 f3 2c RSP: 0018:ffffc9000d837740 EFLAGS: 00010246 RAX: 8857f9fb80c5a300 RBX: ffffea0002847f00 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8dabab01 RDI: 00000000ffffffff RBP: ffffc9000d837878 R08: ffffffff8fc47af7 R09: 1ffffffff1f88f5e R10: dffffc0000000000 R11: fffffbfff1f88f5f R12: dffffc0000000000 R13: 1ffffd4000508fe1 R14: ffffea0002847f18 R15: ffffea0002847f08 FS: 00007f4b6dfda6c0(0000) GS:ffff8881259ad000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000078ada000 CR4: 00000000003526f0 DR0: ffffffffffffffff DR1: 00000000000001f8 DR2: 0000000000000083 DR3: ffffffffefffff15 DR6: 00000000ffff0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 83 f9 08 cmp $0x8,%ecx 3: 73 25 jae 0x2a 5: 85 c9 test %ecx,%ecx 7: 74 0f je 0x18 9: 8a 06 mov (%rsi),%al b: 88 07 mov %al,(%rdi) d: 48 ff c7 inc %rdi 10: 48 ff c6 inc %rsi 13: 48 ff c9 dec %rcx 16: 75 f1 jne 0x9 18: e9 cd 40 04 00 jmp 0x440ea 1d: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1) 24: 00 00 00 27: 0f 1f 00 nopl (%rax) * 2a: 48 8b 06 mov (%rsi),%rax <-- trapping instruction 2d: 48 89 07 mov %rax,(%rdi) 30: 48 83 c6 08 add $0x8,%rsi 34: 48 83 c7 08 add $0x8,%rdi 38: 83 e9 08 sub $0x8,%ecx 3b: 74 db je 0x18 3d: 83 f9 08 cmp $0x8,%ecx