------------[ cut here ]------------ kernel BUG at mm/memory.c:2185! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 6673 Comm: syz-executor146 Not tainted 6.1.0-syzkaller-13139-gf9ff5644bcc0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:vmf_insert_pfn_prot+0x40b/0x420 mm/memory.c:2185 Code: 92 c6 31 ff e8 c6 4d bf ff 84 db 74 2b e8 dd 4a bf ff e9 87 fd ff ff e8 d3 4a bf ff 0f 0b e8 cc 4a bf ff 0f 0b e8 c5 4a bf ff <0f> 0b e8 ce fc e5 08 e8 b9 4a bf ff 0f 0b e8 b2 4a bf ff 0f 0b 55 RSP: 0018:ffffc900058f77a0 EFLAGS: 00010293 RAX: ffffffff81ce785b RBX: 0000000000000420 RCX: ffff88806f7a57c0 RDX: 0000000000000000 RSI: 0000000000000420 RDI: 0000000000000420 RBP: ffffc900058f7860 R08: ffffffff81ce754f R09: ffffffff81ce7523 R10: 0000000000000002 R11: ffff88806f7a57c0 R12: 000000000c040471 R13: ffff88801cbdeb60 R14: ffffc900058f77e0 R15: 000000000001e2e0 FS: 00007f6703207700(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffe631bb9c0 CR3: 000000007d5d6000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: drm_gem_shmem_fault+0x1d8/0x230 drivers/gpu/drm/drm_gem_shmem_helper.c:562 __do_fault+0x136/0x4f0 mm/memory.c:4163 do_read_fault mm/memory.c:4514 [inline] do_fault mm/memory.c:4643 [inline] handle_pte_fault mm/memory.c:4931 [inline] __handle_mm_fault mm/memory.c:5073 [inline] handle_mm_fault+0x2009/0x2650 mm/memory.c:5219 do_user_addr_fault+0x69b/0xcb0 arch/x86/mm/fault.c:1428 handle_page_fault arch/x86/mm/fault.c:1519 [inline] exc_page_fault+0x7a/0x120 arch/x86/mm/fault.c:1575 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570 RIP: 0010:do_strncpy_from_user lib/strncpy_from_user.c:41 [inline] RIP: 0010:strncpy_from_user+0x150/0x330 lib/strncpy_from_user.c:139 Code: 89 34 24 0f 01 cb 0f ae e8 bf 07 00 00 00 4c 89 ee e8 54 87 19 fd 49 83 fd 07 0f 86 81 00 00 00 45 31 ff 0f 1f 80 00 00 00 00 <4f> 8b 34 3c 48 b8 ff fe fe fe fe fe fe fe 49 8d 1c 06 4c 89 f5 48 RSP: 0018:ffffc900058f7cc0 EFLAGS: 00050246 RAX: ffffffff84744059 RBX: 0000000000000fe0 RCX: 0000000000000000 RDX: ffff88806f7a57c0 RSI: 0000000000000fe0 RDI: 0000000000000007 RBP: 0000000000000000 R08: ffffffff8474408c R09: fffff94000379e01 R10: fffff94000379e01 R11: 1ffffd4000379e00 R12: 0000000020000100 R13: 0000000000000fe0 R14: ffff88806f3c0020 R15: 0000000000000000 getname_flags+0xf5/0x4e0 fs/namei.c:150 do_sys_openat2+0xd2/0x500 fs/open.c:1304 do_sys_open fs/open.c:1326 [inline] __do_sys_openat fs/open.c:1342 [inline] __se_sys_openat fs/open.c:1337 [inline] __x64_sys_openat+0x243/0x290 fs/open.c:1337 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f6703a64219 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f6703207208 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007f6703aec268 RCX: 00007f6703a64219 RDX: 0000000000000000 RSI: 0000000020000100 RDI: ffffffffffffff9c RBP: 00007f6703aec260 R08: 00007f6703aec260 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6703aec26c R13: 00007ffe630f57df R14: 00007f6703207300 R15: 0000000000022000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:vmf_insert_pfn_prot+0x40b/0x420 mm/memory.c:2185 Code: 92 c6 31 ff e8 c6 4d bf ff 84 db 74 2b e8 dd 4a bf ff e9 87 fd ff ff e8 d3 4a bf ff 0f 0b e8 cc 4a bf ff 0f 0b e8 c5 4a bf ff <0f> 0b e8 ce fc e5 08 e8 b9 4a bf ff 0f 0b e8 b2 4a bf ff 0f 0b 55 RSP: 0018:ffffc900058f77a0 EFLAGS: 00010293 RAX: ffffffff81ce785b RBX: 0000000000000420 RCX: ffff88806f7a57c0 RDX: 0000000000000000 RSI: 0000000000000420 RDI: 0000000000000420 RBP: ffffc900058f7860 R08: ffffffff81ce754f R09: ffffffff81ce7523 R10: 0000000000000002 R11: ffff88806f7a57c0 R12: 000000000c040471 R13: ffff88801cbdeb60 R14: ffffc900058f77e0 R15: 000000000001e2e0 FS: 00007f6703207700(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020002348 CR3: 000000007d5d6000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 89 34 24 mov %esi,(%rsp) 3: 0f 01 cb stac 6: 0f ae e8 lfence 9: bf 07 00 00 00 mov $0x7,%edi e: 4c 89 ee mov %r13,%rsi 11: e8 54 87 19 fd callq 0xfd19876a 16: 49 83 fd 07 cmp $0x7,%r13 1a: 0f 86 81 00 00 00 jbe 0xa1 20: 45 31 ff xor %r15d,%r15d 23: 0f 1f 80 00 00 00 00 nopl 0x0(%rax) * 2a: 4f 8b 34 3c mov (%r12,%r15,1),%r14 <-- trapping instruction 2e: 48 b8 ff fe fe fe fe movabs $0xfefefefefefefeff,%rax 35: fe fe fe 38: 49 8d 1c 06 lea (%r14,%rax,1),%rbx 3c: 4c 89 f5 mov %r14,%rbp 3f: 48 rex.W