BUG: unable to handle page fault for address: ffffffff00000000
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD df3d067 P4D df3d067 PUD 0
Oops: Oops: 0010 [#1] SMP KASAN PTI
CPU: 0 UID: 0 PID: 6979 Comm: syz.5.236 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
RIP: 0010:0xffffffff00000000
Code: Unable to access opcode bytes at 0xfffffffeffffffd6.
RSP: 0018:ffffc90000007bd8 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff8880693c5000 RCX: c08684cf69579d00
RDX: 0000000000000001 RSI: ffffffff8db5a486 RDI: ffff8880693c5000
RBP: ffffc90000007e30 R08: 0000000000000000 R09: ffffffff81a8b814
R10: dffffc0000000000 R11: ffffffff00000000 R12: ffffffff00000000
R13: ffffffff81a8b814 R14: 1ffff1100d278a01 R15: ffff8880693c5008
FS: 00007ffbe90446c0(0000) GS:ffff888125c85000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffffeffffffd6 CR3: 00000000316b4000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
handle_softirqs+0x286/0x870 kernel/softirq.c:579
__do_softirq kernel/softirq.c:613 [inline]
invoke_softirq kernel/softirq.c:453 [inline]
__irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
irq_exit_rcu+0x9/0x30 kernel/softirq.c:696
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline]
sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1050
</IRQ>
<TASK>
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:lock_is_held_type+0x0/0x190 kernel/locking/lockdep.c:5928
Code: ca 24 f6 90 0f 0b 90 90 90 eb b5 e8 1a fc ff ff 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <f3> 0f 1e fa 55 41 57 41 56 41 55 41 54 53 48 83 ec 10 65 48 8b 05
RSP: 0018:ffffc9001c0b7508 EFLAGS: 00000292
RAX: ffffffff81f730c8 RBX: dffffc0000000000 RCX: 0000000000000002
RDX: ffff88802a678000 RSI: 00000000ffffffff RDI: ffff888029ff10d0
RBP: ffffea00014e4040 R08: ffffea00014e4037 R09: 1ffffd400029c806
R10: dffffc0000000000 R11: fffff9400029c807 R12: 1ffff92003816ee1
R13: ffffc9001c0b7708 R14: 0000000000000001 R15: ffff888029ff10d0
lock_is_held include/linux/lockdep.h:249 [inline]
xa_entry include/linux/xarray.h:1226 [inline]
xas_next_entry+0x1de/0x3d0 include/linux/xarray.h:1731
next_uptodate_folio+0x32/0x5d0 mm/filemap.c:3562
filemap_map_pages+0x1025/0x1740 mm/filemap.c:3755
do_fault_around mm/memory.c:5568 [inline]
do_read_fault mm/memory.c:5601 [inline]
do_fault mm/memory.c:5744 [inline]
do_pte_missing mm/memory.c:4251 [inline]
handle_pte_fault mm/memory.c:6089 [inline]
__handle_mm_fault+0x368a/0x5620 mm/memory.c:6232
handle_mm_fault+0x2d5/0x7f0 mm/memory.c:6401
faultin_page mm/gup.c:1186 [inline]
__get_user_pages+0x1af4/0x30b0 mm/gup.c:1488
populate_vma_page_range+0x26b/0x340 mm/gup.c:1926
__mm_populate+0x24c/0x380 mm/gup.c:2029
mm_populate include/linux/mm.h:3348 [inline]
vm_mmap_pgoff+0x3f0/0x4c0 mm/util.c:584
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7ffbe818e929
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffbe9044038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 00007ffbe83b6160 RCX: 00007ffbe818e929
RDX: 8cd94b934ec872d5 RSI: 0000000000b36000 RDI: 0000200000000000
RBP: 00007ffbe8210b39 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000008031 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000001 R14: 00007ffbe83b6160 R15: 00007fff4e326698
</TASK>
Modules linked in:
CR2: ffffffff00000000
---[ end trace 0000000000000000 ]---
RIP: 0010:0xffffffff00000000
Code: Unable to access opcode bytes at 0xfffffffeffffffd6.
RSP: 0018:ffffc90000007bd8 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff8880693c5000 RCX: c08684cf69579d00
RDX: 0000000000000001 RSI: ffffffff8db5a486 RDI: ffff8880693c5000
RBP: ffffc90000007e30 R08: 0000000000000000 R09: ffffffff81a8b814
R10: dffffc0000000000 R11: ffffffff00000000 R12: ffffffff00000000
R13: ffffffff81a8b814 R14: 1ffff1100d278a01 R15: ffff8880693c5008
FS: 00007ffbe90446c0(0000) GS:ffff888125c85000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffffeffffffd6 CR3: 00000000316b4000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: ca 24 f6 lret $0xf624
3: 90 nop
4: 0f 0b ud2
6: 90 nop
7: 90 nop
8: 90 nop
9: eb b5 jmp 0xffffffc0
b: e8 1a fc ff ff call 0xfffffc2a
10: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1)
17: 00 00 00
1a: 90 nop
1b: 90 nop
1c: 90 nop
1d: 90 nop
1e: 90 nop
1f: 90 nop
20: 90 nop
21: 90 nop
22: 90 nop
23: 90 nop
24: 90 nop
25: 90 nop
26: 90 nop
27: 90 nop
28: 90 nop
29: 90 nop
* 2a: f3 0f 1e fa endbr64 <-- trapping instruction
2e: 55 push %rbp
2f: 41 57 push %r15
31: 41 56 push %r14
33: 41 55 push %r13
35: 41 54 push %r12
37: 53 push %rbx
38: 48 83 ec 10 sub $0x10,%rsp
3c: 65 gs
3d: 48 rex.W
3e: 8b .byte 0x8b
3f: 05 .byte 0x5