do_sock_getsockopt+0x368/0x440 net/socket.c:2384
__sys_getsockopt net/socket.c:2413 [inline]
__do_sys_getsockopt net/socket.c:2423 [inline]
__se_sys_getsockopt net/socket.c:2420 [inline]
__x64_sys_getsockopt+0x1d6/0x280 net/socket.c:2420
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x68/0xd2
------------[ cut here ]------------
WARNING: CPU: 1 PID: 7144 at include/linux/memcontrol.h:764 folio_lruvec include/linux/memcontrol.h:764 [inline]
WARNING: CPU: 1 PID: 7144 at include/linux/memcontrol.h:764 folio_lruvec_lock_irqsave+0x212/0x270 mm/memcontrol.c:1369
Modules linked in:
CPU: 1 PID: 7144 Comm: syz-executor Not tainted 6.6.99-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
RIP: 0010:folio_lruvec include/linux/memcontrol.h:764 [inline]
RIP: 0010:folio_lruvec_lock_irqsave+0x212/0x270 mm/memcontrol.c:1369
Code: 4c 89 f7 e8 10 20 f9 ff 48 8b 04 24 49 89 06 e9 1c ff ff ff 48 89 df 48 c7 c6 c0 bb b6 8a e8 75 9a e1 ff c6 05 23 66 51 0c 01 <0f> 0b e9 1b fe ff ff 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c 9d fe
RSP: 0018:ffffc900033c7798 EFLAGS: 00010246
RAX: 1fc848388d1f6500 RBX: ffffea00017db680 RCX: 1fc848388d1f6500
RDX: 0000000000000004 RSI: ffffffff8aaacbc0 RDI: ffffffff8afc6680
RBP: ffffc900033c7840 R08: ffffffff8e4a7cef R09: 1ffffffff1c94f9d
R10: dffffc0000000000 R11: fffffbfff1c94f9e R12: ffff8880b8f36e48
R13: dffffc0000000000 R14: ffff88802ea10000 R15: 0000000000000000
FS: 0000555564b33500(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555564b337d0 CR3: 000000006f43b000 CR4: 00000000003526e0
Call Trace:
<TASK>
folio_lruvec_relock_irqsave include/linux/memcontrol.h:1654 [inline]
folio_batch_move_lru+0x2d8/0x6b0 mm/swap.c:208
lru_add_drain_cpu+0x10e/0x8c0 mm/swap.c:644
lru_add_drain+0x121/0x3e0 mm/swap.c:744
do_wp_page+0x1abe/0x3630 mm/memory.c:3424
handle_pte_fault mm/memory.c:5041 [inline]
__handle_mm_fault mm/memory.c:5166 [inline]
handle_mm_fault+0x12d4/0x4920 mm/memory.c:5331
do_user_addr_fault+0x738/0x12e0 arch/x86/mm/fault.c:1373
handle_page_fault arch/x86/mm/fault.c:1465 [inline]
exc_page_fault+0x67/0x110 arch/x86/mm/fault.c:1521
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:608
RIP: 0010:__put_user_4+0x11/0x20 arch/x86/lib/putuser.S:89
Code: 01 ca c3 90 90 90 90 90 90 f3 0f 1e fa 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 f3 0f 1e fa 48 89 cb 48 c1 fb 3f 48 09 d9 0f 01 cb <89> 01 31 c9 0f 01 ca c3 90 90 90 90 90 90 90 f3 0f 1e fa 0f 01 cb
RSP: 0018:ffffc900033c7ef8 EFLAGS: 00050202
RAX: 0000000000000129 RBX: 0000000000000000 RCX: 0000555564b337d0
RDX: 0000000000000000 RSI: ffffffff8aaacbc0 RDI: ffffffff8afc6680
RBP: 0000000000000000 R08: ffffffff8e4a7cef R09: 1ffffffff1c94f9d
R10: dffffc0000000000 R11: fffffbfff1c94f9e R12: 1ffff1100fc45c12
R13: 0000000000000000 R14: ffff88807e22da00 R15: dffffc0000000000
schedule_tail+0x93/0xb0 kernel/sched/core.c:5316
ret_from_fork+0x24/0x80 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293
</TASK>
----------------
Code disassembly (best guess):
0: 01 ca add %ecx,%edx
2: c3 ret
3: 90 nop
4: 90 nop
5: 90 nop
6: 90 nop
7: 90 nop
8: 90 nop
9: f3 0f 1e fa endbr64
d: 0f 01 cb stac
10: 66 89 01 mov %ax,(%rcx)
13: 31 c9 xor %ecx,%ecx
15: 0f 01 ca clac
18: c3 ret
19: f3 0f 1e fa endbr64
1d: 48 89 cb mov %rcx,%rbx
20: 48 c1 fb 3f sar $0x3f,%rbx
24: 48 09 d9 or %rbx,%rcx
27: 0f 01 cb stac
* 2a: 89 01 mov %eax,(%rcx) <-- trapping instruction
2c: 31 c9 xor %ecx,%ecx
2e: 0f 01 ca clac
31: c3 ret
32: 90 nop
33: 90 nop
34: 90 nop
35: 90 nop
36: 90 nop
37: 90 nop
38: 90 nop
39: f3 0f 1e fa endbr64
3d: 0f 01 cb stac