do_group_exit+0xd3/0x2a0 kernel/exit.c:1102 __do_sys_exit_group kernel/exit.c:1113 [inline] __se_sys_exit_group kernel/exit.c:1111 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1111 x64_sys_call+0x1530/0x1730 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94 ------------[ cut here ]------------ kernel BUG at mm/filemap.c:3433! Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI CPU: 3 UID: 0 PID: 6544 Comm: syz.2.165 Not tainted 6.15.0-rc4-syzkaller-00042-gb6ea1680d0ac #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 RIP: 0010:filemap_fault+0x1862/0x2740 mm/filemap.c:3433 Code: 00 e9 bf ec ff ff 48 8b 7c 24 28 e8 98 48 2d 00 e9 66 f3 ff ff e8 4e cd c7 ff 48 c7 c6 c0 ee 98 8b 48 89 df e8 2f 94 10 00 90 <0f> 0b e8 37 cd c7 ff 48 c7 c6 20 e5 98 8b 48 89 df e8 18 94 10 00 RSP: 0018:ffffc900061cf1b0 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffffea0001638800 RCX: 0000000000000000 RDX: ffff888021f20000 RSI: ffffffff81f363c1 RDI: ffff888021f20444 RBP: ffffc900061cf480 R08: 0000000000000001 R09: 0000000000000001 R10: ffffffff9084fd17 R11: 0000000000000001 R12: ffff88802660aaf8 R13: 0000000000000008 R14: 0000000000000009 R15: 0000000000000000 FS: 00007fc6aaff66c0(0000) GS:ffff8880d6ce2000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055558db6e808 CR3: 000000002f35c000 CR4: 0000000000352ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __do_fault+0x10a/0x490 mm/memory.c:5098 do_shared_fault mm/memory.c:5582 [inline] do_fault mm/memory.c:5656 [inline] do_pte_missing+0x1a6/0x3fb0 mm/memory.c:4160 handle_pte_fault mm/memory.c:5997 [inline] __handle_mm_fault+0x103d/0x2a40 mm/memory.c:6140 handle_mm_fault+0x3fe/0xad0 mm/memory.c:6309 do_user_addr_fault+0x7a6/0x1370 arch/x86/mm/fault.c:1388 handle_page_fault arch/x86/mm/fault.c:1480 [inline] exc_page_fault+0x5c/0xc0 arch/x86/mm/fault.c:1538 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0010:copy_user_generic arch/x86/include/asm/uaccess_64.h:126 [inline] RIP: 0010:raw_copy_to_user arch/x86/include/asm/uaccess_64.h:147 [inline] RIP: 0010:_inline_copy_to_user include/linux/uaccess.h:197 [inline] RIP: 0010:_copy_to_user+0xb6/0xd0 lib/usercopy.c:26 Code: 89 ee 48 89 ef e8 ea 6d ea fc 4d 85 ff 75 a8 e8 30 73 ea fc 89 de 4c 89 e7 e8 16 f6 4f fd 0f 01 cb 48 89 d9 48 89 ef 4c 89 e6 a4 0f 1f 00 0f 01 ca 48 89 cb eb 80 66 2e 0f 1f 84 00 00 00 00 RSP: 0018:ffffc900061cf718 EFLAGS: 00050297 RAX: 0000000000000001 RBX: 0000000000000004 RCX: 0000000000000004 RDX: fffff52000c39f24 RSI: ffffc900061cf920 RDI: 000020000000088c RBP: 000020000000088c R08: 0000000000000000 R09: fffff52000c39f24 R10: 0000000000000003 R11: 0000000000000000 R12: ffffc900061cf920 R13: 0000200000000890 R14: 00007ffffffff000 R15: 0000000000000000 copy_to_user include/linux/uaccess.h:225 [inline] copy_to_sockptr_offset.constprop.0+0x12f/0x150 include/linux/sockptr.h:114 copy_to_bpfptr_offset include/linux/bpfptr.h:65 [inline] bpf_check+0x22c2/0xbbc0 kernel/bpf/verifier.c:24096 bpf_prog_load+0xe41/0x2490 kernel/bpf/syscall.c:2971 __sys_bpf+0x433c/0x4d80 kernel/bpf/syscall.c:5834 __do_sys_bpf kernel/bpf/syscall.c:5941 [inline] __se_sys_bpf kernel/bpf/syscall.c:5939 [inline] __x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5939 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fc6ad18e969 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fc6aaff6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007fc6ad3b5fa0 RCX: 00007fc6ad18e969 RDX: 0000000000000094 RSI: 0000200000000800 RDI: 0000000000000005 RBP: 00007fc6ad210ab1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fc6ad3b5fa0 R15: 00007ffff9853868 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:filemap_fault+0x1862/0x2740 mm/filemap.c:3433 Code: 00 e9 bf ec ff ff 48 8b 7c 24 28 e8 98 48 2d 00 e9 66 f3 ff ff e8 4e cd c7 ff 48 c7 c6 c0 ee 98 8b 48 89 df e8 2f 94 10 00 90 <0f> 0b e8 37 cd c7 ff 48 c7 c6 20 e5 98 8b 48 89 df e8 18 94 10 00 RSP: 0018:ffffc900061cf1b0 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffffea0001638800 RCX: 0000000000000000 RDX: ffff888021f20000 RSI: ffffffff81f363c1 RDI: ffff888021f20444 RBP: ffffc900061cf480 R08: 0000000000000001 R09: 0000000000000001 R10: ffffffff9084fd17 R11: 0000000000000001 R12: ffff88802660aaf8 R13: 0000000000000008 R14: 0000000000000009 R15: 0000000000000000 FS: 00007fc6aaff66c0(0000) GS:ffff8880d6ce2000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055558db6e808 CR3: 000000002f35c000 CR4: 0000000000352ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 89 ee mov %ebp,%esi 2: 48 89 ef mov %rbp,%rdi 5: e8 ea 6d ea fc call 0xfcea6df4 a: 4d 85 ff test %r15,%r15 d: 75 a8 jne 0xffffffb7 f: e8 30 73 ea fc call 0xfcea7344 14: 89 de mov %ebx,%esi 16: 4c 89 e7 mov %r12,%rdi 19: e8 16 f6 4f fd call 0xfd4ff634 1e: 0f 01 cb stac 21: 48 89 d9 mov %rbx,%rcx 24: 48 89 ef mov %rbp,%rdi 27: 4c 89 e6 mov %r12,%rsi * 2a: f3 a4 rep movsb %ds:(%rsi),%es:(%rdi) <-- trapping instruction 2c: 0f 1f 00 nopl (%rax) 2f: 0f 01 ca clac 32: 48 89 cb mov %rcx,%rbx 35: eb 80 jmp 0xffffffb7 37: 66 data16 38: 2e cs 39: 0f .byte 0xf 3a: 1f (bad) 3b: 84 00 test %al,(%rax) 3d: 00 00 add %al,(%rax)