__mm_populate+0x24c/0x380 mm/gup.c:2029 do_mlock+0x625/0x740 mm/mlock.c:655 __do_sys_mlock mm/mlock.c:663 [inline] __se_sys_mlock mm/mlock.c:661 [inline] __x64_sys_mlock+0x60/0x70 mm/mlock.c:661 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f ------------[ cut here ]------------ kernel BUG at mm/filemap.c:3442! Oops: invalid opcode: 0000 [#1] SMP KASAN PTI CPU: 1 UID: 0 PID: 26955 Comm: syz.7.4764 Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:filemap_fault+0x117d/0x1200 mm/filemap.c:3442 Code: 38 c1 0f 8c 8e fc ff ff 4c 89 e7 e8 4d 96 2b 00 e9 81 fc ff ff e8 a3 13 c8 ff 48 89 df 48 c7 c6 e0 30 94 8b e8 84 b9 0f 00 90 <0f> 0b e8 8c 13 c8 ff 48 8b 3c 24 48 c7 c6 60 37 94 8b e8 6c b9 0f RSP: 0018:ffffc90004c2f300 EFLAGS: 00010246 RAX: 4b5d2ee6c1438d00 RBX: ffffea00025bbe00 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8d982285 RDI: 00000000ffffffff RBP: ffffc90004c2f438 R08: ffffffff8fa10af7 R09: 1ffffffff1f4215e R10: dffffc0000000000 R11: fffffbfff1f4215f R12: dffffc0000000000 R13: 1ffffd40004b77c1 R14: ffffea00025bbe18 R15: ffffea00025bbe08 FS: 00007fe4d0df66c0(0000) GS:ffff888125d50000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000200000252030 CR3: 0000000067580000 CR4: 00000000003526f0 Call Trace: __do_fault+0x138/0x390 mm/memory.c:5169 do_shared_fault mm/memory.c:5654 [inline] do_fault mm/memory.c:5728 [inline] do_pte_missing mm/memory.c:4251 [inline] handle_pte_fault mm/memory.c:6069 [inline] __handle_mm_fault+0x198b/0x5620 mm/memory.c:6212 handle_mm_fault+0x40a/0x8e0 mm/memory.c:6381 do_user_addr_fault+0x764/0x1390 arch/x86/mm/fault.c:1387 handle_page_fault arch/x86/mm/fault.c:1476 [inline] exc_page_fault+0x76/0xf0 arch/x86/mm/fault.c:1532 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0010:__put_user_nocheck_4+0x3/0x10 arch/x86/lib/putuser.S:104 Code: d9 0f 01 cb 89 01 31 c9 0f 01 ca e9 17 3b 03 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 01 cb <89> 01 31 c9 0f 01 ca c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffc90004c2f8b8 EFLAGS: 00050202 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000020000007dd30 RDX: ffff888026075a00 RSI: 0000000000000002 RDI: 00000000ffffffff RBP: ffffc90004c2fa30 R08: ffffc90004c2f667 R09: 1ffff92000985ecc R10: dffffc0000000000 R11: fffff52000985ecd R12: 0000000000000002 R13: dffffc0000000000 R14: 0000000000000000 R15: 000020000007dd00 ____sys_recvmsg+0x2ab/0x460 net/socket.c:2799 ___sys_recvmsg+0x1b5/0x510 net/socket.c:2828 do_recvmmsg+0x307/0x770 net/socket.c:2923 __sys_recvmmsg net/socket.c:2997 [inline] __do_sys_recvmmsg net/socket.c:3020 [inline] __se_sys_recvmmsg net/socket.c:3013 [inline] __x64_sys_recvmmsg+0x190/0x240 net/socket.c:3013 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fe4d2f8e929 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fe4d0df6038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: ffffffffffffffda RBX: 00007fe4d31b6080 RCX: 00007fe4d2f8e929 RDX: 0000000000010106 RSI: 00002000000000c0 RDI: 0000000000000004 RBP: 00007fe4d3010b39 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000001 R14: 00007fe4d31b6080 R15: 00007fe4d32dfa28 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:filemap_fault+0x117d/0x1200 mm/filemap.c:3442 Code: 38 c1 0f 8c 8e fc ff ff 4c 89 e7 e8 4d 96 2b 00 e9 81 fc ff ff e8 a3 13 c8 ff 48 89 df 48 c7 c6 e0 30 94 8b e8 84 b9 0f 00 90 <0f> 0b e8 8c 13 c8 ff 48 8b 3c 24 48 c7 c6 60 37 94 8b e8 6c b9 0f RSP: 0018:ffffc90004c2f300 EFLAGS: 00010246 RAX: 4b5d2ee6c1438d00 RBX: ffffea00025bbe00 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8d982285 RDI: 00000000ffffffff RBP: ffffc90004c2f438 R08: ffffffff8fa10af7 R09: 1ffffffff1f4215e R10: dffffc0000000000 R11: fffffbfff1f4215f R12: dffffc0000000000 R13: 1ffffd40004b77c1 R14: ffffea00025bbe18 R15: ffffea00025bbe08 FS: 00007fe4d0df66c0(0000) GS:ffff888125d50000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000020000020b000 CR3: 0000000067580000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: d9 0f (bad) (%rdi) 2: 01 cb add %ecx,%ebx 4: 89 01 mov %eax,(%rcx) 6: 31 c9 xor %ecx,%ecx 8: 0f 01 ca clac b: e9 17 3b 03 00 jmp 0x33b27 10: 90 nop 11: 90 nop 12: 90 nop 13: 90 nop 14: 90 nop 15: 90 nop 16: 90 nop 17: 90 nop 18: 90 nop 19: 90 nop 1a: 90 nop 1b: 90 nop 1c: 90 nop 1d: 90 nop 1e: 90 nop 1f: 90 nop 20: 90 nop 21: 90 nop 22: 90 nop 23: 90 nop 24: 90 nop 25: 90 nop 26: 90 nop 27: 0f 01 cb stac * 2a: 89 01 mov %eax,(%rcx) <-- trapping instruction 2c: 31 c9 xor %ecx,%ecx 2e: 0f 01 ca clac 31: c3 ret 32: cc int3 33: cc int3 34: cc int3 35: cc int3 36: 90 nop 37: 90 nop 38: 90 nop 39: 90 nop 3a: 90 nop 3b: 90 nop 3c: 90 nop 3d: 90 nop 3e: 90 nop 3f: 90 nop