BUG: unable to handle page fault for address: fffffffffffffff1 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 74ac067 P4D 74ac067 PUD 74ae067 PMD 0 Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 1 UID: 0 PID: 8213 Comm: syz.2.2718 Not tainted syzkaller #0 fe4377b9fb1dd84776adf13d0641004acb4d0da4 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 RIP: 0010:filemap_read_folio+0xec/0x2e0 mm/filemap.c:2475 Code: 00 00 00 00 49 81 e5 00 02 00 00 0f 85 8a 01 00 00 e8 58 2b c8 ff 4d 89 fd 4c 89 ff 4c 89 f6 4c 8b 5c 24 18 41 ba 4a 14 39 4e <45> 03 53 f1 74 02 0f 0b 2e e8 1e d6 40 1e 41 89 c7 31 ff 44 89 fe RSP: 0018:ffffc900073af920 EFLAGS: 00010283 RAX: ffffffff81bf71b8 RBX: 1ffffd4000a22970 RCX: 0000000000080000 RDX: ffffc900189eb000 RSI: ffffea0005114b80 RDI: ffff88811b8ab3c0 RBP: ffffc900073af9e0 R08: ffffea0005114b87 R09: 1ffffd4000a22970 R10: 000000004e39144a R11: 0000000000000000 R12: 1ffff92000e75f28 R13: ffff88811b8ab3c0 R14: ffffea0005114b80 R15: ffff88811b8ab3c0 FS: 00007f9cb14bf6c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffff1 CR3: 0000000120e8a000 CR4: 00000000003526b0 DR0: 000000000000a7d0 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Call Trace: do_read_cache_folio+0x2b4/0x4c0 mm/filemap.c:4054 read_cache_folio+0x54/0x90 mm/filemap.c:4086 freader_get_folio+0x471/0x700 lib/buildid.c:77 freader_fetch+0xa4/0x590 lib/buildid.c:120 __build_id_parse+0x167/0x7f0 lib/buildid.c:305 build_id_parse+0x2e/0x40 lib/buildid.c:359 do_procmap_query fs/proc/task_mmu.c:695 [inline] procfs_procmap_ioctl+0x872/0xdc0 fs/proc/task_mmu.c:774 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0x132/0x1b0 fs/ioctl.c:893 __x64_sys_ioctl+0x7f/0xa0 fs/ioctl.c:893 x64_sys_call+0x1878/0x2ee0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:47 [inline] do_syscall_64+0x57/0xf0 arch/x86/entry/common.c:78 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f9cb059aeb9 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f9cb14bf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f9cb0815fa0 RCX: 00007f9cb059aeb9 RDX: 0000200000000180 RSI: 00000000c0686611 RDI: 0000000000000004 RBP: 00007f9cb0608c1f R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f9cb0816038 R14: 00007f9cb0815fa0 R15: 00007ffc9311ad58 Modules linked in: CR2: fffffffffffffff1 ---[ end trace 0000000000000000 ]--- RIP: 0010:filemap_read_folio+0xec/0x2e0 mm/filemap.c:2475 Code: 00 00 00 00 49 81 e5 00 02 00 00 0f 85 8a 01 00 00 e8 58 2b c8 ff 4d 89 fd 4c 89 ff 4c 89 f6 4c 8b 5c 24 18 41 ba 4a 14 39 4e <45> 03 53 f1 74 02 0f 0b 2e e8 1e d6 40 1e 41 89 c7 31 ff 44 89 fe RSP: 0018:ffffc900073af920 EFLAGS: 00010283 RAX: ffffffff81bf71b8 RBX: 1ffffd4000a22970 RCX: 0000000000080000 RDX: ffffc900189eb000 RSI: ffffea0005114b80 RDI: ffff88811b8ab3c0 RBP: ffffc900073af9e0 R08: ffffea0005114b87 R09: 1ffffd4000a22970 R10: 000000004e39144a R11: 0000000000000000 R12: 1ffff92000e75f28 R13: ffff88811b8ab3c0 R14: ffffea0005114b80 R15: ffff88811b8ab3c0 FS: 00007f9cb14bf6c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffff1 CR3: 0000000120e8a000 CR4: 00000000003526b0 DR0: 000000000000a7d0 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: 00 00 add %al,(%rax) 4: 49 81 e5 00 02 00 00 and $0x200,%r13 b: 0f 85 8a 01 00 00 jne 0x19b 11: e8 58 2b c8 ff call 0xffc82b6e 16: 4d 89 fd mov %r15,%r13 19: 4c 89 ff mov %r15,%rdi 1c: 4c 89 f6 mov %r14,%rsi 1f: 4c 8b 5c 24 18 mov 0x18(%rsp),%r11 24: 41 ba 4a 14 39 4e mov $0x4e39144a,%r10d * 2a: 45 03 53 f1 add -0xf(%r11),%r10d <-- trapping instruction 2e: 74 02 je 0x32 30: 0f 0b ud2 32: 2e e8 1e d6 40 1e cs call 0x1e40d656 38: 41 89 c7 mov %eax,%r15d 3b: 31 ff xor %edi,%edi 3d: 44 89 fe mov %r15d,%esi