BUG: unable to handle page fault for address: ffffffff00000000 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0010) - not-present page PGD df3d067 P4D df3d067 PUD 0 Oops: Oops: 0010 [#1] SMP KASAN PTI CPU: 0 UID: 0 PID: 6979 Comm: syz.5.236 Not tainted 6.16.0-rc2-syzkaller-00024-g9afe652958c3 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:0xffffffff00000000 Code: Unable to access opcode bytes at 0xfffffffeffffffd6. RSP: 0018:ffffc90000007bd8 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: ffff8880693c5000 RCX: c08684cf69579d00 RDX: 0000000000000001 RSI: ffffffff8db5a486 RDI: ffff8880693c5000 RBP: ffffc90000007e30 R08: 0000000000000000 R09: ffffffff81a8b814 R10: dffffc0000000000 R11: ffffffff00000000 R12: ffffffff00000000 R13: ffffffff81a8b814 R14: 1ffff1100d278a01 R15: ffff8880693c5008 FS: 00007ffbe90446c0(0000) GS:ffff888125c85000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffeffffffd6 CR3: 00000000316b4000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: handle_softirqs+0x286/0x870 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1050 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:lock_is_held_type+0x0/0x190 kernel/locking/lockdep.c:5928 Code: ca 24 f6 90 0f 0b 90 90 90 eb b5 e8 1a fc ff ff 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 55 41 57 41 56 41 55 41 54 53 48 83 ec 10 65 48 8b 05 RSP: 0018:ffffc9001c0b7508 EFLAGS: 00000292 RAX: ffffffff81f730c8 RBX: dffffc0000000000 RCX: 0000000000000002 RDX: ffff88802a678000 RSI: 00000000ffffffff RDI: ffff888029ff10d0 RBP: ffffea00014e4040 R08: ffffea00014e4037 R09: 1ffffd400029c806 R10: dffffc0000000000 R11: fffff9400029c807 R12: 1ffff92003816ee1 R13: ffffc9001c0b7708 R14: 0000000000000001 R15: ffff888029ff10d0 lock_is_held include/linux/lockdep.h:249 [inline] xa_entry include/linux/xarray.h:1226 [inline] xas_next_entry+0x1de/0x3d0 include/linux/xarray.h:1731 next_uptodate_folio+0x32/0x5d0 mm/filemap.c:3562 filemap_map_pages+0x1025/0x1740 mm/filemap.c:3755 do_fault_around mm/memory.c:5568 [inline] do_read_fault mm/memory.c:5601 [inline] do_fault mm/memory.c:5744 [inline] do_pte_missing mm/memory.c:4251 [inline] handle_pte_fault mm/memory.c:6089 [inline] __handle_mm_fault+0x368a/0x5620 mm/memory.c:6232 handle_mm_fault+0x2d5/0x7f0 mm/memory.c:6401 faultin_page mm/gup.c:1186 [inline] __get_user_pages+0x1af4/0x30b0 mm/gup.c:1488 populate_vma_page_range+0x26b/0x340 mm/gup.c:1926 __mm_populate+0x24c/0x380 mm/gup.c:2029 mm_populate include/linux/mm.h:3348 [inline] vm_mmap_pgoff+0x3f0/0x4c0 mm/util.c:584 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7ffbe818e929 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffbe9044038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007ffbe83b6160 RCX: 00007ffbe818e929 RDX: 8cd94b934ec872d5 RSI: 0000000000b36000 RDI: 0000200000000000 RBP: 00007ffbe8210b39 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000008031 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000001 R14: 00007ffbe83b6160 R15: 00007fff4e326698 Modules linked in: CR2: ffffffff00000000 ---[ end trace 0000000000000000 ]--- RIP: 0010:0xffffffff00000000 Code: Unable to access opcode bytes at 0xfffffffeffffffd6. RSP: 0018:ffffc90000007bd8 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: ffff8880693c5000 RCX: c08684cf69579d00 RDX: 0000000000000001 RSI: ffffffff8db5a486 RDI: ffff8880693c5000 RBP: ffffc90000007e30 R08: 0000000000000000 R09: ffffffff81a8b814 R10: dffffc0000000000 R11: ffffffff00000000 R12: ffffffff00000000 R13: ffffffff81a8b814 R14: 1ffff1100d278a01 R15: ffff8880693c5008 FS: 00007ffbe90446c0(0000) GS:ffff888125c85000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffeffffffd6 CR3: 00000000316b4000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: ca 24 f6 lret $0xf624 3: 90 nop 4: 0f 0b ud2 6: 90 nop 7: 90 nop 8: 90 nop 9: eb b5 jmp 0xffffffc0 b: e8 1a fc ff ff call 0xfffffc2a 10: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1) 17: 00 00 00 1a: 90 nop 1b: 90 nop 1c: 90 nop 1d: 90 nop 1e: 90 nop 1f: 90 nop 20: 90 nop 21: 90 nop 22: 90 nop 23: 90 nop 24: 90 nop 25: 90 nop 26: 90 nop 27: 90 nop 28: 90 nop 29: 90 nop * 2a: f3 0f 1e fa endbr64 <-- trapping instruction 2e: 55 push %rbp 2f: 41 57 push %r15 31: 41 56 push %r14 33: 41 55 push %r13 35: 41 54 push %r12 37: 53 push %rbx 38: 48 83 ec 10 sub $0x10,%rsp 3c: 65 gs 3d: 48 rex.W 3e: 8b .byte 0x8b 3f: 05 .byte 0x5