BUG: unable to handle page fault for address: fffffffffffffff1 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 6cac067 P4D 6cac067 PUD 6cae067 PMD 0 Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 626 Comm: syz.2.71 Not tainted 6.12.30-syzkaller #0 8a4a04dac53c2c359aaac6bb226bc87d07f226b0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:filemap_read_folio+0xda/0x2b0 mm/filemap.c:2379 Code: 44 24 40 00 00 00 00 48 81 e3 00 02 00 00 0f 85 86 01 00 00 e8 f7 55 ca ff 48 8b 7c 24 18 4c 89 f6 4d 89 fb 41 ba 46 e4 52 61 <45> 03 53 f1 74 02 0f 0b 41 ff d3 0f 1f 00 41 89 c7 31 ff 44 89 fe RSP: 0018:ffffc900035a7920 EFLAGS: 00010293 RAX: ffffffff81ad0819 RBX: 0000000000000000 RCX: ffff88810c7eb3c0 RDX: 0000000000000000 RSI: ffffea0004bdb640 RDI: ffff88811d92d300 RBP: ffffc900035a79e0 R08: ffffea0004bdb647 R09: 1ffffd400097b6c8 R10: 000000006152e446 R11: 0000000000000000 R12: 1ffff920006b4f28 R13: 1ffffd400097b6c8 R14: ffffea0004bdb640 R15: 0000000000000000 FS: 00007fad7d9de6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffff1 CR3: 000000010c3b0000 CR4: 00000000003526b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: do_read_cache_folio+0x2eb/0x440 mm/filemap.c:3837 read_cache_folio+0x54/0x90 mm/filemap.c:3869 freader_get_folio+0x45d/0x6b0 lib/buildid.c:77 freader_fetch+0xa4/0x590 lib/buildid.c:120 __build_id_parse+0x134/0x760 lib/buildid.c:305 build_id_parse+0x2e/0x40 lib/buildid.c:359 do_procmap_query fs/proc/task_mmu.c:534 [inline] procfs_procmap_ioctl+0x7fa/0xce0 fs/proc/task_mmu.c:613 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0x135/0x1b0 fs/ioctl.c:893 __x64_sys_ioctl+0x7f/0xa0 fs/ioctl.c:893 x64_sys_call+0x1878/0x2ee0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x58/0xf0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7fad7df8e929 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fad7d9de038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fad7e1b6080 RCX: 00007fad7df8e929 RDX: 0000200000000180 RSI: 00000000c0686611 RDI: 0000000000000003 RBP: 00007fad7e010b39 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fad7e1b6080 R15: 00007ffd49500b18 Modules linked in: CR2: fffffffffffffff1 ---[ end trace 0000000000000000 ]--- RIP: 0010:filemap_read_folio+0xda/0x2b0 mm/filemap.c:2379 Code: 44 24 40 00 00 00 00 48 81 e3 00 02 00 00 0f 85 86 01 00 00 e8 f7 55 ca ff 48 8b 7c 24 18 4c 89 f6 4d 89 fb 41 ba 46 e4 52 61 <45> 03 53 f1 74 02 0f 0b 41 ff d3 0f 1f 00 41 89 c7 31 ff 44 89 fe RSP: 0018:ffffc900035a7920 EFLAGS: 00010293 RAX: ffffffff81ad0819 RBX: 0000000000000000 RCX: ffff88810c7eb3c0 RDX: 0000000000000000 RSI: ffffea0004bdb640 RDI: ffff88811d92d300 RBP: ffffc900035a79e0 R08: ffffea0004bdb647 R09: 1ffffd400097b6c8 R10: 000000006152e446 R11: 0000000000000000 R12: 1ffff920006b4f28 R13: 1ffffd400097b6c8 R14: ffffea0004bdb640 R15: 0000000000000000 FS: 00007fad7d9de6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffff1 CR3: 000000010c3b0000 CR4: 00000000003526b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 44 24 40 rex.R and $0x40,%al 3: 00 00 add %al,(%rax) 5: 00 00 add %al,(%rax) 7: 48 81 e3 00 02 00 00 and $0x200,%rbx e: 0f 85 86 01 00 00 jne 0x19a 14: e8 f7 55 ca ff call 0xffca5610 19: 48 8b 7c 24 18 mov 0x18(%rsp),%rdi 1e: 4c 89 f6 mov %r14,%rsi 21: 4d 89 fb mov %r15,%r11 24: 41 ba 46 e4 52 61 mov $0x6152e446,%r10d * 2a: 45 03 53 f1 add -0xf(%r11),%r10d <-- trapping instruction 2e: 74 02 je 0x32 30: 0f 0b ud2 32: 41 ff d3 call *%r11 35: 0f 1f 00 nopl (%rax) 38: 41 89 c7 mov %eax,%r15d 3b: 31 ff xor %edi,%edi 3d: 44 89 fe mov %r15d,%esi