populate_vma_page_range+0x29f/0x3a0 mm/gup.c:1860 __mm_populate+0x24c/0x380 mm/gup.c:1963 mm_populate include/linux/mm.h:3701 [inline] vm_mmap_pgoff+0x387/0x4d0 mm/util.c:586 ksys_mmap_pgoff+0x51f/0x760 mm/mmap.c:604 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xec/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f ------------[ cut here ]------------ kernel BUG at mm/filemap.c:3579! Oops: invalid opcode: 0000 [#1] SMP KASAN PTI CPU: 1 UID: 0 PID: 6796 Comm: syz.3.32 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:filemap_fault+0x1215/0x1290 mm/filemap.c:3579 Code: 38 c1 0f 8c 8e fc ff ff 4c 89 e7 e8 85 ef 2c 00 e9 81 fc ff ff e8 3b cf c6 ff 48 89 df 48 c7 c6 40 aa 74 8b e8 dc df 2d ff 90 <0f> 0b e8 24 cf c6 ff 48 8b 3c 24 48 c7 c6 c0 b0 74 8b e8 c4 df 2d RSP: 0018:ffffc9000430f280 EFLAGS: 00010246 RAX: 915d0693906c6900 RBX: ffffea00008fa000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8d792008 RDI: 00000000ffffffff RBP: ffffc9000430f3b8 R08: ffffffff8f822177 R09: 1ffffffff1f0442e R10: dffffc0000000000 R11: fffffbfff1f0442f R12: dffffc0000000000 R13: 1ffffd400011f401 R14: ffffea00008fa018 R15: ffffea00008fa008 FS: 00007efe3c9fe6c0(0000) GS:ffff888125f1f000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055eeb8aac950 CR3: 0000000075ce8000 CR4: 00000000003526f0 Call Trace: __do_fault+0x138/0x390 mm/memory.c:5320 do_shared_fault mm/memory.c:5819 [inline] do_fault mm/memory.c:5893 [inline] do_pte_missing+0x6ad/0x3330 mm/memory.c:4401 handle_pte_fault mm/memory.c:6273 [inline] __handle_mm_fault mm/memory.c:6411 [inline] handle_mm_fault+0x1b26/0x32b0 mm/memory.c:6580 do_user_addr_fault+0x764/0x1380 arch/x86/mm/fault.c:1387 handle_page_fault arch/x86/mm/fault.c:1476 [inline] exc_page_fault+0x71/0xd0 arch/x86/mm/fault.c:1532 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 RIP: 0010:__put_user_nocheck_4+0x3/0x10 arch/x86/lib/putuser.S:104 Code: d9 0f 01 cb 89 01 31 c9 0f 01 ca e9 d7 6d 03 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 01 cb <89> 01 31 c9 0f 01 ca c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffc9000430f8b8 EFLAGS: 00050202 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000020000005b830 RDX: ffff88807b9a8000 RSI: 0000000000000002 RDI: 00000000ffffffff RBP: ffffc9000430fa30 R08: ffffc9000430f667 R09: 1ffff92000861ecc R10: dffffc0000000000 R11: fffff52000861ecd R12: 0000000000000002 R13: dffffc0000000000 R14: 0000000000000000 R15: 000020000005b800 ____sys_recvmsg+0x2ab/0x460 net/socket.c:2825 ___sys_recvmsg+0x1b5/0x510 net/socket.c:2854 do_recvmmsg+0x307/0x770 net/socket.c:2949 __sys_recvmmsg net/socket.c:3023 [inline] __do_sys_recvmmsg net/socket.c:3046 [inline] __se_sys_recvmmsg net/socket.c:3039 [inline] __x64_sys_recvmmsg+0x190/0x240 net/socket.c:3039 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xec/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7efe3d38f749 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007efe3c9fe038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: ffffffffffffffda RBX: 00007efe3d5e6090 RCX: 00007efe3d38f749 RDX: 0000000000010106 RSI: 00002000000000c0 RDI: 0000000000000003 RBP: 00007efe3d413f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000 R13: 00007efe3d5e6128 R14: 00007efe3d5e6090 R15: 00007fff705bf2e8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:filemap_fault+0x1215/0x1290 mm/filemap.c:3579 Code: 38 c1 0f 8c 8e fc ff ff 4c 89 e7 e8 85 ef 2c 00 e9 81 fc ff ff e8 3b cf c6 ff 48 89 df 48 c7 c6 40 aa 74 8b e8 dc df 2d ff 90 <0f> 0b e8 24 cf c6 ff 48 8b 3c 24 48 c7 c6 c0 b0 74 8b e8 c4 df 2d RSP: 0018:ffffc9000430f280 EFLAGS: 00010246 RAX: 915d0693906c6900 RBX: ffffea00008fa000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8d792008 RDI: 00000000ffffffff RBP: ffffc9000430f3b8 R08: ffffffff8f822177 R09: 1ffffffff1f0442e R10: dffffc0000000000 R11: fffffbfff1f0442f R12: dffffc0000000000 R13: 1ffffd400011f401 R14: ffffea00008fa018 R15: ffffea00008fa008 FS: 00007efe3c9fe6c0(0000) GS:ffff888125e1f000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00002000000e2030 CR3: 0000000075ce8000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: d9 0f (bad) (%rdi) 2: 01 cb add %ecx,%ebx 4: 89 01 mov %eax,(%rcx) 6: 31 c9 xor %ecx,%ecx 8: 0f 01 ca clac b: e9 d7 6d 03 00 jmp 0x36de7 10: 90 nop 11: 90 nop 12: 90 nop 13: 90 nop 14: 90 nop 15: 90 nop 16: 90 nop 17: 90 nop 18: 90 nop 19: 90 nop 1a: 90 nop 1b: 90 nop 1c: 90 nop 1d: 90 nop 1e: 90 nop 1f: 90 nop 20: 90 nop 21: 90 nop 22: 90 nop 23: 90 nop 24: 90 nop 25: 90 nop 26: 90 nop 27: 0f 01 cb stac * 2a: 89 01 mov %eax,(%rcx) <-- trapping instruction 2c: 31 c9 xor %ecx,%ecx 2e: 0f 01 ca clac 31: c3 ret 32: cc int3 33: cc int3 34: cc int3 35: cc int3 36: 90 nop 37: 90 nop 38: 90 nop 39: 90 nop 3a: 90 nop 3b: 90 nop 3c: 90 nop 3d: 90 nop 3e: 90 nop 3f: 90 nop