================================================================== BUG: KASAN: user-memory-access in atomic_add include/asm-generic/atomic-instrumented.h:62 [inline] BUG: KASAN: user-memory-access in do_profile_hits kernel/profile.c:325 [inline] BUG: KASAN: user-memory-access in profile_hits+0x81e/0xa40 kernel/profile.c:399 Write of size 4 at addr 00000006ffffe010 by task syz-executor.0/21307 CPU: 0 PID: 21307 Comm: syz-executor.0 Not tainted 5.4.210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x18e/0x1d5 lib/dump_stack.c:118 __kasan_report+0xec/0x130 mm/kasan/report.c:520 kasan_report+0x30/0x60 mm/kasan/common.c:653 check_memory_region_inline mm/kasan/generic.c:141 [inline] check_memory_region+0x298/0x2d0 mm/kasan/generic.c:191 atomic_add include/asm-generic/atomic-instrumented.h:62 [inline] do_profile_hits kernel/profile.c:325 [inline] profile_hits+0x81e/0xa40 kernel/profile.c:399 tick_sched_handle kernel/time/tick-sched.c:172 [inline] tick_sched_timer+0x269/0x410 kernel/time/tick-sched.c:1296 __run_hrtimer+0x187/0x7c0 kernel/time/hrtimer.c:1581 __hrtimer_run_queues kernel/time/hrtimer.c:1643 [inline] hrtimer_interrupt+0x557/0x1070 kernel/time/hrtimer.c:1705 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1123 [inline] smp_apic_timer_interrupt+0x109/0x440 arch/x86/kernel/apic/apic.c:1148 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:831 RIP: 0010:__raw_spin_unlock_irq include/linux/spinlock_api_smp.h:169 [inline] RIP: 0010:_raw_spin_unlock_irq+0x45/0x60 kernel/locking/spinlock.c:199 Code: 08 00 74 0c 48 c7 c7 d0 cd aa 85 e8 a5 15 6d fd 48 83 3d 7d d8 8a 01 00 74 29 48 89 df e8 93 87 29 fd 66 90 fb bf 01 00 00 00 b6 f9 22 fd 65 8b 05 1b 98 e2 7b 85 c0 74 02 5b c3 e8 84 4c e0 RSP: 0018:ffff88819f207178 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000001 RBX: ffff8881a49ef568 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 RBP: ffff8881a49ef5c0 R08: ffffffff821d1134 R09: ffffed1033e40e2a R10: ffffed1033e40e2a R11: 1ffff11033e40e29 R12: 0000000000000cc0 R13: ffff88819f2071e8 R14: 0000000000000cc0 R15: ffffea0006661cc0 spin_unlock_irq include/linux/spinlock.h:388 [inline] __add_to_page_cache_locked+0x49b/0x820 mm/filemap.c:915 add_to_page_cache_lru+0xcf/0x260 mm/filemap.c:962 pagecache_get_page+0x539/0x760 mm/filemap.c:1701 grab_cache_page_write_begin+0x50/0x90 mm/filemap.c:3261 ext4_da_write_begin+0x52b/0xef0 fs/ext4/inode.c:3137 generic_perform_write+0x290/0x510 mm/filemap.c:3311 __generic_file_write_iter+0x239/0x490 mm/filemap.c:3440 ext4_file_write_iter+0x46e/0x1040 fs/ext4/file.c:270 call_write_iter include/linux/fs.h:1976 [inline] new_sync_write fs/read_write.c:483 [inline] __vfs_write+0x4f9/0x6a0 fs/read_write.c:496 __kernel_write+0x12c/0x340 fs/read_write.c:515 dump_emit+0x1cc/0x2d0 fs/coredump.c:838 elf_core_dump+0x39f1/0x42a0 fs/binfmt_elf.c:2352 do_coredump+0x1d70/0x2ca0 fs/coredump.c:801 get_signal+0xd5b/0x13f0 kernel/signal.c:2729 do_signal+0x41/0x10a0 arch/x86/kernel/signal.c:809 exit_to_usermode_loop+0xdd/0x1d0 arch/x86/entry/common.c:159 prepare_exit_to_usermode+0x17c/0x1d0 arch/x86/entry/common.c:194 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fcfc4a75707 Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b RSP: 002b:00007fcfc3c37e50 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 RAX: ffffffffffffffe5 RBX: 0000000000000008 RCX: 00007fcfc4a75707 RDX: 0000000000001000 RSI: 0000000020003480 RDI: 0000000000000003 RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffff00000000 R10: 0000000080000000 R11: 0000000000000293 R12: 0000000000000003 R13: 0000000020001b98 R14: 0000000000000001 R15: 00007fcfc4b0da20 ================================================================== BUG: unable to handle page fault for address: 00000006ffffe010 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 1e4832067 P4D 1e4832067 PUD 0 Oops: 0002 [#1] PREEMPT SMP KASAN CPU: 0 PID: 21307 Comm: syz-executor.0 Tainted: G B 5.4.210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 RIP: 0010:arch_atomic_add arch/x86/include/asm/atomic.h:55 [inline] RIP: 0010:atomic_add include/asm-generic/atomic-instrumented.h:63 [inline] RIP: 0010:do_profile_hits kernel/profile.c:325 [inline] RIP: 0010:profile_hits+0x821/0xa40 kernel/profile.c:399 Code: 02 00 00 48 83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 48 8b 1d 40 ac 6b 05 4a 8d 3c a3 be 04 00 00 00 e8 32 35 3c 00 8b 04 24 42 01 04 a3 48 8b 6c 24 18 31 db 48 89 ea 48 89 5c 24 28 48 8d RSP: 0018:ffff8881f6e09d38 EFLAGS: 00010046 RAX: 0000000000000001 RBX: 0000000000000010 RCX: 0000000000010003 RDX: 0000000000000001 RSI: 0000000000000046 RDI: 0000000000000001 RBP: 0000000000000001 R08: dffffc0000000000 R09: fffffbfff0d7370d R10: fffffbfff0d7370d R11: 1ffffffff0d7370c R12: 00000001bffff800 R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 FS: 00007fcfc3c38700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000006ffffe010 CR3: 00000001eb533000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: tick_sched_handle kernel/time/tick-sched.c:172 [inline] tick_sched_timer+0x269/0x410 kernel/time/tick-sched.c:1296 __run_hrtimer+0x187/0x7c0 kernel/time/hrtimer.c:1581 __hrtimer_run_queues kernel/time/hrtimer.c:1643 [inline] hrtimer_interrupt+0x557/0x1070 kernel/time/hrtimer.c:1705 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1123 [inline] smp_apic_timer_interrupt+0x109/0x440 arch/x86/kernel/apic/apic.c:1148 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:831 RIP: 0010:__raw_spin_unlock_irq include/linux/spinlock_api_smp.h:169 [inline] RIP: 0010:_raw_spin_unlock_irq+0x45/0x60 kernel/locking/spinlock.c:199 Code: 08 00 74 0c 48 c7 c7 d0 cd aa 85 e8 a5 15 6d fd 48 83 3d 7d d8 8a 01 00 74 29 48 89 df e8 93 87 29 fd 66 90 fb bf 01 00 00 00 b6 f9 22 fd 65 8b 05 1b 98 e2 7b 85 c0 74 02 5b c3 e8 84 4c e0 RSP: 0018:ffff88819f207178 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000001 RBX: ffff8881a49ef568 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 RBP: ffff8881a49ef5c0 R08: ffffffff821d1134 R09: ffffed1033e40e2a R10: ffffed1033e40e2a R11: 1ffff11033e40e29 R12: 0000000000000cc0 R13: ffff88819f2071e8 R14: 0000000000000cc0 R15: ffffea0006661cc0 spin_unlock_irq include/linux/spinlock.h:388 [inline] __add_to_page_cache_locked+0x49b/0x820 mm/filemap.c:915 add_to_page_cache_lru+0xcf/0x260 mm/filemap.c:962 pagecache_get_page+0x539/0x760 mm/filemap.c:1701 grab_cache_page_write_begin+0x50/0x90 mm/filemap.c:3261 ext4_da_write_begin+0x52b/0xef0 fs/ext4/inode.c:3137 generic_perform_write+0x290/0x510 mm/filemap.c:3311 __generic_file_write_iter+0x239/0x490 mm/filemap.c:3440 ext4_file_write_iter+0x46e/0x1040 fs/ext4/file.c:270 call_write_iter include/linux/fs.h:1976 [inline] new_sync_write fs/read_write.c:483 [inline] __vfs_write+0x4f9/0x6a0 fs/read_write.c:496 __kernel_write+0x12c/0x340 fs/read_write.c:515 dump_emit+0x1cc/0x2d0 fs/coredump.c:838 elf_core_dump+0x39f1/0x42a0 fs/binfmt_elf.c:2352 do_coredump+0x1d70/0x2ca0 fs/coredump.c:801 get_signal+0xd5b/0x13f0 kernel/signal.c:2729 do_signal+0x41/0x10a0 arch/x86/kernel/signal.c:809 exit_to_usermode_loop+0xdd/0x1d0 arch/x86/entry/common.c:159 prepare_exit_to_usermode+0x17c/0x1d0 arch/x86/entry/common.c:194 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fcfc4a75707 Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b RSP: 002b:00007fcfc3c37e50 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 RAX: ffffffffffffffe5 RBX: 0000000000000008 RCX: 00007fcfc4a75707 RDX: 0000000000001000 RSI: 0000000020003480 RDI: 0000000000000003 RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffff00000000 R10: 0000000080000000 R11: 0000000000000293 R12: 0000000000000003 R13: 0000000020001b98 R14: 0000000000000001 R15: 00007fcfc4b0da20 Modules linked in: CR2: 00000006ffffe010 ---[ end trace be3e937e133e8f09 ]--- RIP: 0010:arch_atomic_add arch/x86/include/asm/atomic.h:55 [inline] RIP: 0010:atomic_add include/asm-generic/atomic-instrumented.h:63 [inline] RIP: 0010:do_profile_hits kernel/profile.c:325 [inline] RIP: 0010:profile_hits+0x821/0xa40 kernel/profile.c:399 Code: 02 00 00 48 83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 48 8b 1d 40 ac 6b 05 4a 8d 3c a3 be 04 00 00 00 e8 32 35 3c 00 8b 04 24 42 01 04 a3 48 8b 6c 24 18 31 db 48 89 ea 48 89 5c 24 28 48 8d RSP: 0018:ffff8881f6e09d38 EFLAGS: 00010046 RAX: 0000000000000001 RBX: 0000000000000010 RCX: 0000000000010003 RDX: 0000000000000001 RSI: 0000000000000046 RDI: 0000000000000001 RBP: 0000000000000001 R08: dffffc0000000000 R09: fffffbfff0d7370d R10: fffffbfff0d7370d R11: 1ffffffff0d7370c R12: 00000001bffff800 R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 FS: 00007fcfc3c38700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000006ffffe010 CR3: 00000001eb533000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 08 00 or %al,(%rax) 2: 74 0c je 0x10 4: 48 c7 c7 d0 cd aa 85 mov $0xffffffff85aacdd0,%rdi b: e8 a5 15 6d fd callq 0xfd6d15b5 10: 48 83 3d 7d d8 8a 01 cmpq $0x0,0x18ad87d(%rip) # 0x18ad895 17: 00 18: 74 29 je 0x43 1a: 48 89 df mov %rbx,%rdi 1d: e8 93 87 29 fd callq 0xfd2987b5 22: 66 90 xchg %ax,%ax 24: fb sti 25: bf 01 00 00 00 mov $0x1,%edi * 2a: e8 b6 f9 22 fd callq 0xfd22f9e5 <-- trapping instruction 2f: 65 8b 05 1b 98 e2 7b mov %gs:0x7be2981b(%rip),%eax # 0x7be29851 36: 85 c0 test %eax,%eax 38: 74 02 je 0x3c 3a: 5b pop %rbx 3b: c3 retq 3c: e8 .byte 0xe8 3d: 84 .byte 0x84 3e: 4c rex.WR 3f: e0 .byte 0xe0