BUG: unable to handle page fault for address: ffff88802ebb7000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 14a01067 P4D 14a01067 PUD 14a02067 PMD 1e201063 PTE 800fffffd1448060 Oops: 0002 [#1] PREEMPT SMP KASAN PTI CPU: 0 PID: 7963 Comm: syz-executor.0 Not tainted 6.8.0-rc2-syzkaller-00055-g6764c317b6bb #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 RIP: 0010:clear_page_erms+0xb/0x20 arch/x86/lib/clear_page_64.S:50 Code: 48 8d 7f 40 75 d9 90 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa b9 00 10 00 00 31 c0 aa c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 90 RSP: 0018:ffffc9000541f4b0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000001000 RDX: ffffea0000baedc0 RSI: ffff888000000000 RDI: ffff88802ebb7000 RBP: ffffea0000baedc0 R08: 0000160000000000 R09: 0000000000000000 R10: ffffed1005d76e00 R11: dffffc0000000000 R12: 0000000000000000 R13: ffffea0000baee00 R14: 0000000000000001 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9400000(0063) knlGS:00000000f5e3cb40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: ffff88802ebb7000 CR3: 000000007ee5e000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: clear_page arch/x86/include/asm/page_64.h:53 [inline] clear_highpage_kasan_tagged include/linux/highmem.h:248 [inline] kernel_init_pages mm/page_alloc.c:1079 [inline] post_alloc_hook+0x1a3/0x350 mm/page_alloc.c:1531 prep_new_page mm/page_alloc.c:1540 [inline] get_page_from_freelist+0xa28/0x3780 mm/page_alloc.c:3311 __alloc_pages+0x22f/0x2440 mm/page_alloc.c:4567 alloc_pages_mpol+0x258/0x600 mm/mempolicy.c:2133 af_alg_sendmsg+0x112a/0x2c20 crypto/af_alg.c:1068 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] ____sys_sendmsg+0xab5/0xc90 net/socket.c:2584 ___sys_sendmsg+0x135/0x1e0 net/socket.c:2638 __sys_sendmsg+0x117/0x1f0 net/socket.c:2667 do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline] __do_fast_syscall_32+0x7c/0x120 arch/x86/entry/common.c:321 do_fast_syscall_32+0x33/0x80 arch/x86/entry/common.c:346 entry_SYSENTER_compat_after_hwframe+0x7c/0x86 RIP: 0023:0xf7263579 Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 RSP: 002b:00000000f5e3c5ac EFLAGS: 00000206 ORIG_RAX: 0000000000000172 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000800 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Modules linked in: CR2: ffff88802ebb7000 ---[ end trace 0000000000000000 ]--- RIP: 0010:clear_page_erms+0xb/0x20 arch/x86/lib/clear_page_64.S:50 Code: 48 8d 7f 40 75 d9 90 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa b9 00 10 00 00 31 c0 aa c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 90 RSP: 0018:ffffc9000541f4b0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000001000 RDX: ffffea0000baedc0 RSI: ffff888000000000 RDI: ffff88802ebb7000 RBP: ffffea0000baedc0 R08: 0000160000000000 R09: 0000000000000000 R10: ffffed1005d76e00 R11: dffffc0000000000 R12: 0000000000000000 R13: ffffea0000baee00 R14: 0000000000000001 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9400000(0063) knlGS:00000000f5e3cb40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: ffff88802ebb7000 CR3: 000000007ee5e000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 48 8d 7f 40 lea 0x40(%rdi),%rdi 4: 75 d9 jne 0xffffffdf 6: 90 nop 7: c3 ret 8: cc int3 9: cc int3 a: cc int3 b: cc int3 c: 0f 1f 00 nopl (%rax) f: 90 nop 10: 90 nop 11: 90 nop 12: 90 nop 13: 90 nop 14: 90 nop 15: 90 nop 16: 90 nop 17: 90 nop 18: 90 nop 19: 90 nop 1a: 90 nop 1b: 90 nop 1c: 90 nop 1d: 90 nop 1e: 90 nop 1f: f3 0f 1e fa endbr64 23: b9 00 10 00 00 mov $0x1000,%ecx 28: 31 c0 xor %eax,%eax * 2a: f3 aa rep stos %al,%es:(%rdi) <-- trapping instruction 2c: c3 ret 2d: cc int3 2e: cc int3 2f: cc int3 30: cc int3 31: 66 66 2e 0f 1f 84 00 data16 cs nopw 0x0(%rax,%rax,1) 38: 00 00 00 00 3c: 0f 1f 00 nopl (%rax) 3f: 90 nop