BUG: unable to handle page fault for address: fffffffffffffffc #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD b68f067 P4D b68f067 PUD b691067 PMD 0 Oops: 0002 [#1] PREEMPT SMP KASAN CPU: 0 PID: 12065 Comm: syz-executor.3 Not tainted 5.14.0-rc5-next-20210812-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__list_add include/linux/list.h:71 [inline] RIP: 0010:list_add include/linux/list.h:86 [inline] RIP: 0010:alloc_huge_page+0xdcb/0x11b0 mm/hugetlb.c:2821 Code: 00 0f 85 6b 03 00 00 48 89 ce 48 89 4a 08 48 b8 00 00 00 00 00 fc ff df 48 c1 ee 03 80 3c 06 00 0f 85 2b 03 00 00 49 8d 7e 10 <49> 89 56 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 RSP: 0018:ffffc9000453f6e0 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: fffffffffffffffc RDX: ffffea0005220008 RSI: 1fffffffffffffff RDI: 0000000000000004 RBP: ffff88806f5a1738 R08: 0000000000000001 R09: 0000000000000001 R10: ffffffff81b71481 R11: 0000000000000000 R12: ffffffff9024fab0 R13: 0000000000000001 R14: fffffffffffffff4 R15: ffffffff9024fb88 FS: 00007fc3e96ab700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffffc CR3: 0000000072b92000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: hugetlb_no_page mm/hugetlb.c:4905 [inline] hugetlb_fault+0xf44/0x2500 mm/hugetlb.c:5112 handle_mm_fault+0x661/0x790 mm/memory.c:4791 do_user_addr_fault+0x48b/0x11c0 arch/x86/mm/fault.c:1390 handle_page_fault arch/x86/mm/fault.c:1475 [inline] exc_page_fault+0x9e/0x180 arch/x86/mm/fault.c:1531 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:568 RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 arch/x86/lib/copy_user_64.S:206 Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 RSP: 0018:ffffc9000453fa48 EFLAGS: 00010202 RAX: 0000000000000001 RBX: 00000000000000d8 RCX: 00000000000000d8 RDX: 00000000000000d8 RSI: 00000000208f9f09 RDI: ffff88807fc17f28 RBP: ffff88807fc17f28 R08: 0000000000000001 R09: ffff88807fc17fff R10: ffffed100ff82fff R11: 0000000000000000 R12: 00000000208f9f09 R13: 00000000208f9fe1 R14: 0000000000000000 R15: 0000000000000000 copy_user_generic arch/x86/include/asm/uaccess_64.h:37 [inline] raw_copy_from_user arch/x86/include/asm/uaccess_64.h:52 [inline] copyin.part.0+0xe4/0x110 lib/iov_iter.c:168 copyin lib/iov_iter.c:275 [inline] copy_page_from_iter_iovec lib/iov_iter.c:312 [inline] copy_page_from_iter+0x389/0x7c0 lib/iov_iter.c:855 process_vm_rw_pages mm/process_vm_access.c:43 [inline] process_vm_rw_single_vec mm/process_vm_access.c:117 [inline] process_vm_rw_core.constprop.0+0x4d9/0x990 mm/process_vm_access.c:215 process_vm_rw+0x29c/0x300 mm/process_vm_access.c:283 __do_sys_process_vm_writev mm/process_vm_access.c:303 [inline] __se_sys_process_vm_writev mm/process_vm_access.c:298 [inline] __x64_sys_process_vm_writev+0xdf/0x1b0 mm/process_vm_access.c:298 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x4665e9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fc3e96ab188 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 RDX: 0000000000000036 RSI: 0000000020000000 RDI: 0000000000000187 RBP: 00000000004bfcc4 R08: 0000000000000077 R09: 0000000000000000 R10: 0000000020121000 R11: 0000000000000246 R12: 000000000056bf80 R13: 00007fffe3e2a9cf R14: 00007fc3e96ab300 R15: 0000000000022000 Modules linked in: CR2: fffffffffffffffc ---[ end trace 53cab6e712513a4b ]--- RIP: 0010:__list_add include/linux/list.h:71 [inline] RIP: 0010:list_add include/linux/list.h:86 [inline] RIP: 0010:alloc_huge_page+0xdcb/0x11b0 mm/hugetlb.c:2821 Code: 00 0f 85 6b 03 00 00 48 89 ce 48 89 4a 08 48 b8 00 00 00 00 00 fc ff df 48 c1 ee 03 80 3c 06 00 0f 85 2b 03 00 00 49 8d 7e 10 <49> 89 56 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 RSP: 0018:ffffc9000453f6e0 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: fffffffffffffffc RDX: ffffea0005220008 RSI: 1fffffffffffffff RDI: 0000000000000004 RBP: ffff88806f5a1738 R08: 0000000000000001 R09: 0000000000000001 R10: ffffffff81b71481 R11: 0000000000000000 R12: ffffffff9024fab0 R13: 0000000000000001 R14: fffffffffffffff4 R15: ffffffff9024fb88 FS: 00007fc3e96ab700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffffc CR3: 0000000072b92000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 0f add %cl,(%rdi) 2: 85 6b 03 test %ebp,0x3(%rbx) 5: 00 00 add %al,(%rax) 7: 48 89 ce mov %rcx,%rsi a: 48 89 4a 08 mov %rcx,0x8(%rdx) e: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 15: fc ff df 18: 48 c1 ee 03 shr $0x3,%rsi 1c: 80 3c 06 00 cmpb $0x0,(%rsi,%rax,1) 20: 0f 85 2b 03 00 00 jne 0x351 26: 49 8d 7e 10 lea 0x10(%r14),%rdi 2a: 49 89 56 08 mov %rdx,0x8(%r14) <-- trapping instruction 2e: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 35: fc ff df 38: 48 89 fa mov %rdi,%rdx 3b: 48 c1 ea 03 shr $0x3,%rdx 3f: 80 .byte 0x80