BUG: unable to handle page fault for address: ffff888042a24000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 12801067 P4D 12801067 PUD 41e19063 PMD 739a0063 PTE 800fffffbd5db060 Oops: 0002 [#1] PREEMPT SMP KASAN CPU: 1 PID: 11457 Comm: syz-executor.0 Not tainted 6.6.0-rc6-syzkaller-00043-gdd72f9c7e512 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 RIP: 0010:clear_page_erms+0xb/0x10 arch/x86/lib/clear_page_64.S:50 Code: 48 89 47 20 48 89 47 28 48 89 47 30 48 89 47 38 48 8d 7f 40 75 d9 90 c3 0f 1f 80 00 00 00 00 f3 0f 1e fa b9 00 10 00 00 31 c0 aa c3 66 90 f3 0f 1e fa 48 83 f9 40 73 36 83 f9 08 73 0f 85 c9 RSP: 0018:ffffc90014ec7380 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000001000 RDX: ffffea00010a8900 RSI: ffff888000000000 RDI: ffff888042a24000 RBP: ffffea00010a8900 R08: 0000160000000000 R09: 0000000000000000 R10: ffffed1008544800 R11: dffffc0000000000 R12: 0000000000000000 R13: ffffea00010a8940 R14: 0000000000000001 R15: 0000000000000000 FS: 0000555555e39480(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff888042a24000 CR3: 00000000278a6000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: clear_page arch/x86/include/asm/page_64.h:53 [inline] clear_highpage_kasan_tagged include/linux/highmem.h:248 [inline] kernel_init_pages mm/page_alloc.c:1071 [inline] post_alloc_hook+0x1a3/0x340 mm/page_alloc.c:1534 prep_new_page mm/page_alloc.c:1543 [inline] get_page_from_freelist+0xee0/0x2f20 mm/page_alloc.c:3170 __alloc_pages+0x1d0/0x4a0 mm/page_alloc.c:4426 alloc_pages+0x1a9/0x270 mm/mempolicy.c:2297 __get_free_pages+0xc/0x40 mm/page_alloc.c:4477 kasan_populate_vmalloc_pte+0x29/0x160 mm/kasan/shadow.c:323 apply_to_pte_range mm/memory.c:2586 [inline] apply_to_pmd_range mm/memory.c:2630 [inline] apply_to_pud_range mm/memory.c:2666 [inline] apply_to_p4d_range mm/memory.c:2702 [inline] __apply_to_page_range+0x5ed/0xdb0 mm/memory.c:2736 alloc_vmap_area+0x85f/0x2060 mm/vmalloc.c:1641 __get_vm_area_node+0x132/0x3d0 mm/vmalloc.c:2595 __vmalloc_node_range+0x27a/0x1540 mm/vmalloc.c:3280 alloc_thread_stack_node kernel/fork.c:309 [inline] dup_task_struct kernel/fork.c:1118 [inline] copy_process+0x13e3/0x73f0 kernel/fork.c:2327 kernel_clone+0xfd/0x920 kernel/fork.c:2909 __do_sys_clone3+0x1f1/0x260 kernel/fork.c:3210 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7efcdf4a88d9 Code: ff ff eb d2 e8 f8 62 fd ff 0f 1f 84 00 00 00 00 00 b8 ea ff ff ff 48 85 ff 74 2c 48 85 d2 74 27 49 89 c8 b8 b3 01 00 00 0f 05 <48> 85 c0 7c 18 74 01 c3 31 ed 48 83 e4 f0 4c 89 c7 ff d2 48 89 c7 RSP: 002b:00007efcdf6bf918 EFLAGS: 00000202 ORIG_RAX: 00000000000001b3 RAX: ffffffffffffffda RBX: 00007efcdf450fb0 RCX: 00007efcdf4a88d9 RDX: 00007efcdf450fb0 RSI: 0000000000000058 RDI: 00007efcdf6bf960 RBP: 00007efce01036c0 R08: 00007efce01036c0 R09: 00007efcdf6bfa47 R10: 0000000000000008 R11: 0000000000000202 R12: ffffffffffffffb0 R13: 000000000000006e R14: 00007efcdf6bf960 R15: 00007efcdf6bfa48 Modules linked in: CR2: ffff888042a24000 ---[ end trace 0000000000000000 ]--- RIP: 0010:clear_page_erms+0xb/0x10 arch/x86/lib/clear_page_64.S:50 Code: 48 89 47 20 48 89 47 28 48 89 47 30 48 89 47 38 48 8d 7f 40 75 d9 90 c3 0f 1f 80 00 00 00 00 f3 0f 1e fa b9 00 10 00 00 31 c0 aa c3 66 90 f3 0f 1e fa 48 83 f9 40 73 36 83 f9 08 73 0f 85 c9 RSP: 0018:ffffc90014ec7380 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000001000 RDX: ffffea00010a8900 RSI: ffff888000000000 RDI: ffff888042a24000 RBP: ffffea00010a8900 R08: 0000160000000000 R09: 0000000000000000 R10: ffffed1008544800 R11: dffffc0000000000 R12: 0000000000000000 R13: ffffea00010a8940 R14: 0000000000000001 R15: 0000000000000000 FS: 0000555555e39480(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff888042a24000 CR3: 00000000278a6000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 48 89 47 20 mov %rax,0x20(%rdi) 4: 48 89 47 28 mov %rax,0x28(%rdi) 8: 48 89 47 30 mov %rax,0x30(%rdi) c: 48 89 47 38 mov %rax,0x38(%rdi) 10: 48 8d 7f 40 lea 0x40(%rdi),%rdi 14: 75 d9 jne 0xffffffef 16: 90 nop 17: c3 ret 18: 0f 1f 80 00 00 00 00 nopl 0x0(%rax) 1f: f3 0f 1e fa endbr64 23: b9 00 10 00 00 mov $0x1000,%ecx 28: 31 c0 xor %eax,%eax * 2a: f3 aa rep stos %al,%es:(%rdi) <-- trapping instruction 2c: c3 ret 2d: 66 90 xchg %ax,%ax 2f: f3 0f 1e fa endbr64 33: 48 83 f9 40 cmp $0x40,%rcx 37: 73 36 jae 0x6f 39: 83 f9 08 cmp $0x8,%ecx 3c: 73 0f jae 0x4d 3e: 85 c9 test %ecx,%ecx