BUG: unable to handle page fault for address: fffffffffffffffc #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD b68f067 P4D b68f067 PUD b691067 PMD 0 Oops: 0002 [#1] PREEMPT SMP KASAN CPU: 1 PID: 4240 Comm: syz-executor.0 Not tainted 5.14.0-rc5-next-20210812-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__list_add include/linux/list.h:71 [inline] RIP: 0010:list_add include/linux/list.h:86 [inline] RIP: 0010:alloc_huge_page+0xdcb/0x11b0 mm/hugetlb.c:2821 Code: 00 0f 85 6b 03 00 00 48 89 ce 48 89 4a 08 48 b8 00 00 00 00 00 fc ff df 48 c1 ee 03 80 3c 06 00 0f 85 2b 03 00 00 49 8d 7e 10 <49> 89 56 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 RSP: 0000:ffffc9000aa07ca0 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: fffffffffffffffc RDX: ffffea0002890008 RSI: 1fffffffffffffff RDI: 0000000000000004 RBP: ffff8880acb4b420 R08: 0000000000000001 R09: 0000000000000001 R10: ffffffff81b71481 R11: 0000000000000000 R12: ffffffff9024fab0 R13: 0000000000000001 R14: fffffffffffffff4 R15: ffffffff9024fb88 FS: 0000000001832400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffffc CR3: 00000000abe2e000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: hugetlb_no_page mm/hugetlb.c:4905 [inline] hugetlb_fault+0xf44/0x2500 mm/hugetlb.c:5112 handle_mm_fault+0x661/0x790 mm/memory.c:4791 do_user_addr_fault+0x48b/0x11c0 arch/x86/mm/fault.c:1390 handle_page_fault arch/x86/mm/fault.c:1475 [inline] exc_page_fault+0x9e/0x180 arch/x86/mm/fault.c:1531 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:568 RIP: 0033:0x407bea Code: 30 48 8b 34 24 48 85 f6 74 17 8b 44 24 18 0f c8 89 c0 48 89 44 24 18 48 83 fe 01 0f 85 a1 01 00 00 48 8b 44 24 10 8b 74 24 18 <89> 30 e9 d2 fc ff ff 48 8b 44 24 10 8b 10 48 8b 04 24 48 85 c0 0f RSP: 002b:00007ffc28d940a0 EFLAGS: 00010246 RAX: 00000000200002c0 RBX: 0000000000970000 RCX: 0000000000000000 RDX: fcc685eb749636d8 RSI: 00000000000000e4 RDI: 00000000018322f0 RBP: 00007ffc28d94198 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000004 R11: 00000000280f625c R12: 00000000001820b3 R13: 00000000000003e8 R14: 000000000056bf80 R15: 000000000018209c Modules linked in: CR2: fffffffffffffffc ---[ end trace 8febd7053c36b86b ]--- RIP: 0010:__list_add include/linux/list.h:71 [inline] RIP: 0010:list_add include/linux/list.h:86 [inline] RIP: 0010:alloc_huge_page+0xdcb/0x11b0 mm/hugetlb.c:2821 Code: 00 0f 85 6b 03 00 00 48 89 ce 48 89 4a 08 48 b8 00 00 00 00 00 fc ff df 48 c1 ee 03 80 3c 06 00 0f 85 2b 03 00 00 49 8d 7e 10 <49> 89 56 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 RSP: 0000:ffffc9000aa07ca0 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: fffffffffffffffc RDX: ffffea0002890008 RSI: 1fffffffffffffff RDI: 0000000000000004 RBP: ffff8880acb4b420 R08: 0000000000000001 R09: 0000000000000001 R10: ffffffff81b71481 R11: 0000000000000000 R12: ffffffff9024fab0 R13: 0000000000000001 R14: fffffffffffffff4 R15: ffffffff9024fb88 FS: 0000000001832400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffffc CR3: 00000000abe2e000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 0f add %cl,(%rdi) 2: 85 6b 03 test %ebp,0x3(%rbx) 5: 00 00 add %al,(%rax) 7: 48 89 ce mov %rcx,%rsi a: 48 89 4a 08 mov %rcx,0x8(%rdx) e: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 15: fc ff df 18: 48 c1 ee 03 shr $0x3,%rsi 1c: 80 3c 06 00 cmpb $0x0,(%rsi,%rax,1) 20: 0f 85 2b 03 00 00 jne 0x351 26: 49 8d 7e 10 lea 0x10(%r14),%rdi 2a: 49 89 56 08 mov %rdx,0x8(%r14) <-- trapping instruction 2e: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 35: fc ff df 38: 48 89 fa mov %rdi,%rdx 3b: 48 c1 ea 03 shr $0x3,%rdx 3f: 80 .byte 0x80