================================================================== BUG: KASAN: invalid-access in __kvm_pgtable_visit arch/arm64/kvm/hyp/pgtable.c:163 [inline] BUG: KASAN: invalid-access in __kvm_pgtable_walk+0x8e4/0xa68 arch/arm64/kvm/hyp/pgtable.c:237 Read of size 8 at addr f4f00000140c0000 by task syz.2.17/3674 Pointer tag: [f4], memory tag: [fe] CPU: 0 UID: 0 PID: 3674 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT Hardware name: linux,dummy-virt (DT) Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:499 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 print_address_description+0xac/0x288 mm/kasan/report.c:378 print_report+0x84/0xa0 mm/kasan/report.c:482 kasan_report+0xb0/0x110 mm/kasan/report.c:595 kasan_tag_mismatch+0x28/0x3c mm/kasan/sw_tags.c:175 __hwasan_tag_mismatch+0x30/0x60 arch/arm64/lib/kasan_sw_tags.S:55 __kvm_pgtable_visit arch/arm64/kvm/hyp/pgtable.c:163 [inline] __kvm_pgtable_walk+0x8e4/0xa68 arch/arm64/kvm/hyp/pgtable.c:237 _kvm_pgtable_walk arch/arm64/kvm/hyp/pgtable.c:260 [inline] kvm_pgtable_walk+0x294/0x468 arch/arm64/kvm/hyp/pgtable.c:283 kvm_pgtable_stage2_destroy_range+0x60/0xb4 arch/arm64/kvm/hyp/pgtable.c:1563 stage2_destroy_range arch/arm64/kvm/mmu.c:924 [inline] kvm_stage2_destroy arch/arm64/kvm/mmu.c:935 [inline] kvm_free_stage2_pgd+0x198/0x28c arch/arm64/kvm/mmu.c:1112 kvm_uninit_stage2_mmu+0x20/0x38 arch/arm64/kvm/mmu.c:1023 kvm_arch_flush_shadow_all+0x1a8/0x1e0 arch/arm64/kvm/nested.c:1113 kvm_flush_shadow_all virt/kvm/kvm_main.c:343 [inline] kvm_mmu_notifier_release+0x48/0xa8 virt/kvm/kvm_main.c:884 mmu_notifier_unregister+0x128/0x42c mm/mmu_notifier.c:815 kvm_destroy_vm virt/kvm/kvm_main.c:1295 [inline] kvm_put_kvm+0x6a0/0xfa8 virt/kvm/kvm_main.c:1353 kvm_vm_release+0x58/0x78 virt/kvm/kvm_main.c:1376 __fput+0x4ac/0x980 fs/file_table.c:468 ____fput+0x20/0x58 fs/file_table.c:496 task_work_run+0x1bc/0x254 kernel/task_work.c:227 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] do_notify_resume+0x1bc/0x270 arch/arm64/kernel/entry-common.c:155 exit_to_user_mode_prepare arch/arm64/kernel/entry-common.c:173 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:182 [inline] el0_svc+0xb8/0x164 arch/arm64/kernel/entry-common.c:880 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:898 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x55f00000140c1400 pfn:0x540c0 flags: 0x1ffc2c000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0xb) raw: 01ffc2c000000000 ffffc1ffc0810b08 ffffc1ffc0845c48 0000000000000000 raw: 55f00000140c1400 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: fff00000140bfe00: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 fe fe fff00000140bff00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe >fff00000140c0000: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe ^ fff00000140c0100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fff00000140c0200: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe ================================================================== Unable to handle kernel paging request at virtual address ffffffffc0000000 KASAN: probably user-memory-access in range [0x0007fffc00000000-0x0007fffc0000000f] Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 swapper pgtable: 4k pages, 52-bit VAs, pgdp=000000004769a000 [ffffffffc0000000] pgd=100000004c61a003, p4d=0000000047ec3403 , pud=0000000047ec4403, pmd=0000000000000000 Internal error: Oops: 0000000096000006 [#1] SMP Modules linked in: CPU: 0 UID: 0 PID: 3674 Comm: syz.2.17 Tainted: G B syzkaller #0 PREEMPT Tainted: [B]=BAD_PAGE Hardware name: linux,dummy-virt (DT) pstate: 61402009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) pc : __kvm_pgtable_visit arch/arm64/kvm/hyp/pgtable.c:163 [inline] pc : __kvm_pgtable_walk+0x27c/0xa68 arch/arm64/kvm/hyp/pgtable.c:237 lr : kvm_dereference_pteref arch/arm64/include/asm/kvm_pgtable.h:389 [inline] lr : __kvm_pgtable_visit arch/arm64/kvm/hyp/pgtable.c:160 [inline] lr : __kvm_pgtable_walk+0x214/0xa68 arch/arm64/kvm/hyp/pgtable.c:237 sp : ffff80008e7477d0 x29: ffff80008e747870 x28: 0000000000000005 x27: ffffffffc0000000 x26: ffffffffc0000000 x25: 0000000000000000 x24: 0000000000000001 x23: 00000000000000ff x22: efff800000000000 x21: ffff80008e7479d8 x20: 00000000000000ff x19: 00000000000000ff x18: 0000000000001b80 x17: 00000000000000f4 x16: 00000000000000d2 x15: fff0000072d86404 x14: 0000000000000000 x13: ffff80008e7479e0 x12: ffff80008e7479e8 x11: ffff80008e7479e8 x10: 0000000000ff0100 x9 : ffff80008e747828 x8 : 00000000000000fe x7 : ffff800080bd4afc x6 : 0000000000000000 x5 : 0000000000000000 x4 : 00000000000000ff x3 : 0000000000000001 x2 : ffffffffc0000000 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: __kvm_pgtable_visit arch/arm64/kvm/hyp/pgtable.c:163 [inline] (P) __kvm_pgtable_walk+0x27c/0xa68 arch/arm64/kvm/hyp/pgtable.c:237 (P) __kvm_pgtable_visit arch/arm64/kvm/hyp/pgtable.c:207 [inline] __kvm_pgtable_walk+0x600/0xa68 arch/arm64/kvm/hyp/pgtable.c:237 _kvm_pgtable_walk arch/arm64/kvm/hyp/pgtable.c:260 [inline] kvm_pgtable_walk+0x294/0x468 arch/arm64/kvm/hyp/pgtable.c:283 kvm_pgtable_stage2_destroy_range+0x60/0xb4 arch/arm64/kvm/hyp/pgtable.c:1563 stage2_destroy_range arch/arm64/kvm/mmu.c:924 [inline] kvm_stage2_destroy arch/arm64/kvm/mmu.c:935 [inline] kvm_free_stage2_pgd+0x198/0x28c arch/arm64/kvm/mmu.c:1112 kvm_uninit_stage2_mmu+0x20/0x38 arch/arm64/kvm/mmu.c:1023 kvm_arch_flush_shadow_all+0x1a8/0x1e0 arch/arm64/kvm/nested.c:1113 kvm_flush_shadow_all virt/kvm/kvm_main.c:343 [inline] kvm_mmu_notifier_release+0x48/0xa8 virt/kvm/kvm_main.c:884 mmu_notifier_unregister+0x128/0x42c mm/mmu_notifier.c:815 kvm_destroy_vm virt/kvm/kvm_main.c:1295 [inline] kvm_put_kvm+0x6a0/0xfa8 virt/kvm/kvm_main.c:1353 kvm_vm_release+0x58/0x78 virt/kvm/kvm_main.c:1376 __fput+0x4ac/0x980 fs/file_table.c:468 ____fput+0x20/0x58 fs/file_table.c:496 task_work_run+0x1bc/0x254 kernel/task_work.c:227 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] do_notify_resume+0x1bc/0x270 arch/arm64/kernel/entry-common.c:155 exit_to_user_mode_prepare arch/arm64/kernel/entry-common.c:173 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:182 [inline] el0_svc+0xb8/0x164 arch/arm64/kernel/entry-common.c:880 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:898 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 Code: 6b08027f 54000060 7103fe7f 54003321 (f9400348) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 6b08027f cmp w19, w8 4: 54000060 b.eq 0x10 // b.none 8: 7103fe7f cmp w19, #0xff c: 54003321 b.ne 0x670 // b.any * 10: f9400348 ldr x8, [x26] <-- trapping instruction