syzbot


WARNING in kvm_gmem_fault_user_mapping

Status: upstream: reported C repro on 2026/01/30 20:15
Subsystems: kvm
[Documentation on labels]
Reported-by: syzbot+33a04338019ac7e43a44@syzkaller.appspotmail.com
Fix commit: mm: thp: deny THP for files on anonymous inodes
Patched on: [ci-upstream-linux-next-kasan-gce-root ci-upstream-rust-kasan-gce], missing on: [ci-qemu-gce-upstream-auto ci-qemu-native-arm64-kvm ci-qemu-upstream ci-qemu-upstream-386 ci-qemu2-arm32 ci-qemu2-arm64 ci-qemu2-arm64-compat ci-qemu2-arm64-mte ci-qemu2-riscv64 ci-snapshot-upstream-root ci-upstream-bpf-kasan-gce ci-upstream-bpf-next-kasan-gce ci-upstream-gce-arm64 ci-upstream-gce-leak ci-upstream-kasan-badwrites-root ci-upstream-kasan-gce ci-upstream-kasan-gce-386 ci-upstream-kasan-gce-root ci-upstream-kasan-gce-selinux-root ci-upstream-kasan-gce-smack-root ci-upstream-kmsan-gce-386-root ci-upstream-kmsan-gce-root ci-upstream-net-kasan-gce ci-upstream-net-this-kasan-gce ci2-upstream-fs ci2-upstream-kcsan-gce ci2-upstream-usb]
First crash: 23d, last: 8d07h
Cause bisection: failed (error log, bisect log)
  
Discussions (7)
Title Replies (including bot) Last reply
[PATCH] mm: thp: Deny THP for guest_memfd and secretmem in file_thp_enabled() 29 (29) 2026/02/21 04:37
[PATCH v2] mm: thp: deny THP for files on anonymous inodes 10 (10) 2026/02/20 23:59
[PATCH v2 0/2] Test MADV_COLLAPSE on guest_memfd 3 (3) 2026/02/20 23:54
[syzbot] [kvm?] WARNING in kvm_gmem_fault_user_mapping 0 (12) 2026/02/13 15:43
[PATCH] KVM: guest_memfd: Disable VMA merging with VM_DONTEXPAND 10 (11) 2026/02/09 19:38
[PATCH 1/2] KVM: guest_memfd: Always use order 0 when allocating for guest_memfd 3 (3) 2026/02/04 16:30
[PATCH] KVM: guest_memfd: Reject large folios until support is implemented 1 (1) 2026/02/03 02:09
Last patch testing requests (14)
Created Duration User Patch Repo Result
2026/02/13 15:43 25m kartikey406@gmail.com patch upstream OK log
2026/02/12 23:21 1h24m retest repro upstream report log
2026/02/12 23:21 1h10m retest repro linux-next report log
2026/02/09 13:11 25m kartikey406@gmail.com patch upstream OK log
2026/02/09 02:02 52m kartikey406@gmail.com patch upstream OK log
2026/02/09 01:55 37m kartikey406@gmail.com patch upstream report log
2026/02/04 17:01 34m ackerleytng@google.com patch git://git.kernel.org/pub/scm/virt/kvm/kvm.git next OK log
2026/02/03 20:06 1h16m ackerleytng@google.com patch git://git.kernel.org/pub/scm/virt/kvm/kvm.git next error
2026/02/02 15:11 1h07m kartikey406@gmail.com patch upstream OK log
2026/02/02 08:34 20m kartikey406@gmail.com patch upstream report log
2026/02/01 11:08 23m kartikey406@gmail.com patch upstream report log
2026/02/01 07:48 24m kartikey406@gmail.com patch upstream report log
2026/02/01 05:48 33m kartikey406@gmail.com patch upstream OK log
2026/02/01 04:57 39m kartikey406@gmail.com patch upstream report log

Sample crash report:
------------[ cut here ]------------
folio_test_large(folio)
WARNING: arch/x86/kvm/../../../virt/kvm/guest_memfd.c:416 at kvm_gmem_fault_user_mapping+0x4b5/0x6e0 virt/kvm/guest_memfd.c:416, CPU#1: syz.3.124/6406
Modules linked in:
CPU: 1 UID: 0 PID: 6406 Comm: syz.3.124 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026
RIP: 0010:kvm_gmem_fault_user_mapping+0x4b5/0x6e0 virt/kvm/guest_memfd.c:416
Code: 00 e9 a1 fe ff ff bd 00 04 00 00 eb d9 e8 43 b8 83 00 48 c7 c6 e0 9f 82 8b 48 89 df e8 d4 f8 ce 00 90 0f 0b e8 2c b8 83 00 90 <0f> 0b 90 48 8d 6b 34 48 89 df e8 ec f6 bb 00 be 04 00 00 00 48 89
RSP: 0018:ffffc90004ab7848 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffffea00018a0000 RCX: ffffffff81834070
RDX: ffff888028b124c0 RSI: ffffffff81834334 RDI: ffff888028b124c0
RBP: ffffc90004ab79f8 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000040 R11: 0000000000000000 R12: ffffea00018a0000
R13: ffffc90004ab7a08 R14: 0000000000000040 R15: ffffea00018a0008
FS:  00007fb8562ce6c0(0000) GS:ffff8881246db000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f89fb863d58 CR3: 000000006060a000 CR4: 00000000003526f0
Call Trace:
 <TASK>
 __do_fault+0x10d/0x550 mm/memory.c:5323
 do_read_fault mm/memory.c:5758 [inline]
 do_fault+0xaf9/0x1990 mm/memory.c:5892
 do_pte_missing mm/memory.c:4404 [inline]
 handle_pte_fault mm/memory.c:6276 [inline]
 __handle_mm_fault+0x1807/0x2b50 mm/memory.c:6414
 handle_mm_fault+0x36d/0xa20 mm/memory.c:6583
 faultin_page mm/gup.c:1126 [inline]
 __get_user_pages+0xf9c/0x34d0 mm/gup.c:1428
 populate_vma_page_range+0x267/0x3f0 mm/gup.c:1860
 __mm_populate+0x107/0x3a0 mm/gup.c:1963
 do_mlock+0x3f0/0x7f0 mm/mlock.c:653
 __do_sys_mlock mm/mlock.c:661 [inline]
 __se_sys_mlock mm/mlock.c:659 [inline]
 __x64_sys_mlock+0x59/0x80 mm/mlock.c:659
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xc9/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fb85539aeb9
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fb8562ce028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095
RAX: ffffffffffffffda RBX: 00007fb855615fa0 RCX: 00007fb85539aeb9
RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000
RBP: 00007fb855408c1f R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fb855616038 R14: 00007fb855615fa0 R15: 00007ffcc1750088
 </TASK>

Crashes (3):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2026/01/28 22:31 upstream 1f97d9dcf536 004c195c .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root WARNING in kvm_gmem_fault_user_mapping
2026/01/29 22:58 linux-next 33a647c659ff aeb6fdd5 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-rust-kasan-gce WARNING in kvm_gmem_fault_user_mapping
2026/01/28 21:02 upstream 1f97d9dcf536 004c195c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root WARNING in kvm_gmem_fault_user_mapping
* Struck through repros no longer work on HEAD.