kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:294 __kasan_slab_alloc+0xa2/0xc0 mm/kasan/common.c:446 kasan_slab_alloc include/linux/kasan.h:224 [inline] slab_post_alloc_hook mm/slab.h:736 [inline] slab_alloc_node mm/slub.c:3243 [inline] slab_alloc mm/slub.c:3251 [inline] __kmem_cache_alloc_lru mm/slub.c:3258 [inline] kmem_cache_alloc+0x2d6/0x4c0 mm/slub.c:3268 vm_area_dup+0x81/0x380 kernel/fork.c:466 __split_vma+0x9f/0x530 mm/mmap.c:2276 do_mas_align_munmap+0x54c/0xee0 mm/mmap.c:2424 do_mas_munmap+0x202/0x2c0 mm/mmap.c:2564 mmap_region+0x219/0x1bf0 mm/mmap.c:2612 do_mmap+0x825/0xf50 mm/mmap.c:1483 vm_mmap_pgoff+0x1ab/0x270 mm/util.c:520 ksys_mmap_pgoff+0x40d/0x5a0 mm/mmap.c:1529 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 ------------[ cut here ]------------ kernel BUG at include/linux/memcontrol.h:524! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 3598 Comm: syz-executor104 Not tainted 5.19.0-rc4-next-20220628-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 RIP: 0010:folio_memcg_rcu include/linux/memcontrol.h:524 [inline] RIP: 0010:workingset_activation+0x68e/0x7d0 mm/workingset.c:413 Code: 80 3c 10 00 0f 85 38 01 00 00 4c 8b 2d 03 ca 0c 0c e9 b8 fc ff ff e8 a1 5c ca ff 48 c7 c6 20 19 d8 89 48 89 ef e8 42 01 00 00 <0f> 0b e8 8b 5c ca ff 0f 0b e9 4a fa ff ff e8 7f 5c ca ff 48 c7 c6 RSP: 0018:ffffc90002f7f4a0 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: ffff88801e629d40 RSI: ffffffff81b05a7e RDI: 0000000000000003 RBP: ffffea000085b000 R08: 0000000000000003 R09: 000000000000ffff R10: 000000000000ffff R11: 0000000000000001 R12: 0000000000000000 R13: ffffea000085b038 R14: dffffc0000000000 R15: 0000000000000003 FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fdd15d54fc8 CR3: 00000000734b0000 CR4: 00000000003526e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: folio_mark_accessed+0x591/0xda0 mm/swap.c:468 kvm_set_page_accessed arch/x86/kvm/../../../virt/kvm/kvm_main.c:2879 [inline] kvm_set_pfn_accessed arch/x86/kvm/../../../virt/kvm/kvm_main.c:2951 [inline] kvm_set_pfn_accessed+0x23b/0x2a0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2945 handle_changed_spte_acc_track arch/x86/kvm/mmu/tdp_mmu.c:354 [inline] handle_changed_spte_acc_track+0x1bc/0x290 arch/x86/kvm/mmu/tdp_mmu.c:346 handle_changed_spte arch/x86/kvm/mmu/tdp_mmu.c:609 [inline] handle_removed_pt arch/x86/kvm/mmu/tdp_mmu.c:493 [inline] __handle_changed_spte+0xc75/0x1810 arch/x86/kvm/mmu/tdp_mmu.c:600 handle_changed_spte arch/x86/kvm/mmu/tdp_mmu.c:607 [inline] handle_removed_pt arch/x86/kvm/mmu/tdp_mmu.c:493 [inline] __handle_changed_spte+0xc66/0x1810 arch/x86/kvm/mmu/tdp_mmu.c:600 __tdp_mmu_set_spte+0x229/0x9d0 arch/x86/kvm/mmu/tdp_mmu.c:732 _tdp_mmu_set_spte arch/x86/kvm/mmu/tdp_mmu.c:748 [inline] tdp_mmu_set_spte arch/x86/kvm/mmu/tdp_mmu.c:757 [inline] __tdp_mmu_zap_root+0x7e6/0x860 arch/x86/kvm/mmu/tdp_mmu.c:863 tdp_mmu_zap_root+0x12e/0x330 arch/x86/kvm/mmu/tdp_mmu.c:899 kvm_tdp_mmu_zap_all+0x154/0x1b0 arch/x86/kvm/mmu/tdp_mmu.c:1007 kvm_mmu_zap_all+0x27c/0x2c0 arch/x86/kvm/mmu/mmu.c:6503 kvm_flush_shadow_all arch/x86/kvm/../../../virt/kvm/kvm_main.c:383 [inline] kvm_mmu_notifier_release+0x5c/0xb0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:889 mn_hlist_release mm/mmu_notifier.c:319 [inline] __mmu_notifier_release+0x1a9/0x600 mm/mmu_notifier.c:357 mmu_notifier_release include/linux/mmu_notifier.h:415 [inline] exit_mmap+0x60f/0x720 mm/mmap.c:3183 __mmput+0x128/0x4c0 kernel/fork.c:1180 mmput+0x5c/0x70 kernel/fork.c:1201 exit_mm kernel/exit.c:510 [inline] do_exit+0xa09/0x29f0 kernel/exit.c:782 do_group_exit+0xd2/0x2f0 kernel/exit.c:925 __do_sys_exit_group kernel/exit.c:936 [inline] __se_sys_exit_group kernel/exit.c:934 [inline] __x64_sys_exit_group+0x3a/0x50 kernel/exit.c:934 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7fdd15d16d79 Code: Unable to access opcode bytes at RIP 0x7fdd15d16d4f. RSP: 002b:00007ffd3b499c58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 00007fdd15d853f0 RCX: 00007fdd15d16d79 RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000003500000015 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdd15d853f0 R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:folio_memcg_rcu include/linux/memcontrol.h:524 [inline] RIP: 0010:workingset_activation+0x68e/0x7d0 mm/workingset.c:413 Code: 80 3c 10 00 0f 85 38 01 00 00 4c 8b 2d 03 ca 0c 0c e9 b8 fc ff ff e8 a1 5c ca ff 48 c7 c6 20 19 d8 89 48 89 ef e8 42 01 00 00 <0f> 0b e8 8b 5c ca ff 0f 0b e9 4a fa ff ff e8 7f 5c ca ff 48 c7 c6 RSP: 0018:ffffc90002f7f4a0 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: ffff88801e629d40 RSI: ffffffff81b05a7e RDI: 0000000000000003 RBP: ffffea000085b000 R08: 0000000000000003 R09: 000000000000ffff R10: 000000000000ffff R11: 0000000000000001 R12: 0000000000000000 R13: ffffea000085b038 R14: dffffc0000000000 R15: 0000000000000003 FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fdd15d54fc8 CR3: 00000000734b0000 CR4: 00000000003526e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400