general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 11978 Comm: syz-executor.5 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8880556c25c0 task.stack: ffff88805a530000 RIP: 0010:vb2_vmalloc_put_userptr+0x6e/0x210 drivers/media/v4l2-core/videobuf2-vmalloc.c:136 RSP: 0018:ffff88805a537c60 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffffc90015d3c000 RCX: 1ffffffff0e799b8 RDX: 0000000000000001 RSI: ffff888082ea8594 RDI: 0000000000000009 RBP: ffff88805a537c88 R08: dffffc0000000000 R09: ffffffff89565cb0 kobject: 'loop1' (ffff8880a4102360): kobject_uevent_env R10: ffff88805a537d18 R11: ffff8880556c25c0 R12: ffff88807d5d1180 kobject: 'loop1' (ffff8880a4102360): fill_kobj_path: path = '/devices/virtual/block/loop1' R13: 0000000000000000 R14: ffff88807d5d1180 R15: ffff88807d5d1188 FS: 0000000000bdc940(0000) GS:ffff8880aec00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c4403d1000 CR3: 000000008a7cc000 CR4: 00000000001426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: __vb2_buf_userptr_put drivers/media/v4l2-core/videobuf2-core.c:256 [inline] __vb2_free_mem drivers/media/v4l2-core/videobuf2-core.c:413 [inline] __vb2_queue_free+0x3a8/0x7d0 drivers/media/v4l2-core/videobuf2-core.c:454 kobject: 'loop3' (ffff8880a41b4ce0): kobject_uevent_env kobject: 'loop3' (ffff8880a41b4ce0): fill_kobj_path: path = '/devices/virtual/block/loop3' vb2_core_queue_release+0x64/0x80 drivers/media/v4l2-core/videobuf2-core.c:2043 vb2_queue_release+0x16/0x20 drivers/media/v4l2-core/videobuf2-v4l2.c:669 v4l2_m2m_ctx_release+0x2d/0x40 drivers/media/v4l2-core/v4l2-mem2mem.c:674 vim2m_release+0xde/0x130 drivers/media/platform/vim2m.c:959 v4l2_release+0xf9/0x190 drivers/media/v4l2-core/v4l2-dev.c:446 __fput+0x275/0x7a0 fs/file_table.c:210 ____fput+0x16/0x20 fs/file_table.c:244 kobject: 'loop0' (ffff888081697620): kobject_uevent_env task_work_run+0x114/0x190 kernel/task_work.c:113 kobject: 'loop0' (ffff888081697620): fill_kobj_path: path = '/devices/virtual/block/loop0' tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x1da/0x220 arch/x86/entry/common.c:164 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4bc/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x42/0xb7 kobject: 'kvm' (ffff8880a6424d90): kobject_uevent_env RIP: 0033:0x414211 kobject: 'kvm' (ffff8880a6424d90): fill_kobj_path: path = '/devices/virtual/misc/kvm' RSP: 002b:00007ffd738779b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000414211 RDX: 0000001b32520000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 000000006e783fbb R09: 000000006e783fbf R10: 00007ffd73877a90 R11: 0000000000000293 R12: 000000000075c9a0 R13: 000000000075c9a0 R14: 00000000007624e0 R15: 000000000075bfd4 Code: 4c 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 8d 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 6c 24 08 49 8d 7d 09 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 3c 01 00 RIP: vb2_vmalloc_put_userptr+0x6e/0x210 drivers/media/v4l2-core/videobuf2-vmalloc.c:136 RSP: ffff88805a537c60 ---[ end trace 1cadbed2fc9e9796 ]---