general protection fault, probably for non-canonical address 0xdffffc0000001f66: 0000 [#1] PREEMPT SMP KASAN KASAN: probably user-memory-access in range [0x000000000000fb30-0x000000000000fb37] CPU: 1 PID: 10370 Comm: syz-executor.2 Not tainted 5.11.0-rc6-next-20210201-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:atomic_switch_perf_msrs arch/x86/kvm/vmx/vmx.c:6527 [inline] RIP: 0010:vmx_vcpu_run+0x538/0x2740 arch/x86/kvm/vmx/vmx.c:6698 Code: 7a 55 00 39 eb 0f 8d fd 00 00 00 e8 82 74 55 00 48 8b 0c 24 48 63 c3 48 8d 04 40 48 8d 2c c1 48 8d 7d 08 48 89 f8 48 c1 e8 03 <42> 80 3c 38 00 0f 85 05 1d 00 00 48 8d 7d 10 4c 8b 6d 08 48 89 f8 RSP: 0018:ffffc900178bfb00 EFLAGS: 00010007 RAX: 0000000000001f66 RBX: 0000000000000000 RCX: 000000000000fb2c RDX: 0000000000040000 RSI: ffffffff811d602e RDI: 000000000000fb34 RBP: 000000000000fb2c R08: 0000000000000000 R09: 0000000000000000 R10: ffffffff811d5fee R11: 0000000000000000 R12: ffff888013bba4d0 R13: ffff888013bba520 R14: ffff888013bb8000 R15: dffffc0000000000 FS: 00007f948f0e8700(0000) GS:ffff8880b9f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000053b038 CR3: 00000000178e1000 CR4: 00000000001526e0 Call Trace: vcpu_enter_guest+0x103d/0x3f90 arch/x86/kvm/x86.c:9007 vcpu_run arch/x86/kvm/x86.c:9147 [inline] kvm_arch_vcpu_ioctl_run+0x440/0x1980 arch/x86/kvm/x86.c:9374 kvm_vcpu_ioctl+0x467/0xd90 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3283 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:739 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x465b09 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f948f0e8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 RBP: 00000000004b069f R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 R13: 00007ffe8cbdf3bf R14: 00007f948f0e8300 R15: 0000000000022000 Modules linked in: ---[ end trace 632e5e5a2c2333b0 ]--- RIP: 0010:atomic_switch_perf_msrs arch/x86/kvm/vmx/vmx.c:6527 [inline] RIP: 0010:vmx_vcpu_run+0x538/0x2740 arch/x86/kvm/vmx/vmx.c:6698 Code: 7a 55 00 39 eb 0f 8d fd 00 00 00 e8 82 74 55 00 48 8b 0c 24 48 63 c3 48 8d 04 40 48 8d 2c c1 48 8d 7d 08 48 89 f8 48 c1 e8 03 <42> 80 3c 38 00 0f 85 05 1d 00 00 48 8d 7d 10 4c 8b 6d 08 48 89 f8 RSP: 0018:ffffc900178bfb00 EFLAGS: 00010007 RAX: 0000000000001f66 RBX: 0000000000000000 RCX: 000000000000fb2c RDX: 0000000000040000 RSI: ffffffff811d602e RDI: 000000000000fb34 RBP: 000000000000fb2c R08: 0000000000000000 R09: 0000000000000000 R10: ffffffff811d5fee R11: 0000000000000000 R12: ffff888013bba4d0 R13: ffff888013bba520 R14: ffff888013bb8000 R15: dffffc0000000000 FS: 00007f948f0e8700(0000) GS:ffff8880b9f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000053b038 CR3: 00000000178e1000 CR4: 00000000001526e0