kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 22490 Comm: syz-executor2 Not tainted 4.17.0-rc4+ #46 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 __should_failslab+0x124/0x180 mm/failslab.c:32 RIP: 0010:msr_write_intercepted arch/x86/kvm/vmx.c:2126 [inline] RIP: 0010:vmx_vcpu_run+0xa2f/0x25f0 arch/x86/kvm/vmx.c:9869 should_failslab+0x9/0x14 mm/slab_common.c:1522 RSP: 0018:ffff8801b4f0f3b0 EFLAGS: 00010003 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc+0x2af/0x760 mm/slab.c:3552 RAX: dffffc0000000000 RBX: 0000000010000000 RCX: ffffffff811f756f RDX: 0000000000000010 RSI: ffffffff811f757c RDI: 0000000000000005 kmem_cache_zalloc include/linux/slab.h:691 [inline] mmu_topup_memory_cache arch/x86/kvm/mmu.c:866 [inline] mmu_topup_memory_caches+0xf7/0x3a0 arch/x86/kvm/mmu.c:912 RBP: ffff8801b4f0f400 R08: ffff8801ace8a140 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 kvm_mmu_load+0x21/0x10e0 arch/x86/kvm/mmu.c:4650 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 00007f956d12c700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 kvm_mmu_reload arch/x86/kvm/mmu.h:85 [inline] vcpu_enter_guest+0x3a83/0x6060 arch/x86/kvm/x86.c:7362 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f956d10adb8 CR3: 00000001b3553000 CR4: 00000000001426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: Code: 00 00 00 10 89 de e8 91 ca 59 00 vcpu_run arch/x86/kvm/x86.c:7559 [inline] kvm_arch_vcpu_ioctl_run+0x33e/0x1690 arch/x86/kvm/x86.c:7736 85 db kvm_vcpu_ioctl+0x79d/0x12e0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2560 0f 84 91 00 00 00 e8 74 c9 59 00 48 8b 54 24 08 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x1cf/0x16a0 fs/ioctl.c:684 48 b8 00 00 00 00 00 fc ksys_ioctl+0xa9/0xd0 fs/ioctl.c:701 ff __do_sys_ioctl fs/ioctl.c:708 [inline] __se_sys_ioctl fs/ioctl.c:706 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:706 df do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 48 c1 ea 03 <80> 3c entry_SYSCALL_64_after_hwframe+0x49/0xbe 02 RIP: 0033:0x455979 00 RSP: 002b:00007fb346ea0c68 EFLAGS: 00000246 0f ORIG_RAX: 0000000000000010 85 RAX: ffffffffffffffda RBX: 00007fb346ea16d4 RCX: 0000000000455979 36 RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000015 19 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 00 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 00 R13: 000000000000027e R14: 00000000006f7c70 R15: 000000000000001f 48 8b 04 24 48 8b 98 40 57 00 00 RIP: msr_write_intercepted arch/x86/kvm/vmx.c:2126 [inline] RSP: ffff8801b4f0f3b0 RIP: vmx_vcpu_run+0xa2f/0x25f0 arch/x86/kvm/vmx.c:9869 RSP: ffff8801b4f0f3b0 ---[ end trace c175e83cdd705b63 ]---