irq bypass consumer (token 00000000ba3c981f) registration fails: -16 *** Guest State *** CR0: actual=0x0000000080000031, shadow=0x0000000060000011, gh_mask=fffffffffffffff7 BUG: unable to handle kernel paging request at 00000000320902b2 IP: lock_acquire+0x183/0x580 kernel/locking/lockdep.c:4002 PGD 5e28067 P4D 5e28067 PUD 5e2a067 PMD 0 Oops: 0002 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 0 PID: 4409 Comm: syz-executor1 Not tainted 4.15.0-rc2-next-20171204+ #58 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: 00000000f95c22b4 task.stack: 000000005fb197c4 RIP: 0010:lock_acquire+0x183/0x580 kernel/locking/lockdep.c:4002 RSP: 0018:ffff8801ce80ee48 EFLAGS: 00010046 RAX: 0000000000000007 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffff8801cdd06040 RSI: 0000000000000000 RDI: ffff8801cdd068c4 RBP: ffff8801ce80ef40 R08: 0000000000000001 R09: 0000000000000000 R10: 1ffff10039d01dcf R11: 0000000000000000 R12: 1ffff10039d01dcf R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 FS: 00007f8d8383a700(0000) GS:ffff8801db400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffff8 CR3: 00000001d9aa0000 CR4: 00000000001426f0 Call Trace: __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x96/0xc0 kernel/locking/spinlock.c:159 kretprobe_table_lock kernel/kprobes.c:1160 [inline] kprobe_flush_task+0xe3/0x5d0 kernel/kprobes.c:1205 finish_task_switch+0x4e3/0x740 kernel/sched/core.c:2681 context_switch kernel/sched/core.c:2803 [inline] __schedule+0x8f3/0x2060 kernel/sched/core.c:3376 preempt_schedule_common+0x22/0x60 kernel/sched/core.c:3515 _cond_resched+0x1d/0x30 kernel/sched/core.c:4852 console_unlock+0x76b/0xd70 kernel/printk/printk.c:2238 vprintk_emit+0x4ad/0x590 kernel/printk/printk.c:1757 vprintk_default+0x28/0x30 kernel/printk/printk.c:1796 vprintk_func+0x57/0xc0 kernel/printk/printk_safe.c:379 printk+0xaa/0xca kernel/printk/printk.c:1829 dump_vmcs arch/x86/kvm/vmx.c:8677 [inline] vmx_handle_exit+0xbee/0x1ce0 arch/x86/kvm/vmx.c:8832 vcpu_enter_guest arch/x86/kvm/x86.c:7084 [inline] vcpu_run arch/x86/kvm/x86.c:7146 [inline] kvm_arch_vcpu_ioctl_run+0x1cb4/0x5c60 arch/x86/kvm/x86.c:7314 kvm_vcpu_ioctl+0x64c/0x1010 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2555 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0x1b1/0x1530 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x4529d9 RSP: 002b:00007f8d83839c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000020ee0000 RCX: 00000000004529d9 RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 000000000000001f RBP: 0000000020ee0800 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 0000000000000021 R13: 0000000020edf000 R14: 00007f8d8383a6d4 R15: 0000000000000000 Code: df 48 89 f9 48 c1 e9 03 0f b6 0c 01 48 89 f8 83 e0 07 83 c0 03 38 c8 7c 08 84 c9 0f 85 fe 02 00 00 c7 82 84 08 00 00 01 00 00 00 1f 44 00 00 65 8b 05 c1 c7 aa 7e 89 c0 48 0f a3 05 07 5e 08 RIP: lock_acquire+0x183/0x580 kernel/locking/lockdep.c:4002 RSP: ffff8801ce80ee48 CR2: fffffffffffffff8 ---[ end trace 27e10cd70857d90f ]---