kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:294 __kasan_slab_alloc+0x97/0xb0 mm/kasan/common.c:447 kasan_slab_alloc include/linux/kasan.h:224 [inline] slab_post_alloc_hook mm/slab.h:727 [inline] slab_alloc mm/slab.c:3294 [inline] __kmem_cache_alloc_lru mm/slab.c:3471 [inline] kmem_cache_alloc+0x214/0x520 mm/slab.c:3491 vm_area_alloc+0x1c/0x110 kernel/fork.c:459 mmap_region+0x976/0x1460 mm/mmap.c:1732 do_mmap+0x863/0xfa0 mm/mmap.c:1540 vm_mmap_pgoff+0x1ab/0x270 mm/util.c:552 ksys_mmap_pgoff+0x41b/0x5a0 mm/mmap.c:1586 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd ------------[ cut here ]------------ kernel BUG at include/linux/memcontrol.h:478! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 3607 Comm: syz-executor270 Not tainted 6.0.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 RIP: 0010:folio_memcg_rcu include/linux/memcontrol.h:478 [inline] RIP: 0010:workingset_activation+0x5e3/0x6c0 mm/workingset.c:413 Code: 48 89 ef e8 ff 00 00 00 c6 05 b7 e3 17 0c 01 0f 0b e9 05 fc ff ff e8 bc 2a ca ff 48 c7 c6 60 25 f8 89 48 89 ef e8 dd 00 00 00 <0f> 0b e8 a6 2a ca ff 0f 0b e9 f5 fa ff ff e8 9a 2a ca ff 48 c7 c6 RSP: 0018:ffffc90003067510 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: ffff8880747a4200 RSI: ffffffff81b10e83 RDI: 0000000000000003 RBP: ffffea0001f7d200 R08: 0000000000000003 R09: 000000000000ffff R10: 000000000000ffff R11: 0000000000000000 R12: 0000000000000000 R13: ffff8880b9a34d08 R14: dffffc0000000000 R15: 0000000000000003 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000007585e000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: folio_mark_accessed+0x591/0xda0 mm/swap.c:463 kvm_set_page_accessed arch/x86/kvm/../../../virt/kvm/kvm_main.c:2895 [inline] kvm_set_pfn_accessed arch/x86/kvm/../../../virt/kvm/kvm_main.c:2967 [inline] kvm_set_pfn_accessed+0x23b/0x2a0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2961 handle_changed_spte_acc_track arch/x86/kvm/mmu/tdp_mmu.c:354 [inline] handle_changed_spte_acc_track+0x1bc/0x290 arch/x86/kvm/mmu/tdp_mmu.c:346 handle_changed_spte arch/x86/kvm/mmu/tdp_mmu.c:609 [inline] handle_removed_pt arch/x86/kvm/mmu/tdp_mmu.c:493 [inline] __handle_changed_spte+0xc75/0x1810 arch/x86/kvm/mmu/tdp_mmu.c:600 handle_changed_spte arch/x86/kvm/mmu/tdp_mmu.c:607 [inline] handle_removed_pt arch/x86/kvm/mmu/tdp_mmu.c:493 [inline] __handle_changed_spte+0xc66/0x1810 arch/x86/kvm/mmu/tdp_mmu.c:600 __tdp_mmu_set_spte+0x229/0x9d0 arch/x86/kvm/mmu/tdp_mmu.c:732 _tdp_mmu_set_spte arch/x86/kvm/mmu/tdp_mmu.c:748 [inline] tdp_mmu_set_spte arch/x86/kvm/mmu/tdp_mmu.c:757 [inline] __tdp_mmu_zap_root+0x7e7/0x860 arch/x86/kvm/mmu/tdp_mmu.c:863 tdp_mmu_zap_root+0x12e/0x330 arch/x86/kvm/mmu/tdp_mmu.c:899 kvm_tdp_mmu_zap_all+0x154/0x1b0 arch/x86/kvm/mmu/tdp_mmu.c:1003 kvm_mmu_zap_all+0x27c/0x2c0 arch/x86/kvm/mmu/mmu.c:6544 kvm_flush_shadow_all arch/x86/kvm/../../../virt/kvm/kvm_main.c:383 [inline] kvm_mmu_notifier_release+0x5c/0xb0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:895 mn_hlist_release mm/mmu_notifier.c:319 [inline] __mmu_notifier_release+0x1a9/0x600 mm/mmu_notifier.c:357 mmu_notifier_release include/linux/mmu_notifier.h:415 [inline] exit_mmap+0x3b6/0x490 mm/mmap.c:3082 __mmput+0x122/0x4b0 kernel/fork.c:1187 mmput+0x56/0x60 kernel/fork.c:1208 exit_mm kernel/exit.c:510 [inline] do_exit+0x9e2/0x29b0 kernel/exit.c:782 do_group_exit+0xd2/0x2f0 kernel/exit.c:925 __do_sys_exit_group kernel/exit.c:936 [inline] __se_sys_exit_group kernel/exit.c:934 [inline] __x64_sys_exit_group+0x3a/0x50 kernel/exit.c:934 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f1a407db069 Code: Unable to access opcode bytes at RIP 0x7f1a407db03f. RSP: 002b:00007ffe95694f38 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 00007f1a4084e290 RCX: 00007f1a407db069 RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a4084e290 R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:folio_memcg_rcu include/linux/memcontrol.h:478 [inline] RIP: 0010:workingset_activation+0x5e3/0x6c0 mm/workingset.c:413 Code: 48 89 ef e8 ff 00 00 00 c6 05 b7 e3 17 0c 01 0f 0b e9 05 fc ff ff e8 bc 2a ca ff 48 c7 c6 60 25 f8 89 48 89 ef e8 dd 00 00 00 <0f> 0b e8 a6 2a ca ff 0f 0b e9 f5 fa ff ff e8 9a 2a ca ff 48 c7 c6 RSP: 0018:ffffc90003067510 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: ffff8880747a4200 RSI: ffffffff81b10e83 RDI: 0000000000000003 RBP: ffffea0001f7d200 R08: 0000000000000003 R09: 000000000000ffff R10: 000000000000ffff R11: 0000000000000000 R12: 0000000000000000 R13: ffff8880b9a34d08 R14: dffffc0000000000 R15: 0000000000000003 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000007585e000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400