kvm: KVM_SET_TSS_ADDR need to be called before entering vcpu kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 0 PID: 4440 Comm: syz-executor6 Not tainted 4.15.0-rc7+ #168 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:native_write_cr4+0x4/0x10 arch/x86/include/asm/special_insns.h:76 RSP: 0000:ffff8801db207ca8 EFLAGS: 00010006 RAX: ffff8801caed41c0 RBX: 00000000001606f0 RCX: ffffffff811a32c2 RDX: 0000000000010000 RSI: 0000000000000000 RDI: 00000000001606f0 RBP: ffff8801db207ca8 R08: ffff8801c0b472c0 R09: ffff8801caed41c0 R10: 000000000000000b R11: ffffed0038168e5b R12: 0000000000000006 R13: ffff8801caed41c0 R14: ffff8801db21d130 R15: ffff8801db21d130 FS: 0000000000000000(0000) GS:ffff8801db200000(0063) knlGS:0000000009f79900 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000020ceffee CR3: 00000001d0732002 CR4: 00000000001626f0 Call Trace: __write_cr4 arch/x86/include/asm/paravirt.h:76 [inline] __cr4_set arch/x86/include/asm/tlbflush.h:252 [inline] cr4_clear_bits arch/x86/include/asm/tlbflush.h:275 [inline] kvm_cpu_vmxoff arch/x86/kvm/vmx.c:3582 [inline] hardware_disable+0x34a/0x4b0 arch/x86/kvm/vmx.c:3588 kvm_arch_hardware_disable+0x35/0xd0 arch/x86/kvm/x86.c:8004 hardware_disable_nolock+0x30/0x40 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3310 flush_smp_call_function_queue+0x1f4/0x570 kernel/smp.c:243 generic_smp_call_function_single_interrupt+0x13/0x30 kernel/smp.c:192 smp_call_function_single_interrupt+0x103/0x640 arch/x86/kernel/smp.c:295 call_function_single_interrupt+0xa9/0xb0 arch/x86/entry/entry_64.S:942 RIP: 0010:__read_once_size include/linux/compiler.h:183 [inline] RIP: 0010:unwind_next_frame.part.6+0x5b1/0xb40 arch/x86/kernel/unwind_frame.c:326 RSP: 0000:ffff8801c0b47168 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff04 RAX: dffffc0000000000 RBX: ffff8801c0b47288 RCX: ffff8801c0b47238 RDX: ffff8801c0b472b0 RSI: 1ffff10038168ec2 RDI: ffff8801c0b47f48 RBP: ffff8801c0b47260 R08: ffff8801c0b472c0 R09: ffff8801caed41c0 R10: 000000000000000b R11: ffffed0038168e5b R12: 1ffff10038168e33 R13: ffff8801c0b47610 R14: ffff8801c0b47610 R15: ffff8801c0b472d8 unwind_next_frame+0x3e/0x50 arch/x86/kernel/unwind_frame.c:287 __save_stack_trace+0x6e/0xd0 arch/x86/kernel/stacktrace.c:44 save_stack_trace+0x1a/0x20 arch/x86/kernel/stacktrace.c:60 save_stack+0x43/0xd0 mm/kasan/kasan.c:447 set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0xad/0xe0 mm/kasan/kasan.c:551 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:489 slab_post_alloc_hook mm/slab.h:442 [inline] slab_alloc mm/slab.c:3382 [inline] kmem_cache_alloc+0x11b/0x760 mm/slab.c:3542 anon_vma_alloc mm/rmap.c:81 [inline] __anon_vma_prepare+0x39d/0x6b0 mm/rmap.c:189 anon_vma_prepare include/linux/rmap.h:153 [inline] do_huge_pmd_anonymous_page+0x1127/0x1b00 mm/huge_memory.c:678 create_huge_pmd mm/memory.c:3828 [inline] __handle_mm_fault+0x1a0c/0x3ce0 mm/memory.c:4032 handle_mm_fault+0x334/0x8d0 mm/memory.c:4098 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1429 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1504 page_fault+0x4c/0x60 arch/x86/entry/entry_64.S:1243 RIP: 0023:0x8066d0f RSP: 002b:000000000844f93c EFLAGS: 00010203 RAX: 0000000000000000 RBX: 000000000844f9a8 RCX: 0000000000000004 RDX: 0000000000000002 RSI: 00000000081400c8 RDI: 0000000020ceffee RBP: 0000000020ceffee R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Code: 0f 1f 80 00 00 00 00 55 48 89 e5 0f 20 d8 5d c3 0f 1f 80 00 00 00 00 55 48 89 e5 0f 22 df 5d c3 0f 1f 80 00 00 00 00 55 48 89 e5 <0f> 22 e7 5d c3 0f 1f 80 00 00 00 00 55 48 89 e5 44 0f 20 c0 5d RIP: native_write_cr4+0x4/0x10 arch/x86/include/asm/special_insns.h:76 RSP: ffff8801db207ca8 ---[ end trace 18031c481adeb2a2 ]---