------------[ cut here ]------------ WARNING: CPU: 0 PID: 6135 at arch/x86/kvm/../../../virt/kvm/dirty_ring.c:164 kvm_dirty_ring_push+0x3bf/0x490 arch/x86/kvm/../../../virt/kvm/dirty_ring.c:164 Modules linked in: CPU: 0 PID: 6135 Comm: syz-executor.4 Not tainted 5.16.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:kvm_dirty_ring_push+0x3bf/0x490 arch/x86/kvm/../../../virt/kvm/dirty_ring.c:164 Code: 00 48 c7 c2 60 4b a2 89 be 7a 01 00 00 48 c7 c7 a0 4c a2 89 c6 05 96 16 72 0c 01 e8 2e 8d f6 07 e9 76 ff ff ff e8 b1 41 6d 00 <0f> 0b 48 b8 00 00 00 00 00 fc ff df 4c 89 fa 48 c1 ea 03 0f b6 04 RSP: 0018:ffffc900050af5b0 EFLAGS: 00010246 RAX: 0000000000040000 RBX: 0000000000000800 RCX: ffffc900055a1000 RDX: 0000000000040000 RSI: ffffffff810a693f RDI: 0000000000000003 RBP: ffff88807dfb61c8 R08: 0000000000000800 R09: 0000000000000001 R10: ffffffff810a6623 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000800 R15: ffff88807dfb61d0 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0063) knlGS:00000000f5e63b40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 00000000f7047874 CR3: 0000000022194000 CR4: 00000000003526e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: mark_page_dirty_in_slot arch/x86/kvm/../../../virt/kvm/kvm_main.c:3030 [inline] mark_page_dirty_in_slot arch/x86/kvm/../../../virt/kvm/kvm_main.c:3021 [inline] __kvm_write_guest_page+0x2e3/0x3b0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2813 kvm_vcpu_write_guest_page arch/x86/kvm/../../../virt/kvm/kvm_main.c:2831 [inline] kvm_vcpu_write_guest+0x88/0x120 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2865 emulator_write_phys arch/x86/kvm/x86.c:6775 [inline] write_emulate+0x2f/0x70 arch/x86/kvm/x86.c:6815 emulator_read_write_onepage+0x3bb/0xb30 arch/x86/kvm/x86.c:6883 emulator_read_write+0x1c4/0x5a0 arch/x86/kvm/x86.c:6938 segmented_write.isra.0+0xee/0x140 arch/x86/kvm/emulate.c:1391 writeback+0x612/0x950 arch/x86/kvm/emulate.c:1753 x86_emulate_insn+0x19f5/0x39c0 arch/x86/kvm/emulate.c:5626 x86_emulate_instruction+0x714/0x1460 arch/x86/kvm/x86.c:8161 handle_io arch/x86/kvm/vmx/vmx.c:4888 [inline] handle_io+0x11d/0x1d0 arch/x86/kvm/vmx/vmx.c:4876 __vmx_handle_exit arch/x86/kvm/vmx/vmx.c:6017 [inline] vmx_handle_exit+0x4f7/0x18a0 arch/x86/kvm/vmx/vmx.c:6034 vcpu_enter_guest+0x298a/0x4380 arch/x86/kvm/x86.c:9982 vcpu_run arch/x86/kvm/x86.c:10049 [inline] kvm_arch_vcpu_ioctl_run+0x4fc/0x21a0 arch/x86/kvm/x86.c:10244 kvm_vcpu_ioctl+0x570/0xf30 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3727 kvm_vcpu_compat_ioctl+0x1f0/0x3b0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3927 __do_compat_sys_ioctl+0x1c7/0x290 fs/ioctl.c:972 do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline] __do_fast_syscall_32+0x65/0xf0 arch/x86/entry/common.c:178 do_fast_syscall_32+0x2f/0x70 arch/x86/entry/common.c:203 entry_SYSENTER_compat_after_hwframe+0x4d/0x5c RIP: 0023:0xf6e69549 Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 RSP: 002b:00000000f5e635fc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 ---------------- Code disassembly (best guess): 0: 03 74 c0 01 add 0x1(%rax,%rax,8),%esi 4: 10 05 03 74 b8 01 adc %al,0x1b87403(%rip) # 0x1b8740d a: 10 06 adc %al,(%rsi) c: 03 74 b4 01 add 0x1(%rsp,%rsi,4),%esi 10: 10 07 adc %al,(%rdi) 12: 03 74 b0 01 add 0x1(%rax,%rsi,4),%esi 16: 10 08 adc %cl,(%rax) 18: 03 74 d8 01 add 0x1(%rax,%rbx,8),%esi 1c: 00 00 add %al,(%rax) 1e: 00 00 add %al,(%rax) 20: 00 51 52 add %dl,0x52(%rcx) 23: 55 push %rbp 24: 89 e5 mov %esp,%ebp 26: 0f 34 sysenter 28: cd 80 int $0x80 * 2a: 5d pop %rbp <-- trapping instruction 2b: 5a pop %rdx 2c: 59 pop %rcx 2d: c3 retq 2e: 90 nop 2f: 90 nop 30: 90 nop 31: 90 nop 32: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi 39: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi