------------[ cut here ]------------ WARNING: CPU: 0 PID: 5697 at arch/arm64/kvm/inject_fault.c:71 pend_serror_exception+0x19c/0x5ac arch/arm64/kvm/inject_fault.c:71 Modules linked in: CPU: 0 UID: 0 PID: 5697 Comm: syz.0.648 Not tainted 6.16.0-rc3-syzkaller-g15724a984643 #0 PREEMPT Hardware name: linux,dummy-virt (DT) pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) pc : pend_serror_exception+0x19c/0x5ac arch/arm64/kvm/inject_fault.c:71 lr : pend_serror_exception+0x19c/0x5ac arch/arm64/kvm/inject_fault.c:71 sp : ffff80008cdc7930 x29: ffff80008cdc7930 x28: c6f00000185e1da8 x27: 0000000000000001 x26: 0000000000000000 x25: 0000000000000001 x24: 00000000000000c6 x23: c6f00000185e2028 x22: 00000000000000c6 x21: c6f00000185e2c01 x20: 0000000000000007 x19: efff800000000000 x18: 00000000000000ff x17: 00000000060eb4a0 x16: 00000000000000b9 x15: 0000000020000200 x14: ffffffffffffffff x13: 0000000000000028 x12: 00000000000000b3 x11: b3f000000de232e4 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : b3f000000de21d80 x7 : ffff800080b08704 x6 : ffff80008cdc7a88 x5 : ffff80008cdc7a88 x4 : 0000000000000001 x3 : ffff8000801a2e80 x2 : 0000000000000000 x1 : 0000000000000002 x0 : 0000000000000000 Call trace: pend_serror_exception+0x19c/0x5ac arch/arm64/kvm/inject_fault.c:71 (P) kvm_inject_serror_esr+0x274/0xe40 arch/arm64/kvm/inject_fault.c:330 __kvm_arm_vcpu_set_events+0x1d4/0x238 arch/arm64/kvm/guest.c:-1 kvm_arm_vcpu_set_events arch/arm64/kvm/arm.c:1698 [inline] kvm_arch_vcpu_ioctl+0xed8/0x16b0 arch/arm64/kvm/arm.c:1810 kvm_vcpu_ioctl+0x5c4/0xc2c virt/kvm/kvm_main.c:4632 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl fs/ioctl.c:893 [inline] __arm64_sys_ioctl+0x18c/0x244 fs/ioctl.c:893 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x90/0x2b4 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x180/0x2f4 arch/arm64/kernel/syscall.c:132 do_el0_svc+0x58/0x74 arch/arm64/kernel/syscall.c:151 el0_svc+0x58/0x160 arch/arm64/kernel/entry-common.c:767 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 irq event stamp: 158 hardirqs last enabled at (157): [] raw_spin_rq_unlock_irq kernel/sched/sched.h:1544 [inline] hardirqs last enabled at (157): [] finish_lock_switch+0xa4/0x1c4 kernel/sched/core.c:5144 hardirqs last disabled at (158): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:511 softirqs last enabled at (154): [] softirq_handle_end kernel/softirq.c:425 [inline] softirqs last enabled at (154): [] handle_softirqs+0xb8c/0xd08 kernel/softirq.c:607 softirqs last disabled at (145): [] __do_softirq+0x14/0x20 kernel/softirq.c:613 ---[ end trace 0000000000000000 ]---