BUG: unable to handle page fault for address: ffffc900061ca330 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 11800067 P4D 11800067 PUD 119c9067 PMD 1de6d067 PTE 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 3640 Comm: syz-executor.2 Not tainted 5.19.0-syzkaller-13930-g7ebfc85e2cd7 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 RIP: 0010:arch_atomic_read arch/x86/include/asm/atomic.h:29 [inline] RIP: 0010:atomic_read include/linux/atomic/atomic-instrumented.h:28 [inline] RIP: 0010:kvm_arch_hardware_enable+0x2ab/0x840 arch/x86/kvm/x86.c:11847 Code: 48 89 e8 48 b9 00 00 00 00 00 fc ff df 48 c1 e8 03 0f b6 14 08 48 89 e8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 ed 04 00 00 <41> 8b 95 30 13 00 00 4d 8d b5 40 12 00 00 b9 08 00 00 00 4c 89 fe RSP: 0018:ffffc90000007ea0 EFLAGS: 00010082 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff81120fe0 RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffc900061ca330 RBP: ffffc900061ca330 R08: 0000000000000000 R09: 0000000000000003 R10: fffff52000c39466 R11: 0000000000000001 R12: 0000000000000000 R13: ffffc900061c9000 R14: 0023001000000000 R15: ffffc90000007ef8 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0063) knlGS:0000000057190380 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: ffffc900061ca330 CR3: 0000000061f9c000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: hardware_enable_nolock+0xa7/0x140 arch/x86/kvm/../../../virt/kvm/kvm_main.c:5007 __flush_smp_call_function_queue+0x205/0x9a0 kernel/smp.c:631 __sysvec_call_function_single+0x95/0x3d0 arch/x86/kernel/smp.c:248 sysvec_call_function_single+0x8e/0xc0 arch/x86/kernel/smp.c:243 asm_sysvec_call_function_single+0x16/0x20 arch/x86/include/asm/idtentry.h:657 RIP: 0010:lock_acquire+0x1ef/0x570 kernel/locking/lockdep.c:5634 Code: fc a2 7e 83 f8 01 0f 85 e8 02 00 00 9c 58 f6 c4 02 0f 85 fb 02 00 00 48 83 7c 24 08 00 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24 RSP: 0018:ffffc900047cf730 EFLAGS: 00000206 RAX: dffffc0000000000 RBX: 1ffff920008f9ee8 RCX: ffffffff815f273e RDX: 1ffff1100421ac5e RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff908db977 R10: fffffbfff211b72e R11: 0000000000000000 R12: 0000000000000001 R13: 0000000000000000 R14: ffff888027aa3928 R15: 0000000000000000 __might_fault mm/memory.c:5577 [inline] __might_fault+0x104/0x170 mm/memory.c:5570 _copy_to_user+0x25/0x140 lib/usercopy.c:28 copy_to_user include/linux/uaccess.h:160 [inline] xt_data_to_user+0x6f/0xf0 net/netfilter/x_tables.c:316 xt_compat_target_to_user+0x318/0x3f0 net/netfilter/x_tables.c:1173 compat_copy_entry_to_user net/ipv6/netfilter/ip6_tables.c:1261 [inline] compat_copy_entries_to_user net/ipv6/netfilter/ip6_tables.c:1572 [inline] compat_get_entries+0x5a3/0x7d0 net/ipv6/netfilter/ip6_tables.c:1608 do_ip6t_get_ctl+0x4ed/0xa10 net/ipv6/netfilter/ip6_tables.c:1669 nf_getsockopt+0x72/0xd0 net/netfilter/nf_sockopt.c:116 ipv6_getsockopt+0x1be/0x270 net/ipv6/ipv6_sockglue.c:1504 tcp_getsockopt+0x86/0xd0 net/ipv4/tcp.c:4391 __sys_getsockopt+0x216/0x690 net/socket.c:2296 __do_compat_sys_socketcall+0x513/0x660 net/compat.c:491 do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline] __do_fast_syscall_32+0x65/0xf0 arch/x86/entry/common.c:178 do_fast_syscall_32+0x2f/0x70 arch/x86/entry/common.c:203 entry_SYSENTER_compat_after_hwframe+0x70/0x82 RIP: 0023:0xf7f9c549 Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 RSP: 002b:00000000f748f650 EFLAGS: 00000286 ORIG_RAX: 0000000000000066 RAX: ffffffffffffffda RBX: 000000000000000f RCX: 00000000f748f668 RDX: 000000006e696200 RSI: 00000000f748f6d8 RDI: 00000000f748f72c RBP: 00000000f6f39e7c R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000286 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Modules linked in: CR2: ffffc900061ca330 ---[ end trace 0000000000000000 ]--- RIP: 0010:arch_atomic_read arch/x86/include/asm/atomic.h:29 [inline] RIP: 0010:atomic_read include/linux/atomic/atomic-instrumented.h:28 [inline] RIP: 0010:kvm_arch_hardware_enable+0x2ab/0x840 arch/x86/kvm/x86.c:11847 Code: 48 89 e8 48 b9 00 00 00 00 00 fc ff df 48 c1 e8 03 0f b6 14 08 48 89 e8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 ed 04 00 00 <41> 8b 95 30 13 00 00 4d 8d b5 40 12 00 00 b9 08 00 00 00 4c 89 fe RSP: 0018:ffffc90000007ea0 EFLAGS: 00010082 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff81120fe0 RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffc900061ca330 RBP: ffffc900061ca330 R08: 0000000000000000 R09: 0000000000000003 R10: fffff52000c39466 R11: 0000000000000001 R12: 0000000000000000 R13: ffffc900061c9000 R14: 0023001000000000 R15: ffffc90000007ef8 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0063) knlGS:0000000057190380 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: ffffc900061ca330 CR3: 0000000061f9c000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 48 89 e8 mov %rbp,%rax 3: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx a: fc ff df d: 48 c1 e8 03 shr $0x3,%rax 11: 0f b6 14 08 movzbl (%rax,%rcx,1),%edx 15: 48 89 e8 mov %rbp,%rax 18: 83 e0 07 and $0x7,%eax 1b: 83 c0 03 add $0x3,%eax 1e: 38 d0 cmp %dl,%al 20: 7c 08 jl 0x2a 22: 84 d2 test %dl,%dl 24: 0f 85 ed 04 00 00 jne 0x517 * 2a: 41 8b 95 30 13 00 00 mov 0x1330(%r13),%edx <-- trapping instruction 31: 4d 8d b5 40 12 00 00 lea 0x1240(%r13),%r14 38: b9 08 00 00 00 mov $0x8,%ecx 3d: 4c 89 fe mov %r15,%rsi