BUG: unable to handle page fault for address: ffffc900061ca330
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 11800067
P4D 11800067
PUD 119c9067 PMD 1de6d067
PTE 0
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 3640 Comm: syz-executor.2 Not tainted 5.19.0-syzkaller-13930-g7ebfc85e2cd7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
RIP: 0010:arch_atomic_read arch/x86/include/asm/atomic.h:29 [inline]
RIP: 0010:atomic_read include/linux/atomic/atomic-instrumented.h:28 [inline]
RIP: 0010:kvm_arch_hardware_enable+0x2ab/0x840 arch/x86/kvm/x86.c:11847
Code: 48 89 e8 48 b9 00 00 00 00 00 fc ff df 48 c1 e8 03 0f b6 14 08 48 89 e8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 ed 04 00 00 <41> 8b 95 30 13 00 00 4d 8d b5 40 12 00 00 b9 08 00 00 00 4c 89 fe
RSP: 0018:ffffc90000007ea0 EFLAGS: 00010082
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff81120fe0
RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffc900061ca330
RBP: ffffc900061ca330 R08: 0000000000000000 R09: 0000000000000003
R10: fffff52000c39466 R11: 0000000000000001 R12: 0000000000000000
R13: ffffc900061c9000 R14: 0023001000000000 R15: ffffc90000007ef8
FS: 0000000000000000(0000) GS:ffff8880b9a00000(0063) knlGS:0000000057190380
CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033
CR2: ffffc900061ca330 CR3: 0000000061f9c000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
hardware_enable_nolock+0xa7/0x140 arch/x86/kvm/../../../virt/kvm/kvm_main.c:5007
__flush_smp_call_function_queue+0x205/0x9a0 kernel/smp.c:631
__sysvec_call_function_single+0x95/0x3d0 arch/x86/kernel/smp.c:248
sysvec_call_function_single+0x8e/0xc0 arch/x86/kernel/smp.c:243
asm_sysvec_call_function_single+0x16/0x20 arch/x86/include/asm/idtentry.h:657
RIP: 0010:lock_acquire+0x1ef/0x570 kernel/locking/lockdep.c:5634
Code: fc a2 7e 83 f8 01 0f 85 e8 02 00 00 9c 58 f6 c4 02 0f 85 fb 02 00 00 48 83 7c 24 08 00 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24
RSP: 0018:ffffc900047cf730 EFLAGS: 00000206
RAX: dffffc0000000000 RBX: 1ffff920008f9ee8 RCX: ffffffff815f273e
RDX: 1ffff1100421ac5e RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff908db977
R10: fffffbfff211b72e R11: 0000000000000000 R12: 0000000000000001
R13: 0000000000000000 R14: ffff888027aa3928 R15: 0000000000000000
__might_fault mm/memory.c:5577 [inline]
__might_fault+0x104/0x170 mm/memory.c:5570
_copy_to_user+0x25/0x140 lib/usercopy.c:28
copy_to_user include/linux/uaccess.h:160 [inline]
xt_data_to_user+0x6f/0xf0 net/netfilter/x_tables.c:316
xt_compat_target_to_user+0x318/0x3f0 net/netfilter/x_tables.c:1173
compat_copy_entry_to_user net/ipv6/netfilter/ip6_tables.c:1261 [inline]
compat_copy_entries_to_user net/ipv6/netfilter/ip6_tables.c:1572 [inline]
compat_get_entries+0x5a3/0x7d0 net/ipv6/netfilter/ip6_tables.c:1608
do_ip6t_get_ctl+0x4ed/0xa10 net/ipv6/netfilter/ip6_tables.c:1669
nf_getsockopt+0x72/0xd0 net/netfilter/nf_sockopt.c:116
ipv6_getsockopt+0x1be/0x270 net/ipv6/ipv6_sockglue.c:1504
tcp_getsockopt+0x86/0xd0 net/ipv4/tcp.c:4391
__sys_getsockopt+0x216/0x690 net/socket.c:2296
__do_compat_sys_socketcall+0x513/0x660 net/compat.c:491
do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]
__do_fast_syscall_32+0x65/0xf0 arch/x86/entry/common.c:178
do_fast_syscall_32+0x2f/0x70 arch/x86/entry/common.c:203
entry_SYSENTER_compat_after_hwframe+0x70/0x82
RIP: 0023:0xf7f9c549
Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
RSP: 002b:00000000f748f650 EFLAGS: 00000286 ORIG_RAX: 0000000000000066
RAX: ffffffffffffffda RBX: 000000000000000f RCX: 00000000f748f668
RDX: 000000006e696200 RSI: 00000000f748f6d8 RDI: 00000000f748f72c
RBP: 00000000f6f39e7c R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000286 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
Modules linked in:
CR2: ffffc900061ca330
---[ end trace 0000000000000000 ]---
RIP: 0010:arch_atomic_read arch/x86/include/asm/atomic.h:29 [inline]
RIP: 0010:atomic_read include/linux/atomic/atomic-instrumented.h:28 [inline]
RIP: 0010:kvm_arch_hardware_enable+0x2ab/0x840 arch/x86/kvm/x86.c:11847
Code: 48 89 e8 48 b9 00 00 00 00 00 fc ff df 48 c1 e8 03 0f b6 14 08 48 89 e8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 ed 04 00 00 <41> 8b 95 30 13 00 00 4d 8d b5 40 12 00 00 b9 08 00 00 00 4c 89 fe
RSP: 0018:ffffc90000007ea0 EFLAGS: 00010082
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff81120fe0
RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffc900061ca330
RBP: ffffc900061ca330 R08: 0000000000000000 R09: 0000000000000003
R10: fffff52000c39466 R11: 0000000000000001 R12: 0000000000000000
R13: ffffc900061c9000 R14: 0023001000000000 R15: ffffc90000007ef8
FS: 0000000000000000(0000) GS:ffff8880b9a00000(0063) knlGS:0000000057190380
CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033
CR2: ffffc900061ca330 CR3: 0000000061f9c000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 48 89 e8 mov %rbp,%rax
3: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx
a: fc ff df
d: 48 c1 e8 03 shr $0x3,%rax
11: 0f b6 14 08 movzbl (%rax,%rcx,1),%edx
15: 48 89 e8 mov %rbp,%rax
18: 83 e0 07 and $0x7,%eax
1b: 83 c0 03 add $0x3,%eax
1e: 38 d0 cmp %dl,%al
20: 7c 08 jl 0x2a
22: 84 d2 test %dl,%dl
24: 0f 85 ed 04 00 00 jne 0x517
* 2a: 41 8b 95 30 13 00 00 mov 0x1330(%r13),%edx <-- trapping instruction
31: 4d 8d b5 40 12 00 00 lea 0x1240(%r13),%r14
38: b9 08 00 00 00 mov $0x8,%ecx
3d: 4c 89 fe mov %r15,%rsi