------------[ cut here ]------------ WARNING: CPU: 0 PID: 6167 at arch/arm64/kvm/inject_fault.c:71 pend_serror_exception+0x19c/0x5ac arch/arm64/kvm/inject_fault.c:71 Modules linked in: CPU: 0 UID: 0 PID: 6167 Comm: syz.0.806 Not tainted 6.16.0-rc3-syzkaller-g15724a984643 #0 PREEMPT Hardware name: linux,dummy-virt (DT) pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) pc : pend_serror_exception+0x19c/0x5ac arch/arm64/kvm/inject_fault.c:71 lr : pend_serror_exception+0x19c/0x5ac arch/arm64/kvm/inject_fault.c:71 sp : ffff80008ec07930 x29: ffff80008ec07930 x28: c1f000001d331da8 x27: 0000000000000001 x26: 0000000000000000 x25: 0000000000000001 x24: 00000000000000c1 x23: c1f000001d332028 x22: 00000000000000c1 x21: c1f000001d332c01 x20: 0000000000000007 x19: efff800000000000 x18: 0000000000000000 x17: 00000000000000bf x16: ffff800080011d9c x15: 0000000020000200 x14: ffffffffffffffff x13: 0000000000000028 x12: 00000000000000b7 x11: b7f000001d0fede4 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : b7f000001d0fd880 x7 : ffff800080b08704 x6 : ffff80008ec07a88 x5 : ffff80008ec07a88 x4 : 0000000000000001 x3 : ffff8000801a2e80 x2 : 0000000000000000 x1 : 0000000000000002 x0 : 0000000000000000 Call trace: pend_serror_exception+0x19c/0x5ac arch/arm64/kvm/inject_fault.c:71 (P) kvm_inject_serror_esr+0x274/0xe40 arch/arm64/kvm/inject_fault.c:330 __kvm_arm_vcpu_set_events+0x1d4/0x238 arch/arm64/kvm/guest.c:-1 kvm_arm_vcpu_set_events arch/arm64/kvm/arm.c:1698 [inline] kvm_arch_vcpu_ioctl+0xed8/0x16b0 arch/arm64/kvm/arm.c:1810 kvm_vcpu_ioctl+0x5c4/0xc2c virt/kvm/kvm_main.c:4632 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl fs/ioctl.c:893 [inline] __arm64_sys_ioctl+0x18c/0x244 fs/ioctl.c:893 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x90/0x2b4 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x180/0x2f4 arch/arm64/kernel/syscall.c:132 do_el0_svc+0x58/0x74 arch/arm64/kernel/syscall.c:151 el0_svc+0x58/0x160 arch/arm64/kernel/entry-common.c:767 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 irq event stamp: 2654 hardirqs last enabled at (2653): [] __raw_read_unlock_irqrestore include/linux/rwlock_api_smp.h:241 [inline] hardirqs last enabled at (2653): [] _raw_read_unlock_irqrestore+0x44/0xbc kernel/locking/spinlock.c:268 hardirqs last disabled at (2654): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:511 softirqs last enabled at (2630): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32 softirqs last disabled at (2628): [] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19 ---[ end trace 0000000000000000 ]---