BUG: unable to handle page fault for address: ffffc9000a23d330 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 12000067 P4D 12000067 PUD 121c9067 PMD 25f0d067 PTE 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 27 Comm: kauditd Not tainted 5.19.0-syzkaller-13930-g7ebfc85e2cd7 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 RIP: 0010:arch_atomic_read arch/x86/include/asm/atomic.h:29 [inline] RIP: 0010:atomic_read include/linux/atomic/atomic-instrumented.h:28 [inline] RIP: 0010:kvm_arch_hardware_enable+0x1d1/0x6d0 arch/x86/kvm/x86.c:11847 Code: 89 5c 24 38 4c 8d 73 f0 4c 89 f7 be 04 00 00 00 e8 a4 44 cc 00 4d 89 f5 49 c1 ed 03 43 0f b6 44 3d 00 84 c0 0f 85 08 02 00 00 <41> 8b 06 ff c8 48 63 d0 4c 89 64 24 10 4c 89 e7 48 8d 74 24 60 b9 RSP: 0018:ffffc900001e0e60 EFLAGS: 00010086 RAX: 0000000000000000 RBX: ffffc9000a23d340 RCX: ffffffff8110f0c2 RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffc9000a23d330 RBP: ffffc900001e0f30 R08: dffffc0000000000 R09: fffff52001447a66 R10: fffff52001447a67 R11: 1ffff92001447a66 R12: ffffc9000a23d240 R13: 1ffff92001447a66 R14: ffffc9000a23d330 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000a23d330 CR3: 000000008cec7000 CR4: 00000000003526e0 Call Trace: hardware_enable_nolock+0xa1/0x140 arch/x86/kvm/../../../virt/kvm/kvm_main.c:5007 __flush_smp_call_function_queue+0x2bc/0xcc0 kernel/smp.c:631 __sysvec_call_function_single+0x62/0x70 arch/x86/kernel/smp.c:248 sysvec_call_function_single+0x8c/0xb0 arch/x86/kernel/smp.c:243 asm_sysvec_call_function_single+0x16/0x20 RIP: 0010:console_emit_next_record+0x8b6/0xa60 kernel/printk/printk.c:2741 Code: b0 03 1c 00 48 8b 44 24 48 42 80 3c 20 00 44 8a 6c 24 17 4c 8b 74 24 28 48 8b 5c 24 38 74 08 4c 89 f7 e8 4d a2 6f 00 49 ff 06 <48> c7 84 24 80 00 00 00 0e 36 e0 45 49 c7 04 1c 00 00 00 00 49 c7 RSP: 0018:ffffc90000a3f8c0 EFLAGS: 00000293 RAX: ffffffff816d8f18 RBX: 1ffff92000147f28 RCX: ffff888012f3d880 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc90000a3faf0 R08: ffffffff816d8eef R09: fffffbfff1c4ace6 R10: fffffbfff1c4ace6 R11: 1ffffffff1c4ace5 R12: dffffc0000000000 R13: 0000000000000201 R14: 0000000000000046 R15: 0000000000000200 console_unlock+0x26b/0x6f0 kernel/printk/printk.c:2861 vprintk_emit+0xd1/0x1e0 kernel/printk/printk.c:2271 _printk+0xcf/0x10f kernel/printk/printk.c:2292 kauditd_printk_skb kernel/audit.c:538 [inline] kauditd_hold_skb+0x1b8/0x200 kernel/audit.c:573 kauditd_send_queue+0x2c7/0x330 kernel/audit.c:758 kauditd_thread+0x710/0xb30 kernel/audit.c:882 kthread+0x266/0x300 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 Modules linked in: CR2: ffffc9000a23d330 ---[ end trace 0000000000000000 ]--- RIP: 0010:arch_atomic_read arch/x86/include/asm/atomic.h:29 [inline] RIP: 0010:atomic_read include/linux/atomic/atomic-instrumented.h:28 [inline] RIP: 0010:kvm_arch_hardware_enable+0x1d1/0x6d0 arch/x86/kvm/x86.c:11847 Code: 89 5c 24 38 4c 8d 73 f0 4c 89 f7 be 04 00 00 00 e8 a4 44 cc 00 4d 89 f5 49 c1 ed 03 43 0f b6 44 3d 00 84 c0 0f 85 08 02 00 00 <41> 8b 06 ff c8 48 63 d0 4c 89 64 24 10 4c 89 e7 48 8d 74 24 60 b9 RSP: 0018:ffffc900001e0e60 EFLAGS: 00010086 RAX: 0000000000000000 RBX: ffffc9000a23d340 RCX: ffffffff8110f0c2 RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffc9000a23d330 RBP: ffffc900001e0f30 R08: dffffc0000000000 R09: fffff52001447a66 R10: fffff52001447a67 R11: 1ffff92001447a66 R12: ffffc9000a23d240 R13: 1ffff92001447a66 R14: ffffc9000a23d330 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000a23d330 CR3: 000000008cec7000 CR4: 00000000003526e0 ---------------- Code disassembly (best guess): 0: 89 5c 24 38 mov %ebx,0x38(%rsp) 4: 4c 8d 73 f0 lea -0x10(%rbx),%r14 8: 4c 89 f7 mov %r14,%rdi b: be 04 00 00 00 mov $0x4,%esi 10: e8 a4 44 cc 00 callq 0xcc44b9 15: 4d 89 f5 mov %r14,%r13 18: 49 c1 ed 03 shr $0x3,%r13 1c: 43 0f b6 44 3d 00 movzbl 0x0(%r13,%r15,1),%eax 22: 84 c0 test %al,%al 24: 0f 85 08 02 00 00 jne 0x232 * 2a: 41 8b 06 mov (%r14),%eax <-- trapping instruction 2d: ff c8 dec %eax 2f: 48 63 d0 movslq %eax,%rdx 32: 4c 89 64 24 10 mov %r12,0x10(%rsp) 37: 4c 89 e7 mov %r12,%rdi 3a: 48 8d 74 24 60 lea 0x60(%rsp),%rsi 3f: b9 .byte 0xb9