BUG: unable to handle page fault for address: ffffc9000a23d330
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 12000067
P4D 12000067
PUD 121c9067
PMD 25f0d067
PTE 0
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 27 Comm: kauditd Not tainted 5.19.0-syzkaller-13930-g7ebfc85e2cd7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
RIP: 0010:arch_atomic_read arch/x86/include/asm/atomic.h:29 [inline]
RIP: 0010:atomic_read include/linux/atomic/atomic-instrumented.h:28 [inline]
RIP: 0010:kvm_arch_hardware_enable+0x1d1/0x6d0 arch/x86/kvm/x86.c:11847
Code: 89 5c 24 38 4c 8d 73 f0 4c 89 f7 be 04 00 00 00 e8 a4 44 cc 00 4d 89 f5 49 c1 ed 03 43 0f b6 44 3d 00 84 c0 0f 85 08 02 00 00 <41> 8b 06 ff c8 48 63 d0 4c 89 64 24 10 4c 89 e7 48 8d 74 24 60 b9
RSP: 0018:ffffc900001e0e60 EFLAGS: 00010086
RAX: 0000000000000000 RBX: ffffc9000a23d340 RCX: ffffffff8110f0c2
RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffc9000a23d330
RBP: ffffc900001e0f30 R08: dffffc0000000000 R09: fffff52001447a66
R10: fffff52001447a67 R11: 1ffff92001447a66 R12: ffffc9000a23d240
R13: 1ffff92001447a66 R14: ffffc9000a23d330 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc9000a23d330 CR3: 000000008cec7000 CR4: 00000000003526e0
Call Trace:
hardware_enable_nolock+0xa1/0x140 arch/x86/kvm/../../../virt/kvm/kvm_main.c:5007
__flush_smp_call_function_queue+0x2bc/0xcc0 kernel/smp.c:631
__sysvec_call_function_single+0x62/0x70 arch/x86/kernel/smp.c:248
sysvec_call_function_single+0x8c/0xb0 arch/x86/kernel/smp.c:243
asm_sysvec_call_function_single+0x16/0x20
RIP: 0010:console_emit_next_record+0x8b6/0xa60 kernel/printk/printk.c:2741
Code: b0 03 1c 00 48 8b 44 24 48 42 80 3c 20 00 44 8a 6c 24 17 4c 8b 74 24 28 48 8b 5c 24 38 74 08 4c 89 f7 e8 4d a2 6f 00 49 ff 06 <48> c7 84 24 80 00 00 00 0e 36 e0 45 49 c7 04 1c 00 00 00 00 49 c7
RSP: 0018:ffffc90000a3f8c0 EFLAGS: 00000293
RAX: ffffffff816d8f18 RBX: 1ffff92000147f28 RCX: ffff888012f3d880
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90000a3faf0 R08: ffffffff816d8eef R09: fffffbfff1c4ace6
R10: fffffbfff1c4ace6 R11: 1ffffffff1c4ace5 R12: dffffc0000000000
R13: 0000000000000201 R14: 0000000000000046 R15: 0000000000000200
console_unlock+0x26b/0x6f0 kernel/printk/printk.c:2861
vprintk_emit+0xd1/0x1e0 kernel/printk/printk.c:2271
_printk+0xcf/0x10f kernel/printk/printk.c:2292
kauditd_printk_skb kernel/audit.c:538 [inline]
kauditd_hold_skb+0x1b8/0x200 kernel/audit.c:573
kauditd_send_queue+0x2c7/0x330 kernel/audit.c:758
kauditd_thread+0x710/0xb30 kernel/audit.c:882
kthread+0x266/0x300 kernel/kthread.c:376
ret_from_fork+0x1f/0x30
Modules linked in:
CR2: ffffc9000a23d330
---[ end trace 0000000000000000 ]---
RIP: 0010:arch_atomic_read arch/x86/include/asm/atomic.h:29 [inline]
RIP: 0010:atomic_read include/linux/atomic/atomic-instrumented.h:28 [inline]
RIP: 0010:kvm_arch_hardware_enable+0x1d1/0x6d0 arch/x86/kvm/x86.c:11847
Code: 89 5c 24 38 4c 8d 73 f0 4c 89 f7 be 04 00 00 00 e8 a4 44 cc 00 4d 89 f5 49 c1 ed 03 43 0f b6 44 3d 00 84 c0 0f 85 08 02 00 00 <41> 8b 06 ff c8 48 63 d0 4c 89 64 24 10 4c 89 e7 48 8d 74 24 60 b9
RSP: 0018:ffffc900001e0e60 EFLAGS: 00010086
RAX: 0000000000000000 RBX: ffffc9000a23d340 RCX: ffffffff8110f0c2
RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffc9000a23d330
RBP: ffffc900001e0f30 R08: dffffc0000000000 R09: fffff52001447a66
R10: fffff52001447a67 R11: 1ffff92001447a66 R12: ffffc9000a23d240
R13: 1ffff92001447a66 R14: ffffc9000a23d330 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc9000a23d330 CR3: 000000008cec7000 CR4: 00000000003526e0
----------------
Code disassembly (best guess):
0: 89 5c 24 38 mov %ebx,0x38(%rsp)
4: 4c 8d 73 f0 lea -0x10(%rbx),%r14
8: 4c 89 f7 mov %r14,%rdi
b: be 04 00 00 00 mov $0x4,%esi
10: e8 a4 44 cc 00 callq 0xcc44b9
15: 4d 89 f5 mov %r14,%r13
18: 49 c1 ed 03 shr $0x3,%r13
1c: 43 0f b6 44 3d 00 movzbl 0x0(%r13,%r15,1),%eax
22: 84 c0 test %al,%al
24: 0f 85 08 02 00 00 jne 0x232
* 2a: 41 8b 06 mov (%r14),%eax <-- trapping instruction
2d: ff c8 dec %eax
2f: 48 63 d0 movslq %eax,%rdx
32: 4c 89 64 24 10 mov %r12,0x10(%rsp)
37: 4c 89 e7 mov %r12,%rdi
3a: 48 8d 74 24 60 lea 0x60(%rsp),%rsi
3f: b9 .byte 0xb9