BUG: unable to handle page fault for address: ffffffffffffff64
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD b88f067 P4D b88f067 PUD b891067 PMD 0
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 6570 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:wait_consider_task+0xae/0x3b80 kernel/exit.c:1295
Code: 8f 5c 05 00 00 48 89 c8 48 89 4c 24 10 48 c1 e8 03 0f b6 14 28 48 89 c8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 c2 1a 00 00 <45> 8b a7 5c 05 00 00 bf 10 00 00 00 44 89 e6 e8 be ae 31 00 41 83
RSP: 0018:ffffc90002a4fb60 EFLAGS: 00010246
RAX: 0000000000000007 RBX: 0000000000000000 RCX: ffffffffffffff64
RDX: 0000000000000000 RSI: ffffffff8145fde2 RDI: ffffc90002a4fd18
RBP: dffffc0000000000 R08: 0000000000000000 R09: ffffffff8b80a083
R10: ffffffff81463fb6 R11: 0000000000000000 R12: dffffc0000000000
R13: ffff88801c763a00 R14: 0000000000000000 R15: fffffffffffffa08
FS: 0000555556289400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffff64 CR3: 00000000447a7000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 00000000b8fecd19 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
do_wait_thread kernel/exit.c:1404 [inline]
do_wait+0x6ca/0xce0 kernel/exit.c:1521
kernel_wait4+0x14c/0x260 kernel/exit.c:1684
__do_sys_wait4+0x13f/0x150 kernel/exit.c:1712
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fa02d401fb7
Code: 89 7c 24 10 48 89 4c 24 18 e8 35 50 02 00 4c 8b 54 24 18 8b 54 24 14 41 89 c0 48 8b 74 24 08 8b 7c 24 10 b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 89 44 24 10 e8 65 50 02 00 8b 44
RSP: 002b:00007fa02da4ad50 EFLAGS: 00000293 ORIG_RAX: 000000000000003d
RAX: ffffffffffffffda RBX: 0000000000002a5a RCX: 00007fa02d401fb7
RDX: 0000000040000001 RSI: 00007fa02da4addc RDI: 00000000ffffffff
RBP: 00007fa02da4addc R08: 0000000000000000 R09: 00007ffcf51d1080
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000032
R13: 000000000031c2fb R14: 0000000000000000 R15: 00007fa02da4ae40
</TASK>
Modules linked in:
CR2: ffffffffffffff64
---[ end trace 10246ccf24150519 ]---
RIP: 0010:wait_consider_task+0xae/0x3b80 kernel/exit.c:1295
Code: 8f 5c 05 00 00 48 89 c8 48 89 4c 24 10 48 c1 e8 03 0f b6 14 28 48 89 c8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 c2 1a 00 00 <45> 8b a7 5c 05 00 00 bf 10 00 00 00 44 89 e6 e8 be ae 31 00 41 83
RSP: 0018:ffffc90002a4fb60 EFLAGS: 00010246
RAX: 0000000000000007 RBX: 0000000000000000 RCX: ffffffffffffff64
RDX: 0000000000000000 RSI: ffffffff8145fde2 RDI: ffffc90002a4fd18
RBP: dffffc0000000000 R08: 0000000000000000 R09: ffffffff8b80a083
R10: ffffffff81463fb6 R11: 0000000000000000 R12: dffffc0000000000
R13: ffff88801c763a00 R14: 0000000000000000 R15: fffffffffffffa08
FS: 0000555556289400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffff64 CR3: 00000000447a7000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 00000000b8fecd19 DR6: 00000000ffff0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess), 1 bytes skipped:
0: 5c pop %rsp
1: 05 00 00 48 89 add $0x89480000,%eax
6: c8 48 89 4c enterq $0x8948,$0x4c
a: 24 10 and $0x10,%al
c: 48 c1 e8 03 shr $0x3,%rax
10: 0f b6 14 28 movzbl (%rax,%rbp,1),%edx
14: 48 89 c8 mov %rcx,%rax
17: 83 e0 07 and $0x7,%eax
1a: 83 c0 03 add $0x3,%eax
1d: 38 d0 cmp %dl,%al
1f: 7c 08 jl 0x29
21: 84 d2 test %dl,%dl
23: 0f 85 c2 1a 00 00 jne 0x1aeb
* 29: 45 8b a7 5c 05 00 00 mov 0x55c(%r15),%r12d <-- trapping instruction
30: bf 10 00 00 00 mov $0x10,%edi
35: 44 89 e6 mov %r12d,%esi
38: e8 be ae 31 00 callq 0x31aefb
3d: 41 rex.B
3e: 83 .byte 0x83