kthread+0x34b/0x3d0 kernel/kthread.c:313
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298
---[ end trace cf2105fa19a4556e ]---
BUG: unable to handle page fault for address: ffffed112437ffff
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 23fff2067 P4D 23fff2067 PUD 0
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 42 Comm: erofs_worker/1 Tainted: G W 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
RIP: 0010:z_erofs_decompress_pcluster fs/erofs/zdata.c:1043 [inline]
RIP: 0010:z_erofs_decompress_queue+0x863/0x1d20 fs/erofs/zdata.c:1188
Code: c0 0f 85 db 01 00 00 41 8b 04 24 c1 f8 02 89 c0 48 8b 4c 24 70 4c 8d 3c c1 4d 89 fc 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 ff e8 4e f4 7e ff 4d 8b 37 4d 85 f6 0f
RSP: 0018:ffffc900006bf7c0 EFLAGS: 00010a06
RAX: dffffc0000000000 RBX: ffffea0004843b40 RCX: ffff888121c00000
RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffea0004843b68
RBP: ffffc900006bfd30 R08: dffffc0000000000 R09: fffff9400090876e
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff1112437ffff
R13: 0000000000000000 R14: ffffea0004843b40 R15: ffff888921bffff8
FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffed112437ffff CR3: 000000011a965000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
z_erofs_decompressqueue_work fs/erofs/zdata.c:1199 [inline]
z_erofs_decompressqueue_kthread_work+0x95/0xe0 fs/erofs/zdata.c:896
kthread_worker_fn+0x48b/0x920 kernel/kthread.c:759
kthread+0x34b/0x3d0 kernel/kthread.c:313
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298
Modules linked in:
CR2: ffffed112437ffff
---[ end trace cf2105fa19a4556f ]---
RIP: 0010:z_erofs_decompress_pcluster fs/erofs/zdata.c:1043 [inline]
RIP: 0010:z_erofs_decompress_queue+0x863/0x1d20 fs/erofs/zdata.c:1188
Code: c0 0f 85 db 01 00 00 41 8b 04 24 c1 f8 02 89 c0 48 8b 4c 24 70 4c 8d 3c c1 4d 89 fc 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 ff e8 4e f4 7e ff 4d 8b 37 4d 85 f6 0f
RSP: 0018:ffffc900006bf7c0 EFLAGS: 00010a06
RAX: dffffc0000000000 RBX: ffffea0004843b40 RCX: ffff888121c00000
RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffea0004843b68
RBP: ffffc900006bfd30 R08: dffffc0000000000 R09: fffff9400090876e
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff1112437ffff
R13: 0000000000000000 R14: ffffea0004843b40 R15: ffff888921bffff8
FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffed112437ffff CR3: 000000011a965000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: c0 0f 85 rorb $0x85,(%rdi)
3: db 01 fildl (%rcx)
5: 00 00 add %al,(%rax)
7: 41 8b 04 24 mov (%r12),%eax
b: c1 f8 02 sar $0x2,%eax
e: 89 c0 mov %eax,%eax
10: 48 8b 4c 24 70 mov 0x70(%rsp),%rcx
15: 4c 8d 3c c1 lea (%rcx,%rax,8),%r15
19: 4d 89 fc mov %r15,%r12
1c: 49 c1 ec 03 shr $0x3,%r12
20: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
27: fc ff df
* 2a: 41 80 3c 04 00 cmpb $0x0,(%r12,%rax,1) <-- trapping instruction
2f: 74 08 je 0x39
31: 4c 89 ff mov %r15,%rdi
34: e8 4e f4 7e ff call 0xff7ef487
39: 4d 8b 37 mov (%r15),%r14
3c: 4d 85 f6 test %r14,%r14
3f: 0f .byte 0xf