BUG: unable to handle page fault for address: fffffffffffffff8
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 6612067 P4D 6612067 PUD 6614067 PMD 0
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 310 Comm: syz-executor938 Not tainted 5.10.210-syzkaller-00394-g70b6ab09a34b #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
RIP: 0010:swake_up_locked+0x57/0x120 kernel/sched/swait.c:30
Code: 89 df e8 bc 57 59 00 4c 8b 3b 49 39 df 0f 84 ca 00 00 00 49 8d 7f f8 48 89 f8 48 c1 e8 03 42 80 3c 20 00 74 05 e8 99 57 59 00 <49> 8b 7f f8 e8 10 e1 f9 ff 4c 89 ff e8 b8 96 07 01 84 c0 74 6a 49
RSP: 0018:ffffc900022a7d30 EFLAGS: 00010046
RAX: 1fffffffffffffff RBX: ffffc90001fe7aa0 RCX: 0000000000000001
RDX: dffffc0000000000 RSI: 0000000000000004 RDI: fffffffffffffff8
RBP: ffffc900022a7d58 R08: dffffc0000000000 R09: 0000000000000003
R10: fffff52000454f98 R11: dffffc0000000001 R12: dffffc0000000000
R13: ffffc90001fe7a90 R14: 0000000000000246 R15: 0000000000000000
FS: 00005555562213c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffffffffffff8 CR3: 0000000116159000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
complete+0x5c/0xb0 kernel/sched/completion.c:36
uinput_flush_requests drivers/input/misc/uinput.c:213 [inline]
uinput_destroy_device+0x164/0x950 drivers/input/misc/uinput.c:298
uinput_release+0x3e/0x50 drivers/input/misc/uinput.c:744
__fput+0x309/0x760 fs/file_table.c:281
____fput+0x15/0x20 fs/file_table.c:314
task_work_run+0x129/0x190 kernel/task_work.c:164
tracehook_notify_resume include/linux/tracehook.h:188 [inline]
exit_to_user_mode_loop+0xbf/0xd0 kernel/entry/common.c:172
exit_to_user_mode_prepare kernel/entry/common.c:199 [inline]
syscall_exit_to_user_mode+0xc5/0x1d0 kernel/entry/common.c:274
do_syscall_64+0x40/0x70 arch/x86/entry/common.c:56
entry_SYSCALL_64_after_hwframe+0x61/0xc6
RIP: 0033:0x7fb6af562a8a
Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 53 81 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 b3 81 02 00 8b 44 24
RSP: 002b:00007ffe50aa0df0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007fb6af562a8a
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 00000000000dde3b R08: 0000000000000000 R09: 00007ffe50aa0ed0
R10: 0000000000000000 R11: 0000000000000293 R12: 00000000000003e8
R13: 00007fb6af5ea1bc R14: 00000000000dde6d R15: 00007fb6af5ea1a0
Modules linked in:
CR2: fffffffffffffff8
---[ end trace 7f3ef19fc4eed330 ]---
RIP: 0010:swake_up_locked+0x57/0x120 kernel/sched/swait.c:30
Code: 89 df e8 bc 57 59 00 4c 8b 3b 49 39 df 0f 84 ca 00 00 00 49 8d 7f f8 48 89 f8 48 c1 e8 03 42 80 3c 20 00 74 05 e8 99 57 59 00 <49> 8b 7f f8 e8 10 e1 f9 ff 4c 89 ff e8 b8 96 07 01 84 c0 74 6a 49
RSP: 0018:ffffc900022a7d30 EFLAGS: 00010046
RAX: 1fffffffffffffff RBX: ffffc90001fe7aa0 RCX: 0000000000000001
RDX: dffffc0000000000 RSI: 0000000000000004 RDI: fffffffffffffff8
RBP: ffffc900022a7d58 R08: dffffc0000000000 R09: 0000000000000003
R10: fffff52000454f98 R11: dffffc0000000001 R12: dffffc0000000000
R13: ffffc90001fe7a90 R14: 0000000000000246 R15: 0000000000000000
FS: 00005555562213c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffffffffffff8 CR3: 0000000116159000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 89 df mov %ebx,%edi
2: e8 bc 57 59 00 call 0x5957c3
7: 4c 8b 3b mov (%rbx),%r15
a: 49 39 df cmp %rbx,%r15
d: 0f 84 ca 00 00 00 je 0xdd
13: 49 8d 7f f8 lea -0x8(%r15),%rdi
17: 48 89 f8 mov %rdi,%rax
1a: 48 c1 e8 03 shr $0x3,%rax
1e: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1)
23: 74 05 je 0x2a
25: e8 99 57 59 00 call 0x5957c3
* 2a: 49 8b 7f f8 mov -0x8(%r15),%rdi <-- trapping instruction
2e: e8 10 e1 f9 ff call 0xfff9e143
33: 4c 89 ff mov %r15,%rdi
36: e8 b8 96 07 01 call 0x10796f3
3b: 84 c0 test %al,%al
3d: 74 6a je 0xa9
3f: 49 rex.WB