BUG: unable to handle page fault for address: fffffffffffffff8 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 6812067 P4D 6812067 PUD 6814067 PMD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 5126 Comm: syz-executor.1 Not tainted 5.15.149-syzkaller-00131-g79bd336c7a94 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 RIP: 0010:swake_up_locked+0x57/0x120 kernel/sched/swait.c:30 Code: 89 df e8 4c b1 5f 00 4c 8b 3b 49 39 df 0f 84 ca 00 00 00 49 8d 7f f8 48 89 f8 48 c1 e8 03 42 80 3c 20 00 74 05 e8 29 b1 5f 00 <49> 8b 7f f8 e8 a0 7d f9 ff 4c 89 ff e8 68 d8 16 01 84 c0 74 6a 49 RSP: 0018:ffffc90001fe7cd0 EFLAGS: 00010046 RAX: 1fffffffffffffff RBX: ffffc9000207fa80 RCX: 0000000000000001 RDX: dffffc0000000000 RSI: 0000000000000004 RDI: fffffffffffffff8 RBP: ffffc90001fe7cf8 R08: dffffc0000000000 R09: 0000000000000003 R10: fffff520003fcf8c R11: dffffc0000000001 R12: dffffc0000000000 R13: ffffc9000207fa70 R14: 0000000000000246 R15: 0000000000000000 FS: 000055555578a480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffff8 CR3: 0000000127908000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: complete+0x5c/0xb0 kernel/sched/completion.c:36 uinput_flush_requests drivers/input/misc/uinput.c:213 [inline] uinput_destroy_device+0x164/0x950 drivers/input/misc/uinput.c:298 uinput_release+0x3e/0x50 drivers/input/misc/uinput.c:744 __fput+0x3fe/0x910 fs/file_table.c:280 ____fput+0x15/0x20 fs/file_table.c:308 task_work_run+0x129/0x190 kernel/task_work.c:164 tracehook_notify_resume include/linux/tracehook.h:189 [inline] exit_to_user_mode_loop+0xc4/0xe0 kernel/entry/common.c:175 exit_to_user_mode_prepare+0x5a/0xa0 kernel/entry/common.c:208 __syscall_exit_to_user_mode_work kernel/entry/common.c:290 [inline] syscall_exit_to_user_mode+0x26/0x160 kernel/entry/common.c:301 do_syscall_64+0x49/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7fb36e52ae5a Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24 RSP: 002b:00007ffd91256a50 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007fb36e52ae5a RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007fb36e664980 R08: 0000001b33760000 R09: 0000000000000003 R10: 0000000000000001 R11: 0000000000000293 R12: 000000000003baff R13: 00007fb36e66305c R14: 0000000000000032 R15: 00007fb36e664980 Modules linked in: CR2: fffffffffffffff8 ---[ end trace 91458c3b65560e8e ]--- RIP: 0010:swake_up_locked+0x57/0x120 kernel/sched/swait.c:30 Code: 89 df e8 4c b1 5f 00 4c 8b 3b 49 39 df 0f 84 ca 00 00 00 49 8d 7f f8 48 89 f8 48 c1 e8 03 42 80 3c 20 00 74 05 e8 29 b1 5f 00 <49> 8b 7f f8 e8 a0 7d f9 ff 4c 89 ff e8 68 d8 16 01 84 c0 74 6a 49 RSP: 0018:ffffc90001fe7cd0 EFLAGS: 00010046 RAX: 1fffffffffffffff RBX: ffffc9000207fa80 RCX: 0000000000000001 RDX: dffffc0000000000 RSI: 0000000000000004 RDI: fffffffffffffff8 RBP: ffffc90001fe7cf8 R08: dffffc0000000000 R09: 0000000000000003 R10: fffff520003fcf8c R11: dffffc0000000001 R12: dffffc0000000000 R13: ffffc9000207fa70 R14: 0000000000000246 R15: 0000000000000000 FS: 000055555578a480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffff8 CR3: 0000000127908000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 89 df mov %ebx,%edi 2: e8 4c b1 5f 00 call 0x5fb153 7: 4c 8b 3b mov (%rbx),%r15 a: 49 39 df cmp %rbx,%r15 d: 0f 84 ca 00 00 00 je 0xdd 13: 49 8d 7f f8 lea -0x8(%r15),%rdi 17: 48 89 f8 mov %rdi,%rax 1a: 48 c1 e8 03 shr $0x3,%rax 1e: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) 23: 74 05 je 0x2a 25: e8 29 b1 5f 00 call 0x5fb153 * 2a: 49 8b 7f f8 mov -0x8(%r15),%rdi <-- trapping instruction 2e: e8 a0 7d f9 ff call 0xfff97dd3 33: 4c 89 ff mov %r15,%rdi 36: e8 68 d8 16 01 call 0x116d8a3 3b: 84 c0 test %al,%al 3d: 74 6a je 0xa9 3f: 49 rex.WB