BUG: unable to handle page fault for address: ffff8881447a219c #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 10801067 P4D 10801067 PUD 1449a2063 PMD 10b063 PTE 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 12743 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:wait_consider_task+0xae/0x3b80 kernel/exit.c:1288 Code: 8f 1c 05 00 00 48 89 c8 48 89 4c 24 10 48 c1 e8 03 0f b6 14 28 48 89 c8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 c2 1a 00 00 <45> 8b a7 1c 05 00 00 bf 10 00 00 00 44 89 e6 e8 3e 50 31 00 41 83 RSP: 0018:ffffc90003adfb60 EFLAGS: 00010246 RAX: 0000000000000007 RBX: 0000000000000000 RCX: ffff8881447a219c RDX: 0000000000000000 RSI: ffffffff8145a3e2 RDI: ffffc90003adfd18 RBP: dffffc0000000000 R08: 0000000000000000 R09: ffffffff8b60a083 R10: ffffffff8145e5b6 R11: 0000000000000000 R12: dffffc0000000000 R13: ffff88803f189c80 R14: 0000000000000000 R15: ffff8881447a1c80 FS: 0000555556ca5400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff8881447a219c CR3: 000000003a936000 CR4: 0000000000350ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: do_wait_thread kernel/exit.c:1397 [inline] do_wait+0x6ca/0xce0 kernel/exit.c:1514 kernel_wait4+0x14c/0x260 kernel/exit.c:1677 __do_sys_wait4+0x13f/0x150 kernel/exit.c:1705 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f0b49454f87 Code: 89 7c 24 10 48 89 4c 24 18 e8 35 50 02 00 4c 8b 54 24 18 8b 54 24 14 41 89 c0 48 8b 74 24 08 8b 7c 24 10 b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 89 44 24 10 e8 65 50 02 00 8b 44 RSP: 002b:00007fffb99d1910 EFLAGS: 00000293 ORIG_RAX: 000000000000003d RAX: ffffffffffffffda RBX: 00000000000007e8 RCX: 00007f0b49454f87 RDX: 0000000040000001 RSI: 00007fffb99d199c RDI: 00000000ffffffff RBP: 00007fffb99d199c R08: 0000000000000000 R09: 00007fffb99df080 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000032 R13: 0000000000178849 R14: 0000000000000013 R15: 00007fffb99d1a00 Modules linked in: CR2: ffff8881447a219c ---[ end trace ab990d2be2b3ec5f ]--- RIP: 0010:wait_consider_task+0xae/0x3b80 kernel/exit.c:1288 Code: 8f 1c 05 00 00 48 89 c8 48 89 4c 24 10 48 c1 e8 03 0f b6 14 28 48 89 c8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 c2 1a 00 00 <45> 8b a7 1c 05 00 00 bf 10 00 00 00 44 89 e6 e8 3e 50 31 00 41 83 RSP: 0018:ffffc90003adfb60 EFLAGS: 00010246 RAX: 0000000000000007 RBX: 0000000000000000 RCX: ffff8881447a219c RDX: 0000000000000000 RSI: ffffffff8145a3e2 RDI: ffffc90003adfd18 RBP: dffffc0000000000 R08: 0000000000000000 R09: ffffffff8b60a083 R10: ffffffff8145e5b6 R11: 0000000000000000 R12: dffffc0000000000 R13: ffff88803f189c80 R14: 0000000000000000 R15: ffff8881447a1c80 FS: 0000555556ca5400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff8881447a219c CR3: 000000003a936000 CR4: 0000000000350ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 1c 05 sbb $0x5,%al 2: 00 00 add %al,(%rax) 4: 48 89 c8 mov %rcx,%rax 7: 48 89 4c 24 10 mov %rcx,0x10(%rsp) c: 48 c1 e8 03 shr $0x3,%rax 10: 0f b6 14 28 movzbl (%rax,%rbp,1),%edx 14: 48 89 c8 mov %rcx,%rax 17: 83 e0 07 and $0x7,%eax 1a: 83 c0 03 add $0x3,%eax 1d: 38 d0 cmp %dl,%al 1f: 7c 08 jl 0x29 21: 84 d2 test %dl,%dl 23: 0f 85 c2 1a 00 00 jne 0x1aeb * 29: 45 8b a7 1c 05 00 00 mov 0x51c(%r15),%r12d <-- trapping instruction 30: bf 10 00 00 00 mov $0x10,%edi 35: 44 89 e6 mov %r12d,%esi 38: e8 3e 50 31 00 callq 0x31507b 3d: 41 rex.B 3e: 83 .byte 0x83