Unable to handle kernel paging request at virtual address fffffffffffffff8 Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004 CM = 0, WnR = 0 swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000001af592000 [fffffffffffffff8] pgd=0000000000000000 , p4d=0000000000000000 Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 9153 Comm: syz.3.1828 Not tainted 5.15.180-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 pstate: 004000c5 (nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : swake_up_locked+0x58/0x114 kernel/sched/swait.c:30 lr : complete+0x5c/0xbc kernel/sched/completion.c:36 sp : ffff800020fe79f0 x29: ffff800020fe79f0 x28: ffff0000cc3f9a70 x27: 1fffe00019176f75 x26: ffff0000c8bb7ba8 x25: 1fffe0001a9a3c00 x24: dfff800000000000 x23: ffff8000217c78a0 x22: dfff800000000000 x21: 0000000000000001 x20: ffff8000217c78f8 x19: 0000000000000000 x18: 0000000000000000 x17: 0000000000000000 x16: ffff8000082d4dc8 x15: 0000000000000002 x14: 0000000000ff0100 x13: ffffffffffffffff x12: ffff7000041fcf2c x11: 1ffff000041fcf2c x10: 0000000000000004 x9 : 0000000000000000 x8 : 0000000000000000 x7 : 0000000000000000 x6 : ffff800008297c14 x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff8000082d4ee8 x2 : 0000000000000001 x1 : 0000000000000000 x0 : fffffffffffffff8 Call trace: swake_up_locked+0x58/0x114 kernel/sched/swait.c:30 complete+0x5c/0xbc kernel/sched/completion.c:36 uinput_flush_requests drivers/input/misc/uinput.c:212 [inline] uinput_destroy_device+0xf4/0x774 drivers/input/misc/uinput.c:297 uinput_release+0x44/0x60 drivers/input/misc/uinput.c:724 __fput+0x1c0/0x7f8 fs/file_table.c:311 ____fput+0x20/0x30 fs/file_table.c:339 task_work_run+0x12c/0x1e0 kernel/task_work.c:188 tracehook_notify_resume include/linux/tracehook.h:189 [inline] do_notify_resume+0x24b4/0x3128 arch/arm64/kernel/signal.c:946 prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:133 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:138 [inline] el0_svc+0xf0/0x1e0 arch/arm64/kernel/entry-common.c:609 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 Code: d343fc08 38766908 34000048 9416d60e (f85f8260) ---[ end trace 5e09d8298d27e505 ]--- ---------------- Code disassembly (best guess): 0: d343fc08 lsr x8, x0, #3 4: 38766908 ldrb w8, [x8, x22] 8: 34000048 cbz w8, 0x10 c: 9416d60e bl 0x5b5844 * 10: f85f8260 ldur x0, [x19, #-8] <-- trapping instruction