Unable to handle kernel paging request at virtual address dfff80011828edf1 KASAN: probably user-memory-access in range [0x00000008c1476f88-0x00000008c1476f8f] Mem abort info: ESR = 0x0000000096000005 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: level 1 translation fault Data abort info: ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [dfff80011828edf1] address between user and kernel address ranges Internal error: Oops: 0000000096000005 [#1] SMP Modules linked in: CPU: 1 UID: 0 PID: 6577 Comm: syz-executor Tainted: G L syzkaller #0 PREEMPT Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 pstate: 63400005 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : __list_del_entry_valid_or_report+0xa0/0x1b4 lib/list_debug.c:65 lr : __list_del_entry_valid include/linux/list.h:132 [inline] lr : __list_del_entry include/linux/list.h:223 [inline] lr : list_del_init include/linux/list.h:295 [inline] lr : inode_cgwb_move_to_attached+0x228/0x498 fs/fs-writeback.c:323 sp : ffff8000a28976c0 x29: ffff8000a28976c0 x28: 1fffe0001ec6ad37 x27: ffff80008f871000 x26: 0000000000000082 x25: dfff800000000000 x24: 1fffe0001ec6ad37 x23: 000000011828edf1 x22: dfff800000000000 x21: 00000008c1476f88 x20: 00000008c1476f80 x19: ffff0000f6356a78 x18: 1fffe00033781890 x17: ffff80008f86e000 x16: ffff8000805378ac x15: 0000000000000001 x14: 1fffe0001ec6ad2d x13: 0000000000000000 x12: 0000000000000000 x11: ffff60001ec6ad2e x10: 0000000000ff0100 x9 : 1fffe000196d1c0d x8 : ffff0000f6356a78 x7 : ffff800080e72cf4 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff800080e75b78 x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffff0000f6356a80 Call trace: __list_del_entry_valid_or_report+0xa0/0x1b4 lib/list_debug.c:65 (P) __list_del_entry_valid include/linux/list.h:132 [inline] __list_del_entry include/linux/list.h:223 [inline] list_del_init include/linux/list.h:295 [inline] inode_cgwb_move_to_attached+0x228/0x498 fs/fs-writeback.c:323 writeback_single_inode+0x55c/0xc2c fs/fs-writeback.c:1875 write_inode_now+0x13c/0x1a4 fs/fs-writeback.c:2924 iput_final fs/inode.c:1941 [inline] iput+0x9b8/0xfdc fs/inode.c:2003 diFreeSpecial+0x78/0x100 fs/jfs/jfs_imap.c:552 jfs_umount+0x15c/0x350 fs/jfs/jfs_umount.c:65 jfs_put_super+0x90/0x188 fs/jfs/super.c:194 generic_shutdown_super+0x12c/0x2b8 fs/super.c:643 kill_block_super+0x44/0x90 fs/super.c:1722 deactivate_locked_super+0xc4/0x12c fs/super.c:474 deactivate_super+0xe0/0x100 fs/super.c:507 cleanup_mnt+0x31c/0x3ac fs/namespace.c:1318 __cleanup_mnt+0x20/0x30 fs/namespace.c:1325 task_work_run+0x1dc/0x260 kernel/task_work.c:233 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] __exit_to_user_mode_loop kernel/entry/common.c:44 [inline] exit_to_user_mode_loop+0x10c/0x18c kernel/entry/common.c:75 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline] exit_to_user_mode_prepare_legacy include/linux/irq-entry-common.h:242 [inline] arm64_exit_to_user_mode arch/arm64/kernel/entry-common.c:81 [inline] el0_svc+0x17c/0x26c arch/arm64/kernel/entry-common.c:725 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:743 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 Code: eb13011f 540005c1 91002295 d343feb7 (38766ae8) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: eb13011f cmp x8, x19 4: 540005c1 b.ne 0xbc // b.any 8: 91002295 add x21, x20, #0x8 c: d343feb7 lsr x23, x21, #3 * 10: 38766ae8 ldrb w8, [x23, x22] <-- trapping instruction