Unable to handle kernel paging request at virtual address dfff800000000006 Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006 CM = 0, WnR = 0 [dfff800000000006] address between user and kernel address ranges Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 4022 Comm: syz-executor414 Not tainted 5.15.166-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : write_special_inodes fs/jfs/jfs_logmgr.c:208 [inline] pc : lmLogSync+0x210/0x98c fs/jfs/jfs_logmgr.c:945 lr : write_special_inodes fs/jfs/jfs_logmgr.c:207 [inline] lr : lmLogSync+0x1ec/0x98c fs/jfs/jfs_logmgr.c:945 sp : ffff80001dc57780 x29: ffff80001dc57850 x28: 1ffff00002955a9d x27: dfff800000000000 x26: fffffbffeffa6c34 x25: ffff80001dc577a0 x24: 1fffe00019bfc806 x23: dfff800000000000 x22: 0000000000000000 x21: 0000000000000030 x20: ffff0000c0fcbe38 x19: ffff0000cbe05800 x18: 0000000000000000 x17: 0000000000000000 x16: ffff80000824ec44 x15: 00000000ffffffff x14: 1ffff0000295606a x13: dfff800000000000 x12: 0000000000000003 x11: 0000000000000000 x10: 0000000000000000 x9 : 4ae482f039a79200 x8 : 0000000000000006 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000008 x3 : 0000000000000010 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: write_special_inodes fs/jfs/jfs_logmgr.c:208 [inline] lmLogSync+0x210/0x98c fs/jfs/jfs_logmgr.c:945 jfs_syncpt+0x74/0x98 fs/jfs/jfs_logmgr.c:1049 jfs_sync_fs+0x8c/0xac fs/jfs/super.c:690 sync_filesystem+0xe8/0x218 fs/sync.c:56 generic_shutdown_super+0x70/0x29c fs/super.c:448 kill_block_super+0x70/0xdc fs/super.c:1425 deactivate_locked_super+0xb8/0x13c fs/super.c:335 deactivate_super+0x108/0x128 fs/super.c:366 cleanup_mnt+0x3c0/0x474 fs/namespace.c:1143 __cleanup_mnt+0x20/0x30 fs/namespace.c:1150 task_work_run+0x130/0x1e4 kernel/task_work.c:188 tracehook_notify_resume include/linux/tracehook.h:189 [inline] do_notify_resume+0x262c/0x32b8 arch/arm64/kernel/signal.c:946 prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:133 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:138 [inline] el0_svc+0xfc/0x1f0 arch/arm64/kernel/entry-common.c:609 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 Code: 97bf8f6c f94002a8 9100c115 d343fea8 (387b6908) ---[ end trace ecce092f4b954ab2 ]--- ---------------- Code disassembly (best guess): 0: 97bf8f6c bl 0xfffffffffefe3db0 4: f94002a8 ldr x8, [x21] 8: 9100c115 add x21, x8, #0x30 c: d343fea8 lsr x8, x21, #3 * 10: 387b6908 ldrb w8, [x8, x27] <-- trapping instruction