BUG: unable to handle page fault for address: ffffffff00000018 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD d97e067 P4D d97e067 PUD 0 Oops: Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 0 PID: 1086 Comm: kworker/u32:6 Not tainted 6.10.0-rc2-syzkaller #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Workqueue: events_unbound btrfs_async_reclaim_metadata_space RIP: 0010:__lock_acquire+0xe48/0x3b30 kernel/locking/lockdep.c:5005 Code: 82 be 05 00 00 ba 01 00 00 00 e9 e4 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 80 3c 02 00 0f 85 82 1f 00 00 <49> 81 3c 24 e0 fd e2 92 0f 84 98 f2 ff ff 41 83 fe 01 0f 87 a0 f2 RSP: 0018:ffffc900073aec78 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 1fffffffe0000003 RSI: ffff888020382440 RDI: ffffffff00000018 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001 R10: ffffffff8fe2c097 R11: 0000000000000008 R12: ffffffff00000018 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff88802c000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffff00000018 CR3: 0000000045724000 CR4: 0000000000350ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire kernel/locking/lockdep.c:5754 [inline] lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 __queue_work+0x39e/0x1020 kernel/workqueue.c:2319 queue_work_on+0x11a/0x140 kernel/workqueue.c:2410 btrfs_cache_block_group+0x549/0x820 fs/btrfs/block-group.c:962 find_free_extent+0x36a1/0x6820 fs/btrfs/extent-tree.c:4507 btrfs_reserve_extent+0x333/0x6b0 fs/btrfs/extent-tree.c:4689 btrfs_alloc_tree_block+0x20e/0x11a0 fs/btrfs/extent-tree.c:5145 btrfs_force_cow_block+0x3e5/0x19e0 fs/btrfs/ctree.c:568 btrfs_cow_block+0x2b6/0xb70 fs/btrfs/ctree.c:746 btrfs_search_slot+0x11bd/0x3010 fs/btrfs/ctree.c:2101 btrfs_update_device+0x142/0x540 fs/btrfs/volumes.c:2902 btrfs_chunk_alloc_add_chunk_item+0x306/0xf70 fs/btrfs/volumes.c:5810 do_chunk_alloc fs/btrfs/block-group.c:3851 [inline] btrfs_chunk_alloc+0x4ba/0x1190 fs/btrfs/block-group.c:4139 flush_space+0x96d/0xdd0 fs/btrfs/space-info.c:783 btrfs_async_reclaim_metadata_space+0x3cd/0x980 fs/btrfs/space-info.c:1088 process_one_work+0x958/0x1ad0 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Modules linked in: CR2: ffffffff00000018 ---[ end trace 0000000000000000 ]--- RIP: 0010:__lock_acquire+0xe48/0x3b30 kernel/locking/lockdep.c:5005 Code: 82 be 05 00 00 ba 01 00 00 00 e9 e4 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 80 3c 02 00 0f 85 82 1f 00 00 <49> 81 3c 24 e0 fd e2 92 0f 84 98 f2 ff ff 41 83 fe 01 0f 87 a0 f2 RSP: 0018:ffffc900073aec78 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 1fffffffe0000003 RSI: ffff888020382440 RDI: ffffffff00000018 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001 R10: ffffffff8fe2c097 R11: 0000000000000008 R12: ffffffff00000018 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff88802c000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffff00000018 CR3: 0000000045724000 CR4: 0000000000350ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: be 05 00 00 ba mov $0xba000005,%esi 5: 01 00 add %eax,(%rax) 7: 00 00 add %al,(%rax) 9: e9 e4 00 00 00 jmp 0xf2 e: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 15: fc ff df 18: 4c 89 e2 mov %r12,%rdx 1b: 48 c1 ea 03 shr $0x3,%rdx 1f: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 23: 0f 85 82 1f 00 00 jne 0x1fab * 29: 49 81 3c 24 e0 fd e2 cmpq $0xffffffff92e2fde0,(%r12) <-- trapping instruction 30: 92 31: 0f 84 98 f2 ff ff je 0xfffff2cf 37: 41 83 fe 01 cmp $0x1,%r14d 3b: 0f .byte 0xf 3c: 87 .byte 0x87 3d: a0 .byte 0xa0 3e: f2 repnz