Unable to handle kernel paging request at virtual address dfff800000000006 Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006 CM = 0, WnR = 0 [dfff800000000006] address between user and kernel address ranges Internal error: Oops: 96000006 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 3999 Comm: syz-executor.0 Not tainted 5.15.117-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : write_special_inodes fs/jfs/jfs_logmgr.c:208 [inline] pc : jfs_flush_journal+0x6ac/0xd94 fs/jfs/jfs_logmgr.c:1581 lr : write_special_inodes fs/jfs/jfs_logmgr.c:207 [inline] lr : jfs_flush_journal+0x688/0xd94 fs/jfs/jfs_logmgr.c:1581 sp : ffff80001c847760 x29: ffff80001c847850 x28: dfff800000000000 x27: dfff800000000000 x26: 1fffe00019ab2635 x25: 1fffe00019ab2600 x24: 1fffe00023f5e0fc x23: ffff0000cd5931b8 x22: 0000000000000030 x21: ffff0000db76a438 x20: ffff0000cd5931a8 x19: ffff0000cd593000 x18: 0000000000000001 x17: ff808000089cdbf4 x16: ffff80000824cbf4 x15: ffff8000089cdbf4 x14: 1ffff0000291e06a x13: ffffffffffffffff x12: 0000000000000000 x11: ff808000086cc7c8 x10: 0000000000000000 x9 : ab825ef0ece21200 x8 : 0000000000000006 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 0000000000000080 x4 : 0000000000000008 x3 : 0000000000000010 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: write_special_inodes fs/jfs/jfs_logmgr.c:208 [inline] jfs_flush_journal+0x6ac/0xd94 fs/jfs/jfs_logmgr.c:1581 jfs_umount+0xf8/0x338 fs/jfs/jfs_umount.c:58 jfs_put_super+0x90/0x188 fs/jfs/super.c:194 generic_shutdown_super+0x130/0x29c fs/super.c:475 kill_block_super+0x70/0xdc fs/super.c:1405 deactivate_locked_super+0xb8/0x13c fs/super.c:335 deactivate_super+0x108/0x128 fs/super.c:366 cleanup_mnt+0x3c0/0x474 fs/namespace.c:1143 __cleanup_mnt+0x20/0x30 fs/namespace.c:1150 task_work_run+0x130/0x1e4 kernel/task_work.c:164 tracehook_notify_resume include/linux/tracehook.h:189 [inline] do_notify_resume+0x262c/0x32b8 arch/arm64/kernel/signal.c:946 prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:133 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:138 [inline] el0_svc+0xfc/0x1f0 arch/arm64/kernel/entry-common.c:597 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:614 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 Code: 97bfe2a8 f94002c8 9100c116 d343fec8 (387c6908) ---[ end trace b71a0a68e2534882 ]--- ---------------- Code disassembly (best guess): 0: 97bfe2a8 bl 0xfffffffffeff8aa0 4: f94002c8 ldr x8, [x22] 8: 9100c116 add x22, x8, #0x30 c: d343fec8 lsr x8, x22, #3 * 10: 387c6908 ldrb w8, [x8, x28] <-- trapping instruction