Unable to handle kernel paging request at virtual address 1fff800003441a18 Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006 CM = 0, WnR = 0 [1fff800003441a18] address between user and kernel address ranges Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 4269 Comm: syz-executor.2 Not tainted 6.1.0-rc4-syzkaller-00039-g1621b6eaebf7-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : generic_test_bit include/asm-generic/bitops/generic-non-atomic.h:128 [inline] pc : __lock_acquire+0x654/0x3084 kernel/locking/lockdep.c:5025 lr : mark_usage kernel/locking/lockdep.c:4555 [inline] lr : __lock_acquire+0x630/0x3084 kernel/locking/lockdep.c:5009 sp : ffff8000131033d0 x29: ffff8000131034b0 x28: 0000000000000001 x27: ffff0000d2c89a68 x26: ffff0000d2c8a450 x25: ffff0000d2c8a470 x24: ffff0000d2c8a470 x23: 00000000000000c0 x22: 0000000000000001 x21: 0000000000000000 x20: ffff0000d2c89a40 x19: 555554aaabb2c422 x18: 00000000000000c0 x17: ffff80000dcdc198 x16: ffff80000db1a158 x15: ffff0000d2c89a40 x14: 0000000000000018 x13: ffff80000819fba0 x12: 00000000c73c5909 x11: ff808000095f17a4 x10: ffff80000dcdc198 x9 : 1ffffffff5765880 x8 : 0000000000000000 x7 : 0000000000000000 x6 : ffff80000801154c x5 : 4c1501080080ffff x4 : ffff80000801154c x3 : 4c1501080080ffff x2 : fffffffffffffff8 x1 : ffff80000cc75907 x0 : 0000000000000001 Call trace: generic_test_bit include/asm-generic/bitops/generic-non-atomic.h:128 [inline] __lock_acquire+0x654/0x3084 kernel/locking/lockdep.c:5025 reacquire_held_locks+0x120/0x1c0 kernel/locking/lockdep.c:5193 __lock_release kernel/locking/lockdep.c:5382 [inline] lock_release+0x148/0x2b4 kernel/locking/lockdep.c:5688 __mutex_unlock_slowpath+0x44/0x1cc kernel/locking/mutex.c:907 mutex_unlock+0x24/0x30 kernel/locking/mutex.c:543 hugetlb_no_page+0x298/0xe38 mm/hugetlb.c:5772 hugetlb_fault+0x3d0/0xe30 mm/hugetlb.c:5877 handle_mm_fault+0x904/0xa48 mm/memory.c:5216 __do_page_fault arch/arm64/mm/fault.c:506 [inline] do_page_fault+0x428/0x79c arch/arm64/mm/fault.c:606 do_translation_fault+0x78/0x194 arch/arm64/mm/fault.c:689 do_mem_abort+0x54/0x130 arch/arm64/mm/fault.c:825 el1_abort+0x3c/0x5c arch/arm64/kernel/entry-common.c:367 el1h_64_sync_handler+0x60/0xac arch/arm64/kernel/entry-common.c:427 el1h_64_sync+0x64/0x68 arch/arm64/kernel/entry.S:579 __arch_copy_from_user+0x1bc/0x1f4 arch/arm64/lib/copy_from_user.S:214 __import_iovec+0x60/0x248 lib/iov_iter.c:1773 import_iovec+0x6c/0x88 lib/iov_iter.c:1838 vfs_writev fs/read_write.c:931 [inline] do_writev+0xf8/0x234 fs/read_write.c:977 __do_sys_writev fs/read_write.c:1050 [inline] __se_sys_writev fs/read_write.c:1047 [inline] __arm64_sys_writev+0x28/0x38 fs/read_write.c:1047 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584 Code: 350000e8 93407e69 d343fd29 927de529 (f8696949) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 350000e8 cbnz w8, 0x1c 4: 93407e69 sxtw x9, w19 8: d343fd29 lsr x9, x9, #3 c: 927de529 and x9, x9, #0x1ffffffffffffff8 * 10: f8696949 ldr x9, [x10, x9] <-- trapping instruction