loop3: detected capacity change from 0 to 64 Unable to handle kernel paging request at virtual address 63d9d3ec3f3f3f4b Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004 CM = 0, WnR = 0 [63d9d3ec3f3f3f4b] address between user and kernel address ranges Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 8285 Comm: syz-executor356 Not tainted 6.1.0-rc2-syzkaller-154433-g247f34f7b803 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __list_add_valid+0x28/0xb8 lib/list_debug.c:30 lr : __list_add include/linux/list.h:69 [inline] lr : list_add_tail include/linux/list.h:102 [inline] lr : list_lru_add+0x144/0x1f4 mm/list_lru.c:129 sp : ffff8000177cb8e0 x29: ffff8000177cb8e0 x28: ffff80000d95c000 x27: ffff0000cd10d600 x26: ffff0000ce552d28 x25: 63d9d3ec3f3f3f4b x24: ffff0000cb30b690 x23: ffff0000cd246000 x22: 0000000000000000 x21: ffff0000cd10d600 x20: ffff0000ce3327f0 x19: ffff0000ce552d28 x18: fffffffffffffff6 x17: 0000000000000000 x16: 0000000000000002 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000406 x12: ffff80000d93cc50 x11: ff8080000c075eac x10: ffff80000d379358 x9 : e270367d3c617200 x8 : 63d9d3ec3f3f3f4b x7 : 0000020000000006 x6 : ffff80000c075e58 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff0000cb30b690 x2 : 63d9d3ec3f3f3f4b x1 : 63d9d3ec3f3f3f4b x0 : ffff0000ce552d28 Call trace: __list_add_valid+0x28/0xb8 lib/list_debug.c:27 __list_add include/linux/list.h:69 [inline] list_add_tail include/linux/list.h:102 [inline] list_lru_add+0x144/0x1f4 mm/list_lru.c:129 d_lru_add+0x144/0x1a4 fs/dcache.c:431 retain_dentry+0x124/0x144 fs/dcache.c:685 dput+0x188/0x2e0 fs/dcache.c:908 handle_mounts fs/namei.c:1548 [inline] step_into+0x164/0x54c fs/namei.c:1831 walk_component fs/namei.c:1999 [inline] link_path_walk+0x380/0x628 fs/namei.c:2320 path_openat+0xb8/0x11c4 fs/namei.c:3709 do_filp_open+0xdc/0x1b8 fs/namei.c:3740 do_sys_openat2+0xb8/0x22c fs/open.c:1310 do_sys_open fs/open.c:1326 [inline] __do_sys_openat fs/open.c:1342 [inline] __se_sys_openat fs/open.c:1337 [inline] __arm64_sys_openat+0xb0/0xe0 fs/open.c:1337 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:636 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 Code: b4000322 f9400462 eb08005f 54000341 (f9400102) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: b4000322 cbz x2, 0x64 4: f9400462 ldr x2, [x3, #8] 8: eb08005f cmp x2, x8 c: 54000341 b.ne 0x74 // b.any * 10: f9400102 ldr x2, [x8] <-- trapping instruction