Unable to handle kernel paging request at virtual address dfff800000000000 Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006 CM = 0, WnR = 0 [dfff800000000000] address between user and kernel address ranges Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 4855 Comm: syz.0.15 Not tainted 5.15.182-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : btrfs_root_node+0xdc/0x3d4 fs/btrfs/ctree.c:132 lr : rcu_read_lock include/linux/rcupdate.h:740 [inline] lr : btrfs_root_node+0x84/0x3d4 fs/btrfs/ctree.c:131 sp : ffff80001f097250 x29: ffff80001f097250 x28: dfff800000000000 x27: ffff8000116c1e40 x26: 0000000000000001 x25: ffff8000116c25c0 x24: ffff80001658d000 x23: ffff8000116c2600 x22: ffff80001658d000 x21: 0000000000000001 x20: 0000000000000000 x19: 0000000000000000 x18: 0000000000000000 x17: 0000000000000000 x16: ffff8000111a53fc x15: ffff800008974808 x14: ffff8000089712cc x13: 1ffff0000282a06b x12: 0000000000ff0100 x11: 0000000000000000 x10: 0000000000000000 x9 : ffff800009e07824 x8 : ffff0000d5f19b40 x7 : ffff800009e1aee4 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000002 x2 : 0000000000000008 x1 : ffff8000117a9520 x0 : 0000000000000001 Call trace: rcu_read_lock include/linux/rcupdate.h:740 [inline] btrfs_root_node+0xdc/0x3d4 fs/btrfs/ctree.c:131 btrfs_read_lock_root_node+0x68/0x35c fs/btrfs/locking.c:276 btrfs_build_ref_tree+0xec/0xf90 fs/btrfs/ref-verify.c:993 open_ctree+0x1dc0/0x27b8 fs/btrfs/disk-io.c:3609 btrfs_fill_super+0x1b4/0x2d4 fs/btrfs/super.c:1387 btrfs_mount_root+0x730/0x780 fs/btrfs/super.c:1751 legacy_get_tree+0xd4/0x16c fs/fs_context.c:611 vfs_get_tree+0x90/0x274 fs/super.c:1530 fc_mount fs/namespace.c:1000 [inline] vfs_kern_mount+0xdc/0x178 fs/namespace.c:1030 btrfs_mount+0x2a0/0x8d4 fs/btrfs/super.c:1811 legacy_get_tree+0xd4/0x16c fs/fs_context.c:611 vfs_get_tree+0x90/0x274 fs/super.c:1530 do_new_mount+0x228/0x810 fs/namespace.c:3013 path_mount+0x5b4/0x1000 fs/namespace.c:3343 do_mount fs/namespace.c:3356 [inline] __do_sys_mount fs/namespace.c:3564 [inline] __se_sys_mount fs/namespace.c:3541 [inline] __arm64_sys_mount+0x514/0x5e4 fs/namespace.c:3541 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 Code: 52805ca1 aa1703e2 390ae2da 95cb4634 (387c6a88) ---[ end trace 5bbbdd79dc69c80a ]--- ---------------- Code disassembly (best guess): 0: 52805ca1 mov w1, #0x2e5 // #741 4: aa1703e2 mov x2, x23 8: 390ae2da strb w26, [x22, #696] c: 95cb4634 bl 0x72d18dc * 10: 387c6a88 ldrb w8, [x20, x28] <-- trapping instruction