u64s 11 type btree_ptr_v2 SPOS_MAX len 0 ver 0: seq 771f68864d6973cb written 32 min_key POS_MIN durability: 1 ptr: 0:29:0 gen 0, fixing done bcachefs (loop2): going read-write bcachefs (loop2): journal_replay... Unable to handle kernel paging request at virtual address 001a104c801fffe3 Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [001a104c801fffe3] address between user and kernel address ranges Internal error: Oops: 0000000096000004 [#1] SMP Modules linked in: CPU: 0 UID: 0 PID: 7594 Comm: syz.2.21 Not tainted 6.15.0-rc4-syzkaller-00028-ge0f4c8dd9d2d #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 pstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : kasan_byte_accessible+0x10/0x20 mm/kasan/generic.c:199 lr : __kasan_check_byte+0x20/0x54 mm/kasan/common.c:556 sp : ffff80009ba35100 x29: ffff80009ba35100 x28: ffff80008f301000 x27: ffff0000cac68000 x26: ffff80008adc6580 x25: 0000000000000000 x24: 0000000000000001 x23: 0000000000000000 x22: 00d4826400ffff18 x21: 00d4826400ffff18 x20: 0000000000000000 x19: ffff80008adc6580 x18: 00000000ebcb5c3d x17: dfff800000000000 x16: ffff80008ada5d6c x15: 0000000000000001 x14: 1fffe0001acf9230 x13: 0000000000000000 x12: 0000000000000000 x11: ffff60001acf9231 x10: 0000000000000003 x9 : dfff800000000000 x8 : 001a904c801fffe3 x7 : ffff80008042a044 x6 : ffff80008040fa80 x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000000 x1 : ffff80008adc6580 x0 : 00d4826400ffff18 Call trace: kasan_mem_to_shadow include/linux/kasan.h:64 [inline] (P) kasan_byte_accessible+0x10/0x20 mm/kasan/generic.c:199 (P) kasan_check_byte include/linux/kasan.h:399 [inline] lock_acquire+0xb0/0x2e0 kernel/locking/lockdep.c:5840 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x48/0x60 kernel/locking/spinlock.c:154 __queue_work+0x874/0x1230 kernel/workqueue.c:-1 queue_work_on+0xdc/0x18c kernel/workqueue.c:2392 queue_work include/linux/workqueue.h:662 [inline] __bch2_btree_node_write+0x2350/0x2ed0 fs/bcachefs/btree_io.c:2469 bch2_btree_node_write_trans+0x9c/0x628 fs/bcachefs/btree_io.c:2572 btree_split+0x39a4/0x54a4 fs/bcachefs/btree_update_interior.c:1708 bch2_btree_split_leaf+0x140/0x794 fs/bcachefs/btree_update_interior.c:1870 bch2_trans_commit_error+0x168/0x114c fs/bcachefs/btree_trans_commit.c:904 __bch2_trans_commit+0x5100/0x62d0 fs/bcachefs/btree_trans_commit.c:1069 bch2_trans_commit fs/bcachefs/btree_update.h:195 [inline] wb_flush_one_slowpath+0x10c/0x148 fs/bcachefs/btree_write_buffer.c:127 wb_flush_one+0xcf8/0x1558 fs/bcachefs/btree_write_buffer.c:181 bch2_btree_write_buffer_flush_locked+0x108c/0x2548 fs/bcachefs/btree_write_buffer.c:398 btree_write_buffer_flush_seq+0x1010/0x1144 fs/bcachefs/btree_write_buffer.c:570 bch2_btree_write_buffer_journal_flush+0x70/0xc8 fs/bcachefs/btree_write_buffer.c:586 journal_flush_pins+0x6f4/0xcc0 fs/bcachefs/journal_reclaim.c:592 journal_flush_pins_or_still_flushing fs/bcachefs/journal_reclaim.c:862 [inline] journal_flush_done+0x100/0x678 fs/bcachefs/journal_reclaim.c:880 bch2_journal_flush_pins+0x19c/0x220 fs/bcachefs/journal_reclaim.c:912 bch2_journal_flush_all_pins fs/bcachefs/journal_reclaim.h:76 [inline] bch2_journal_replay+0x1978/0x1c50 fs/bcachefs/recovery.c:443 bch2_run_recovery_pass+0xf0/0x1d0 fs/bcachefs/recovery_passes.c:227 bch2_run_recovery_passes+0x314/0xc30 fs/bcachefs/recovery_passes.c:280 bch2_fs_recovery+0x1aac/0x2d30 fs/bcachefs/recovery.c:937 bch2_fs_start+0x5b0/0x908 fs/bcachefs/super.c:1083 bch2_fs_get_tree+0xa0c/0xef4 fs/bcachefs/fs.c:2570 vfs_get_tree+0x90/0x28c fs/super.c:1759 do_new_mount+0x228/0x814 fs/namespace.c:3884 path_mount+0x5b4/0xde0 fs/namespace.c:4211 do_mount fs/namespace.c:4224 [inline] __do_sys_mount fs/namespace.c:4435 [inline] __se_sys_mount fs/namespace.c:4412 [inline] __arm64_sys_mount+0x3e8/0x468 fs/namespace.c:4412 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Code: d503245f d343fc08 d2d00009 f2fbffe9 (38696908) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: d503245f bti c 4: d343fc08 lsr x8, x0, #3 8: d2d00009 mov x9, #0x800000000000 // #140737488355328 c: f2fbffe9 movk x9, #0xdfff, lsl #48 * 10: 38696908 ldrb w8, [x8, x9] <-- trapping instruction