Unable to handle kernel paging request at virtual address ffffffffffffffec KASAN: maybe wild-memory-access in range [0x0003ffffffffff60-0x0003ffffffffff67] Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004 CM = 0, WnR = 0 swapper pgtable: 4k pages, 48-bit VAs, pgdp=000000020dfcc000 [ffffffffffffffec] pgd=0000000000000000, p4d=0000000000000000 Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 5785 Comm: syz.0.291 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/26/2026 pstate: 82400005 (Nzcv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) pc : ext4_ext_drop_refs fs/ext4/extents.c:119 [inline] pc : ext4_free_ext_path fs/ext4/extents.c:128 [inline] pc : ext4_ext_map_blocks+0x2a70/0x570c fs/ext4/extents.c:4497 lr : ext4_ext_map_blocks+0x1654/0x570c fs/ext4/extents.c:4427 sp : ffff8000213d7120 x29: ffff8000213d73a0 x28: dfff800000000000 x27: 0000000000000002 x26: ffff8000213d7650 x25: 0000000000000001 x24: 0000000000000002 x23: 0000000000000002 x22: ffff0000fc422ad0 x21: 0000000000000001 x20: ffff8000213d7650 x19: ffffffffffffffe4 x18: ffff800011b9bf60 x17: ffff80001835a000 x16: ffff8000082d92bc x15: ffff8000089f004c x14: 0000000000000001 x13: 1ffff00002b4e732 x12: 0000000000080000 x11: 00000000000035f8 x10: ffff8000224fd000 x9 : ffff800008d259ac x8 : 0000000000000000 x7 : ffff80000805983c x6 : ffff800008059a4c x5 : ffff0000e8985060 x4 : ffff8000213d6be8 x3 : 0000000000000000 x2 : 0000000000000006 x1 : 0000000000000000 x0 : ffffffffffffffec Call trace: ext4_ext_drop_refs fs/ext4/extents.c:119 [inline] ext4_free_ext_path fs/ext4/extents.c:128 [inline] ext4_ext_map_blocks+0x2a70/0x570c fs/ext4/extents.c:4497 ext4_map_blocks+0x860/0x1778 fs/ext4/inode.c:679 ext4_alloc_file_blocks+0x2ac/0x8ec fs/ext4/extents.c:4581 ext4_zero_range+0x3b4/0xcf8 fs/ext4/extents.c:4698 ext4_fallocate+0x414/0x1abc fs/ext4/extents.c:4833 vfs_fallocate+0x4a4/0x5f4 fs/open.c:323 ioctl_preallocate+0x20c/0x2b4 fs/ioctl.c:290 file_ioctl fs/ioctl.c:-1 [inline] do_vfs_ioctl+0x1874/0x2100 fs/ioctl.c:849 __do_sys_ioctl fs/ioctl.c:868 [inline] __se_sys_ioctl fs/ioctl.c:856 [inline] __arm64_sys_ioctl+0xe4/0x1c8 fs/ioctl.c:856 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b4 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x58/0x130 arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x128 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 Code: 2a1803fb d343fc08 38fc6908 35006ba8 (79401276) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 2a1803fb mov w27, w24 4: d343fc08 lsr x8, x0, #3 8: 38fc6908 ldrsb w8, [x8, x28] c: 35006ba8 cbnz w8, 0xd80 * 10: 79401276 ldrh w22, [x19, #8] <-- trapping instruction