syz-executor.0 (19076): drop_caches: 2 BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 PGD 97b43067 P4D 97b43067 PUD a5acc067 PMD 0 Oops: 0002 [#1] PREEMPT SMP KASAN CPU: 1 PID: 19103 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 RIP: 0010:test_and_set_bit arch/x86/include/asm/bitops.h:209 [inline] RIP: 0010:test_and_set_bit_lock arch/x86/include/asm/bitops.h:223 [inline] RIP: 0010:trylock_buffer include/linux/buffer_head.h:367 [inline] RIP: 0010:lock_buffer include/linux/buffer_head.h:373 [inline] RIP: 0010:udf_getblk+0x1c1/0x390 fs/udf/inode.c:464 Code: e5 01 89 ee e8 90 f5 f2 fe 40 84 ed 0f 84 00 01 00 00 e8 52 f4 f2 fe 31 d2 be 74 01 00 00 48 c7 c7 a0 80 9a 88 e8 ff e3 d1 fe 49 0f ba 2c 24 02 40 0f 92 c5 31 ff 89 ee e8 5b f5 f2 fe 40 84 RSP: 0018:ffff88809d9df4d8 EFLAGS: 00010246 RAX: 0000000000000007 RBX: 1ffff11013b3be9d RCX: 0000000000000001 RDX: 0000000000000000 RSI: 00000000ffffffff RDI: ffff888099436324 RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 000000004c92587c R12: 0000000000000000 R13: ffff8880a2f43670 R14: ffff8880a2f43698 R15: dffffc0000000000 FS: 00007fb75f196700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 00000000afc6a000 CR4: 00000000003426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: udf_bread+0x85/0x240 fs/udf/inode.c:1206 udf_add_entry+0xfda/0x2a20 fs/udf/namei.c:509 udf_add_nondir+0xf9/0x400 fs/udf/namei.c:602 udf_create+0x130/0x180 fs/udf/namei.c:639 lookup_open+0x893/0x1a20 fs/namei.c:3235 do_last fs/namei.c:3327 [inline] path_openat+0x1094/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 do_sys_open+0x3b3/0x520 fs/open.c:1085 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fb7608655a9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fb75f196168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007fb760986120 RCX: 00007fb7608655a9 RDX: 000000000000275a RSI: 0000000020000140 RDI: ffffffffffffff9c RBP: 00007fb7608c0580 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffdc7877e7f R14: 00007fb75f196300 R15: 0000000000022000 Modules linked in: CR2: 0000000000000000 ---[ end trace 6dda99c52737cf33 ]--- RIP: 0010:test_and_set_bit arch/x86/include/asm/bitops.h:209 [inline] RIP: 0010:test_and_set_bit_lock arch/x86/include/asm/bitops.h:223 [inline] RIP: 0010:trylock_buffer include/linux/buffer_head.h:367 [inline] RIP: 0010:lock_buffer include/linux/buffer_head.h:373 [inline] RIP: 0010:udf_getblk+0x1c1/0x390 fs/udf/inode.c:464 Code: e5 01 89 ee e8 90 f5 f2 fe 40 84 ed 0f 84 00 01 00 00 e8 52 f4 f2 fe 31 d2 be 74 01 00 00 48 c7 c7 a0 80 9a 88 e8 ff e3 d1 fe 49 0f ba 2c 24 02 40 0f 92 c5 31 ff 89 ee e8 5b f5 f2 fe 40 84 RSP: 0018:ffff88809d9df4d8 EFLAGS: 00010246 RAX: 0000000000000007 RBX: 1ffff11013b3be9d RCX: 0000000000000001 RDX: 0000000000000000 RSI: 00000000ffffffff RDI: ffff888099436324 RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 000000004c92587c R12: 0000000000000000 R13: ffff8880a2f43670 R14: ffff8880a2f43698 R15: dffffc0000000000 FS: 00007fb75f196700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 00000000afc6a000 CR4: 00000000003426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: e5 01 in $0x1,%eax 2: 89 ee mov %ebp,%esi 4: e8 90 f5 f2 fe callq 0xfef2f599 9: 40 84 ed test %bpl,%bpl c: 0f 84 00 01 00 00 je 0x112 12: e8 52 f4 f2 fe callq 0xfef2f469 17: 31 d2 xor %edx,%edx 19: be 74 01 00 00 mov $0x174,%esi 1e: 48 c7 c7 a0 80 9a 88 mov $0xffffffff889a80a0,%rdi 25: e8 ff e3 d1 fe callq 0xfed1e429 * 2a: f0 49 0f ba 2c 24 02 lock btsq $0x2,(%r12) <-- trapping instruction 31: 40 0f 92 c5 setb %bpl 35: 31 ff xor %edi,%edi 37: 89 ee mov %ebp,%esi 39: e8 5b f5 f2 fe callq 0xfef2f599 3e: 40 rex 3f: 84 .byte 0x84