Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018 Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006 CM = 0, WnR = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=000000014d5ee000 [0000000000000018] pgd=080000013dd36003, p4d=080000013dd36003, pud=080000013d2a7003, pmd=0000000000000000 Internal error: Oops: 96000006 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 23681 Comm: syz-executor.3 Not tainted 5.19.0-rc8-syzkaller-01618-g680fb5b009e8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/20/2022 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : ntfs_update_mftmirr+0x3c/0x328 fs/ntfs3/fsntfs.c:834 lr : ntfs_update_mftmirr+0x30/0x328 fs/ntfs3/fsntfs.c:831 sp : ffff80001682bba0 x29: ffff80001682bbb0 x28: ffff0000fc5e8000 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: ffff0000c40b4880 x23: 0000000000000000 x22: 0000000000000020 x21: 00000000ffffffea x20: 0000000000000000 x19: ffff0000fd130000 x18: 00000000000003e9 x17: ffff80000dcfd698 x16: ffff80000db3b658 x15: ffff0000fc5e8000 x14: 0000000000020016 x13: 00000000f0000000 x12: 0000000000040000 x11: 0000000000004002 x10: ffff80001b82c000 x9 : ffff800008bfd55c x8 : 0000000000004003 x7 : ffff8000084b2594 x6 : 0000000000000000 x5 : 0000000000240000 x4 : 0000000000100000 x3 : 0000000000000000 x2 : ffff0000fc5e8000 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: ntfs_update_mftmirr+0x3c/0x328 fs/ntfs3/fsntfs.c:838 put_ntfs+0xec/0x13c fs/ntfs3/super.c:463 ntfs_fs_free+0x30/0x70 fs/ntfs3/super.c:1365 put_fs_context+0x80/0x278 fs/fs_context.c:469 do_new_mount+0x25c/0x4e4 fs/namespace.c:3044 path_mount+0x358/0x8b0 fs/namespace.c:3370 do_mount fs/namespace.c:3383 [inline] __do_sys_mount fs/namespace.c:3591 [inline] __se_sys_mount fs/namespace.c:3568 [inline] __arm64_sys_mount+0x2f8/0x408 fs/namespace.c:3568 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x154 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x14c arch/arm64/kernel/entry-common.c:624 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:642 el0t_64_sync+0x18c/0x190 Code: 97da7930 f940027a b9405277 2a1f03e0 (f9400f55) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 97da7930 bl 0xffffffffff69e4c0 4: f940027a ldr x26, [x19] 8: b9405277 ldr w23, [x19, #80] c: 2a1f03e0 mov w0, wzr * 10: f9400f55 ldr x21, [x26, #24] <-- trapping instruction