Unable to handle kernel NULL pointer dereference at virtual address 0000000000000048 Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006 CM = 0, WnR = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=000000010b003000 [0000000000000048] pgd=080000010b674003, p4d=080000010b674003, pud=080000010ca14003, pmd=0000000000000000 Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 3287 Comm: syz-executor245 Not tainted 6.1.0-rc6-syzkaller-32662-g6d464646530f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : p9_client_rpc+0x4c/0x548 net/9p/client.c:675 lr : p9_client_rpc+0x4c/0x548 net/9p/client.c:662 sp : ffff800013063850 x29: ffff8000130638d0 x28: 000000000000006f x27: ffff800013063c78 x26: ffff80000d5d3aa0 x25: ffff80000d3b91f0 x24: ffff80000d5d3aa0 x23: ffff0000cca7aa00 x22: ffff800013063c70 x21: ffff80000cf5303d x20: 0000000000000020 x19: 0000000000000000 x18: 00000000000003bc x17: ffff80000c0cd83c x16: ffff80000dbe6158 x15: ffff0000ca300000 x14: 0000000000000000 x13: 00000000ffffffff x12: ffff0000ca300000 x11: ff8080000be75cb4 x10: 0000000000000000 x9 : ffff80000be75cb4 x8 : ffff0000ca300000 x7 : ffff8000095d1994 x6 : 0000000000000000 x5 : 0000000000000000 x4 : ffff800013063c70 x3 : 0000000000000000 x2 : ffff80000cf5303d x1 : 0000000000000020 x0 : 0000000000000000 Call trace: p9_client_rpc+0x4c/0x548 net/9p/client.c:662 p9_client_xattrcreate+0x54/0x98 net/9p/client.c:2024 v9fs_fid_xattr_set+0x94/0x218 fs/9p/xattr.c:125 v9fs_xattr_set+0x68/0x138 fs/9p/xattr.c:100 v9fs_xattr_handler_set+0x58/0x70 fs/9p/xattr.c:159 __vfs_setxattr+0x250/0x260 fs/xattr.c:182 __vfs_setxattr_noperm+0xcc/0x320 fs/xattr.c:216 __vfs_setxattr_locked+0x16c/0x194 fs/xattr.c:277 vfs_setxattr+0xf4/0x1f4 fs/xattr.c:309 do_setxattr fs/xattr.c:594 [inline] setxattr fs/xattr.c:617 [inline] path_setxattr+0x354/0x414 fs/xattr.c:636 __do_sys_setxattr fs/xattr.c:652 [inline] __se_sys_setxattr fs/xattr.c:648 [inline] __arm64_sys_setxattr+0x2c/0x40 fs/xattr.c:648 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584 Code: a9019be5 f90017e7 f81f83a8 9710bf2a (f9402668) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: a9019be5 stp x5, x6, [sp, #24] 4: f90017e7 str x7, [sp, #40] 8: f81f83a8 stur x8, [x29, #-8] c: 9710bf2a bl 0xfffffffffc42fcb4 * 10: f9402668 ldr x8, [x19, #72] <-- trapping instruction