github.com/google/syzkaller@v0.0.0-20240517125934-c0f1611a36d6/pkg/report/testdata/linux/guilty/64 (about)

     1  FILE: fs/ntfs3/frecord.c
     2  
     3  
     4  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008
     5  Mem abort info:
     6    ESR = 0x0000000096000006
     7    EC = 0x25: DABT (current EL), IL = 32 bits
     8    SET = 0, FnV = 0
     9    EA = 0, S1PTW = 0
    10    FSC = 0x06: level 2 translation fault
    11  Data abort info:
    12    ISV = 0, ISS = 0x00000006
    13    CM = 0, WnR = 0
    14  user pgtable: 4k pages, 48-bit VAs, pgdp=000000010adf6000
    15  [0000000000000008] pgd=0800000106a37003, p4d=0800000106a37003, pud=0800000106a36003, pmd=0000000000000000
    16  Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP
    17  Modules linked in:
    18  CPU: 1 PID: 3072 Comm: syz-executor288 Not tainted 6.1.0-rc8-syzkaller-33330-ga5541c0811a0 #0
    19  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
    20  pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
    21  pc : _compound_head include/linux/page-flags.h:253 [inline]
    22  pc : unlock_page+0x18/0xb8 mm/folio-compat.c:20
    23  lr : unlock_page+0x18/0xb8 mm/folio-compat.c:19
    24  sp : ffff80000ff1b910
    25  x29: ffff80000ff1b910 x28: 0000000000000007 x27: fffffc000330a480
    26  x26: 00000000ffffffff x25: 0000000000000000 x24: 0000000000000000
    27  x23: 0000000000000001 x22: 0000000000000000 x21: 00000000fffffff4
    28  x20: ffff0000c95b4880 x19: 0000000000000000 x18: 0000000000000073
    29  x17: 6e69676e45206574 x16: ffff80000dbe6158 x15: ffff0000c4423480
    30  x14: 0000000000000000 x13: 00000000ffffffff x12: ffff0000c4423480
    31  x11: ff808000083f6804 x10: 0000000000000000 x9 : ffff8000083f6804
    32  x8 : ffff0000c4423480 x7 : ffff80000c091ebc x6 : 0000000000000000
    33  x5 : 0000000000000080 x4 : 0000000000000001 x3 : 0000000000000000
    34  x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
    35  Call trace:
    36   unlock_page+0x18/0xb8 mm/folio-compat.c:19
    37   ni_readpage_cmpr+0x328/0x7cc fs/ntfs3/frecord.c:2139
    38   ntfs_read_folio+0xd8/0x128 fs/ntfs3/inode.c:697
    39   filemap_read_folio+0xc4/0x468 mm/filemap.c:2407
    40   filemap_create_folio+0xc0/0x1b4 mm/filemap.c:2536
    41   filemap_get_pages+0x388/0x598 mm/filemap.c:2588
    42   filemap_read+0x14c/0x6f4 mm/filemap.c:2675
    43   generic_file_read_iter+0x6c/0x25c mm/filemap.c:2821
    44   ntfs_file_read_iter+0xe4/0x118 fs/ntfs3/file.c:853
    45   call_read_iter include/linux/fs.h:2193 [inline]
    46   new_sync_read fs/read_write.c:389 [inline]
    47   vfs_read+0x2d4/0x448 fs/read_write.c:470
    48   ksys_pread64 fs/read_write.c:665 [inline]
    49   __do_sys_pread64 fs/read_write.c:675 [inline]
    50   __se_sys_pread64 fs/read_write.c:672 [inline]
    51   __arm64_sys_pread64+0xbc/0x11c fs/read_write.c:672
    52   __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
    53   invoke_syscall arch/arm64/kernel/syscall.c:52 [inline]
    54   el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142
    55   do_el0_svc+0x48/0x140 arch/arm64/kernel/syscall.c:197
    56   el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637
    57   el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
    58   el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584
    59  Code: a9014ff4 910003fd aa0003f3 97fac089 (f9400674) 
    60  ---[ end trace 0000000000000000 ]---