BUG: unable to handle page fault for address: ffffed101d6c9d0e #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 23ffef067 P4D 23ffef067 PUD 13fff6067 PMD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 26830 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:le32_add_cpu include/linux/byteorder/generic.h:151 [inline] RIP: 0010:udf_free_inode+0xe8/0x350 fs/udf/ialloc.c:40 Code: 2e 97 bc fe 66 41 81 fe 00 40 0f 84 89 01 00 00 e8 5d 90 bc fe 48 8d 7d 20 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 a6 RSP: 0018:ffffc9000473fc70 EFLAGS: 00010212 RAX: dffffc0000000000 RBX: ffff8880873cbb00 RCX: 0000000000000000 RDX: 1ffff1101d6c9d0e RSI: ffffffff82ba5cb3 RDI: ffff8880eb64e870 RBP: ffff8880eb64e850 R08: 0000000000000000 R09: 0000000000008000 R10: ffffffff82ba5ca2 R11: 0000000000004000 R12: ffff888076740000 R13: ffff88807761d8c0 R14: 0000000000008000 R15: ffff888076740678 FS: 00005555571a4400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed101d6c9d0e CR3: 0000000019995000 CR4: 0000000000350ee0 Call Trace: udf_evict_inode+0x348/0x580 fs/udf/inode.c:164 evict+0x2ed/0x6b0 fs/inode.c:588 iput_final fs/inode.c:1664 [inline] iput.part.0+0x539/0x850 fs/inode.c:1690 iput+0x58/0x70 fs/inode.c:1680 dentry_unlink_inode+0x2b1/0x460 fs/dcache.c:376 __dentry_kill+0x3c0/0x640 fs/dcache.c:582 dentry_kill fs/dcache.c:720 [inline] dput+0x66b/0xbc0 fs/dcache.c:888 __fput+0x3ad/0x9f0 fs/file_table.c:293 task_work_run+0xdd/0x1a0 kernel/task_work.c:164 tracehook_notify_resume include/linux/tracehook.h:189 [inline] exit_to_user_mode_loop kernel/entry/common.c:175 [inline] exit_to_user_mode_prepare+0x27e/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f124f83367b Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 RSP: 002b:00007ffe9ecb9180 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f124f83367b RDX: 00007f124f989540 RSI: 00000000000f4240 RDI: 0000000000000003 RBP: 0000000000000000 R08: 0000000000000000 R09: 00007f124f9893c0 R10: 00007ffe9ed32090 R11: 0000000000000293 R12: 0000000000092dde R13: 00000000000003e8 R14: 00007f124f983f60 R15: 0000000000092a2f Modules linked in: CR2: ffffed101d6c9d0e ---[ end trace 644a8be848efdff4 ]--- RIP: 0010:le32_add_cpu include/linux/byteorder/generic.h:151 [inline] RIP: 0010:udf_free_inode+0xe8/0x350 fs/udf/ialloc.c:40 Code: 2e 97 bc fe 66 41 81 fe 00 40 0f 84 89 01 00 00 e8 5d 90 bc fe 48 8d 7d 20 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 a6 RSP: 0018:ffffc9000473fc70 EFLAGS: 00010212 RAX: dffffc0000000000 RBX: ffff8880873cbb00 RCX: 0000000000000000 RDX: 1ffff1101d6c9d0e RSI: ffffffff82ba5cb3 RDI: ffff8880eb64e870 RBP: ffff8880eb64e850 R08: 0000000000000000 R09: 0000000000008000 R10: ffffffff82ba5ca2 R11: 0000000000004000 R12: ffff888076740000 R13: ffff88807761d8c0 R14: 0000000000008000 R15: ffff888076740678 FS: 00005555571a4400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed101d6c9d0e CR3: 0000000019995000 CR4: 0000000000350ee0 ---------------- Code disassembly (best guess): 0: 2e 97 cs xchg %eax,%edi 2: bc fe 66 41 81 mov $0x814166fe,%esp 7: fe 00 incb (%rax) 9: 40 0f 84 89 01 00 00 rex je 0x199 10: e8 5d 90 bc fe callq 0xfebc9072 15: 48 8d 7d 20 lea 0x20(%rbp),%rdi 19: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 20: fc ff df 23: 48 89 fa mov %rdi,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 0f b6 14 02 movzbl (%rdx,%rax,1),%edx <-- trapping instruction 2e: 48 89 f8 mov %rdi,%rax 31: 83 e0 07 and $0x7,%eax 34: 83 c0 03 add $0x3,%eax 37: 38 d0 cmp %dl,%al 39: 7c 08 jl 0x43 3b: 84 d2 test %dl,%dl 3d: 0f .byte 0xf 3e: 85 .byte 0x85 3f: a6 cmpsb %es:(%rdi),%ds:(%rsi)