incfs: mount failed -22
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 384 Comm: syz-executor379 Not tainted 5.4.268-syzkaller-00012-g51cf29fc2bfc #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
RIP: 0010:dir_rename fs/incfs/vfs.c:1374 [inline]
RIP: 0010:dir_rename_wrap+0x1a5/0x4f0 fs/incfs/vfs.c:84
Code: 7a ff eb 05 e8 4c 85 7a ff bb f0 ff ff ff 48 8b 6c 24 18 e9 02 03 00 00 e8 38 85 7a ff 31 db 48 83 c3 08 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 2c 68 aa ff 48 8b 1b 48 8b 44 24
RSP: 0018:ffff8881e2c1fac0 EFLAGS: 00010202
RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff8881db22de80
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffff8881db671018 R08: ffffffff81e9c0e1 R09: ffffed103c583f49
R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
R13: ffff8881db671028 R14: ffff8881dc000000 R15: 1ffff1103b6ce203
FS: 00007f19cd39e6c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f19cd41c450 CR3: 00000001db038000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
vfs_rename+0x90e/0xda0 fs/namei.c:4584
do_renameat2+0x889/0x1110 fs/namei.c:4733
__do_sys_renameat2 fs/namei.c:4768 [inline]
__se_sys_renameat2 fs/namei.c:4765 [inline]
__x64_sys_renameat2+0xb1/0xc0 fs/namei.c:4765
do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
Modules linked in:
---[ end trace 3c95681bd66b3bfe ]---
RIP: 0010:dir_rename fs/incfs/vfs.c:1374 [inline]
RIP: 0010:dir_rename_wrap+0x1a5/0x4f0 fs/incfs/vfs.c:84
Code: 7a ff eb 05 e8 4c 85 7a ff bb f0 ff ff ff 48 8b 6c 24 18 e9 02 03 00 00 e8 38 85 7a ff 31 db 48 83 c3 08 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 2c 68 aa ff 48 8b 1b 48 8b 44 24
RSP: 0018:ffff8881e2c1fac0 EFLAGS: 00010202
RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff8881db22de80
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffff8881db671018 R08: ffffffff81e9c0e1 R09: ffffed103c583f49
R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
R13: ffff8881db671028 R14: ffff8881dc000000 R15: 1ffff1103b6ce203
FS: 00007f19cd39e6c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555a9bf9b068 CR3: 00000001db038000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 7a ff jp 0x1
2: eb 05 jmp 0x9
4: e8 4c 85 7a ff call 0xff7a8555
9: bb f0 ff ff ff mov $0xfffffff0,%ebx
e: 48 8b 6c 24 18 mov 0x18(%rsp),%rbp
13: e9 02 03 00 00 jmp 0x31a
18: e8 38 85 7a ff call 0xff7a8555
1d: 31 db xor %ebx,%ebx
1f: 48 83 c3 08 add $0x8,%rbx
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) <-- trapping instruction
2f: 74 08 je 0x39
31: 48 89 df mov %rbx,%rdi
34: e8 2c 68 aa ff call 0xffaa6865
39: 48 8b 1b mov (%rbx),%rbx
3c: 48 rex.W
3d: 8b .byte 0x8b
3e: 44 rex.R
3f: 24 .byte 0x24