BUG: unable to handle page fault for address: 00003680ffffea08 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 4864 Comm: systemd-udevd Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:find_stack lib/stackdepot.c:209 [inline] RIP: 0010:stack_depot_save+0x12b/0x4e0 lib/stackdepot.c:281 Code: 05 7a 64 b8 0c 89 da 81 e2 ff ff 0f 00 4c 8d 3c d0 4d 8b 37 4d 85 f6 75 11 e9 94 00 00 00 4d 8b 36 4d 85 f6 0f 84 88 00 00 00 <41> 39 5e 08 75 ee 45 3b 66 0c 75 e8 31 c0 49 8b 4c c6 18 48 39 4c RSP: 0018:ffffc9000153f548 EFLAGS: 00010206 RAX: ffff88823b000000 RBX: 0000000062405857 RCX: 0000000000000003 RDX: 0000000000005857 RSI: 0000000000000cc0 RDI: 000000001d26f840 RBP: ffffc9000153f5b8 R08: 00000000bd03d427 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: 000000000000000f R13: 000000000000000f R14: 00003680ffffea00 R15: ffff88823b02c2b8 FS: 00007f867a3c88c0(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00003680ffffea08 CR3: 00000000151c8000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: kasan_save_stack+0x32/0x40 mm/kasan/common.c:40 kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:428 [inline] __kasan_slab_alloc+0x84/0xa0 mm/kasan/common.c:461 kasan_slab_alloc include/linux/kasan.h:236 [inline] slab_post_alloc_hook mm/slab.h:527 [inline] slab_alloc_node mm/slub.c:2924 [inline] slab_alloc mm/slub.c:2932 [inline] kmem_cache_alloc+0x152/0x3a0 mm/slub.c:2937 shmem_alloc_inode+0x18/0x40 mm/shmem.c:3775 alloc_inode+0x61/0x230 fs/inode.c:233 new_inode_pseudo fs/inode.c:927 [inline] new_inode+0x27/0x2f0 fs/inode.c:956 shmem_get_inode+0x195/0xc20 mm/shmem.c:2305 shmem_mknod+0x5a/0x1f0 mm/shmem.c:2865 lookup_open.isra.0+0xfe4/0x13d0 fs/namei.c:3215 open_last_lookups fs/namei.c:3285 [inline] path_openat+0x9af/0x27d0 fs/namei.c:3491 do_filp_open+0x190/0x3d0 fs/namei.c:3521 do_sys_openat2+0x16d/0x420 fs/open.c:1187 do_sys_open fs/open.c:1203 [inline] __do_sys_open fs/open.c:1211 [inline] __se_sys_open fs/open.c:1207 [inline] __x64_sys_open+0x119/0x1c0 fs/open.c:1207 do_syscall_64+0x3a/0xb0 arch/x86/entry/common.c:47 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f867950e840 Code: 73 01 c3 48 8b 0d 68 77 20 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 89 bb 20 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 1e f6 ff ff 48 89 04 24 RSP: 002b:00007fff91c47128 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f867950e840 RDX: 00000000000001a4 RSI: 0000000000080141 RDI: 000056082e2cb369 RBP: 000056082e2cb369 R08: c0c8fefc00000000 R09: 0000000000000007 R10: cb98b0c023a55a4d R11: 0000000000000246 R12: 000056082f971010 R13: 00000000fffffffe R14: 0000000000000000 R15: 0000000000000001 Modules linked in: CR2: 00003680ffffea08 ---[ end trace ca0d554000193035 ]--- RIP: 0010:find_stack lib/stackdepot.c:209 [inline] RIP: 0010:stack_depot_save+0x12b/0x4e0 lib/stackdepot.c:281 Code: 05 7a 64 b8 0c 89 da 81 e2 ff ff 0f 00 4c 8d 3c d0 4d 8b 37 4d 85 f6 75 11 e9 94 00 00 00 4d 8b 36 4d 85 f6 0f 84 88 00 00 00 <41> 39 5e 08 75 ee 45 3b 66 0c 75 e8 31 c0 49 8b 4c c6 18 48 39 4c RSP: 0018:ffffc9000153f548 EFLAGS: 00010206 RAX: ffff88823b000000 RBX: 0000000062405857 RCX: 0000000000000003 RDX: 0000000000005857 RSI: 0000000000000cc0 RDI: 000000001d26f840 RBP: ffffc9000153f5b8 R08: 00000000bd03d427 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: 000000000000000f R13: 000000000000000f R14: 00003680ffffea00 R15: ffff88823b02c2b8 FS: 00007f867a3c88c0(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00003680ffffea08 CR3: 00000000151c8000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400