overlayfs: upper fs does not support tmpfile. overlayfs: upper fs does not support RENAME_WHITEOUT. ================================================================== BUG: KASAN: user-memory-access in scnprintf_cpu_key fs/reiserfs/prints.c:95 [inline] BUG: KASAN: user-memory-access in prepare_error_buf+0x1194/0x157c fs/reiserfs/prints.c:229 Read of size 4 at addr 00000000ffffffff by task syz.0.101/4646 CPU: 0 PID: 4646 Comm: syz.0.101 Not tainted 6.1.106-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 Call trace: dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106 print_report+0xe4/0x4c0 mm/kasan/report.c:398 kasan_report+0xd4/0x130 mm/kasan/report.c:495 __asan_report_load4_noabort+0x2c/0x38 mm/kasan/report_generic.c:350 scnprintf_cpu_key fs/reiserfs/prints.c:95 [inline] prepare_error_buf+0x1194/0x157c fs/reiserfs/prints.c:229 __reiserfs_error+0xe8/0x2ac fs/reiserfs/prints.c:396 reiserfs_do_truncate+0x2c0/0x11c8 fs/reiserfs/stree.c:1930 reiserfs_delete_object+0x80/0x1ac fs/reiserfs/stree.c:1503 reiserfs_evict_inode+0x26c/0x3f0 fs/reiserfs/inode.c:63 evict+0x260/0x68c fs/inode.c:666 iput_final fs/inode.c:1791 [inline] iput+0x7c0/0x8a4 fs/inode.c:1817 dentry_unlink_inode+0x37c/0x4bc fs/dcache.c:405 d_delete+0xa4/0x18c fs/dcache.c:2572 xattr_unlink fs/reiserfs/xattr.c:96 [inline] lookup_and_delete_xattr fs/reiserfs/xattr.c:494 [inline] reiserfs_xattr_set_handle+0xb94/0xe90 fs/reiserfs/xattr.c:529 reiserfs_xattr_set+0x398/0x4b0 fs/reiserfs/xattr.c:633 trusted_set+0x98/0xec fs/reiserfs/xattr_trusted.c:31 __vfs_removexattr+0x370/0x38c fs/xattr.c:479 __vfs_removexattr_locked+0x1d8/0x380 fs/xattr.c:514 vfs_removexattr+0xe0/0x23c fs/xattr.c:536 ovl_do_removexattr fs/overlayfs/overlayfs.h:270 [inline] ovl_removexattr fs/overlayfs/overlayfs.h:278 [inline] ovl_make_workdir fs/overlayfs/super.c:1456 [inline] ovl_get_workdir+0xcc8/0x13d4 fs/overlayfs/super.c:1539 ovl_fill_super+0x15b4/0x2254 fs/overlayfs/super.c:2095 mount_nodev+0x68/0x104 fs/super.c:1489 ovl_mount+0x3c/0x50 fs/overlayfs/super.c:2186 legacy_get_tree+0xd4/0x16c fs/fs_context.c:632 vfs_get_tree+0x90/0x274 fs/super.c:1573 do_new_mount+0x278/0x8fc fs/namespace.c:3051 path_mount+0x590/0xe5c fs/namespace.c:3381 do_mount fs/namespace.c:3394 [inline] __do_sys_mount fs/namespace.c:3602 [inline] __se_sys_mount fs/namespace.c:3579 [inline] __arm64_sys_mount+0x45c/0x594 fs/namespace.c:3579 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 ================================================================== Unable to handle kernel paging request at virtual address 00000000ffffffff Mem abort info: ESR = 0x0000000096000005 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: level 1 translation fault Data abort info: ISV = 0, ISS = 0x00000005 CM = 0, WnR = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=000000011c574000 [00000000ffffffff] pgd=08000001524e5003, p4d=08000001524e5003, pud=0000000000000000 Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 4646 Comm: syz.0.101 Tainted: G B 6.1.106-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : scnprintf_cpu_key fs/reiserfs/prints.c:95 [inline] pc : prepare_error_buf+0x6dc/0x157c fs/reiserfs/prints.c:229 lr : scnprintf_cpu_key fs/reiserfs/prints.c:95 [inline] lr : prepare_error_buf+0x1194/0x157c fs/reiserfs/prints.c:229 sp : ffff80001dc86840 x29: ffff80001dc869c0 x28: ffff800019bd39be x27: ffff800019bd2abe x26: ffff80001dc86ab8 x25: ffff80001dc86aa0 x24: ffff80001dc86920 x23: ffff800019bd2aa0 x22: 00000000ffffffff x21: ffffffffffffffe2 x20: 00000000000003e2 x19: dfff800000000000 x18: ffff80001dc86540 x17: 0000000000000000 x16: ffff8000121d8240 x15: 0000000000000002 x14: 00000000ffffffff x13: 0000000000000001 x12: 0000000000040000 x11: 000000000003ffff x10: ffff80001e3ba000 x9 : 0000000000000000 x8 : ffff0000dff0d340 x7 : 0000000000000001 x6 : 0000000000000001 x5 : ffff80001dc86058 x4 : ffff800015aa2d40 x3 : ffff8000081ae3ec x2 : 0000000000000001 x1 : 0000000000000000 x0 : 00000000ffffffff Call trace: scnprintf_cpu_key fs/reiserfs/prints.c:95 [inline] prepare_error_buf+0x6dc/0x157c fs/reiserfs/prints.c:229 __reiserfs_error+0xe8/0x2ac fs/reiserfs/prints.c:396 reiserfs_do_truncate+0x2c0/0x11c8 fs/reiserfs/stree.c:1930 reiserfs_delete_object+0x80/0x1ac fs/reiserfs/stree.c:1503 reiserfs_evict_inode+0x26c/0x3f0 fs/reiserfs/inode.c:63 evict+0x260/0x68c fs/inode.c:666 iput_final fs/inode.c:1791 [inline] iput+0x7c0/0x8a4 fs/inode.c:1817 dentry_unlink_inode+0x37c/0x4bc fs/dcache.c:405 d_delete+0xa4/0x18c fs/dcache.c:2572 xattr_unlink fs/reiserfs/xattr.c:96 [inline] lookup_and_delete_xattr fs/reiserfs/xattr.c:494 [inline] reiserfs_xattr_set_handle+0xb94/0xe90 fs/reiserfs/xattr.c:529 reiserfs_xattr_set+0x398/0x4b0 fs/reiserfs/xattr.c:633 trusted_set+0x98/0xec fs/reiserfs/xattr_trusted.c:31 __vfs_removexattr+0x370/0x38c fs/xattr.c:479 __vfs_removexattr_locked+0x1d8/0x380 fs/xattr.c:514 vfs_removexattr+0xe0/0x23c fs/xattr.c:536 ovl_do_removexattr fs/overlayfs/overlayfs.h:270 [inline] ovl_removexattr fs/overlayfs/overlayfs.h:278 [inline] ovl_make_workdir fs/overlayfs/super.c:1456 [inline] ovl_get_workdir+0xcc8/0x13d4 fs/overlayfs/super.c:1539 ovl_fill_super+0x15b4/0x2254 fs/overlayfs/super.c:2095 mount_nodev+0x68/0x104 fs/super.c:1489 ovl_mount+0x3c/0x50 fs/overlayfs/super.c:2186 legacy_get_tree+0xd4/0x16c fs/fs_context.c:632 vfs_get_tree+0x90/0x274 fs/super.c:1573 do_new_mount+0x278/0x8fc fs/namespace.c:3051 path_mount+0x590/0xe5c fs/namespace.c:3381 do_mount fs/namespace.c:3394 [inline] __do_sys_mount fs/namespace.c:3602 [inline] __se_sys_mount fs/namespace.c:3579 [inline] __arm64_sys_mount+0x45c/0x594 fs/namespace.c:3579 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 Code: d343fec8 38f36908 35005548 aa1603e0 (b8404418) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: d343fec8 lsr x8, x22, #3 4: 38f36908 ldrsb w8, [x8, x19] 8: 35005548 cbnz w8, 0xab0 c: aa1603e0 mov x0, x22 * 10: b8404418 ldr w24, [x0], #4 <-- trapping instruction