RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f215f26293a RDX: 0000000020000380 RSI: 0000000020000280 RDI: 0000000000000000 RBP: 00007f215dbd6020 R08: 00007f215dbd6020 R09: 0000000020000380 R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000380 R13: 0000000020000280 R14: 00007f215dbd5fe0 R15: 0000000020002580 BUG: unable to handle kernel paging request at fffffffffffffffc IP: do_new_mount fs/namespace.c:2577 [inline] IP: do_mount+0x1ef2/0x2a30 fs/namespace.c:2905 PGD 8e6b067 P4D 8e6b067 PUD 8e6d067 PMD 0 Oops: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 28995 Comm: syz-executor.2 Not tainted 4.14.293-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 task: ffff88809145a6c0 task.stack: ffff8880b12e8000 RIP: 0010:do_new_mount fs/namespace.c:2577 [inline] RIP: 0010:do_mount+0x1ef2/0x2a30 fs/namespace.c:2905 RSP: 0018:ffff8880b12efd90 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: 00000000fffffff4 RCX: ffffc900078a0000 RDX: 1fffffffffffffff RSI: ffffffff818e9704 RDI: fffffffffffffffc RBP: fffffffffffffff4 R08: ffffffff8b9fc01c R09: 0000000000000001 R10: 0000000000000000 R11: ffff88809145a6c0 R12: ffff88809c57c028 R13: ffffffff891ea580 R14: 0000000000000000 R15: 0000000000000020 FS: 00007f215dbd6700(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffffc CR3: 00000000b3ec1000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: SYSC_mount fs/namespace.c:3121 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3098 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f215f26293a RSP: 002b:00007f215dbd5f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f215f26293a RDX: 0000000020000380 RSI: 0000000020000280 RDI: 0000000000000000 RBP: 00007f215dbd6020 R08: 00007f215dbd6020 R09: 0000000020000380 R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000380 R13: 0000000020000280 R14: 00007f215dbd5fe0 R15: 0000000020002580 Code: c6 ff 48 89 ef 48 63 eb e8 7c 61 ff ff 48 8d 7d 08 b8 ff ff 37 00 48 89 fa 48 c1 e0 2a 48 c1 ea 03 80 3c 02 00 0f 85 4b 08 00 00 <48> 8b 5d 08 e8 95 b0 c6 ff 48 8d 7b 70 e8 4c 47 b2 ff 4c 89 ef RIP: do_new_mount fs/namespace.c:2577 [inline] RSP: ffff8880b12efd90 RIP: do_mount+0x1ef2/0x2a30 fs/namespace.c:2905 RSP: ffff8880b12efd90 CR2: fffffffffffffffc ---[ end trace 8dfef79659d94e66 ]--- ---------------- Code disassembly (best guess), 1 bytes skipped: 0: ff 48 89 decl -0x77(%rax) 3: ef out %eax,(%dx) 4: 48 63 eb movslq %ebx,%rbp 7: e8 7c 61 ff ff callq 0xffff6188 c: 48 8d 7d 08 lea 0x8(%rbp),%rdi 10: b8 ff ff 37 00 mov $0x37ffff,%eax 15: 48 89 fa mov %rdi,%rdx 18: 48 c1 e0 2a shl $0x2a,%rax 1c: 48 c1 ea 03 shr $0x3,%rdx 20: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 24: 0f 85 4b 08 00 00 jne 0x875 * 2a: 48 8b 5d 08 mov 0x8(%rbp),%rbx <-- trapping instruction 2e: e8 95 b0 c6 ff callq 0xffc6b0c8 33: 48 8d 7b 70 lea 0x70(%rbx),%rdi 37: e8 4c 47 b2 ff callq 0xffb24788 3c: 4c 89 ef mov %r13,%rdi