BUG: unable to handle page fault for address: fffffbfff2d568f9 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 23ffe4067 P4D 23ffe4067 PUD 23ffe3067 PMD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 6092 Comm: syz-executor.2 Not tainted 6.3.0-rc2-syzkaller-00363-g478a351ce0d6 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:85 [inline] RIP: 0010:memory_is_nonzero mm/kasan/generic.c:102 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:128 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:178 [inline] RIP: 0010:kasan_check_range+0xdf/0x190 mm/kasan/generic.c:187 Code: 80 38 00 74 f2 48 89 c2 b8 01 00 00 00 48 85 d2 75 56 5b 5d 41 5c c3 48 85 d2 74 5e 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 50 <80> 38 00 74 f2 eb d4 41 bc 08 00 00 00 48 89 ea 45 29 dc 4d 8d 1c RSP: 0018:ffffc900160bf7d0 EFLAGS: 00010086 RAX: fffffbfff2d568f9 RBX: fffffbfff2d568fa RCX: ffffffff81645879 RDX: fffffbfff2d568fa RSI: 0000000000000008 RDI: ffffffff96ab47c8 RBP: fffffbfff2d568f9 R08: 0000000000000000 R09: ffffffff96ab47cf R10: fffffbfff2d568f9 R11: 1ffffffff21b798d R12: ffff88807bd8a7f0 R13: ffff88807bd89d40 R14: ffff88807bd8a778 R15: dffffc0000000000 FS: 00007f25d5b5e700(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffbfff2d568f9 CR3: 000000001fdd6000 CR4: 0000000000350ee0 Call Trace: instrument_atomic_read include/linux/instrumented.h:72 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] __lock_acquire+0xeb9/0x5d40 kernel/locking/lockdep.c:5026 lock_acquire kernel/locking/lockdep.c:5669 [inline] lock_acquire+0x1af/0x520 kernel/locking/lockdep.c:5634 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:350 [inline] take_dentry_name_snapshot+0x2b/0x170 fs/dcache.c:315 ovl_check_rename_whiteout fs/overlayfs/super.c:1207 [inline] ovl_make_workdir fs/overlayfs/super.c:1329 [inline] ovl_get_workdir fs/overlayfs/super.c:1444 [inline] ovl_fill_super+0x2090/0x7270 fs/overlayfs/super.c:2000 mount_nodev+0x64/0x120 fs/super.c:1417 legacy_get_tree+0x109/0x220 fs/fs_context.c:610 vfs_get_tree+0x8d/0x350 fs/super.c:1501 do_new_mount fs/namespace.c:3042 [inline] path_mount+0x1342/0x1e40 fs/namespace.c:3372 do_mount fs/namespace.c:3385 [inline] __do_sys_mount fs/namespace.c:3594 [inline] __se_sys_mount fs/namespace.c:3571 [inline] __x64_sys_mount+0x283/0x300 fs/namespace.c:3571 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f25d4e8c0f9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f25d5b5e168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f25d4fabf80 RCX: 00007f25d4e8c0f9 RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 RBP: 00007f25d4ee7b39 R08: 0000000020000480 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc9801b12f R14: 00007f25d5b5e300 R15: 0000000000022000 Modules linked in: CR2: fffffbfff2d568f9 ---[ end trace 0000000000000000 ]--- RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:85 [inline] RIP: 0010:memory_is_nonzero mm/kasan/generic.c:102 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:128 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:178 [inline] RIP: 0010:kasan_check_range+0xdf/0x190 mm/kasan/generic.c:187 Code: 80 38 00 74 f2 48 89 c2 b8 01 00 00 00 48 85 d2 75 56 5b 5d 41 5c c3 48 85 d2 74 5e 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 50 <80> 38 00 74 f2 eb d4 41 bc 08 00 00 00 48 89 ea 45 29 dc 4d 8d 1c RSP: 0018:ffffc900160bf7d0 EFLAGS: 00010086 RAX: fffffbfff2d568f9 RBX: fffffbfff2d568fa RCX: ffffffff81645879 RDX: fffffbfff2d568fa RSI: 0000000000000008 RDI: ffffffff96ab47c8 RBP: fffffbfff2d568f9 R08: 0000000000000000 R09: ffffffff96ab47cf R10: fffffbfff2d568f9 R11: 1ffffffff21b798d R12: ffff88807bd8a7f0 R13: ffff88807bd89d40 R14: ffff88807bd8a778 R15: dffffc0000000000 FS: 00007f25d5b5e700(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffbfff2d568f9 CR3: 000000001fdd6000 CR4: 0000000000350ee0 ---------------- Code disassembly (best guess): 0: 80 38 00 cmpb $0x0,(%rax) 3: 74 f2 je 0xfffffff7 5: 48 89 c2 mov %rax,%rdx 8: b8 01 00 00 00 mov $0x1,%eax d: 48 85 d2 test %rdx,%rdx 10: 75 56 jne 0x68 12: 5b pop %rbx 13: 5d pop %rbp 14: 41 5c pop %r12 16: c3 retq 17: 48 85 d2 test %rdx,%rdx 1a: 74 5e je 0x7a 1c: 48 01 ea add %rbp,%rdx 1f: eb 09 jmp 0x2a 21: 48 83 c0 01 add $0x1,%rax 25: 48 39 d0 cmp %rdx,%rax 28: 74 50 je 0x7a * 2a: 80 38 00 cmpb $0x0,(%rax) <-- trapping instruction 2d: 74 f2 je 0x21 2f: eb d4 jmp 0x5 31: 41 bc 08 00 00 00 mov $0x8,%r12d 37: 48 89 ea mov %rbp,%rdx 3a: 45 29 dc sub %r11d,%r12d 3d: 4d rex.WRB 3e: 8d .byte 0x8d 3f: 1c .byte 0x1c