erofs (device loop3): bogus dirent @ nid 46 erofs (device loop3): invalid de[0].nameoff 0 @ nid 89 Oops: general protection fault, probably for non-canonical address 0xdffffc000000000d: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000068-0x000000000000006f] CPU: 1 UID: 0 PID: 5847 Comm: syz-executor Not tainted 6.13.0-next-20250203-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 RIP: 0010:__d_unalias+0x199/0x2a0 fs/dcache.c:2969 Code: 98 00 00 00 4c 89 fb 48 c1 eb 03 49 89 ed 80 3c 2b 00 74 08 4c 89 ff e8 a5 5c e7 ff 49 8b 2f 48 83 c5 68 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 88 5c e7 ff 4c 8b 5d 00 4d 85 db RSP: 0018:ffffc900040e78b8 EFLAGS: 00010202 RAX: 000000000000000d RBX: 1ffff1100f1e9b90 RCX: ffff888022f20000 RDX: 0000000000000000 RSI: ffff888078f4dbe8 RDI: ffff88805bcf4d38 RBP: 0000000000000068 R08: ffff88805bd6a3ab R09: 1ffff1100b7ad475 R10: dffffc0000000000 R11: ffffed100b7ad476 R12: ffff888078f4dbe8 R13: dffffc0000000000 R14: 0000000000000000 R15: ffff888078f4dc80 FS: 000055557cfa4500(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2e60fff8 CR3: 0000000060564000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: d_splice_alias+0x1e6/0x330 fs/dcache.c:3037 erofs_lookup+0x262/0x470 fs/erofs/namei.c:215 __lookup_slow+0x296/0x400 fs/namei.c:1793 lookup_slow+0x53/0x70 fs/namei.c:1810 walk_component+0x2e1/0x410 fs/namei.c:2114 lookup_last fs/namei.c:2612 [inline] path_lookupat+0x16f/0x450 fs/namei.c:2636 filename_lookup+0x2a3/0x670 fs/namei.c:2665 user_path_at+0x3a/0x60 fs/namei.c:3072 ksys_umount fs/namespace.c:2071 [inline] __do_sys_umount fs/namespace.c:2079 [inline] __se_sys_umount fs/namespace.c:2077 [inline] __x64_sys_umount+0xf1/0x170 fs/namespace.c:2077 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7efd1638e0d7 Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 RSP: 002b:00007ffe4c2bfdb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efd1638e0d7 RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffe4c2bfe70 RBP: 00007ffe4c2bfe70 R08: 0000000000000000 R09: 0000000000000000 R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffe4c2c0f60 R13: 00007efd1640e08c R14: 000055557cfa44a8 R15: 00007ffe4c2c2030 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__d_unalias+0x199/0x2a0 fs/dcache.c:2969 Code: 98 00 00 00 4c 89 fb 48 c1 eb 03 49 89 ed 80 3c 2b 00 74 08 4c 89 ff e8 a5 5c e7 ff 49 8b 2f 48 83 c5 68 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 88 5c e7 ff 4c 8b 5d 00 4d 85 db RSP: 0018:ffffc900040e78b8 EFLAGS: 00010202 RAX: 000000000000000d RBX: 1ffff1100f1e9b90 RCX: ffff888022f20000 RDX: 0000000000000000 RSI: ffff888078f4dbe8 RDI: ffff88805bcf4d38 RBP: 0000000000000068 R08: ffff88805bd6a3ab R09: 1ffff1100b7ad475 R10: dffffc0000000000 R11: ffffed100b7ad476 R12: ffff888078f4dbe8 R13: dffffc0000000000 R14: 0000000000000000 R15: ffff888078f4dc80 FS: 000055557cfa4500(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2e60fff8 CR3: 0000000060564000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 98 cwtl 1: 00 00 add %al,(%rax) 3: 00 4c 89 fb add %cl,-0x5(%rcx,%rcx,4) 7: 48 c1 eb 03 shr $0x3,%rbx b: 49 89 ed mov %rbp,%r13 e: 80 3c 2b 00 cmpb $0x0,(%rbx,%rbp,1) 12: 74 08 je 0x1c 14: 4c 89 ff mov %r15,%rdi 17: e8 a5 5c e7 ff call 0xffe75cc1 1c: 49 8b 2f mov (%r15),%rbp 1f: 48 83 c5 68 add $0x68,%rbp 23: 48 89 e8 mov %rbp,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 48 89 ef mov %rbp,%rdi 34: e8 88 5c e7 ff call 0xffe75cc1 39: 4c 8b 5d 00 mov 0x0(%rbp),%r11 3d: 4d 85 db test %r11,%r11