BUG: kernel NULL pointer dereference, address: 0000000000000048 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 8000000106f1d067 P4D 8000000106f1d067 PUD 0 Oops: Oops: 0000 [#1] PREEMPT SMP PTI CPU: 1 UID: 0 PID: 4272 Comm: syz.3.16 Not tainted 6.14.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 RIP: 0010:is_anon_ns fs/mount.h:159 [inline] RIP: 0010:clone_private_mount+0xa2/0x110 fs/namespace.c:2420 Code: c3 40 48 39 dd 75 0b eb 49 48 8b 6d 00 48 39 dd 74 3b 48 8b 7d a8 4c 89 ee e8 ca 26 ff ff 84 c0 74 e7 f6 45 c2 80 74 e1 eb 52 <48> 83 78 48 00 75 4b 4c 89 ff e8 6f 00 00 00 84 c0 74 3f 49 8b 04 RSP: 0018:ffffc900038bfcb0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff88811771e020 RCX: 0000000000000001 RDX: 0000000000000001 RSI: ffffffff83c1bc77 RDI: 00000000ffffffff RBP: 0000000008000020 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881022c5788 R13: ffff88810a084020 R14: ffffffffffffffea R15: ffff88811771e000 FS: 00007fa2ca85c6c0(0000) GS:ffff88813bb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000048 CR3: 000000011036c000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ovl_get_layers fs/overlayfs/super.c:1061 [inline] ovl_get_lowerstack+0x4be/0x830 fs/overlayfs/super.c:1156 ovl_fill_super+0x202/0x440 fs/overlayfs/super.c:1404 vfs_get_super fs/super.c:1280 [inline] get_tree_nodev+0x55/0x90 fs/super.c:1299 vfs_get_tree+0x24/0xb0 fs/super.c:1814 do_new_mount+0x15a/0x3a0 fs/namespace.c:3651 do_mount fs/namespace.c:3991 [inline] __do_sys_mount fs/namespace.c:4202 [inline] __se_sys_mount+0x148/0x1b0 fs/namespace.c:4179 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x8d/0x170 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fa2c998cde9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa2ca85c038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fa2c9ba5fa0 RCX: 00007fa2c998cde9 RDX: 0000200000000180 RSI: 0000200000000140 RDI: 0000000000000000 RBP: 00007fa2c9a0e2a0 R08: 00002000000001c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fa2c9ba5fa0 R15: 00007ffd597f3a88 Modules linked in: CR2: 0000000000000048 ---[ end trace 0000000000000000 ]--- RIP: 0010:is_anon_ns fs/mount.h:159 [inline] RIP: 0010:clone_private_mount+0xa2/0x110 fs/namespace.c:2420 Code: c3 40 48 39 dd 75 0b eb 49 48 8b 6d 00 48 39 dd 74 3b 48 8b 7d a8 4c 89 ee e8 ca 26 ff ff 84 c0 74 e7 f6 45 c2 80 74 e1 eb 52 <48> 83 78 48 00 75 4b 4c 89 ff e8 6f 00 00 00 84 c0 74 3f 49 8b 04 RSP: 0018:ffffc900038bfcb0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff88811771e020 RCX: 0000000000000001 RDX: 0000000000000001 RSI: ffffffff83c1bc77 RDI: 00000000ffffffff RBP: 0000000008000020 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881022c5788 R13: ffff88810a084020 R14: ffffffffffffffea R15: ffff88811771e000 FS: 00007fa2ca85c6c0(0000) GS:ffff88813bb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000048 CR3: 000000011036c000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: c3 ret 1: 40 rex 2: 48 39 dd cmp %rbx,%rbp 5: 75 0b jne 0x12 7: eb 49 jmp 0x52 9: 48 8b 6d 00 mov 0x0(%rbp),%rbp d: 48 39 dd cmp %rbx,%rbp 10: 74 3b je 0x4d 12: 48 8b 7d a8 mov -0x58(%rbp),%rdi 16: 4c 89 ee mov %r13,%rsi 19: e8 ca 26 ff ff call 0xffff26e8 1e: 84 c0 test %al,%al 20: 74 e7 je 0x9 22: f6 45 c2 80 testb $0x80,-0x3e(%rbp) 26: 74 e1 je 0x9 28: eb 52 jmp 0x7c * 2a: 48 83 78 48 00 cmpq $0x0,0x48(%rax) <-- trapping instruction 2f: 75 4b jne 0x7c 31: 4c 89 ff mov %r15,%rdi 34: e8 6f 00 00 00 call 0xa8 39: 84 c0 test %al,%al 3b: 74 3f je 0x7c 3d: 49 rex.WB 3e: 8b .byte 0x8b 3f: 04 .byte 0x4