NILFS (loop1): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 27362 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 RIP: 0010:strcmp+0x57/0xb0 lib/string.c:385 Code: fa 48 c1 e8 03 83 e2 07 42 0f b6 04 28 38 d0 7f 04 84 c0 75 50 0f b6 6b ff 4c 8d 66 01 48 89 f0 48 89 f2 48 c1 e8 03 83 e2 07 <42> 0f b6 04 28 38 d0 7f 04 84 c0 75 24 41 3a 6c 24 ff 74 ae 19 c0 RSP: 0018:ffff888035ca72f0 EFLAGS: 00010046 RAX: 00000000000b0004 RBX: ffffffff88b3ec61 RCX: 0000000000580020 RDX: 0000000000000000 RSI: 0000000000580020 RDI: ffffffff88b3ec60 RBP: 0000000000000026 R08: 0000000000000001 R09: fffffbfff1a3fea0 R10: ffffffff8d243760 R11: dffffc0000000000 R12: 0000000000580021 R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 00007f7bb247d700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2e1bd73000 CR3: 0000000090342000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: count_matching_names kernel/locking/lockdep.c:642 [inline] register_lock_class+0x9cd/0x11c0 kernel/locking/lockdep.c:796 audit: type=1804 audit(1667194818.014:1013): pid=27313 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir621905085/syzkaller.8HRIP1/387/file0" dev="sda1" ino=15497 res=1 __lock_acquire+0x17d/0x3ff0 kernel/locking/lockdep.c:3304 lock_acquire+0x170/0x3c0 kernel/locking/lockdep.c:3908 down_read+0x36/0x80 kernel/locking/rwsem.c:24 nilfs_bmap_lookup_at_level+0x7b/0x3e0 fs/nilfs2/bmap.c:68 nilfs_bmap_lookup fs/nilfs2/bmap.h:170 [inline] nilfs_mdt_submit_block.constprop.0+0x1a5/0xaa0 fs/nilfs2/mdt.c:142 nilfs_mdt_read_block+0x96/0x3e0 fs/nilfs2/mdt.c:175 nilfs_mdt_get_block+0xe6/0xd40 fs/nilfs2/mdt.c:250 nilfs_palloc_get_block+0xc4/0x2b0 fs/nilfs2/alloc.c:216 nilfs_palloc_get_entry_block+0x17b/0x230 fs/nilfs2/alloc.c:318 nilfs_ifile_get_inode_block+0xbf/0x170 fs/nilfs2/ifile.c:143 __nilfs_read_inode fs/nilfs2/inode.c:483 [inline] nilfs_iget+0x204/0x860 fs/nilfs2/inode.c:592 nilfs_get_root_dentry+0x26/0x250 fs/nilfs2/super.c:908 nilfs_fill_super fs/nilfs2/super.c:1082 [inline] nilfs_mount+0xac8/0xe70 fs/nilfs2/super.c:1321 mount_fs+0xa3/0x310 fs/super.c:1261 vfs_kern_mount.part.0+0x68/0x470 fs/namespace.c:961 vfs_kern_mount fs/namespace.c:951 [inline] do_new_mount fs/namespace.c:2492 [inline] do_mount+0x115c/0x2f50 fs/namespace.c:2822 ksys_mount+0xcf/0x130 fs/namespace.c:3038 __do_sys_mount fs/namespace.c:3052 [inline] __se_sys_mount fs/namespace.c:3049 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3049 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f7bb3f2cada Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f7bb247cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bb3f2cada RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bb247cfe0 RBP: 00007f7bb247d020 R08: 00007f7bb247d020 R09: 0000000020000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 R13: 0000000020000100 R14: 00007f7bb247cfe0 R15: 0000000020000180 Modules linked in: ---[ end trace 60cebaf35f550c5d ]--- RIP: 0010:strcmp+0x57/0xb0 lib/string.c:385 Code: fa 48 c1 e8 03 83 e2 07 42 0f b6 04 28 38 d0 7f 04 84 c0 75 50 0f b6 6b ff 4c 8d 66 01 48 89 f0 48 89 f2 48 c1 e8 03 83 e2 07 <42> 0f b6 04 28 38 d0 7f 04 84 c0 75 24 41 3a 6c 24 ff 74 ae 19 c0 RSP: 0018:ffff888035ca72f0 EFLAGS: 00010046 RAX: 00000000000b0004 RBX: ffffffff88b3ec61 RCX: 0000000000580020 RDX: 0000000000000000 RSI: 0000000000580020 RDI: ffffffff88b3ec60 RBP: 0000000000000026 R08: 0000000000000001 R09: fffffbfff1a3fea0 R10: ffffffff8d243760 R11: dffffc0000000000 R12: 0000000000580021 R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 00007f7bb247d700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2e1bd73000 CR3: 0000000090342000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: fa cli 1: 48 c1 e8 03 shr $0x3,%rax 5: 83 e2 07 and $0x7,%edx 8: 42 0f b6 04 28 movzbl (%rax,%r13,1),%eax d: 38 d0 cmp %dl,%al f: 7f 04 jg 0x15 11: 84 c0 test %al,%al 13: 75 50 jne 0x65 15: 0f b6 6b ff movzbl -0x1(%rbx),%ebp 19: 4c 8d 66 01 lea 0x1(%rsi),%r12 1d: 48 89 f0 mov %rsi,%rax 20: 48 89 f2 mov %rsi,%rdx 23: 48 c1 e8 03 shr $0x3,%rax 27: 83 e2 07 and $0x7,%edx * 2a: 42 0f b6 04 28 movzbl (%rax,%r13,1),%eax <-- trapping instruction 2f: 38 d0 cmp %dl,%al 31: 7f 04 jg 0x37 33: 84 c0 test %al,%al 35: 75 24 jne 0x5b 37: 41 3a 6c 24 ff cmp -0x1(%r12),%bpl 3c: 74 ae je 0xffffffec 3e: 19 c0 sbb %eax,%eax