Oops: stack segment: 0000 [#1] SMP KASAN PTI CPU: 0 UID: 0 PID: 123 Comm: jfsCommit Not tainted syzkaller #0 PREEMPT_{RT,(full)} Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:folio_flags include/linux/page-flags.h:360 [inline] RIP: 0010:folio_trylock include/linux/pagemap.h:1104 [inline] RIP: 0010:folio_lock include/linux/pagemap.h:1140 [inline] RIP: 0010:release_metapage+0x9e/0xab0 fs/jfs/jfs_metapage.c:870 Code: 04 00 00 e8 54 3a 82 fe 48 c7 c7 47 58 db 8c be 73 04 00 00 e8 a3 c2 54 fe 2e 2e 2e 31 c0 49 8d 5c 24 08 48 89 dd 48 c1 ed 03 <42> 80 7c 2d 00 00 74 08 48 89 df e8 c2 f8 e3 fe 4c 8b 3b 4c 89 fe RSP: 0018:ffffc900039976b8 EFLAGS: 00010202 RAX: 0000000000000000 RBX: 0000000000000008 RCX: 21960b9e73cfa700 RDX: ffff88801df5da00 RSI: ffffffff8cf656a0 RDI: ffffffff8b3ddfe0 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: ffffed1008fd7b0a R12: 0000000000000000 R13: dffffc0000000000 R14: ffff888047ebd828 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff888126df6000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff6822d87d0 CR3: 000000000d3a6000 CR4: 00000000003526f0 Call Trace: xtTruncate+0xe84/0x2e70 fs/jfs/jfs_xtree.c:-1 jfs_free_zero_link+0x33a/0x4a0 fs/jfs/namei.c:759 jfs_evict_inode+0x363/0x440 fs/jfs/inode.c:159 evict+0x504/0x9c0 fs/inode.c:810 txLazyCommit fs/jfs/jfs_txnmgr.c:2665 [inline] jfs_lazycommit+0x3f1/0xa10 fs/jfs/jfs_txnmgr.c:2734 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:folio_flags include/linux/page-flags.h:360 [inline] RIP: 0010:folio_trylock include/linux/pagemap.h:1104 [inline] RIP: 0010:folio_lock include/linux/pagemap.h:1140 [inline] RIP: 0010:release_metapage+0x9e/0xab0 fs/jfs/jfs_metapage.c:870 Code: 04 00 00 e8 54 3a 82 fe 48 c7 c7 47 58 db 8c be 73 04 00 00 e8 a3 c2 54 fe 2e 2e 2e 31 c0 49 8d 5c 24 08 48 89 dd 48 c1 ed 03 <42> 80 7c 2d 00 00 74 08 48 89 df e8 c2 f8 e3 fe 4c 8b 3b 4c 89 fe RSP: 0018:ffffc900039976b8 EFLAGS: 00010202 RAX: 0000000000000000 RBX: 0000000000000008 RCX: 21960b9e73cfa700 RDX: ffff88801df5da00 RSI: ffffffff8cf656a0 RDI: ffffffff8b3ddfe0 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: ffffed1008fd7b0a R12: 0000000000000000 R13: dffffc0000000000 R14: ffff888047ebd828 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff888126df6000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff6822d87d0 CR3: 000000000d3a6000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: 04 00 add $0x0,%al 2: 00 e8 add %ch,%al 4: 54 push %rsp 5: 3a 82 fe 48 c7 c7 cmp -0x3838b702(%rdx),%al b: 47 58 rex.RXB pop %r8 d: db 8c be 73 04 00 00 fisttpl 0x473(%rsi,%rdi,4) 14: e8 a3 c2 54 fe call 0xfe54c2bc 19: 2e 2e 2e 31 c0 cs cs cs xor %eax,%eax 1e: 49 8d 5c 24 08 lea 0x8(%r12),%rbx 23: 48 89 dd mov %rbx,%rbp 26: 48 c1 ed 03 shr $0x3,%rbp * 2a: 42 80 7c 2d 00 00 cmpb $0x0,0x0(%rbp,%r13,1) <-- trapping instruction 30: 74 08 je 0x3a 32: 48 89 df mov %rbx,%rdi 35: e8 c2 f8 e3 fe call 0xfee3f8fc 3a: 4c 8b 3b mov (%rbx),%r15 3d: 4c 89 fe mov %r15,%rsi