BUG: unable to handle kernel paging request at ffff887fc1275b10 PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 24891 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:__read_once_size include/linux/compiler.h:263 [inline] RIP: 0010:arch_atomic_read arch/x86/include/asm/atomic.h:31 [inline] RIP: 0010:atomic_read include/asm-generic/atomic-instrumented.h:22 [inline] RIP: 0010:dbNextAG+0x179/0x530 fs/jfs/jfs_dmap.c:622 Code: 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 0f b6 14 02 4c 89 e8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 19 03 00 00 <45> 8b 6d 00 31 ff 44 89 ee e8 d9 c9 ec fe 45 85 ed 0f 85 60 02 00 RSP: 0018:ffff8880478c7238 EFLAGS: 00010246 RAX: 0000000000000003 RBX: ffffffffc473ec00 RCX: ffffffff8275bccf RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff887fc1275b10 RBP: ffffffffc473ec00 R08: 0000000000000000 R09: ffffed0ff824eb62 R10: ffff887fc1275b13 R11: 00000000b8078c0a R12: ffff8880af57a640 R13: ffff887fc1275b10 R14: 00000000017b5daf R15: ffff88808a7ba440 FS: 00007f04f5293700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff887fc1275b10 CR3: 000000009e94a000 CR4: 00000000003426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: dbAlloc+0x44b/0xb00 fs/jfs/jfs_dmap.c:857 dtSplitUp+0x365/0x4e70 fs/jfs/jfs_dtree.c:987 dtInsert+0x7fd/0xa00 fs/jfs/jfs_dtree.c:876 jfs_create.part.0+0x3c6/0x880 fs/jfs/namei.c:150 jfs_create+0x3f/0x60 fs/jfs/namei.c:90 lookup_open+0x893/0x1a20 fs/namei.c:3235 do_last fs/namei.c:3327 [inline] path_openat+0x1094/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 do_sys_open+0x3b3/0x520 fs/open.c:1085 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f04f6d205a9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f04f5293168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007f04f6e40f80 RCX: 00007f04f6d205a9 RDX: 000000000000275a RSI: 0000000020000040 RDI: ffffffffffffff9c RBP: 00007f04f6d7b7b0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff1c79b8df R14: 00007f04f5293300 R15: 0000000000022000 Modules linked in: CR2: ffff887fc1275b10 ---[ end trace 65cb2b95f4c34084 ]--- RIP: 0010:__read_once_size include/linux/compiler.h:263 [inline] RIP: 0010:arch_atomic_read arch/x86/include/asm/atomic.h:31 [inline] RIP: 0010:atomic_read include/asm-generic/atomic-instrumented.h:22 [inline] RIP: 0010:dbNextAG+0x179/0x530 fs/jfs/jfs_dmap.c:622 Code: 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 0f b6 14 02 4c 89 e8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 19 03 00 00 <45> 8b 6d 00 31 ff 44 89 ee e8 d9 c9 ec fe 45 85 ed 0f 85 60 02 00 RSP: 0018:ffff8880478c7238 EFLAGS: 00010246 RAX: 0000000000000003 RBX: ffffffffc473ec00 RCX: ffffffff8275bccf RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff887fc1275b10 RBP: ffffffffc473ec00 R08: 0000000000000000 R09: ffffed0ff824eb62 R10: ffff887fc1275b13 R11: 00000000b8078c0a R12: ffff8880af57a640 R13: ffff887fc1275b10 R14: 00000000017b5daf R15: ffff88808a7ba440 FS: 00007f04f5293700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff887fc1275b10 CR3: 000000009e94a000 CR4: 00000000003426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 4c 89 ea mov %r13,%rdx 3: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax a: fc ff df d: 48 c1 ea 03 shr $0x3,%rdx 11: 0f b6 14 02 movzbl (%rdx,%rax,1),%edx 15: 4c 89 e8 mov %r13,%rax 18: 83 e0 07 and $0x7,%eax 1b: 83 c0 03 add $0x3,%eax 1e: 38 d0 cmp %dl,%al 20: 7c 08 jl 0x2a 22: 84 d2 test %dl,%dl 24: 0f 85 19 03 00 00 jne 0x343 * 2a: 45 8b 6d 00 mov 0x0(%r13),%r13d <-- trapping instruction 2e: 31 ff xor %edi,%edi 30: 44 89 ee mov %r13d,%esi 33: e8 d9 c9 ec fe callq 0xfeecca11 38: 45 85 ed test %r13d,%r13d 3b: 0f .byte 0xf 3c: 85 60 02 test %esp,0x2(%rax)