kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 12887 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 RIP: 0010:write_special_inodes+0xa6/0x170 fs/jfs/jfs_logmgr.c:221 Code: 8b 7d 30 41 ff d4 48 8d 7b 28 48 89 f8 48 c1 e8 03 80 3c 28 00 0f 85 ab 00 00 00 4c 8b 6b 28 49 8d 7d 30 48 89 f8 48 c1 e8 03 <80> 3c 28 00 0f 85 88 00 00 00 49 8b 7d 30 41 ff d4 48 8d bb b0 00 RSP: 0018:ffff888055367a48 EFLAGS: 00010206 RAX: 0000000000000006 RBX: ffff8880a8a00980 RCX: ffffc90005d24000 RDX: 000000000002498d RSI: ffffffff817ce5d8 RDI: 0000000000000030 RBP: dffffc0000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: ffffffff817ce790 R13: 0000000000000000 R14: ffff8880b390a000 R15: ffff88804dee0a68 FS: 00007f8467736700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c02b28a000 CR3: 00000000af872000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: jfs_flush_journal.part.0+0x2c1/0x6a0 fs/jfs/jfs_logmgr.c:1595 jfs_flush_journal+0x23/0x30 fs/jfs/jfs_logmgr.c:1537 jfs_umount+0xbf/0x310 fs/jfs/jfs_umount.c:71 jfs_fill_super+0x83c/0xb50 fs/jfs/super.c:633 mount_bdev+0x2fc/0x3b0 fs/super.c:1158 mount_fs+0xa3/0x310 fs/super.c:1261 vfs_kern_mount.part.0+0x68/0x470 fs/namespace.c:961 vfs_kern_mount fs/namespace.c:951 [inline] do_new_mount fs/namespace.c:2492 [inline] do_mount+0x115c/0x2f50 fs/namespace.c:2822 ksys_mount+0xcf/0x130 fs/namespace.c:3038 __do_sys_mount fs/namespace.c:3052 [inline] __se_sys_mount fs/namespace.c:3049 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3049 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f8468dc4ada Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f8467735f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f8468dc4ada RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f8467735fe0 RBP: 00007f8467736020 R08: 00007f8467736020 R09: 0000000020000000 R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 00007f8467735fe0 R15: 0000000020000140 Modules linked in: audit: type=1804 audit(1665491747.955:96): pid=12850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir1624675063/syzkaller.CMIaF2/28/file0/file0" dev="loop2" ino=17 res=1 EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue IPVS: ftp: loaded support on port[0] = 21 JFS: discard option not supported on device ERROR: (device loop3): diRead: i_ino != di_number JFS: discard option not supported on device ERROR: (device loop4): diRead: i_ino != di_number audit: type=1800 audit(1665491748.025:97): pid=12866 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=14099 res=0 ---[ end trace c054036ebad66e99 ]--- audit: type=1804 audit(1665491748.025:98): pid=12868 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir1411374887/syzkaller.alw90e/38/file0" dev="sda1" ino=14099 res=1 RIP: 0010:write_special_inodes+0xa6/0x170 fs/jfs/jfs_logmgr.c:221 Code: 8b 7d 30 41 ff d4 48 8d 7b 28 48 89 f8 48 c1 e8 03 80 3c 28 00 0f 85 ab 00 00 00 4c 8b 6b 28 49 8d 7d 30 48 89 f8 48 c1 e8 03 <80> 3c 28 00 0f 85 88 00 00 00 49 8b 7d 30 41 ff d4 48 8d bb b0 00 audit: type=1804 audit(1665491748.025:99): pid=12869 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir1411374887/syzkaller.alw90e/38/file0" dev="sda1" ino=14099 res=1 RSP: 0018:ffff888055367a48 EFLAGS: 00010206 RAX: 0000000000000006 RBX: ffff8880a8a00980 RCX: ffffc90005d24000 RDX: 000000000002498d RSI: ffffffff817ce5d8 RDI: 0000000000000030 audit: type=1804 audit(1665491748.025:100): pid=12868 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir1411374887/syzkaller.alw90e/38/file0" dev="sda1" ino=14099 res=1 RBP: dffffc0000000000 R08: 0000000000000000 R09: 0000000000000000 JFS: discard option not supported on device ERROR: (device loop0): diRead: i_ino != di_number R10: 0000000000000005 R11: 0000000000000000 R12: ffffffff817ce790 R13: 0000000000000000 R14: ffff8880b390a000 R15: ffff88804dee0a68 FS: 00007f8467736700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fef43941fc8 CR3: 00000000af872000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 JFS: discard option not supported on device DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 8b 7d 30 mov 0x30(%rbp),%edi 3: 41 ff d4 callq *%r12 6: 48 8d 7b 28 lea 0x28(%rbx),%rdi a: 48 89 f8 mov %rdi,%rax d: 48 c1 e8 03 shr $0x3,%rax 11: 80 3c 28 00 cmpb $0x0,(%rax,%rbp,1) 15: 0f 85 ab 00 00 00 jne 0xc6 1b: 4c 8b 6b 28 mov 0x28(%rbx),%r13 1f: 49 8d 7d 30 lea 0x30(%r13),%rdi 23: 48 89 f8 mov %rdi,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 80 3c 28 00 cmpb $0x0,(%rax,%rbp,1) <-- trapping instruction 2e: 0f 85 88 00 00 00 jne 0xbc 34: 49 8b 7d 30 mov 0x30(%r13),%rdi 38: 41 ff d4 callq *%r12 3b: 48 rex.W 3c: 8d .byte 0x8d 3d: bb .byte 0xbb 3e: b0 00 mov $0x0,%al