kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 11342 Comm: kworker/u4:10 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Workqueue: writeback wb_workfn (flush-7:2) RIP: 0010:lbmStartIO+0x12b/0x480 fs/jfs/jfs_logmgr.c:2143 Code: c1 ea 03 80 3c 02 00 0f 85 f5 02 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 6c 24 20 49 8d bd e0 00 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 ef 02 00 00 4d 8b ad e0 00 00 00 4d 39 ee 74 67 RSP: 0018:ffff888090cef740 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffff8880a3320000 RCX: 0000000000000003 RDX: 000000000000001c RSI: ffffffff835f37ea RDI: 00000000000000e0 RBP: ffff88809fb2a700 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: ffff888095201b00 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055b7b4cb5160 CR3: 000000009b756000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lbmWrite+0x27b/0x3a0 fs/jfs/jfs_logmgr.c:2092 lmGCwrite+0x3f2/0x4e0 fs/jfs/jfs_logmgr.c:806 jfs_flush_journal.part.0+0x478/0x6a0 fs/jfs/jfs_logmgr.c:1570 jfs_flush_journal+0x23/0x30 fs/jfs/jfs_logmgr.c:1537 jfs_write_inode+0x175/0x1d0 fs/jfs/inode.c:140 write_inode fs/fs-writeback.c:1244 [inline] __writeback_single_inode+0x733/0x11d0 fs/fs-writeback.c:1442 writeback_sb_inodes+0x537/0xef0 fs/fs-writeback.c:1647 wb_writeback+0x28d/0xcc0 fs/fs-writeback.c:1820 wb_do_writeback fs/fs-writeback.c:1965 [inline] wb_workfn+0x29b/0x1250 fs/fs-writeback.c:2006 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Modules linked in: ---[ end trace bf0b706c7188df59 ]--- RIP: 0010:lbmStartIO+0x12b/0x480 fs/jfs/jfs_logmgr.c:2143 Code: c1 ea 03 80 3c 02 00 0f 85 f5 02 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 6c 24 20 49 8d bd e0 00 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 ef 02 00 00 4d 8b ad e0 00 00 00 4d 39 ee 74 67 RSP: 0018:ffff888090cef740 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffff8880a3320000 RCX: 0000000000000003 RDX: 000000000000001c RSI: ffffffff835f37ea RDI: 00000000000000e0 RBP: ffff88809fb2a700 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: ffff888095201b00 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055b7b4cb5160 CR3: 00000000910a0000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: c1 ea 03 shr $0x3,%edx 3: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 7: 0f 85 f5 02 00 00 jne 0x302 d: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 14: fc ff df 17: 4d 8b 6c 24 20 mov 0x20(%r12),%r13 1c: 49 8d bd e0 00 00 00 lea 0xe0(%r13),%rdi 23: 48 89 fa mov %rdi,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2e: 0f 85 ef 02 00 00 jne 0x323 34: 4d 8b ad e0 00 00 00 mov 0xe0(%r13),%r13 3b: 4d 39 ee cmp %r13,%r14 3e: 74 67 je 0xa7