IPVS: ftp: loaded support on port[0] = 21 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 1985 Comm: jfsCommit Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 RIP: 0010:__list_add_valid+0x22/0xa0 lib/list_debug.c:23 Code: ff 90 90 90 90 90 90 90 48 b8 00 00 00 00 00 fc ff df 41 54 49 89 d4 55 48 89 fd 48 8d 7a 08 48 83 ec 08 48 89 fa 48 c1 ea 03 <80> 3c 02 00 75 50 49 8b 54 24 08 48 39 f2 0f 85 aa 52 85 04 48 b8 RSP: 0018:ffff8880b0b27cb8 EFLAGS: 00010002 RAX: dffffc0000000000 RBX: ffffc90001401100 RCX: ffffffff82752b89 RDX: 0000000000000001 RSI: ffffc90001401110 RDI: 0000000000000008 RBP: ffff8880a98fc5b0 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000000 R13: ffffc90001401110 R14: ffff8880a98fc5b0 R15: ffff888098ae4690 FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f24540111d0 CR3: 0000000009e6d000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __list_add include/linux/list.h:60 [inline] list_add include/linux/list.h:79 [inline] diUpdatePMap+0x835/0x1090 fs/jfs/jfs_imap.c:2836 txUpdateMap+0xbfd/0x1000 fs/jfs/jfs_txnmgr.c:2401 txLazyCommit fs/jfs/jfs_txnmgr.c:2709 [inline] jfs_lazycommit+0x525/0x9d0 fs/jfs/jfs_txnmgr.c:2777 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Modules linked in: ---[ end trace 2e577b73f6085e11 ]--- RIP: 0010:__list_add_valid+0x22/0xa0 lib/list_debug.c:23 Code: ff 90 90 90 90 90 90 90 48 b8 00 00 00 00 00 fc ff df 41 54 49 89 d4 55 48 89 fd 48 8d 7a 08 48 83 ec 08 48 89 fa 48 c1 ea 03 <80> 3c 02 00 75 50 49 8b 54 24 08 48 39 f2 0f 85 aa 52 85 04 48 b8 RSP: 0018:ffff8880b0b27cb8 EFLAGS: 00010002 RAX: dffffc0000000000 RBX: ffffc90001401100 RCX: ffffffff82752b89 RDX: 0000000000000001 RSI: ffffc90001401110 RDI: 0000000000000008 RBP: ffff8880a98fc5b0 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000000 R13: ffffc90001401110 R14: ffff8880a98fc5b0 R15: ffff888098ae4690 FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f24540111d0 CR3: 0000000009e6d000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: ff 90 90 90 90 90 callq *-0x6f6f6f70(%rax) 6: 90 nop 7: 90 nop 8: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax f: fc ff df 12: 41 54 push %r12 14: 49 89 d4 mov %rdx,%r12 17: 55 push %rbp 18: 48 89 fd mov %rdi,%rbp 1b: 48 8d 7a 08 lea 0x8(%rdx),%rdi 1f: 48 83 ec 08 sub $0x8,%rsp 23: 48 89 fa mov %rdi,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2e: 75 50 jne 0x80 30: 49 8b 54 24 08 mov 0x8(%r12),%rdx 35: 48 39 f2 cmp %rsi,%rdx 38: 0f 85 aa 52 85 04 jne 0x48552e8 3e: 48 rex.W 3f: b8 .byte 0xb8