------------[ cut here ]------------ kernel BUG at fs/reiserfs/journal.c:1925! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 8103 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:do_journal_release fs/reiserfs/journal.c:1925 [inline] RIP: 0010:journal_release+0x326/0x4d0 fs/reiserfs/journal.c:1981 Code: 00 0f 85 5d 01 00 00 49 8b 34 24 4c 89 f7 e8 41 75 ff ff be 01 00 00 00 4c 89 f7 e8 f4 96 ff ff e9 51 fe ff ff e8 4a 49 8b ff <0f> 0b e8 43 49 8b ff ba 38 00 00 00 31 f6 4c 8d 74 24 20 4c 89 f7 RSP: 0018:ffff888096f67b98 EFLAGS: 00010293 RAX: ffff88809ee64200 RBX: 1ffff11012decf73 RCX: ffffffff81d73a32 RDX: 0000000000000000 RSI: ffffffff81d73c26 RDI: 0000000000000005 RBP: ffff88803b7022c0 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000000 R13: ffff88803b702940 R14: ffff888096f67c90 R15: ffffc9000b018000 FS: 000055555680b400(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c03101b050 CR3: 000000009cfc9000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: reiserfs_put_super+0xe0/0x5c0 fs/reiserfs/super.c:616 generic_shutdown_super+0x144/0x370 fs/super.c:456 kill_block_super+0x97/0xf0 fs/super.c:1185 deactivate_locked_super+0x94/0x160 fs/super.c:329 deactivate_super+0x174/0x1a0 fs/super.c:360 cleanup_mnt+0x1a8/0x290 fs/namespace.c:1098 task_work_run+0x148/0x1c0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x251/0x2a0 arch/x86/entry/common.c:167 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f7fe102e537 Code: ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffec94bbe78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f7fe102e537 RDX: 00007ffec94bbf4b RSI: 000000000000000a RDI: 00007ffec94bbf40 RBP: 00007ffec94bbf40 R08: 00000000ffffffff R09: 00007ffec94bbd10 R10: 000055555680c903 R11: 0000000000000246 R12: 00007f7fe1087b24 R13: 00007ffec94bd000 R14: 000055555680c810 R15: 00007ffec94bd040 Modules linked in: IPVS: ftp: loaded support on port[0] = 21 BTRFS info (device loop1): unrecognized mount option 'ÜT"™¤-í' netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. BTRFS error (device loop1): open_ctree failed IPVS: ftp: loaded support on port[0] = 21 audit: type=1804 audit(1673945135.084:261): pid=20676 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir2169006913/syzkaller.hLz3tB/171/bus" dev="sda1" ino=15095 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. IPVS: ftp: loaded support on port[0] = 21 ---[ end trace 685ee60cb63ea9c0 ]--- RIP: 0010:do_journal_release fs/reiserfs/journal.c:1925 [inline] RIP: 0010:journal_release+0x326/0x4d0 fs/reiserfs/journal.c:1981 audit: type=1804 audit(1673945135.354:262): pid=20742 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir2169006913/syzkaller.hLz3tB/171/bus" dev="sda1" ino=15095 res=1 Code: 00 0f 85 5d 01 00 00 49 8b 34 24 4c 89 f7 e8 41 75 ff ff be 01 00 00 00 4c 89 f7 e8 f4 96 ff ff e9 51 fe ff ff e8 4a 49 8b ff <0f> 0b e8 43 49 8b ff ba 38 00 00 00 31 f6 4c 8d 74 24 20 4c 89 f7 RSP: 0018:ffff888096f67b98 EFLAGS: 00010293 RAX: ffff88809ee64200 RBX: 1ffff11012decf73 RCX: ffffffff81d73a32 RDX: 0000000000000000 RSI: ffffffff81d73c26 RDI: 0000000000000005 RBP: ffff88803b7022c0 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000000 R13: ffff88803b702940 R14: ffff888096f67c90 R15: ffffc9000b018000 netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. IPVS: ftp: loaded support on port[0] = 21 FS: 000055555680b400(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f22df096008 CR3: 000000009cfc9000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 BTRFS info (device loop1): unrecognized mount option 'ÜT"™¤-í' BTRFS error (device loop1): open_ctree failed