audit: type=1804 audit(1666334047.792:16): pid=10408 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir1773732431/syzkaller.3TGLoX/45/file0" dev="sda1" ino=13880 res=1 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 10427 Comm: syz-executor.0 Not tainted 4.14.295-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 task: ffff8880a8f96600 task.stack: ffff888046320000 RIP: 0010:dtInsertEntry.isra.0+0x10a2/0x1440 fs/jfs/jfs_dtree.c:4018 RSP: 0018:ffff888046327558 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffc90005bd2000 RDX: 0000000000000001 RSI: ffffffff823bf775 RDI: 0000000000000008 RBP: ffff8880406ac3ea R08: ffff888046327738 R09: ffff888046327718 R10: 0000000000000000 R11: ffff8880a8f96600 R12: ffff8880b10895dc R13: dffffc0000000000 R14: 0000000000000074 R15: ffff8880406ac3e8 FS: 00007f84ae53b700(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005612a0a48667 CR3: 000000008f7a1000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: dtInsert+0x47a/0x9e0 fs/jfs/jfs_dtree.c:898 jfs_create.part.0+0x364/0x800 fs/jfs/namei.c:150 jfs_create+0x35/0x50 fs/jfs/namei.c:90 lookup_open+0x77a/0x1750 fs/namei.c:3241 do_last fs/namei.c:3334 [inline] path_openat+0xe08/0x2970 fs/namei.c:3571 do_filp_open+0x179/0x3c0 fs/namei.c:3605 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f84afbc85a9 RSP: 002b:00007f84ae53b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007f84afce8f80 RCX: 00007f84afbc85a9 RDX: 000000000000275a RSI: 00000000200001c0 RDI: ffffffffffffff9c RBP: 00007f84afc23580 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd1dcfe8bf R14: 00007f84ae53b300 R15: 0000000000022000 Code: c6 40 04 ff e9 9f f9 ff ff e8 4b 50 19 ff 48 8b 84 24 b0 00 00 00 48 8d 78 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 df 01 00 RIP: dtInsertEntry.isra.0+0x10a2/0x1440 fs/jfs/jfs_dtree.c:4018 RSP: ffff888046327558 ---[ end trace edad219b7e6a3b89 ]--- ---------------- Code disassembly (best guess): 0: c6 40 04 ff movb $0xff,0x4(%rax) 4: e9 9f f9 ff ff jmpq 0xfffff9a8 9: e8 4b 50 19 ff callq 0xff195059 e: 48 8b 84 24 b0 00 00 mov 0xb0(%rsp),%rax 15: 00 16: 48 8d 78 08 lea 0x8(%rax),%rdi 1a: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 21: fc ff df 24: 48 89 fa mov %rdi,%rdx 27: 48 c1 ea 03 shr $0x3,%rdx * 2b: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2f: 48 89 fa mov %rdi,%rdx 32: 83 e2 07 and $0x7,%edx 35: 38 d0 cmp %dl,%al 37: 7f 08 jg 0x41 39: 84 c0 test %al,%al 3b: 0f .byte 0xf 3c: 85 df test %ebx,%edi 3e: 01 00 add %eax,(%rax)