(syz.0.15,4303,1):ocfs2_initialize_super:2318 ERROR: status = -30 (syz.0.15,4303,1):ocfs2_fill_super:1030 ERROR: status = -30 (syz.0.15,4303,1):ocfs2_fill_super:1225 ERROR: status = -30 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 1 PID: 4303 Comm: syz.0.15 Not tainted 4.19.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:__lock_acquire.isra.10+0x4e6/0x1870 kernel/locking/lockdep.c:3294 Code: 48 83 c4 50 44 89 e0 5b 41 5c 41 5d 41 5e 41 5f 5d c3 48 b8 00 00 00 00 00 fc ff df 89 f3 49 8d 7c df 08 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 0f 0d 00 00 49 8b 5c df 08 48 85 db 0f 85 07 fc RSP: 0018:ffff8800a6d6f570 EFLAGS: 00010002 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000023 RSI: 0000000000000000 RDI: 0000000000000118 RBP: ffff8800a6d6f5e8 R08: 0000000000000000 R09: 0000000000000000 R10: ffff8800a6d6f7e8 R11: ffff8800ad0aa37f R12: ffffffff88040f60 R13: ffff8800a1956200 R14: 0000000000000000 R15: 0000000000000110 FS: 00007f78c404d6c0(0000) GS:ffff8800bab00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000560277bbbf98 CR3: 00000000a83d4000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire+0x18b/0x340 kernel/locking/lockdep.c:3900 flush_workqueue+0xf3/0x1050 kernel/workqueue.c:2655 ocfs2_shutdown_local_alloc+0xbe/0x910 fs/ocfs2/localalloc.c:389 ocfs2_dismount_volume+0x1af/0x830 fs/ocfs2/super.c:1927 ocfs2_fill_super+0x1d4/0x2710 fs/ocfs2/super.c:1230 mount_bdev+0x272/0x330 fs/super.c:1158 ocfs2_mount+0x10/0x20 fs/ocfs2/super.c:1241 mount_fs+0x84/0x1f5 fs/super.c:1261 vfs_kern_mount.part.11+0x58/0x3d0 fs/namespace.c:961 vfs_kern_mount fs/namespace.c:951 [inline] do_new_mount fs/namespace.c:2457 [inline] do_mount+0x376/0x26e0 fs/namespace.c:2787 ksys_mount+0xb1/0xd0 fs/namespace.c:3003 __do_sys_mount fs/namespace.c:3017 [inline] __se_sys_mount fs/namespace.c:3014 [inline] __x64_sys_mount+0xb9/0x150 fs/namespace.c:3014 do_syscall_64+0xd0/0x340 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f78c45cd79a Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f78c404ce68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f78c404cef0 RCX: 00007f78c45cd79a RDX: 0000000020004440 RSI: 0000000020000780 RDI: 00007f78c404ceb0 RBP: 0000000020004440 R08: 00007f78c404cef0 R09: 0000000001000000 R10: 0000000001000000 R11: 0000000000000246 R12: 0000000020000780 R13: 00007f78c404ceb0 R14: 000000000000444a R15: 00000000200005c0 Modules linked in: ---[ end trace 0f2f6a472d300197 ]--- RIP: 0010:__lock_acquire.isra.10+0x4e6/0x1870 kernel/locking/lockdep.c:3294 Code: 48 83 c4 50 44 89 e0 5b 41 5c 41 5d 41 5e 41 5f 5d c3 48 b8 00 00 00 00 00 fc ff df 89 f3 49 8d 7c df 08 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 0f 0d 00 00 49 8b 5c df 08 48 85 db 0f 85 07 fc RSP: 0018:ffff8800a6d6f570 EFLAGS: 00010002 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000023 RSI: 0000000000000000 RDI: 0000000000000118 RBP: ffff8800a6d6f5e8 R08: 0000000000000000 R09: 0000000000000000 R10: ffff8800a6d6f7e8 R11: ffff8800ad0aa37f R12: ffffffff88040f60 R13: ffff8800a1956200 R14: 0000000000000000 R15: 0000000000000110 FS: 00007f78c404d6c0(0000) GS:ffff8800bab00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000560277bbbf98 CR3: 00000000a83d4000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 48 83 c4 50 add $0x50,%rsp 4: 44 89 e0 mov %r12d,%eax 7: 5b pop %rbx 8: 41 5c pop %r12 a: 41 5d pop %r13 c: 41 5e pop %r14 e: 41 5f pop %r15 10: 5d pop %rbp 11: c3 ret 12: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 19: fc ff df 1c: 89 f3 mov %esi,%ebx 1e: 49 8d 7c df 08 lea 0x8(%r15,%rbx,8),%rdi 23: 48 89 fa mov %rdi,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2e: 0f 85 0f 0d 00 00 jne 0xd43 34: 49 8b 5c df 08 mov 0x8(%r15,%rbx,8),%rbx 39: 48 85 db test %rbx,%rbx 3c: 0f .byte 0xf 3d: 85 07 test %eax,(%rdi) 3f: fc cld