(syz.4.2120,24195,0):ocfs2_write_begin_nolock:1791 ERROR: status = -12 BUG: unable to handle page fault for address: fffffffffffffffc #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD df3d067 P4D df3d067 PUD df3f067 PMD 0 Oops: Oops: 0000 [#1] SMP KASAN PTI CPU: 0 UID: 0 PID: 24195 Comm: syz.4.2120 Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:const_folio_flags include/linux/page-flags.h:347 [inline] RIP: 0010:folio_test_locked include/linux/page-flags.h:547 [inline] RIP: 0010:folio_unlock+0x3a/0x160 mm/filemap.c:1498 Code: fb 49 bf 00 00 00 00 00 fc ff df e8 a0 da c8 ff 4c 8d 73 08 4d 89 f4 49 c1 ec 03 43 80 3c 3c 00 74 08 4c 89 f7 e8 96 32 2a 00 <4d> 8b 2e 4c 89 ee 48 83 e6 01 31 ff e8 55 df c8 ff 49 83 e5 01 0f RSP: 0000:ffffc9000adb6f68 EFLAGS: 00010246 RAX: ffffffff81f772f0 RBX: fffffffffffffff4 RCX: ffff888025a21e00 RDX: 0000000000000000 RSI: 0000000000000001 RDI: fffffffffffffff4 RBP: 0000000000000001 R08: ffff8880576f447f R09: 1ffff1100aede88f R10: dffffc0000000000 R11: ffffed100aede890 R12: 1fffffffffffffff R13: 0000000000000000 R14: fffffffffffffffc R15: dffffc0000000000 FS: 00007fbccde826c0(0000) GS:ffff888125c84000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffffc CR3: 000000005e534000 CR4: 00000000003526f0 Call Trace: ocfs2_unlock_and_free_folios+0x71/0x1a0 fs/ocfs2/aops.c:765 ocfs2_free_write_ctxt fs/ocfs2/aops.c:813 [inline] ocfs2_write_begin_nolock+0x3078/0x4340 fs/ocfs2/aops.c:1830 ocfs2_write_begin+0x1bb/0x310 fs/ocfs2/aops.c:1882 generic_perform_write+0x2c7/0x910 mm/filemap.c:4112 __generic_file_write_iter+0x1ae/0x230 mm/filemap.c:4226 ocfs2_file_write_iter+0x157a/0x1d10 fs/ocfs2/file.c:2469 do_iter_readv_writev+0x56e/0x7f0 fs/read_write.c:-1 vfs_writev+0x31a/0x960 fs/read_write.c:1057 do_writev+0x14d/0x2d0 fs/read_write.c:1103 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fbcccf8e929 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fbccde82038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 00007fbccd1b5fa0 RCX: 00007fbcccf8e929 RDX: 0000000000000001 RSI: 0000200000000140 RDI: 0000000000000005 RBP: 00007fbccde82090 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 00007fbccd1b5fa0 R15: 00007ffcd81f07c8 Modules linked in: CR2: fffffffffffffffc ---[ end trace 0000000000000000 ]--- RIP: 0010:const_folio_flags include/linux/page-flags.h:347 [inline] RIP: 0010:folio_test_locked include/linux/page-flags.h:547 [inline] RIP: 0010:folio_unlock+0x3a/0x160 mm/filemap.c:1498 Code: fb 49 bf 00 00 00 00 00 fc ff df e8 a0 da c8 ff 4c 8d 73 08 4d 89 f4 49 c1 ec 03 43 80 3c 3c 00 74 08 4c 89 f7 e8 96 32 2a 00 <4d> 8b 2e 4c 89 ee 48 83 e6 01 31 ff e8 55 df c8 ff 49 83 e5 01 0f RSP: 0000:ffffc9000adb6f68 EFLAGS: 00010246 RAX: ffffffff81f772f0 RBX: fffffffffffffff4 RCX: ffff888025a21e00 RDX: 0000000000000000 RSI: 0000000000000001 RDI: fffffffffffffff4 RBP: 0000000000000001 R08: ffff8880576f447f R09: 1ffff1100aede88f R10: dffffc0000000000 R11: ffffed100aede890 R12: 1fffffffffffffff R13: 0000000000000000 R14: fffffffffffffffc R15: dffffc0000000000 FS: 00007fbccde826c0(0000) GS:ffff888125c84000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffffc CR3: 000000005e534000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: fb sti 1: 49 bf 00 00 00 00 00 movabs $0xdffffc0000000000,%r15 8: fc ff df b: e8 a0 da c8 ff call 0xffc8dab0 10: 4c 8d 73 08 lea 0x8(%rbx),%r14 14: 4d 89 f4 mov %r14,%r12 17: 49 c1 ec 03 shr $0x3,%r12 1b: 43 80 3c 3c 00 cmpb $0x0,(%r12,%r15,1) 20: 74 08 je 0x2a 22: 4c 89 f7 mov %r14,%rdi 25: e8 96 32 2a 00 call 0x2a32c0 * 2a: 4d 8b 2e mov (%r14),%r13 <-- trapping instruction 2d: 4c 89 ee mov %r13,%rsi 30: 48 83 e6 01 and $0x1,%rsi 34: 31 ff xor %edi,%edi 36: e8 55 df c8 ff call 0xffc8df90 3b: 49 83 e5 01 and $0x1,%r13 3f: 0f .byte 0xf