jfs_dirty_inode called on read-only volume Is remount racy? jfs_dirty_inode called on read-only volume Is remount racy? jfs_dirty_inode called on read-only volume Is remount racy? Unable to handle kernel paging request at virtual address dfff800000000008 KASAN: null-ptr-deref in range [0x0000000000000040-0x0000000000000047] Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006 CM = 0, WnR = 0 [dfff800000000008] address between user and kernel address ranges Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 6264 Comm: syz.6.315 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 pstate: 62400005 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) pc : generic_test_bit include/asm-generic/bitops/generic-non-atomic.h:128 [inline] pc : txBeginAnon+0xac/0x154 fs/jfs/jfs_txnmgr.c:465 lr : spin_lock include/linux/spinlock.h:351 [inline] lr : txBeginAnon+0x78/0x154 fs/jfs/jfs_txnmgr.c:458 sp : ffff8000224a6d40 x29: ffff8000224a6d40 x28: ffff80001c46d148 x27: ffff80001c46c000 x26: ffff80001c46d000 x25: 0000000000000008 x24: 0000000000000150 x23: dfff800000000000 x22: 0000000000000001 x21: 0000000000000000 x20: 0000000000000040 x19: ffff800015681100 x18: ffff800011abbcc0 x17: ffff8000181f9000 x16: ffff8000082e763c x15: ffff800017cd9fc0 x14: ffff0000dae38a98 x13: 1ffff00002a180b1 x12: ffff700004494d90 x11: 1ffff00004494d90 x10: 0000000000000004 x9 : 3ddbc715f71fdb00 x8 : 3ddbc715f71fdb00 x7 : ffff8000098a24c0 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff8000082e775c x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: spin_lock include/linux/spinlock.h:351 [inline] txBeginAnon+0xac/0x154 fs/jfs/jfs_txnmgr.c:-1 extAlloc+0xe4/0xd64 fs/jfs/jfs_extent.c:78 jfs_get_block+0x2bc/0x8b8 fs/jfs/inode.c:248 __block_write_begin_int+0x34c/0x13b8 fs/buffer.c:1991 __block_write_begin fs/buffer.c:2041 [inline] block_write_begin+0x98/0x11c fs/buffer.c:2102 jfs_write_begin+0x44/0x88 fs/jfs/inode.c:304 generic_perform_write+0x230/0x4b0 mm/filemap.c:3846 __generic_file_write_iter+0x168/0x37c mm/filemap.c:3974 generic_file_write_iter+0xb4/0x2b0 mm/filemap.c:4006 do_iter_readv_writev fs/read_write.c:-1 [inline] do_iter_write+0x530/0x91c fs/read_write.c:861 vfs_iter_write+0x88/0xac fs/read_write.c:902 iter_file_splice_write+0x500/0xa18 fs/splice.c:685 do_splice_from fs/splice.c:763 [inline] direct_splice_actor+0xe4/0x134 fs/splice.c:950 splice_direct_to_actor+0x3b4/0x978 fs/splice.c:896 do_splice_direct+0x158/0x244 fs/splice.c:1002 generic_copy_file_range fs/read_write.c:1393 [inline] vfs_copy_file_range+0x8f0/0x11ec fs/read_write.c:1539 __do_sys_copy_file_range fs/read_write.c:1596 [inline] __se_sys_copy_file_range fs/read_write.c:1559 [inline] __arm64_sys_copy_file_range+0x4f4/0x81c fs/read_write.c:1559 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2bc arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x58/0x13c arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x138 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 Code: aa1803e0 97ffff75 aa1303e0 959d3139 (38776b28) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: aa1803e0 mov x0, x24 4: 97ffff75 bl 0xfffffffffffffdd8 8: aa1303e0 mov x0, x19 c: 959d3139 bl 0x674c4f0 * 10: 38776b28 ldrb w8, [x25, x23] <-- trapping instruction