OCFS2: ERROR (device (efault)): void ocfs2_abort_trigger(struct jbd2_buffer_trigger_type *, struct buffer_head *): JBD2 has aborted our journal, ocfs2 cannot continue
general protection fault, probably for non-canonical address 0xdffffc00000000cf: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000678-0x000000000000067f]
CPU: 0 PID: 4244 Comm: jbd2/loop0-29 Not tainted 6.1.114-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
RIP: 0010:ocfs2_handle_error+0x2c/0x250 fs/ocfs2/super.c:2524
Code: 57 41 56 41 55 41 54 53 50 49 89 fc 48 bd 00 00 00 00 00 fc ff df e8 13 63 1b fe 49 8d 9c 24 78 06 00 00 48 89 d8 48 c1 e8 03 <80> 3c 28 00 74 08 48 89 df e8 a6 e4 72 fe 48 8b 1b 4c 8d b3 00 01
RSP: 0018:ffffc90003d6f660 EFLAGS: 00010206
RAX: 00000000000000cf RBX: 0000000000000678 RCX: ffff888030468000
RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000
RBP: dffffc0000000000 R08: ffffffff816e64bc R09: fffffbfff1d34036
R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000
R13: ffffffff8b4af640 R14: 1ffff920007adedc R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055f66dacde58 CR3: 000000000d08e000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
__ocfs2_error+0x13c/0x190 fs/ocfs2/super.c:2567
ocfs2_abort_trigger+0x112/0x150 fs/ocfs2/journal.c:576
jbd2_journal_commit_transaction+0x16fb/0x6a50 fs/jbd2/commit.c:623
kjournald2+0x45e/0x840 fs/jbd2/journal.c:210
kthread+0x28d/0x320 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:ocfs2_handle_error+0x2c/0x250 fs/ocfs2/super.c:2524
Code: 57 41 56 41 55 41 54 53 50 49 89 fc 48 bd 00 00 00 00 00 fc ff df e8 13 63 1b fe 49 8d 9c 24 78 06 00 00 48 89 d8 48 c1 e8 03 <80> 3c 28 00 74 08 48 89 df e8 a6 e4 72 fe 48 8b 1b 4c 8d b3 00 01
RSP: 0018:ffffc90003d6f660 EFLAGS: 00010206
RAX: 00000000000000cf RBX: 0000000000000678 RCX: ffff888030468000
RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000
RBP: dffffc0000000000 R08: ffffffff816e64bc R09: fffffbfff1d34036
R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000
R13: ffffffff8b4af640 R14: 1ffff920007adedc R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055f66dacde58 CR3: 000000000d08e000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 57 push %rdi
1: 41 56 push %r14
3: 41 55 push %r13
5: 41 54 push %r12
7: 53 push %rbx
8: 50 push %rax
9: 49 89 fc mov %rdi,%r12
c: 48 bd 00 00 00 00 00 movabs $0xdffffc0000000000,%rbp
13: fc ff df
16: e8 13 63 1b fe call 0xfe1b632e
1b: 49 8d 9c 24 78 06 00 lea 0x678(%r12),%rbx
22: 00
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 80 3c 28 00 cmpb $0x0,(%rax,%rbp,1) <-- trapping instruction
2e: 74 08 je 0x38
30: 48 89 df mov %rbx,%rdi
33: e8 a6 e4 72 fe call 0xfe72e4de
38: 48 8b 1b mov (%rbx),%rbx
3b: 4c rex.WR
3c: 8d .byte 0x8d
3d: b3 00 mov $0x0,%bl
3f: 01 .byte 0x1