general protection fault, probably for non-canonical address 0xdffffc000000003d: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x00000000000001e8-0x00000000000001ef] CPU: 1 PID: 112 Comm: jfsCommit Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 RIP: 0010:__lock_acquire+0xf9/0x7d40 kernel/locking/lockdep.c:5005 Code: 89 bc 24 88 00 00 00 0f 85 88 67 00 00 83 3d 39 1a 23 0d 00 0f 84 16 10 00 00 83 3d 40 c1 97 0b 00 74 36 48 89 f8 48 c1 e8 03 <42> 80 3c 00 00 74 1f 48 8b bc 24 88 00 00 00 e8 f3 28 77 00 48 8b RSP: 0018:ffffc90002617980 EFLAGS: 00010002 RAX: 000000000000003d RBX: ffff88801970bc00 RCX: 1ffff920004c2f54 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000000001e8 RBP: ffffc90002617bc8 R08: dffffc0000000000 R09: 0000000000000001 R10: dffffc0000000000 R11: fffffbfff1d162be R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4affb89000 CR3: 000000005a4f0000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: lock_acquire+0x19e/0x420 kernel/locking/lockdep.c:5754 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:119 [inline] _raw_spin_lock_irq+0xaf/0xf0 kernel/locking/spinlock.c:170 spin_lock_irq include/linux/spinlock.h:376 [inline] txLazyCommit fs/jfs/jfs_txnmgr.c:2669 [inline] jfs_lazycommit+0x488/0xa70 fs/jfs/jfs_txnmgr.c:2733 kthread+0x2fa/0x390 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__lock_acquire+0xf9/0x7d40 kernel/locking/lockdep.c:5005 Code: 89 bc 24 88 00 00 00 0f 85 88 67 00 00 83 3d 39 1a 23 0d 00 0f 84 16 10 00 00 83 3d 40 c1 97 0b 00 74 36 48 89 f8 48 c1 e8 03 <42> 80 3c 00 00 74 1f 48 8b bc 24 88 00 00 00 e8 f3 28 77 00 48 8b RSP: 0018:ffffc90002617980 EFLAGS: 00010002 RAX: 000000000000003d RBX: ffff88801970bc00 RCX: 1ffff920004c2f54 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000000001e8 RBP: ffffc90002617bc8 R08: dffffc0000000000 R09: 0000000000000001 R10: dffffc0000000000 R11: fffffbfff1d162be R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4affb89000 CR3: 000000005a4f0000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 ---------------- Code disassembly (best guess): 0: 89 bc 24 88 00 00 00 mov %edi,0x88(%rsp) 7: 0f 85 88 67 00 00 jne 0x6795 d: 83 3d 39 1a 23 0d 00 cmpl $0x0,0xd231a39(%rip) # 0xd231a4d 14: 0f 84 16 10 00 00 je 0x1030 1a: 83 3d 40 c1 97 0b 00 cmpl $0x0,0xb97c140(%rip) # 0xb97c161 21: 74 36 je 0x59 23: 48 89 f8 mov %rdi,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 00 00 cmpb $0x0,(%rax,%r8,1) <-- trapping instruction 2f: 74 1f je 0x50 31: 48 8b bc 24 88 00 00 mov 0x88(%rsp),%rdi 38: 00 39: e8 f3 28 77 00 call 0x772931 3e: 48 rex.W 3f: 8b .byte 0x8b