general protection fault, probably for non-canonical address 0xdffffc000000003d: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x00000000000001e8-0x00000000000001ef] CPU: 1 PID: 107 Comm: jfsCommit Not tainted 6.1.148-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 RIP: 0010:__lock_acquire+0xe8/0x7c50 kernel/locking/lockdep.c:4919 Code: 42 0f b6 04 00 84 c0 0f 85 53 65 00 00 83 3d 12 a2 bc 0c 00 0f 84 c0 27 00 00 83 3d 81 a3 3c 0b 00 74 29 48 89 d8 48 c1 e8 03 <42> 80 3c 00 00 74 12 48 89 df e8 89 f3 6d 00 49 b8 00 00 00 00 00 RSP: 0000:ffffc90002cc79a0 EFLAGS: 00010002 RAX: 000000000000003d RBX: 00000000000001e8 RCX: 1ffff92000598f58 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000000001e8 RBP: ffffc90002cc7bf0 R08: dffffc0000000000 R09: 0000000000000001 R10: fffffbfff1c3ea96 R11: 1ffffffff1c3ea95 R12: ffff88801afb0000 R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe6d9f35000 CR3: 000000005e82d000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:119 [inline] _raw_spin_lock_irq+0x9f/0xe0 kernel/locking/spinlock.c:170 spin_lock_irq include/linux/spinlock.h:376 [inline] txLazyCommit fs/jfs/jfs_txnmgr.c:2668 [inline] jfs_lazycommit+0x486/0xa50 fs/jfs/jfs_txnmgr.c:2732 kthread+0x29d/0x330 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__lock_acquire+0xe8/0x7c50 kernel/locking/lockdep.c:4919 Code: 42 0f b6 04 00 84 c0 0f 85 53 65 00 00 83 3d 12 a2 bc 0c 00 0f 84 c0 27 00 00 83 3d 81 a3 3c 0b 00 74 29 48 89 d8 48 c1 e8 03 <42> 80 3c 00 00 74 12 48 89 df e8 89 f3 6d 00 49 b8 00 00 00 00 00 RSP: 0000:ffffc90002cc79a0 EFLAGS: 00010002 RAX: 000000000000003d RBX: 00000000000001e8 RCX: 1ffff92000598f58 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000000001e8 RBP: ffffc90002cc7bf0 R08: dffffc0000000000 R09: 0000000000000001 R10: fffffbfff1c3ea96 R11: 1ffffffff1c3ea95 R12: ffff88801afb0000 R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe6d9f35000 CR3: 000000005e82d000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 42 0f b6 04 00 movzbl (%rax,%r8,1),%eax 5: 84 c0 test %al,%al 7: 0f 85 53 65 00 00 jne 0x6560 d: 83 3d 12 a2 bc 0c 00 cmpl $0x0,0xcbca212(%rip) # 0xcbca226 14: 0f 84 c0 27 00 00 je 0x27da 1a: 83 3d 81 a3 3c 0b 00 cmpl $0x0,0xb3ca381(%rip) # 0xb3ca3a2 21: 74 29 je 0x4c 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 00 00 cmpb $0x0,(%rax,%r8,1) <-- trapping instruction 2f: 74 12 je 0x43 31: 48 89 df mov %rbx,%rdi 34: e8 89 f3 6d 00 call 0x6df3c2 39: 49 rex.WB 3a: b8 00 00 00 00 mov $0x0,%eax