loop0: detected capacity change from 0 to 32768 read_mapping_page failed! ERROR: (device loop0): txAbort: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000040 Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006 CM = 0, WnR = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=0000000113e42000 [0000000000000040] pgd=0800000115c46003, p4d=0800000115c46003, pud=08000001123e2003, pmd=0000000000000000 Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 4634 Comm: syz-executor.0 Not tainted 6.2.0-rc7-syzkaller-17907-g2d3827b3f393 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : generic_test_bit include/asm-generic/bitops/generic-non-atomic.h:128 [inline] pc : txBegin+0xb8/0x2a0 fs/jfs/jfs_txnmgr.c:366 lr : txBegin+0x90/0x2a0 fs/jfs/jfs_txnmgr.c:357 sp : ffff8000134e3ac0 x29: ffff8000134e3ad0 x28: 0000000000000150 x27: 0000000000000000 x26: ffff80000d598000 x25: 0000000000000000 x24: 00000000ffffffff x23: ffff80000efc1000 x22: 0000000000000000 x21: ffff80000d599678 x20: ffff0000cd7a9e88 x19: ffff80000efc1748 x18: 0000000000000000 x17: 0000000000000000 x16: ffff0000d3e13e48 x15: ffff80000dbd2118 x14: ffff0000d3e13400 x13: 00000000ffffffff x12: ffff0000d3e13400 x11: ff80800008d22088 x10: 0000000000000000 x9 : ffff0000d3e13400 x8 : ffff800008d22088 x7 : ffff800008d22064 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: txBegin+0xb8/0x2a0 fs/jfs/jfs_txnmgr.c:362 jfs_link+0xd4/0x2cc fs/jfs/namei.c:802 vfs_link+0x3d4/0x458 fs/namei.c:4529 do_linkat+0x1b4/0x4ec fs/namei.c:4600 __do_sys_linkat fs/namei.c:4628 [inline] __se_sys_linkat fs/namei.c:4625 [inline] __arm64_sys_linkat+0x70/0x8c fs/namei.c:4625 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x64/0x178 arch/arm64/kernel/syscall.c:52 el0_svc_common+0xbc/0x180 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x110 arch/arm64/kernel/syscall.c:193 el0_svc+0x58/0x14c arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591 Code: 9400007e aa1503e0 94c921f4 350001f6 (f9402374) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 9400007e bl 0x1f8 4: aa1503e0 mov x0, x21 8: 94c921f4 bl 0x32487d8 c: 350001f6 cbnz w22, 0x48 * 10: f9402374 ldr x20, [x27, #64] <-- trapping instruction