Oops: general protection fault, probably for non-canonical address 0xdffffc0000000011: 0000 [#1] SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f] CPU: 1 UID: 0 PID: 6887 Comm: kworker/1:2H Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: gfs2-glock/syz:syz glock_work_func RIP: 0010:__gfs2_trans_begin+0x3b2/0x900 fs/gfs2/trans.c:73 Code: 09 00 00 4c 89 e8 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 ef e8 bf 6e 21 fe 41 bf 8c 00 00 00 4d 03 7d 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 63 04 00 00 45 8b 3f 89 df 44 89 fe e8 RSP: 0018:ffffc900040af6a0 EFLAGS: 00010217 RAX: 0000000000000011 RBX: 0000000000000004 RCX: ffff88801db41e80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900040af858 RBP: ffffc900040af790 R08: ffff888045cc40af R09: 1ffff11008b98815 R10: dffffc0000000000 R11: ffffed1008b98816 R12: dffffc0000000000 R13: ffff888045cc49f0 R14: ffffc900040af7e0 R15: 000000000000008c FS: 0000000000000000(0000) GS:ffff888126187000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f196d9156c0 CR3: 00000000a228d000 CR4: 0000000000350ef0 Call Trace: gfs2_ail_empty_gl+0x12b/0x2f0 fs/gfs2/glops.c:125 inode_go_sync+0x462/0x5d0 fs/gfs2/glops.c:332 do_xmote+0x1a7/0x750 fs/gfs2/glock.c:684 glock_work_func+0x2a8/0x580 fs/gfs2/glock.c:1010 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x599/0xb30 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__gfs2_trans_begin+0x3b2/0x900 fs/gfs2/trans.c:73 Code: 09 00 00 4c 89 e8 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 ef e8 bf 6e 21 fe 41 bf 8c 00 00 00 4d 03 7d 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 63 04 00 00 45 8b 3f 89 df 44 89 fe e8 RSP: 0018:ffffc900040af6a0 EFLAGS: 00010217 RAX: 0000000000000011 RBX: 0000000000000004 RCX: ffff88801db41e80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900040af858 RBP: ffffc900040af790 R08: ffff888045cc40af R09: 1ffff11008b98815 R10: dffffc0000000000 R11: ffffed1008b98816 R12: dffffc0000000000 R13: ffff888045cc49f0 R14: ffffc900040af7e0 R15: 000000000000008c FS: 0000000000000000(0000) GS:ffff888126187000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f196d9156c0 CR3: 0000000033ac0000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: 09 00 or %eax,(%rax) 2: 00 4c 89 e8 add %cl,-0x18(%rcx,%rcx,4) 6: 48 c1 e8 03 shr $0x3,%rax a: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) f: 74 08 je 0x19 11: 4c 89 ef mov %r13,%rdi 14: e8 bf 6e 21 fe call 0xfe216ed8 19: 41 bf 8c 00 00 00 mov $0x8c,%r15d 1f: 4d 03 7d 00 add 0x0(%r13),%r15 23: 4c 89 f8 mov %r15,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 0f b6 04 20 movzbl (%rax,%r12,1),%eax <-- trapping instruction 2f: 84 c0 test %al,%al 31: 0f 85 63 04 00 00 jne 0x49a 37: 45 8b 3f mov (%r15),%r15d 3a: 89 df mov %ebx,%edi 3c: 44 89 fe mov %r15d,%esi 3f: e8 .byte 0xe8