Oops: general protection fault, probably for non-canonical address 0xdffffc0000000053: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000298-0x000000000000029f] CPU: 1 UID: 0 PID: 121 Comm: jfsCommit Not tainted syzkaller #0 PREEMPT_{RT,(full)} Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 RIP: 0010:kasan_byte_accessible+0x12/0x30 mm/kasan/generic.c:210 Code: 79 ff ff ff 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 40 d6 48 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <0f> b6 04 07 3c 08 0f 92 c0 c3 cc cc cc cc cc 66 66 66 66 66 66 2e RSP: 0018:ffffc900015dfb00 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: ffffffff8b0f9a93 RCX: 0000000080000001 RDX: 0000000000000000 RSI: ffffffff8b0f9a93 RDI: 0000000000000053 RBP: ffffffff834df9a5 R08: 0000000000000001 R09: 0000000000000000 R10: ffffc900015dfc30 R11: fffff520002bbf88 R12: 0000000000000000 R13: 0000000000000298 R14: 0000000000000298 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8881266c9000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2f509ff8 CR3: 000000003b1e0000 CR4: 00000000003526f0 Call Trace: __kasan_check_byte+0x12/0x40 mm/kasan/common.c:573 kasan_check_byte include/linux/kasan.h:402 [inline] lock_acquire+0x84/0x330 kernel/locking/lockdep.c:5842 rt_spin_lock+0x83/0x400 kernel/locking/spinlock_rt.c:56 spin_lock_irq include/linux/spinlock_rt.h:93 [inline] txLazyCommit fs/jfs/jfs_txnmgr.c:2669 [inline] jfs_lazycommit+0x455/0xa10 fs/jfs/jfs_txnmgr.c:2734 kthread+0x726/0x8b0 kernel/kthread.c:463 ret_from_fork+0x51b/0xa40 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:kasan_byte_accessible+0x12/0x30 mm/kasan/generic.c:210 Code: 79 ff ff ff 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 40 d6 48 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <0f> b6 04 07 3c 08 0f 92 c0 c3 cc cc cc cc cc 66 66 66 66 66 66 2e RSP: 0018:ffffc900015dfb00 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: ffffffff8b0f9a93 RCX: 0000000080000001 RDX: 0000000000000000 RSI: ffffffff8b0f9a93 RDI: 0000000000000053 RBP: ffffffff834df9a5 R08: 0000000000000001 R09: 0000000000000000 R10: ffffc900015dfc30 R11: fffff520002bbf88 R12: 0000000000000000 R13: 0000000000000298 R14: 0000000000000298 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8881266c9000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2f509ff8 CR3: 000000003b1e0000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess), 4 bytes skipped: 0: 0f 1f 40 00 nopl 0x0(%rax) 4: 90 nop 5: 90 nop 6: 90 nop 7: 90 nop 8: 90 nop 9: 90 nop a: 90 nop b: 90 nop c: 90 nop d: 90 nop e: 90 nop f: 90 nop 10: 90 nop 11: 90 nop 12: 90 nop 13: 90 nop 14: 0f 1f 40 d6 nopl -0x2a(%rax) 18: 48 c1 ef 03 shr $0x3,%rdi 1c: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 23: fc ff df * 26: 0f b6 04 07 movzbl (%rdi,%rax,1),%eax <-- trapping instruction 2a: 3c 08 cmp $0x8,%al 2c: 0f 92 c0 setb %al 2f: c3 ret 30: cc int3 31: cc int3 32: cc int3 33: cc int3 34: cc int3 35: 66 data16 36: 66 data16 37: 66 data16 38: 66 data16 39: 66 data16 3a: 66 data16 3b: 2e cs