loop0: detected capacity change from 0 to 32768
read_mapping_page failed!
ERROR: (device loop0): txAbort: 
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000040
Mem abort info:
  ESR = 0x0000000096000006
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x06: level 2 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000006
  CM = 0, WnR = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=0000000113e42000
[0000000000000040] pgd=0800000115c46003, p4d=0800000115c46003, pud=08000001123e2003, pmd=0000000000000000
Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 4634 Comm: syz-executor.0 Not tainted 6.2.0-rc7-syzkaller-17907-g2d3827b3f393 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : generic_test_bit include/asm-generic/bitops/generic-non-atomic.h:128 [inline]
pc : txBegin+0xb8/0x2a0 fs/jfs/jfs_txnmgr.c:366
lr : txBegin+0x90/0x2a0 fs/jfs/jfs_txnmgr.c:357
sp : ffff8000134e3ac0
x29: ffff8000134e3ad0 x28: 0000000000000150 x27: 0000000000000000
x26: ffff80000d598000 x25: 0000000000000000 x24: 00000000ffffffff
x23: ffff80000efc1000 x22: 0000000000000000 x21: ffff80000d599678
x20: ffff0000cd7a9e88 x19: ffff80000efc1748 x18: 0000000000000000
x17: 0000000000000000 x16: ffff0000d3e13e48 x15: ffff80000dbd2118
x14: ffff0000d3e13400 x13: 00000000ffffffff x12: ffff0000d3e13400
x11: ff80800008d22088 x10: 0000000000000000 x9 : ffff0000d3e13400
x8 : ffff800008d22088 x7 : ffff800008d22064 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 txBegin+0xb8/0x2a0 fs/jfs/jfs_txnmgr.c:362
 jfs_link+0xd4/0x2cc fs/jfs/namei.c:802
 vfs_link+0x3d4/0x458 fs/namei.c:4529
 do_linkat+0x1b4/0x4ec fs/namei.c:4600
 __do_sys_linkat fs/namei.c:4628 [inline]
 __se_sys_linkat fs/namei.c:4625 [inline]
 __arm64_sys_linkat+0x70/0x8c fs/namei.c:4625
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x64/0x178 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0xbc/0x180 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x48/0x110 arch/arm64/kernel/syscall.c:193
 el0_svc+0x58/0x14c arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591
Code: 9400007e aa1503e0 94c921f4 350001f6 (f9402374) 
---[ end trace 0000000000000000 ]---
----------------
Code disassembly (best guess):
   0:	9400007e 	bl	0x1f8
   4:	aa1503e0 	mov	x0, x21
   8:	94c921f4 	bl	0x32487d8
   c:	350001f6 	cbnz	w22, 0x48
* 10:	f9402374 	ldr	x20, [x27, #64] <-- trapping instruction