general protection fault, probably for non-canonical address 0xdffffc0000000097: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x00000000000004b8-0x00000000000004bf] CPU: 0 PID: 93 Comm: kworker/0:1H Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: glock_workqueue glock_work_func RIP: 0010:is_system_glock fs/gfs2/glock.c:724 [inline] RIP: 0010:do_xmote+0xdd3/0x13c0 fs/gfs2/glock.c:833 Code: ff df 80 3c 08 00 74 08 4c 89 f7 e8 f7 9d 3e fe 41 bf b8 04 00 00 4d 03 3e 4c 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ff e8 cf 9d 3e fe 49 3b 1f 0f 84 af 00 00 RSP: 0018:ffffc90002567b80 EFLAGS: 00010202 RAX: 0000000000000097 RBX: ffff888066e50548 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000004000 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffff88807b6ac0af R09: 1ffff1100f6d5815 R10: dffffc0000000000 R11: ffffed100f6d5816 R12: dffffc0000000000 R13: 1ffff1100f6d5815 R14: ffff88807b6ac718 R15: 00000000000004b8 FS: 0000000000000000(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b31e21ff8 CR3: 000000007e985000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: glock_work_func+0x25e/0x470 fs/gfs2/glock.c:1089 process_one_work+0x8a2/0x1160 kernel/workqueue.c:2292 worker_thread+0xaa2/0x1270 kernel/workqueue.c:2439 kthread+0x29d/0x330 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:is_system_glock fs/gfs2/glock.c:724 [inline] RIP: 0010:do_xmote+0xdd3/0x13c0 fs/gfs2/glock.c:833 Code: ff df 80 3c 08 00 74 08 4c 89 f7 e8 f7 9d 3e fe 41 bf b8 04 00 00 4d 03 3e 4c 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ff e8 cf 9d 3e fe 49 3b 1f 0f 84 af 00 00 RSP: 0018:ffffc90002567b80 EFLAGS: 00010202 RAX: 0000000000000097 RBX: ffff888066e50548 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000004000 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffff88807b6ac0af R09: 1ffff1100f6d5815 R10: dffffc0000000000 R11: ffffed100f6d5816 R12: dffffc0000000000 R13: 1ffff1100f6d5815 R14: ffff88807b6ac718 R15: 00000000000004b8 FS: 0000000000000000(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b31e21ff8 CR3: 000000007e952000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: ff lcall (bad) 1: df 80 3c 08 00 74 filds 0x7400083c(%rax) 7: 08 4c 89 f7 or %cl,-0x9(%rcx,%rcx,4) b: e8 f7 9d 3e fe call 0xfe3e9e07 10: 41 bf b8 04 00 00 mov $0x4b8,%r15d 16: 4d 03 3e add (%r14),%r15 19: 4c 89 f8 mov %r15,%rax 1c: 48 c1 e8 03 shr $0x3,%rax 20: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx 27: fc ff df * 2a: 80 3c 08 00 cmpb $0x0,(%rax,%rcx,1) <-- trapping instruction 2e: 74 08 je 0x38 30: 4c 89 ff mov %r15,%rdi 33: e8 cf 9d 3e fe call 0xfe3e9e07 38: 49 3b 1f cmp (%r15),%rbx 3b: 0f .byte 0xf 3c: 84 .byte 0x84 3d: af scas %es:(%rdi),%eax