general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
CPU: 1 PID: 23 Comm: ksoftirqd/1 Tainted: G W syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026
RIP: 0010:NODE_MAPPING fs/f2fs/f2fs.h:2058 [inline]
RIP: 0010:f2fs_in_warm_node_list+0x4b/0x1b0 fs/f2fs/node.c:315
Code: 81 c6 d0 00 00 00 4c 89 f0 48 c1 e8 03 42 80 3c 38 00 74 08 4c 89 f7 e8 43 b0 8d ff 4d 8b 36 49 83 c6 30 4c 89 f0 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 f7 e8 26 b0 8d ff 4d 8b 26 4c 8d 73 18
RSP: 0018:ffffc900001879e8 EFLAGS: 00010006
RAX: 0000000000000006 RBX: ffffea0004a64d80 RCX: ffff888100332880
RDX: 0000000000000100 RSI: ffffea0004a64d80 RDI: ffff88811859c000
RBP: ffffc90000187a08 R08: ffffffff8792e42f R09: 1ffffffff0f25c85
R10: dffffc0000000000 R11: fffffbfff0f25c86 R12: dffffc0000000000
R13: ffffea0004a64d80 R14: 0000000000000030 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f08911f2d94 CR3: 000000011017d000 CR4: 00000000003506a0
Call Trace:
<TASK>
f2fs_write_end_io+0x512/0xae0 fs/f2fs/data.c:382
bio_endio+0x6a9/0x7c0 block/bio.c:1557
req_bio_endio block/blk-mq.c:786 [inline]
blk_update_request+0x4c4/0xe60 block/blk-mq.c:931
blk_mq_end_request+0x41/0x80 block/blk-mq.c:1056
blk_flush_complete_seq+0x5b8/0xca0 block/blk-flush.c:210
flush_end_io+0x838/0xab0 block/blk-flush.c:268
__blk_mq_end_request+0x49d/0x570 block/blk-mq.c:1046
blk_mq_end_request+0x55/0x80 block/blk-mq.c:1058
lo_complete_rq+0x147/0x260 drivers/block/loop.c:365
blk_complete_reqs block/blk-mq.c:1136 [inline]
blk_done_softirq+0x116/0x160 block/blk-mq.c:1141
handle_softirqs+0x1d7/0x600 kernel/softirq.c:642
run_ksoftirqd+0x28/0x30 kernel/softirq.c:1019
smpboot_thread_fn+0x4a0/0x910 kernel/smpboot.c:164
kthread+0x281/0x320 kernel/kthread.c:386
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:NODE_MAPPING fs/f2fs/f2fs.h:2058 [inline]
RIP: 0010:f2fs_in_warm_node_list+0x4b/0x1b0 fs/f2fs/node.c:315
Code: 81 c6 d0 00 00 00 4c 89 f0 48 c1 e8 03 42 80 3c 38 00 74 08 4c 89 f7 e8 43 b0 8d ff 4d 8b 36 49 83 c6 30 4c 89 f0 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 f7 e8 26 b0 8d ff 4d 8b 26 4c 8d 73 18
RSP: 0018:ffffc900001879e8 EFLAGS: 00010006
RAX: 0000000000000006 RBX: ffffea0004a64d80 RCX: ffff888100332880
RDX: 0000000000000100 RSI: ffffea0004a64d80 RDI: ffff88811859c000
RBP: ffffc90000187a08 R08: ffffffff8792e42f R09: 1ffffffff0f25c85
R10: dffffc0000000000 R11: fffffbfff0f25c86 R12: dffffc0000000000
R13: ffffea0004a64d80 R14: 0000000000000030 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f08911f2d94 CR3: 000000011017d000 CR4: 00000000003506a0
----------------
Code disassembly (best guess):
0: 81 c6 d0 00 00 00 add $0xd0,%esi
6: 4c 89 f0 mov %r14,%rax
9: 48 c1 e8 03 shr $0x3,%rax
d: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1)
12: 74 08 je 0x1c
14: 4c 89 f7 mov %r14,%rdi
17: e8 43 b0 8d ff call 0xff8db05f
1c: 4d 8b 36 mov (%r14),%r14
1f: 49 83 c6 30 add $0x30,%r14
23: 4c 89 f0 mov %r14,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1) <-- trapping instruction
2f: 74 08 je 0x39
31: 4c 89 f7 mov %r14,%rdi
34: e8 26 b0 8d ff call 0xff8db05f
39: 4d 8b 26 mov (%r14),%r12
3c: 4c 8d 73 18 lea 0x18(%rbx),%r14