general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
CPU: 1 PID: 23 Comm: ksoftirqd/1 Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
RIP: 0010:NODE_MAPPING fs/f2fs/f2fs.h:2001 [inline]
RIP: 0010:f2fs_in_warm_node_list+0x4b/0x1b0 fs/f2fs/node.c:315
Code: 81 c6 c0 00 00 00 4c 89 f0 48 c1 e8 03 42 80 3c 38 00 74 08 4c 89 f7 e8 83 f9 8d ff 4d 8b 36 49 83 c6 30 4c 89 f0 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 f7 e8 66 f9 8d ff 4d 8b 26 4c 8d 73 18
RSP: 0018:ffffc900001879e8 EFLAGS: 00010006
RAX: 0000000000000006 RBX: ffffea0004239540 RCX: ffff888100330000
RDX: 0000000000000100 RSI: ffffea0004239540 RDI: ffff88810d9e4000
RBP: ffffc90000187a08 R08: ffffc90000187687 R09: 1ffff92000030ed0
R10: 0000000000000000 R11: ffffffff8134c6c0 R12: dffffc0000000000
R13: ffffea0004239540 R14: 0000000000000030 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000200000001000 CR3: 000000010b2e8000 CR4: 00000000003526a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
f2fs_write_end_io+0x50f/0xae0 fs/f2fs/data.c:382
bio_endio+0x6a9/0x7c0 block/bio.c:1557
req_bio_endio block/blk-mq.c:786 [inline]
blk_update_request+0x4c4/0xe60 block/blk-mq.c:931
blk_mq_end_request+0x41/0x80 block/blk-mq.c:1056
blk_flush_complete_seq+0x5b8/0xca0 block/blk-flush.c:210
flush_end_io+0x838/0xab0 block/blk-flush.c:268
__blk_mq_end_request+0x49d/0x570 block/blk-mq.c:1046
blk_mq_end_request+0x55/0x80 block/blk-mq.c:1058
lo_complete_rq+0x147/0x260 drivers/block/loop.c:365
blk_complete_reqs block/blk-mq.c:1136 [inline]
blk_done_softirq+0x116/0x160 block/blk-mq.c:1141
handle_softirqs+0x1d7/0x600 kernel/softirq.c:642
run_ksoftirqd+0x28/0x30 kernel/softirq.c:1019
smpboot_thread_fn+0x4a0/0x910 kernel/smpboot.c:164
kthread+0x281/0x320 kernel/kthread.c:386
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:NODE_MAPPING fs/f2fs/f2fs.h:2001 [inline]
RIP: 0010:f2fs_in_warm_node_list+0x4b/0x1b0 fs/f2fs/node.c:315
Code: 81 c6 c0 00 00 00 4c 89 f0 48 c1 e8 03 42 80 3c 38 00 74 08 4c 89 f7 e8 83 f9 8d ff 4d 8b 36 49 83 c6 30 4c 89 f0 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 f7 e8 66 f9 8d ff 4d 8b 26 4c 8d 73 18
RSP: 0018:ffffc900001879e8 EFLAGS: 00010006
RAX: 0000000000000006 RBX: ffffea0004239540 RCX: ffff888100330000
RDX: 0000000000000100 RSI: ffffea0004239540 RDI: ffff88810d9e4000
RBP: ffffc90000187a08 R08: ffffc90000187687 R09: 1ffff92000030ed0
R10: 0000000000000000 R11: ffffffff8134c6c0 R12: dffffc0000000000
R13: ffffea0004239540 R14: 0000000000000030 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000200000001000 CR3: 000000010b2e8000 CR4: 00000000003526a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 81 c6 c0 00 00 00 add $0xc0,%esi
6: 4c 89 f0 mov %r14,%rax
9: 48 c1 e8 03 shr $0x3,%rax
d: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1)
12: 74 08 je 0x1c
14: 4c 89 f7 mov %r14,%rdi
17: e8 83 f9 8d ff call 0xff8df99f
1c: 4d 8b 36 mov (%r14),%r14
1f: 49 83 c6 30 add $0x30,%r14
23: 4c 89 f0 mov %r14,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1) <-- trapping instruction
2f: 74 08 je 0x39
31: 4c 89 f7 mov %r14,%rdi
34: e8 66 f9 8d ff call 0xff8df99f
39: 4d 8b 26 mov (%r14),%r12
3c: 4c 8d 73 18 lea 0x18(%rbx),%r14