general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
CPU: 0 PID: 13 Comm: ksoftirqd/0 Tainted: G W syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026
RIP: 0010:NODE_MAPPING fs/f2fs/f2fs.h:2003 [inline]
RIP: 0010:f2fs_in_warm_node_list+0x4b/0x1b0 fs/f2fs/node.c:315
Code: 81 c6 c0 00 00 00 4c 89 f0 48 c1 e8 03 42 80 3c 38 00 74 08 4c 89 f7 e8 23 f2 8d ff 4d 8b 36 49 83 c6 30 4c 89 f0 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 f7 e8 06 f2 8d ff 4d 8b 26 4c 8d 73 18
RSP: 0018:ffffc900000d79e8 EFLAGS: 00010006
RAX: 0000000000000006 RBX: ffffea00052de240 RCX: ffff888100322880
RDX: 0000000000000100 RSI: ffffea00052de240 RDI: ffff888111728000
RBP: ffffc900000d7a08 R08: ffffffff8792b9af R09: 1ffffffff0f25735
R10: dffffc0000000000 R11: fffffbfff0f25736 R12: dffffc0000000000
R13: ffffea00052de240 R14: 0000000000000030 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fbd8b1e7eb8 CR3: 000000010ffbd000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
f2fs_write_end_io+0x50f/0xae0 fs/f2fs/data.c:382
bio_endio+0x6a9/0x7c0 block/bio.c:1557
req_bio_endio block/blk-mq.c:786 [inline]
blk_update_request+0x4c4/0xe60 block/blk-mq.c:931
blk_mq_end_request+0x41/0x80 block/blk-mq.c:1056
blk_flush_complete_seq+0x5b8/0xca0 block/blk-flush.c:210
flush_end_io+0x838/0xab0 block/blk-flush.c:268
__blk_mq_end_request+0x49d/0x570 block/blk-mq.c:1046
blk_mq_end_request+0x55/0x80 block/blk-mq.c:1058
lo_complete_rq+0x147/0x260 drivers/block/loop.c:365
blk_complete_reqs block/blk-mq.c:1136 [inline]
blk_done_softirq+0x116/0x160 block/blk-mq.c:1141
handle_softirqs+0x1d7/0x600 kernel/softirq.c:642
run_ksoftirqd+0x28/0x30 kernel/softirq.c:1019
smpboot_thread_fn+0x4a0/0x910 kernel/smpboot.c:164
kthread+0x281/0x320 kernel/kthread.c:386
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:NODE_MAPPING fs/f2fs/f2fs.h:2003 [inline]
RIP: 0010:f2fs_in_warm_node_list+0x4b/0x1b0 fs/f2fs/node.c:315
Code: 81 c6 c0 00 00 00 4c 89 f0 48 c1 e8 03 42 80 3c 38 00 74 08 4c 89 f7 e8 23 f2 8d ff 4d 8b 36 49 83 c6 30 4c 89 f0 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 f7 e8 06 f2 8d ff 4d 8b 26 4c 8d 73 18
RSP: 0018:ffffc900000d79e8 EFLAGS: 00010006
RAX: 0000000000000006 RBX: ffffea00052de240 RCX: ffff888100322880
RDX: 0000000000000100 RSI: ffffea00052de240 RDI: ffff888111728000
RBP: ffffc900000d7a08 R08: ffffffff8792b9af R09: 1ffffffff0f25735
R10: dffffc0000000000 R11: fffffbfff0f25736 R12: dffffc0000000000
R13: ffffea00052de240 R14: 0000000000000030 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fbd8b1e7eb8 CR3: 000000010ffbd000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 81 c6 c0 00 00 00 add $0xc0,%esi
6: 4c 89 f0 mov %r14,%rax
9: 48 c1 e8 03 shr $0x3,%rax
d: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1)
12: 74 08 je 0x1c
14: 4c 89 f7 mov %r14,%rdi
17: e8 23 f2 8d ff call 0xff8df23f
1c: 4d 8b 36 mov (%r14),%r14
1f: 49 83 c6 30 add $0x30,%r14
23: 4c 89 f0 mov %r14,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1) <-- trapping instruction
2f: 74 08 je 0x39
31: 4c 89 f7 mov %r14,%rdi
34: e8 06 f2 8d ff call 0xff8df23f
39: 4d 8b 26 mov (%r14),%r12
3c: 4c 8d 73 18 lea 0x18(%rbx),%r14