general protection fault, probably for non-canonical address 0xdffffc00000000e9: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000748-0x000000000000074f]
CPU: 0 PID: 46 Comm: kswapd0 Not tainted 5.15.173-syzkaller-00161-gb4bd207b0380 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
RIP: 0010:f2fs_release_page+0x23a/0x7c0 fs/f2fs/data.c:3728
Code: 00 4c 03 23 4c 89 e0 48 c1 e8 03 42 80 3c 30 00 74 08 4c 89 e7 e8 56 f1 8a ff bb 48 07 00 00 49 03 1c 24 48 89 d8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 0f 85 3c 05 00 00 44 8b 23 bb 00 00 00 40 be
RSP: 0018:ffffc900006fee48 EFLAGS: 00010202
RAX: 00000000000000e9 RBX: 0000000000000748 RCX: ffff88810538a780
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc900006fee88 R08: ffffffff8227ccbc R09: fffff94000c1ddd9
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff888127dc33c8
R13: 4000000000002005 R14: dffffc0000000000 R15: ffffea00060eeec0
FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4bf9bd2000 CR3: 0000000182fd2000 CR4: 00000000003506b0
DR0: 0000000000002800 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
try_to_release_page+0x194/0x1f0 mm/filemap.c:4048
shrink_page_list+0x1fd4/0x5c50 mm/vmscan.c:1763
shrink_inactive_list mm/vmscan.c:2305 [inline]
shrink_list mm/vmscan.c:2550 [inline]
shrink_lruvec+0x17ec/0x4580 mm/vmscan.c:5755
shrink_node_memcgs mm/vmscan.c:5947 [inline]
shrink_node+0x1083/0x2550 mm/vmscan.c:5977
kswapd_shrink_node mm/vmscan.c:6727 [inline]
balance_pgdat+0x15e1/0x2f50 mm/vmscan.c:6917
kswapd+0x698/0xd60 mm/vmscan.c:7176
kthread+0x421/0x510 kernel/kthread.c:337
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287
</TASK>
Modules linked in:
---[ end trace ad35c56d9ed9fb25 ]---
RIP: 0010:f2fs_release_page+0x23a/0x7c0 fs/f2fs/data.c:3728
Code: 00 4c 03 23 4c 89 e0 48 c1 e8 03 42 80 3c 30 00 74 08 4c 89 e7 e8 56 f1 8a ff bb 48 07 00 00 49 03 1c 24 48 89 d8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 0f 85 3c 05 00 00 44 8b 23 bb 00 00 00 40 be
RSP: 0018:ffffc900006fee48 EFLAGS: 00010202
RAX: 00000000000000e9 RBX: 0000000000000748 RCX: ffff88810538a780
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc900006fee88 R08: ffffffff8227ccbc R09: fffff94000c1ddd9
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff888127dc33c8
R13: 4000000000002005 R14: dffffc0000000000 R15: ffffea00060eeec0
FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020356030 CR3: 0000000114b66000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 00 4c 03 23 add %cl,0x23(%rbx,%rax,1)
4: 4c 89 e0 mov %r12,%rax
7: 48 c1 e8 03 shr $0x3,%rax
b: 42 80 3c 30 00 cmpb $0x0,(%rax,%r14,1)
10: 74 08 je 0x1a
12: 4c 89 e7 mov %r12,%rdi
15: e8 56 f1 8a ff call 0xff8af170
1a: bb 48 07 00 00 mov $0x748,%ebx
1f: 49 03 1c 24 add (%r12),%rbx
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 0f b6 04 30 movzbl (%rax,%r14,1),%eax <-- trapping instruction
2f: 84 c0 test %al,%al
31: 0f 85 3c 05 00 00 jne 0x573
37: 44 8b 23 mov (%rbx),%r12d
3a: bb 00 00 00 40 mov $0x40000000,%ebx
3f: be .byte 0xbe