Oops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037] CPU: 1 UID: 0 PID: 43 Comm: kworker/u8:2 Not tainted syzkaller #0 PREEMPT_{RT,(full)} Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet RIP: 0010:NODE_MAPPING fs/f2fs/f2fs.h:2260 [inline] RIP: 0010:is_node_folio fs/f2fs/f2fs.h:2270 [inline] RIP: 0010:f2fs_in_warm_node_list+0xbd/0x290 fs/f2fs/node.c:330 Code: 00 00 4d 03 3c 24 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 ff e8 a1 a4 fd fd 4d 8b 3f 49 83 c7 30 4c 89 f8 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 ff e8 84 a4 fd fd 4d 3b 37 74 19 e8 0a RSP: 0000:ffffc90000b47400 EFLAGS: 00010206 RAX: 0000000000000006 RBX: ffffea000183ccc0 RCX: ffff88801fac0000 RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000100 RBP: ffffea000183ccd8 R08: ffff888040d11eab R09: 1ffff110081a23d5 R10: dffffc0000000000 R11: ffffed10081a23d6 R12: ffff888025326798 R13: dffffc0000000000 R14: ffff88806055d050 R15: 0000000000000030 FS: 0000000000000000(0000) GS:ffff888126440000(0000) knlGS:0000000000000000 FS: 0000000000000000(0000) GS:ffff888126440000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc198f57000 CR3: 000000004cf7e000 CR4: 00000000003526f0 Call Trace: f2fs_write_end_io+0x7ab/0xff0 fs/f2fs/data.c:400 blk_update_request+0x57e/0xe60 block/blk-mq.c:1016 blk_mq_end_request+0x3e/0x70 block/blk-mq.c:1178 blk_flush_complete_seq+0x687/0xce0 block/blk-flush.c:191 flush_end_io+0xc40/0xf30 block/blk-flush.c:251 __blk_mq_end_request+0x4a9/0x680 block/blk-mq.c:1168 blk_complete_reqs block/blk-mq.c:1253 [inline] blk_done_softirq+0x10a/0x160 block/blk-mq.c:1258 handle_softirqs+0x1de/0x6f0 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] __local_bh_enable_ip+0x170/0x2b0 kernel/softirq.c:302 local_bh_enable include/linux/bottom_half.h:33 [inline] spin_unlock_bh include/linux/spinlock_rt.h:116 [inline] batadv_iv_ogm_queue_add+0x738/0xd20 net/batman-adv/bat_iv_ogm.c:668 batadv_iv_ogm_schedule_buff net/batman-adv/bat_iv_ogm.c:841 [inline] batadv_iv_ogm_schedule+0x8a1/0xf60 net/batman-adv/bat_iv_ogm.c:873 batadv_iv_send_outstanding_bat_ogm_packet+0x6c8/0x7e0 net/batman-adv/bat_iv_ogm.c:1709 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0xb02/0x1830 kernel/workqueue.c:3358 worker_thread+0xa50/0xfc0 kernel/workqueue.c:3439 kthread+0x388/0x470 kernel/kthread.c:467 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:NODE_MAPPING fs/f2fs/f2fs.h:2260 [inline] RIP: 0010:is_node_folio fs/f2fs/f2fs.h:2270 [inline] RIP: 0010:f2fs_in_warm_node_list+0xbd/0x290 fs/f2fs/node.c:330 Code: 00 00 4d 03 3c 24 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 ff e8 a1 a4 fd fd 4d 8b 3f 49 83 c7 30 4c 89 f8 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 ff e8 84 a4 fd fd 4d 3b 37 74 19 e8 0a RSP: 0000:ffffc90000b47400 EFLAGS: 00010206 RAX: 0000000000000006 RBX: ffffea000183ccc0 RCX: ffff88801fac0000 RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000100 RBP: ffffea000183ccd8 R08: ffff888040d11eab R09: 1ffff110081a23d5 R10: dffffc0000000000 R11: ffffed10081a23d6 R12: ffff888025326798 R13: dffffc0000000000 R14: ffff88806055d050 R15: 0000000000000030 FS: 0000000000000000(0000) GS:ffff888126440000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc198f57000 CR3: 000000004cf7e000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: 4d 03 3c 24 add (%r12),%r15 6: 4c 89 f8 mov %r15,%rax 9: 48 c1 e8 03 shr $0x3,%rax d: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) 12: 74 08 je 0x1c 14: 4c 89 ff mov %r15,%rdi 17: e8 a1 a4 fd fd call 0xfdfda4bd 1c: 4d 8b 3f mov (%r15),%r15 1f: 49 83 c7 30 add $0x30,%r15 23: 4c 89 f8 mov %r15,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 4c 89 ff mov %r15,%rdi 34: e8 84 a4 fd fd call 0xfdfda4bd 39: 4d 3b 37 cmp (%r15),%r14 3c: 74 19 je 0x57 3e: e8 .byte 0xe8 3f: 0a .byte 0xa