BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0010) - not-present page PGD 3c435067 P4D 3c435067 PUD 3c436067 PMD 0 Oops: 0010 [#1] PREEMPT SMP KASAN CPU: 0 PID: 32655 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:0x0 Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. RSP: 0018:ffffc90003277858 EFLAGS: 00010286 RAX: 1ffffffff14be2c3 RBX: 00000000000005ff RCX: ffffffff8a5f1618 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0005453280 RBP: ffffc90003277ad0 R08: ffffffff81ac0c3c R09: fffff94000a8a651 R10: fffff94000a8a651 R11: 0000000000000000 R12: ffff88808a6bd310 R13: 0000000000000001 R14: ffff888030bc6000 R15: ffffea0005453280 FS: 0000000003130400(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 000000003c434000 CR4: 00000000001526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 00000000000006aa Call Trace: f2fs_update_meta_page+0x4b/0x380 fs/f2fs/segment.c:2465 do_checkpoint fs/f2fs/checkpoint.c:1515 [inline] f2fs_write_checkpoint+0x2f7a/0x5220 fs/f2fs/checkpoint.c:1676 f2fs_issue_checkpoint+0x308/0x4a0 __sync_filesystem fs/sync.c:39 [inline] sync_filesystem+0x19e/0x200 fs/sync.c:67 generic_shutdown_super+0x6e/0x2b0 fs/super.c:448 kill_block_super+0x79/0xd0 fs/super.c:1395 kill_f2fs_super+0x2f9/0x3c0 fs/f2fs/super.c:4444 deactivate_locked_super+0xa7/0xf0 fs/super.c:335 cleanup_mnt+0x462/0x510 fs/namespace.c:1137 task_work_run+0x146/0x1c0 kernel/task_work.c:164 tracehook_notify_resume include/linux/tracehook.h:189 [inline] exit_to_user_mode_loop kernel/entry/common.c:175 [inline] exit_to_user_mode_prepare+0x201/0x220 kernel/entry/common.c:209 __syscall_exit_to_user_mode_work kernel/entry/common.c:291 [inline] syscall_exit_to_user_mode+0x26/0x60 kernel/entry/common.c:302 do_syscall_64+0x4c/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x467a57 Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffc15c63408 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a57 RDX: 00007ffc15c634dc RSI: 0000000000000002 RDI: 00007ffc15c634d0 RBP: 00007ffc15c634d0 R08: 00000000ffffffff R09: 00007ffc15c632a0 R10: 00000000031318e3 R11: 0000000000000246 R12: 00000000004bee90 R13: 00007ffc15c645a0 R14: 0000000003131810 R15: 00007ffc15c645e0 Modules linked in: CR2: 0000000000000000 ---[ end trace b3716caaea01c5d1 ]--- RIP: 0010:0x0 Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. RSP: 0018:ffffc90003277858 EFLAGS: 00010286 RAX: 1ffffffff14be2c3 RBX: 00000000000005ff RCX: ffffffff8a5f1618 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0005453280 RBP: ffffc90003277ad0 R08: ffffffff81ac0c3c R09: fffff94000a8a651 R10: fffff94000a8a651 R11: 0000000000000000 R12: ffff88808a6bd310 R13: 0000000000000001 R14: ffff888030bc6000 R15: ffffea0005453280 FS: 0000000003130400(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 000000003c434000 CR4: 00000000001526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 00000000000006aa