general protection fault, probably for non-canonical address 0xdffffc00000000e9: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000748-0x000000000000074f] CPU: 0 PID: 46 Comm: kswapd0 Not tainted 5.15.173-syzkaller-00161-gb4bd207b0380 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:f2fs_release_page+0x23a/0x7c0 fs/f2fs/data.c:3728 Code: 00 4c 03 23 4c 89 e0 48 c1 e8 03 42 80 3c 30 00 74 08 4c 89 e7 e8 56 f1 8a ff bb 48 07 00 00 49 03 1c 24 48 89 d8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 0f 85 3c 05 00 00 44 8b 23 bb 00 00 00 40 be RSP: 0018:ffffc900006fee48 EFLAGS: 00010202 RAX: 00000000000000e9 RBX: 0000000000000748 RCX: ffff88810538a780 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc900006fee88 R08: ffffffff8227ccbc R09: fffff94000c1ddd9 R10: 0000000000000000 R11: dffffc0000000001 R12: ffff888127dc33c8 R13: 4000000000002005 R14: dffffc0000000000 R15: ffffea00060eeec0 FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4bf9bd2000 CR3: 0000000182fd2000 CR4: 00000000003506b0 DR0: 0000000000002800 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: try_to_release_page+0x194/0x1f0 mm/filemap.c:4048 shrink_page_list+0x1fd4/0x5c50 mm/vmscan.c:1763 shrink_inactive_list mm/vmscan.c:2305 [inline] shrink_list mm/vmscan.c:2550 [inline] shrink_lruvec+0x17ec/0x4580 mm/vmscan.c:5755 shrink_node_memcgs mm/vmscan.c:5947 [inline] shrink_node+0x1083/0x2550 mm/vmscan.c:5977 kswapd_shrink_node mm/vmscan.c:6727 [inline] balance_pgdat+0x15e1/0x2f50 mm/vmscan.c:6917 kswapd+0x698/0xd60 mm/vmscan.c:7176 kthread+0x421/0x510 kernel/kthread.c:337 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 Modules linked in: ---[ end trace ad35c56d9ed9fb25 ]--- RIP: 0010:f2fs_release_page+0x23a/0x7c0 fs/f2fs/data.c:3728 Code: 00 4c 03 23 4c 89 e0 48 c1 e8 03 42 80 3c 30 00 74 08 4c 89 e7 e8 56 f1 8a ff bb 48 07 00 00 49 03 1c 24 48 89 d8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 0f 85 3c 05 00 00 44 8b 23 bb 00 00 00 40 be RSP: 0018:ffffc900006fee48 EFLAGS: 00010202 RAX: 00000000000000e9 RBX: 0000000000000748 RCX: ffff88810538a780 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc900006fee88 R08: ffffffff8227ccbc R09: fffff94000c1ddd9 R10: 0000000000000000 R11: dffffc0000000001 R12: ffff888127dc33c8 R13: 4000000000002005 R14: dffffc0000000000 R15: ffffea00060eeec0 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020356030 CR3: 0000000114b66000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 4c 03 23 add %cl,0x23(%rbx,%rax,1) 4: 4c 89 e0 mov %r12,%rax 7: 48 c1 e8 03 shr $0x3,%rax b: 42 80 3c 30 00 cmpb $0x0,(%rax,%r14,1) 10: 74 08 je 0x1a 12: 4c 89 e7 mov %r12,%rdi 15: e8 56 f1 8a ff call 0xff8af170 1a: bb 48 07 00 00 mov $0x748,%ebx 1f: 49 03 1c 24 add (%r12),%rbx 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 0f b6 04 30 movzbl (%rax,%r14,1),%eax <-- trapping instruction 2f: 84 c0 test %al,%al 31: 0f 85 3c 05 00 00 jne 0x573 37: 44 8b 23 mov (%rbx),%r12d 3a: bb 00 00 00 40 mov $0x40000000,%ebx 3f: be .byte 0xbe