BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 0 P4D 0
Oops: 0010 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 24581 Comm: syz-executor.3 Not tainted 5.17.0-next-20220401-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:0x0
Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
RSP: 0018:ffffc90000007a60 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff888051b43690 RCX: 0000000000000100
RDX: 1ffff1100a3686d3 RSI: ffff8880742f93c0 RDI: ffff888025d01800
RBP: ffff888025d01800 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff87c81cb7 R11: 0000000000000000 R12: ffff8880742f93c0
R13: 0000000000000000 R14: ffff888025d01f60 R15: ffff88807e29492c
FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 0000000038788000 CR4: 00000000003506f0
Call Trace:
__tcp_transmit_skb+0x1098/0x38b0 net/ipv4/tcp_output.c:1371
tcp_transmit_skb net/ipv4/tcp_output.c:1420 [inline]
tcp_xmit_probe_skb+0x28c/0x320 net/ipv4/tcp_output.c:4009
tcp_write_wakeup+0x1bd/0x610 net/ipv4/tcp_output.c:4062
tcp_send_probe0+0x44/0x560 net/ipv4/tcp_output.c:4077
tcp_probe_timer net/ipv4/tcp_timer.c:398 [inline]
tcp_write_timer_handler+0x9ed/0xbc0 net/ipv4/tcp_timer.c:626
tcp_write_timer+0xa2/0x2b0 net/ipv4/tcp_timer.c:642
call_timer_fn+0x1a5/0x6b0 kernel/time/timer.c:1421
expire_timers kernel/time/timer.c:1466 [inline]
__run_timers.part.0+0x67c/0xa30 kernel/time/timer.c:1734
__run_timers kernel/time/timer.c:1715 [inline]
run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1747
__do_softirq+0x29b/0x9c2 kernel/softirq.c:558
invoke_softirq kernel/softirq.c:432 [inline]
__irq_exit_rcu+0x123/0x180 kernel/softirq.c:637
irq_exit_rcu+0x5/0x20 kernel/softirq.c:649
sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1097
asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:645
RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x60 kernel/kcov.c:200
Code: 81 e1 00 01 00 00 65 48 8b 14 25 00 70 02 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 ac 15 00 00 85 c0 74 2b 8b 82 88 15 00 00 <83> f8 02 75 20 48 8b 8a 90 15 00 00 8b 92 8c 15 00 00 48 8b 01 48
RSP: 0018:ffffc900085c76b0 EFLAGS: 00000246
RAX: 0000000000000000 RBX: 000000000001c27c RCX: 0000000000000000
RDX: ffff88804062d7c0 RSI: ffffffff81b0e22e RDI: 0000000000000003
RBP: 1ffff920010b8ed8 R08: 0000000000000000 R09: ffff88804062d7c7
R10: ffffffff81b0e218 R11: 0000000000000000 R12: ffff888023404210
R13: 00007fe379c08000 R14: 800000001c27c007 R15: 0000000000000000
vm_normal_page+0xde/0x2a0 mm/memory.c:651
zap_pte_range mm/memory.c:1370 [inline]
zap_pmd_range mm/memory.c:1497 [inline]
zap_pud_range mm/memory.c:1526 [inline]
zap_p4d_range mm/memory.c:1547 [inline]
unmap_page_range+0xc36/0x3fa0 mm/memory.c:1568
unmap_single_vma+0x198/0x310 mm/memory.c:1613
unmap_vmas+0x16b/0x2f0 mm/memory.c:1645
exit_mmap+0x1c4/0x4a0 mm/mmap.c:3148
__mmput+0x122/0x4b0 kernel/fork.c:1183
mmput+0x56/0x60 kernel/fork.c:1205
exit_mm kernel/exit.c:510 [inline]
do_exit+0xa12/0x2a00 kernel/exit.c:782
do_group_exit+0xd2/0x2f0 kernel/exit.c:925
get_signal+0x22df/0x24c0 kernel/signal.c:2904
arch_do_signal_or_restart+0x88/0x1a10 arch/x86/kernel/signal.c:867
exit_to_user_mode_loop kernel/entry/common.c:180 [inline]
exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:215
__syscall_exit_to_user_mode_work kernel/entry/common.c:297 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:308
do_syscall_64+0x42/0x80 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fe37a0add71
Code: Unable to access opcode bytes at RIP 0x7fe37a0add47.
RSP: 002b:00007fe37b11c0b0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6
RAX: fffffffffffffdfc RBX: 00007fe37a19bf60 RCX: 00007fe37a0add71
RDX: 00007fe37b11c0f0 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 00007fe37a0e308d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
R13: 00007ffc9f26904f R14: 00007fe37b11c300 R15: 0000000000022000
Modules linked in:
CR2: 0000000000000000
---[ end trace 0000000000000000 ]---
RIP: 0010:0x0
Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
RSP: 0018:ffffc90000007a60 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff888051b43690 RCX: 0000000000000100
RDX: 1ffff1100a3686d3 RSI: ffff8880742f93c0 RDI: ffff888025d01800
RBP: ffff888025d01800 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff87c81cb7 R11: 0000000000000000 R12: ffff8880742f93c0
R13: 0000000000000000 R14: ffff888025d01f60 R15: ffff88807e29492c
FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 0000000038788000 CR4: 00000000003506f0
----------------
Code disassembly (best guess):
0: 81 e1 00 01 00 00 and $0x100,%ecx
6: 65 48 8b 14 25 00 70 mov %gs:0x27000,%rdx
d: 02 00
f: a9 00 01 ff 00 test $0xff0100,%eax
14: 74 0e je 0x24
16: 85 c9 test %ecx,%ecx
18: 74 35 je 0x4f
1a: 8b 82 ac 15 00 00 mov 0x15ac(%rdx),%eax
20: 85 c0 test %eax,%eax
22: 74 2b je 0x4f
24: 8b 82 88 15 00 00 mov 0x1588(%rdx),%eax
* 2a: 83 f8 02 cmp $0x2,%eax <-- trapping instruction
2d: 75 20 jne 0x4f
2f: 48 8b 8a 90 15 00 00 mov 0x1590(%rdx),%rcx
36: 8b 92 8c 15 00 00 mov 0x158c(%rdx),%edx
3c: 48 8b 01 mov (%rcx),%rax
3f: 48 rex.W