BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0010) - not-present page PGD 0 P4D 0 Oops: 0010 [#1] PREEMPT SMP KASAN CPU: 0 PID: 24581 Comm: syz-executor.3 Not tainted 5.17.0-next-20220401-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:0x0 Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. RSP: 0018:ffffc90000007a60 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: ffff888051b43690 RCX: 0000000000000100 RDX: 1ffff1100a3686d3 RSI: ffff8880742f93c0 RDI: ffff888025d01800 RBP: ffff888025d01800 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffff87c81cb7 R11: 0000000000000000 R12: ffff8880742f93c0 R13: 0000000000000000 R14: ffff888025d01f60 R15: ffff88807e29492c FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 0000000038788000 CR4: 00000000003506f0 Call Trace: __tcp_transmit_skb+0x1098/0x38b0 net/ipv4/tcp_output.c:1371 tcp_transmit_skb net/ipv4/tcp_output.c:1420 [inline] tcp_xmit_probe_skb+0x28c/0x320 net/ipv4/tcp_output.c:4009 tcp_write_wakeup+0x1bd/0x610 net/ipv4/tcp_output.c:4062 tcp_send_probe0+0x44/0x560 net/ipv4/tcp_output.c:4077 tcp_probe_timer net/ipv4/tcp_timer.c:398 [inline] tcp_write_timer_handler+0x9ed/0xbc0 net/ipv4/tcp_timer.c:626 tcp_write_timer+0xa2/0x2b0 net/ipv4/tcp_timer.c:642 call_timer_fn+0x1a5/0x6b0 kernel/time/timer.c:1421 expire_timers kernel/time/timer.c:1466 [inline] __run_timers.part.0+0x67c/0xa30 kernel/time/timer.c:1734 __run_timers kernel/time/timer.c:1715 [inline] run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1747 __do_softirq+0x29b/0x9c2 kernel/softirq.c:558 invoke_softirq kernel/softirq.c:432 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:637 irq_exit_rcu+0x5/0x20 kernel/softirq.c:649 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1097 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:645 RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x60 kernel/kcov.c:200 Code: 81 e1 00 01 00 00 65 48 8b 14 25 00 70 02 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 ac 15 00 00 85 c0 74 2b 8b 82 88 15 00 00 <83> f8 02 75 20 48 8b 8a 90 15 00 00 8b 92 8c 15 00 00 48 8b 01 48 RSP: 0018:ffffc900085c76b0 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 000000000001c27c RCX: 0000000000000000 RDX: ffff88804062d7c0 RSI: ffffffff81b0e22e RDI: 0000000000000003 RBP: 1ffff920010b8ed8 R08: 0000000000000000 R09: ffff88804062d7c7 R10: ffffffff81b0e218 R11: 0000000000000000 R12: ffff888023404210 R13: 00007fe379c08000 R14: 800000001c27c007 R15: 0000000000000000 vm_normal_page+0xde/0x2a0 mm/memory.c:651 zap_pte_range mm/memory.c:1370 [inline] zap_pmd_range mm/memory.c:1497 [inline] zap_pud_range mm/memory.c:1526 [inline] zap_p4d_range mm/memory.c:1547 [inline] unmap_page_range+0xc36/0x3fa0 mm/memory.c:1568 unmap_single_vma+0x198/0x310 mm/memory.c:1613 unmap_vmas+0x16b/0x2f0 mm/memory.c:1645 exit_mmap+0x1c4/0x4a0 mm/mmap.c:3148 __mmput+0x122/0x4b0 kernel/fork.c:1183 mmput+0x56/0x60 kernel/fork.c:1205 exit_mm kernel/exit.c:510 [inline] do_exit+0xa12/0x2a00 kernel/exit.c:782 do_group_exit+0xd2/0x2f0 kernel/exit.c:925 get_signal+0x22df/0x24c0 kernel/signal.c:2904 arch_do_signal_or_restart+0x88/0x1a10 arch/x86/kernel/signal.c:867 exit_to_user_mode_loop kernel/entry/common.c:180 [inline] exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:215 __syscall_exit_to_user_mode_work kernel/entry/common.c:297 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:308 do_syscall_64+0x42/0x80 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fe37a0add71 Code: Unable to access opcode bytes at RIP 0x7fe37a0add47. RSP: 002b:00007fe37b11c0b0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6 RAX: fffffffffffffdfc RBX: 00007fe37a19bf60 RCX: 00007fe37a0add71 RDX: 00007fe37b11c0f0 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fe37a0e308d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 R13: 00007ffc9f26904f R14: 00007fe37b11c300 R15: 0000000000022000 Modules linked in: CR2: 0000000000000000 ---[ end trace 0000000000000000 ]--- RIP: 0010:0x0 Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. RSP: 0018:ffffc90000007a60 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: ffff888051b43690 RCX: 0000000000000100 RDX: 1ffff1100a3686d3 RSI: ffff8880742f93c0 RDI: ffff888025d01800 RBP: ffff888025d01800 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffff87c81cb7 R11: 0000000000000000 R12: ffff8880742f93c0 R13: 0000000000000000 R14: ffff888025d01f60 R15: ffff88807e29492c FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 0000000038788000 CR4: 00000000003506f0 ---------------- Code disassembly (best guess): 0: 81 e1 00 01 00 00 and $0x100,%ecx 6: 65 48 8b 14 25 00 70 mov %gs:0x27000,%rdx d: 02 00 f: a9 00 01 ff 00 test $0xff0100,%eax 14: 74 0e je 0x24 16: 85 c9 test %ecx,%ecx 18: 74 35 je 0x4f 1a: 8b 82 ac 15 00 00 mov 0x15ac(%rdx),%eax 20: 85 c0 test %eax,%eax 22: 74 2b je 0x4f 24: 8b 82 88 15 00 00 mov 0x1588(%rdx),%eax * 2a: 83 f8 02 cmp $0x2,%eax <-- trapping instruction 2d: 75 20 jne 0x4f 2f: 48 8b 8a 90 15 00 00 mov 0x1590(%rdx),%rcx 36: 8b 92 8c 15 00 00 mov 0x158c(%rdx),%edx 3c: 48 8b 01 mov (%rcx),%rax 3f: 48 rex.W