================================================================== BUG: KASAN: null-ptr-deref in instrument_atomic_read_write include/linux/instrumented.h:96 [inline] BUG: KASAN: null-ptr-deref in atomic_fetch_add_relaxed include/linux/atomic/atomic-instrumented.h:252 [inline] BUG: KASAN: null-ptr-deref in __refcount_add include/linux/refcount.h:193 [inline] BUG: KASAN: null-ptr-deref in __refcount_inc include/linux/refcount.h:250 [inline] BUG: KASAN: null-ptr-deref in refcount_inc include/linux/refcount.h:267 [inline] BUG: KASAN: null-ptr-deref in sock_hold include/net/sock.h:777 [inline] BUG: KASAN: null-ptr-deref in unix_stream_bpf_update_proto+0xf8/0x33c net/unix/unix_bpf.c:171 Write of size 4 at addr 0000000000000080 by task syz-executor.4/21900 CPU: 1 PID: 21900 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-gaafe7ad77b91 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:291 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:298 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 print_report+0xe4/0x514 mm/kasan/report.c:478 kasan_report+0xd8/0x138 mm/kasan/report.c:588 kasan_check_range+0x254/0x294 mm/kasan/generic.c:187 __kasan_check_write+0x20/0x30 mm/kasan/shadow.c:37 instrument_atomic_read_write include/linux/instrumented.h:96 [inline] atomic_fetch_add_relaxed include/linux/atomic/atomic-instrumented.h:252 [inline] __refcount_add include/linux/refcount.h:193 [inline] __refcount_inc include/linux/refcount.h:250 [inline] refcount_inc include/linux/refcount.h:267 [inline] sock_hold include/net/sock.h:777 [inline] unix_stream_bpf_update_proto+0xf8/0x33c net/unix/unix_bpf.c:171 sock_map_init_proto net/core/sock_map.c:190 [inline] sock_map_link+0x874/0xbcc net/core/sock_map.c:294 sock_map_update_common+0xe8/0x51c net/core/sock_map.c:483 sock_map_update_elem_sys+0x378/0x674 net/core/sock_map.c:577 bpf_map_update_value+0x260/0x850 kernel/bpf/syscall.c:167 map_update_elem+0x588/0x6c0 kernel/bpf/syscall.c:1526 __sys_bpf+0x25c/0x5dc kernel/bpf/syscall.c:5371 __do_sys_bpf kernel/bpf/syscall.c:5487 [inline] __se_sys_bpf kernel/bpf/syscall.c:5485 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5485 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 ================================================================== Unable to handle kernel NULL pointer dereference at virtual address 0000000000000080 Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=00000001181c8000 [0000000000000080] pgd=080000010c192003, p4d=080000010c192003, pud=0800000114952003, pmd=0000000000000000 Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 21900 Comm: syz-executor.4 Tainted: G B 6.7.0-rc6-syzkaller-gaafe7ad77b91 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __lse_atomic_fetch_add_relaxed arch/arm64/include/asm/atomic_lse.h:62 [inline] pc : arch_atomic_fetch_add_relaxed arch/arm64/include/asm/atomic.h:49 [inline] pc : raw_atomic_fetch_add_relaxed include/linux/atomic/atomic-arch-fallback.h:747 [inline] pc : atomic_fetch_add_relaxed include/linux/atomic/atomic-instrumented.h:253 [inline] pc : __refcount_add include/linux/refcount.h:193 [inline] pc : __refcount_inc include/linux/refcount.h:250 [inline] pc : refcount_inc include/linux/refcount.h:267 [inline] pc : sock_hold include/net/sock.h:777 [inline] pc : unix_stream_bpf_update_proto+0x104/0x33c net/unix/unix_bpf.c:171 lr : arch_atomic_fetch_add_relaxed arch/arm64/include/asm/atomic.h:49 [inline] lr : raw_atomic_fetch_add_relaxed include/linux/atomic/atomic-arch-fallback.h:747 [inline] lr : atomic_fetch_add_relaxed include/linux/atomic/atomic-instrumented.h:253 [inline] lr : __refcount_add include/linux/refcount.h:193 [inline] lr : __refcount_inc include/linux/refcount.h:250 [inline] lr : refcount_inc include/linux/refcount.h:267 [inline] lr : sock_hold include/net/sock.h:777 [inline] lr : unix_stream_bpf_update_proto+0x100/0x33c net/unix/unix_bpf.c:171 sp : ffff800097987840 x29: ffff800097987840 x28: ffff0000ce9c7800 x27: 1ffff00012f30f18 x26: ffff8000894f9160 x25: ffff0000d10aa000 x24: 0000000000000000 x23: dfff800000000000 x22: ffff0000ce9c7800 x21: 0000000000000080 x20: ffff0000d10aa000 x19: ffff0000ce9c7800 x18: 1fffe0003682a5ce x17: ffff80008e4ed000 x16: ffff80008051bad0 x15: 0000000000000001 x14: 1ffff000122a4f38 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000040000 x10: 000000000003ffff x9 : ffff800098b4f000 x8 : 0000000000000001 x7 : 1fffe0003682a5cf x6 : ffff80008028df50 x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff8000801b85b0 x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: arch_atomic_fetch_add_relaxed arch/arm64/include/asm/atomic.h:49 [inline] raw_atomic_fetch_add_relaxed include/linux/atomic/atomic-arch-fallback.h:747 [inline] atomic_fetch_add_relaxed include/linux/atomic/atomic-instrumented.h:253 [inline] __refcount_add include/linux/refcount.h:193 [inline] __refcount_inc include/linux/refcount.h:250 [inline] refcount_inc include/linux/refcount.h:267 [inline] sock_hold include/net/sock.h:777 [inline] unix_stream_bpf_update_proto+0x104/0x33c net/unix/unix_bpf.c:171 sock_map_init_proto net/core/sock_map.c:190 [inline] sock_map_link+0x874/0xbcc net/core/sock_map.c:294 sock_map_update_common+0xe8/0x51c net/core/sock_map.c:483 sock_map_update_elem_sys+0x378/0x674 net/core/sock_map.c:577 bpf_map_update_value+0x260/0x850 kernel/bpf/syscall.c:167 map_update_elem+0x588/0x6c0 kernel/bpf/syscall.c:1526 __sys_bpf+0x25c/0x5dc kernel/bpf/syscall.c:5371 __do_sys_bpf kernel/bpf/syscall.c:5487 [inline] __se_sys_bpf kernel/bpf/syscall.c:5485 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5485 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 Code: 97a8a7bd d503201f 97a8b0a7 52800028 (b82802b6) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 97a8a7bd bl 0xfffffffffea29ef4 4: d503201f nop 8: 97a8b0a7 bl 0xfffffffffea2c2a4 c: 52800028 mov w8, #0x1 // #1 * 10: b82802b6 ldadd w8, w22, [x21] <-- trapping instruction