BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0010) - not-present page PGD 800000007ec72067 P4D 800000007ec72067 PUD 2819c067 PMD 0 Thread overran stack, or stack corrupted Oops: Oops: 0010 [#1] PREEMPT SMP KASAN PTI CPU: 1 UID: 0 PID: 5325 Comm: syz.1.7 Not tainted 6.11.0-rc5-next-20240827-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:0x0 Code: Unable to access opcode bytes at 0xffffffffffffffd6. RSP: 0018:ffffc900041a6d20 EFLAGS: 00010086 RAX: 0000000000000000 RBX: ffffc900041a7360 RCX: 0000000000040000 RDX: ffffc90009199000 RSI: 000000000002f826 RDI: 000000000002f827 RBP: ffffc900041a6de0 R08: ffffffff84b5002a R09: ffffffff81420825 R10: 0000000000000002 R11: ffffffff8bb167a0 R12: ffffffff8e4c6160 R13: 1ffff92000834da8 R14: dffffc0000000000 R15: ffffc900041a6d60 FS: 00007fbc403e86c0(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 000000001f4ec000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0010:error_entry+0x6d/0x140 arch/x86/entry/entry_64.S:1021 Code: f6 84 24 90 00 00 00 03 74 4e 0f 01 f8 0f 1f 00 66 90 0f 20 d8 0f 1f 44 00 00 48 25 ff e7 ff ff 0f 22 d8 66 90 b9 48 00 00 00 <65> 48 8b 15 bb 60 22 74 89 d0 48 c1 ea 20 0f 30 90 0f 1f 44 00 00 RSP: 0000:ffffc900041a6dd0 EFLAGS: 00010006 RAX: 000000001f4ec000 RBX: 0000000000000000 RCX: 0000000000000048 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000007fffffff RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 RIP: 8ab3:vsnprintf+0xf2/0x1da0 RSP: 0000:ffffffff814254e0 EFLAGS: ffffffff8e06cbcf ORIG_RAX: 0000000000000000 RAX: 03ffff24001069c0 RBX: 0000000000000008 RCX: ffffc900041a7118 RDX: ffffc90009199000 RSI: 0000000000000008 RDI: 000000007fffffff RBP: ffffffff8142558f R08: ffffffff8bb92a7d R09: 0000000000000000 R10: ffffc900041a7130 R11: fffff52000834e29 R12: 1ffff92000834e2f R13: ffffffff815f8eea R14: ffffc900041a6f68 R15: dffffc0000000000 Modules linked in: CR2: 0000000000000000 ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: f6 84 24 90 00 00 00 testb $0x3,0x90(%rsp) 7: 03 8: 74 4e je 0x58 a: 0f 01 f8 swapgs d: 0f 1f 00 nopl (%rax) 10: 66 90 xchg %ax,%ax 12: 0f 20 d8 mov %cr3,%rax 15: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 1a: 48 25 ff e7 ff ff and $0xffffffffffffe7ff,%rax 20: 0f 22 d8 mov %rax,%cr3 23: 66 90 xchg %ax,%ax 25: b9 48 00 00 00 mov $0x48,%ecx * 2a: 65 48 8b 15 bb 60 22 mov %gs:0x742260bb(%rip),%rdx # 0x742260ed <-- trapping instruction 31: 74 32: 89 d0 mov %edx,%eax 34: 48 c1 ea 20 shr $0x20,%rdx 38: 0f 30 wrmsr 3a: 90 nop 3b: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)