BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0010) - not-present page PGD 1e3180067 P4D 1e3180067 PUD 1e1792067 PMD 0 Oops: 0010 [#1] PREEMPT SMP KASAN CPU: 0 PID: 1846 Comm: syz-executor.0 Not tainted 5.4.274-syzkaller-00002-g6f97bd951d82 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 RIP: 0010:0x0 Code: Bad RIP value. RSP: 0018:ffff8881f6e09d18 EFLAGS: 00010202 RAX: ffffffff8154d7aa RBX: 0000000000000102 RCX: ffff8881ebdc5e80 RDX: 0000000080000102 RSI: 0000000000000000 RDI: ffff8881e40d31c0 RBP: ffff8881f6e09ec8 R08: ffffffff8154d3ee R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffffa5d0 R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881e40d31c0 FS: 00007fa8ec92e6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 00000001e46c4000 CR4: 00000000003406b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: call_timer_fn+0x36/0x390 kernel/time/timer.c:1448 expire_timers kernel/time/timer.c:1493 [inline] __run_timers+0x879/0xbe0 kernel/time/timer.c:1817 run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1830 __do_softirq+0x23b/0x6b7 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x195/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:538 [inline] smp_apic_timer_interrupt+0x11a/0x460 arch/x86/kernel/apic/apic.c:1149 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834 RIP: 0010:__raw_spin_unlock_irq include/linux/spinlock_api_smp.h:169 [inline] RIP: 0010:_raw_spin_unlock_irq+0x45/0x60 kernel/locking/spinlock.c:199 Code: 08 00 74 0c 48 c7 c7 90 3b eb 85 e8 75 12 43 fd 48 83 3d cd 2c 9a 01 00 74 29 48 89 df e8 e3 e7 fa fc 66 90 fb bf 01 00 00 00 66 d4 f3 fc 65 8b 05 ab 7e b1 7b 85 c0 74 02 5b c3 e8 34 45 af RSP: 0018:ffff8881e6be6d30 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000001 RBX: ffff8881f6e57b40 RCX: dffffc0000000000 RDX: 0000000040000002 RSI: 0000000000000000 RDI: 0000000000000001 RBP: ffff8881e6be6d90 R08: ffffffff81799989 R09: fffffbfff0c96e5b R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881f6e57b40 R13: ffff8881ebdc5e80 R14: dffffc0000000000 R15: 0000000000000000 finish_lock_switch kernel/sched/core.c:3347 [inline] finish_task_switch+0x130/0x590 kernel/sched/core.c:3447 context_switch kernel/sched/core.c:3611 [inline] __schedule+0xb0d/0x1320 kernel/sched/core.c:4307 preempt_schedule_irq+0xc7/0x140 kernel/sched/core.c:4558 retint_kernel+0x1b/0x1b RIP: 0010:unwind_get_return_address+0x2/0x80 arch/x86/kernel/unwind_orc.c:309 Code: c1 0f 8c fb fe ff ff 48 89 df 89 74 24 14 e8 75 64 64 00 48 8d 7c 24 40 8b 74 24 14 e9 e1 fe ff ff e8 42 34 0b 00 66 90 41 57 <41> 56 53 48 89 fb 49 be 00 00 00 00 00 fc ff df 48 89 f8 48 c1 e8 RSP: 0018:ffff8881e6be6ff0 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13 RAX: 68166950da55eb00 RBX: ffff8881e6be7000 RCX: 68166950da55eb00 RDX: dffffc0000000000 RSI: ffff8881e6be6b80 RDI: ffff8881e6be7000 RBP: ffff8881e6be7090 R08: dffffc0000000000 R09: ffff8881e6be7050 R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881ebdc5e80 R13: ffffffff8153b310 R14: ffff8881e6be70e0 R15: 0000000000000000 arch_stack_walk+0xf5/0x140 arch/x86/kernel/stacktrace.c:26 stack_trace_save+0x118/0x1c0 kernel/stacktrace.c:123 save_stack mm/kasan/common.c:70 [inline] set_track mm/kasan/common.c:78 [inline] __kasan_kmalloc+0x171/0x210 mm/kasan/common.c:529 slab_post_alloc_hook mm/slab.h:584 [inline] slab_alloc_node mm/slub.c:2829 [inline] slab_alloc mm/slub.c:2837 [inline] __kmalloc+0x105/0x2e0 mm/slub.c:3909 __kmalloc_node include/linux/slab.h:422 [inline] kmalloc_node include/linux/slab.h:599 [inline] __vmalloc_area_node mm/vmalloc.c:2419 [inline] __vmalloc_node_range+0x2bd/0x710 mm/vmalloc.c:2499 kasan_module_alloc+0x6b/0xb0 mm/kasan/common.c:626 module_alloc+0x97/0xb0 arch/x86/kernel/module.c:80 bpf_jit_binary_alloc+0x9f/0x1a0 kernel/bpf/core.c:826 bpf_int_jit_compile+0x8169/0x8c40 arch/x86/net/bpf_jit_comp.c:1179 bpf_prog_select_runtime+0x654/0x900 kernel/bpf/core.c:1782 bpf_prog_load kernel/bpf/syscall.c:1728 [inline] __do_sys_bpf kernel/bpf/syscall.c:2891 [inline] __se_sys_bpf+0x8193/0xbcb0 kernel/bpf/syscall.c:2849 do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x5c/0xc1 RIP: 0033:0x7fa8ed5d4ea9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa8ec92e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007fa8ed70c050 RCX: 00007fa8ed5d4ea9 RDX: 0000000000000080 RSI: 0000000020000600 RDI: 0000000000000005 RBP: 00007fa8ed643ff4 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000006e R14: 00007fa8ed70c050 R15: 00007fff456b57f8 Modules linked in: CR2: 0000000000000000 ---[ end trace 4bedf552415a5562 ]--- RIP: 0010:0x0 Code: Bad RIP value. RSP: 0018:ffff8881f6e09d18 EFLAGS: 00010202 RAX: ffffffff8154d7aa RBX: 0000000000000102 RCX: ffff8881ebdc5e80 RDX: 0000000080000102 RSI: 0000000000000000 RDI: ffff8881e40d31c0 RBP: ffff8881f6e09ec8 R08: ffffffff8154d3ee R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffffa5d0 R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881e40d31c0 FS: 00007fa8ec92e6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 00000001e46c4000 CR4: 00000000003406b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 ---------------- Code disassembly (best guess): 0: 08 00 or %al,(%rax) 2: 74 0c je 0x10 4: 48 c7 c7 90 3b eb 85 mov $0xffffffff85eb3b90,%rdi b: e8 75 12 43 fd call 0xfd431285 10: 48 83 3d cd 2c 9a 01 cmpq $0x0,0x19a2ccd(%rip) # 0x19a2ce5 17: 00 18: 74 29 je 0x43 1a: 48 89 df mov %rbx,%rdi 1d: e8 e3 e7 fa fc call 0xfcfae805 22: 66 90 xchg %ax,%ax 24: fb sti 25: bf 01 00 00 00 mov $0x1,%edi * 2a: e8 66 d4 f3 fc call 0xfcf3d495 <-- trapping instruction 2f: 65 8b 05 ab 7e b1 7b mov %gs:0x7bb17eab(%rip),%eax # 0x7bb17ee1 36: 85 c0 test %eax,%eax 38: 74 02 je 0x3c 3a: 5b pop %rbx 3b: c3 ret 3c: e8 .byte 0xe8 3d: 34 45 xor $0x45,%al 3f: af scas %es:(%rdi),%eax