BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 1e3180067 P4D 1e3180067 PUD 1e1792067 PMD 0
Oops: 0010 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 1846 Comm: syz-executor.0 Not tainted 5.4.274-syzkaller-00002-g6f97bd951d82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
RIP: 0010:0x0
Code: Bad RIP value.
RSP: 0018:ffff8881f6e09d18 EFLAGS: 00010202
RAX: ffffffff8154d7aa RBX: 0000000000000102 RCX: ffff8881ebdc5e80
RDX: 0000000080000102 RSI: 0000000000000000 RDI: ffff8881e40d31c0
RBP: ffff8881f6e09ec8 R08: ffffffff8154d3ee R09: 0000000000000003
R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffffa5d0
R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881e40d31c0
FS: 00007fa8ec92e6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 00000001e46c4000 CR4: 00000000003406b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
call_timer_fn+0x36/0x390 kernel/time/timer.c:1448
expire_timers kernel/time/timer.c:1493 [inline]
__run_timers+0x879/0xbe0 kernel/time/timer.c:1817
run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1830
__do_softirq+0x23b/0x6b7 kernel/softirq.c:292
invoke_softirq kernel/softirq.c:373 [inline]
irq_exit+0x195/0x1c0 kernel/softirq.c:413
exiting_irq arch/x86/include/asm/apic.h:538 [inline]
smp_apic_timer_interrupt+0x11a/0x460 arch/x86/kernel/apic/apic.c:1149
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834
RIP: 0010:__raw_spin_unlock_irq include/linux/spinlock_api_smp.h:169 [inline]
RIP: 0010:_raw_spin_unlock_irq+0x45/0x60 kernel/locking/spinlock.c:199
Code: 08 00 74 0c 48 c7 c7 90 3b eb 85 e8 75 12 43 fd 48 83 3d cd 2c 9a 01 00 74 29 48 89 df e8 e3 e7 fa fc 66 90 fb bf 01 00 00 00 66 d4 f3 fc 65 8b 05 ab 7e b1 7b 85 c0 74 02 5b c3 e8 34 45 af
RSP: 0018:ffff8881e6be6d30 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13
RAX: 0000000000000001 RBX: ffff8881f6e57b40 RCX: dffffc0000000000
RDX: 0000000040000002 RSI: 0000000000000000 RDI: 0000000000000001
RBP: ffff8881e6be6d90 R08: ffffffff81799989 R09: fffffbfff0c96e5b
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881f6e57b40
R13: ffff8881ebdc5e80 R14: dffffc0000000000 R15: 0000000000000000
finish_lock_switch kernel/sched/core.c:3347 [inline]
finish_task_switch+0x130/0x590 kernel/sched/core.c:3447
context_switch kernel/sched/core.c:3611 [inline]
__schedule+0xb0d/0x1320 kernel/sched/core.c:4307
preempt_schedule_irq+0xc7/0x140 kernel/sched/core.c:4558
retint_kernel+0x1b/0x1b
RIP: 0010:unwind_get_return_address+0x2/0x80 arch/x86/kernel/unwind_orc.c:309
Code: c1 0f 8c fb fe ff ff 48 89 df 89 74 24 14 e8 75 64 64 00 48 8d 7c 24 40 8b 74 24 14 e9 e1 fe ff ff e8 42 34 0b 00 66 90 41 57 <41> 56 53 48 89 fb 49 be 00 00 00 00 00 fc ff df 48 89 f8 48 c1 e8
RSP: 0018:ffff8881e6be6ff0 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13
RAX: 68166950da55eb00 RBX: ffff8881e6be7000 RCX: 68166950da55eb00
RDX: dffffc0000000000 RSI: ffff8881e6be6b80 RDI: ffff8881e6be7000
RBP: ffff8881e6be7090 R08: dffffc0000000000 R09: ffff8881e6be7050
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881ebdc5e80
R13: ffffffff8153b310 R14: ffff8881e6be70e0 R15: 0000000000000000
arch_stack_walk+0xf5/0x140 arch/x86/kernel/stacktrace.c:26
stack_trace_save+0x118/0x1c0 kernel/stacktrace.c:123
save_stack mm/kasan/common.c:70 [inline]
set_track mm/kasan/common.c:78 [inline]
__kasan_kmalloc+0x171/0x210 mm/kasan/common.c:529
slab_post_alloc_hook mm/slab.h:584 [inline]
slab_alloc_node mm/slub.c:2829 [inline]
slab_alloc mm/slub.c:2837 [inline]
__kmalloc+0x105/0x2e0 mm/slub.c:3909
__kmalloc_node include/linux/slab.h:422 [inline]
kmalloc_node include/linux/slab.h:599 [inline]
__vmalloc_area_node mm/vmalloc.c:2419 [inline]
__vmalloc_node_range+0x2bd/0x710 mm/vmalloc.c:2499
kasan_module_alloc+0x6b/0xb0 mm/kasan/common.c:626
module_alloc+0x97/0xb0 arch/x86/kernel/module.c:80
bpf_jit_binary_alloc+0x9f/0x1a0 kernel/bpf/core.c:826
bpf_int_jit_compile+0x8169/0x8c40 arch/x86/net/bpf_jit_comp.c:1179
bpf_prog_select_runtime+0x654/0x900 kernel/bpf/core.c:1782
bpf_prog_load kernel/bpf/syscall.c:1728 [inline]
__do_sys_bpf kernel/bpf/syscall.c:2891 [inline]
__se_sys_bpf+0x8193/0xbcb0 kernel/bpf/syscall.c:2849
do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
RIP: 0033:0x7fa8ed5d4ea9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fa8ec92e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007fa8ed70c050 RCX: 00007fa8ed5d4ea9
RDX: 0000000000000080 RSI: 0000000020000600 RDI: 0000000000000005
RBP: 00007fa8ed643ff4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000006e R14: 00007fa8ed70c050 R15: 00007fff456b57f8
Modules linked in:
CR2: 0000000000000000
---[ end trace 4bedf552415a5562 ]---
RIP: 0010:0x0
Code: Bad RIP value.
RSP: 0018:ffff8881f6e09d18 EFLAGS: 00010202
RAX: ffffffff8154d7aa RBX: 0000000000000102 RCX: ffff8881ebdc5e80
RDX: 0000000080000102 RSI: 0000000000000000 RDI: ffff8881e40d31c0
RBP: ffff8881f6e09ec8 R08: ffffffff8154d3ee R09: 0000000000000003
R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffffa5d0
R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881e40d31c0
FS: 00007fa8ec92e6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 00000001e46c4000 CR4: 00000000003406b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
----------------
Code disassembly (best guess):
0: 08 00 or %al,(%rax)
2: 74 0c je 0x10
4: 48 c7 c7 90 3b eb 85 mov $0xffffffff85eb3b90,%rdi
b: e8 75 12 43 fd call 0xfd431285
10: 48 83 3d cd 2c 9a 01 cmpq $0x0,0x19a2ccd(%rip) # 0x19a2ce5
17: 00
18: 74 29 je 0x43
1a: 48 89 df mov %rbx,%rdi
1d: e8 e3 e7 fa fc call 0xfcfae805
22: 66 90 xchg %ax,%ax
24: fb sti
25: bf 01 00 00 00 mov $0x1,%edi
* 2a: e8 66 d4 f3 fc call 0xfcf3d495 <-- trapping instruction
2f: 65 8b 05 ab 7e b1 7b mov %gs:0x7bb17eab(%rip),%eax # 0x7bb17ee1
36: 85 c0 test %eax,%eax
38: 74 02 je 0x3c
3a: 5b pop %rbx
3b: c3 ret
3c: e8 .byte 0xe8
3d: 34 45 xor $0x45,%al
3f: af scas %es:(%rdi),%eax