BUG: kernel NULL pointer dereference, address: 0000000000000010 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 0 UID: 0 PID: 12 Comm: kworker/u4:1 Not tainted 6.13.0-syzkaller-09760-g69e858e0b8b2 #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: bat_events batadv_mcast_mla_update RIP: 0010:find_stack lib/stackdepot.c:553 [inline] RIP: 0010:stack_depot_save_flags+0x1b4/0x940 lib/stackdepot.c:618 Code: 00 31 f6 48 89 d5 4c 89 cb e8 48 2c c8 ff 49 89 d9 8b 5c 24 04 48 89 ea 4c 8b 44 24 08 45 85 e4 75 67 4d 8b 3f 49 39 d7 74 5c <45> 39 77 10 75 f2 45 39 4f 14 75 ec 31 c0 49 8b 0c c0 49 3b 4c c7 RSP: 0018:ffffc900001e7600 EFLAGS: 00010207 RAX: ffff88805e200000 RBX: 0000000000000001 RCX: 00000000008a33a0 RDX: ffff88805eaa33a0 RSI: 0000000000000003 RDI: 00000000d592118f RBP: 00000000a8edfa6c R08: ffffc900001e7670 R09: 0000000000000009 R10: ffffc900001e7530 R11: ffffffff81ab2f20 R12: 0000000000000020 R13: 0000000000000009 R14: 000000004a38a33a R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff88801fc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000010 CR3: 000000001eb26000 CR4: 0000000000352ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: kasan_save_stack mm/kasan/common.c:48 [inline] kasan_save_track+0x51/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4325 kmalloc_noprof include/linux/slab.h:901 [inline] batadv_mcast_mla_softif_get_ipv4 net/batman-adv/multicast.c:404 [inline] batadv_mcast_mla_softif_get net/batman-adv/multicast.c:531 [inline] __batadv_mcast_mla_update net/batman-adv/multicast.c:911 [inline] batadv_mcast_mla_update+0xfad/0x4030 net/batman-adv/multicast.c:948 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3317 worker_thread+0x870/0xd30 kernel/workqueue.c:3398 kthread+0x7a9/0x920 kernel/kthread.c:464 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Modules linked in: CR2: 0000000000000010 ---[ end trace 0000000000000000 ]--- RIP: 0010:find_stack lib/stackdepot.c:553 [inline] RIP: 0010:stack_depot_save_flags+0x1b4/0x940 lib/stackdepot.c:618 Code: 00 31 f6 48 89 d5 4c 89 cb e8 48 2c c8 ff 49 89 d9 8b 5c 24 04 48 89 ea 4c 8b 44 24 08 45 85 e4 75 67 4d 8b 3f 49 39 d7 74 5c <45> 39 77 10 75 f2 45 39 4f 14 75 ec 31 c0 49 8b 0c c0 49 3b 4c c7 RSP: 0018:ffffc900001e7600 EFLAGS: 00010207 RAX: ffff88805e200000 RBX: 0000000000000001 RCX: 00000000008a33a0 RDX: ffff88805eaa33a0 RSI: 0000000000000003 RDI: 00000000d592118f RBP: 00000000a8edfa6c R08: ffffc900001e7670 R09: 0000000000000009 R10: ffffc900001e7530 R11: ffffffff81ab2f20 R12: 0000000000000020 R13: 0000000000000009 R14: 000000004a38a33a R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff88801fc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000010 CR3: 000000001eb26000 CR4: 0000000000352ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 31 add %dh,(%rcx) 2: f6 48 89 d5 testb $0xd5,-0x77(%rax) 6: 4c 89 cb mov %r9,%rbx 9: e8 48 2c c8 ff call 0xffc82c56 e: 49 89 d9 mov %rbx,%r9 11: 8b 5c 24 04 mov 0x4(%rsp),%ebx 15: 48 89 ea mov %rbp,%rdx 18: 4c 8b 44 24 08 mov 0x8(%rsp),%r8 1d: 45 85 e4 test %r12d,%r12d 20: 75 67 jne 0x89 22: 4d 8b 3f mov (%r15),%r15 25: 49 39 d7 cmp %rdx,%r15 28: 74 5c je 0x86 * 2a: 45 39 77 10 cmp %r14d,0x10(%r15) <-- trapping instruction 2e: 75 f2 jne 0x22 30: 45 39 4f 14 cmp %r9d,0x14(%r15) 34: 75 ec jne 0x22 36: 31 c0 xor %eax,%eax 38: 49 8b 0c c0 mov (%r8,%rax,8),%rcx 3c: 49 rex.WB 3d: 3b .byte 0x3b 3e: 4c rex.WR 3f: c7 .byte 0xc7