BUG: kernel NULL pointer dereference, address: 0000000000000077 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP CPU: 0 PID: 10214 Comm: syz-executor.2 Not tainted 5.10.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:arch_atomic64_read arch/x86/include/asm/atomic64_64.h:22 [inline] RIP: 0010:atomic64_read include/asm-generic/atomic-instrumented.h:838 [inline] RIP: 0010:atomic_long_read include/asm-generic/atomic-long.h:29 [inline] RIP: 0010:filp_close+0x4/0x60 fs/open.c:1274 Code: 66 0f 1f 44 00 00 8b 86 84 00 00 00 25 e3 7f ff ff 0d 00 00 20 00 89 86 84 00 00 00 31 c0 c3 0f 1f 80 00 00 00 00 41 54 55 53 <48> 8b 47 78 48 85 c0 0f 84 bf f9 37 02 48 8b 47 28 45 31 e4 48 89 RSP: 0018:ffffc90002ddbd28 EFLAGS: 00010286 RAX: 0000000000000000 RBX: ffff88810dcb09c0 RCX: ffff88811e87ba20 RDX: ffff88811ea53800 RSI: ffff88810dcb09c0 RDI: ffffffffffffffff RBP: ffffffffffffffff R08: 0000000000000001 R09: 0000000000000001 R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000000 R15: ffff88811e87eb80 FS: 0000000000000000(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000077 CR3: 000000000508a000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: close_files fs/file.c:402 [inline] put_files_struct+0x67/0xc0 fs/file.c:430 do_exit+0x392/0xd40 kernel/exit.c:804 do_group_exit+0x34/0xb0 kernel/exit.c:906 get_signal+0x180/0xdb0 kernel/signal.c:2758 arch_do_signal+0x2b/0x8d0 arch/x86/kernel/signal.c:811 exit_to_user_mode_loop kernel/entry/common.c:161 [inline] exit_to_user_mode_prepare+0xec/0x1c0 kernel/entry/common.c:191 syscall_exit_to_user_mode+0x38/0x260 kernel/entry/common.c:266 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45e149 Code: Unable to access opcode bytes at RIP 0x45e11f. RSP: 002b:00007f637e3f9cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 000000000119bf88 RCX: 000000000045e149 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000119bf8c RBP: 000000000119bf80 R08: 0000000000000018 R09: 0000000000000000 R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000119bf8c R13: 00007fffd7515bbf R14: 00007f637e3fa9c0 R15: 000000000119bf8c Modules linked in: CR2: 0000000000000077 ---[ end trace b7138e616e0159ea ]--- RIP: 0010:arch_atomic64_read arch/x86/include/asm/atomic64_64.h:22 [inline] RIP: 0010:atomic64_read include/asm-generic/atomic-instrumented.h:838 [inline] RIP: 0010:atomic_long_read include/asm-generic/atomic-long.h:29 [inline] RIP: 0010:filp_close+0x4/0x60 fs/open.c:1274 Code: 66 0f 1f 44 00 00 8b 86 84 00 00 00 25 e3 7f ff ff 0d 00 00 20 00 89 86 84 00 00 00 31 c0 c3 0f 1f 80 00 00 00 00 41 54 55 53 <48> 8b 47 78 48 85 c0 0f 84 bf f9 37 02 48 8b 47 28 45 31 e4 48 89 RSP: 0018:ffffc90002ddbd28 EFLAGS: 00010286 RAX: 0000000000000000 RBX: ffff88810dcb09c0 RCX: ffff88811e87ba20 RDX: ffff88811ea53800 RSI: ffff88810dcb09c0 RDI: ffffffffffffffff RBP: ffffffffffffffff R08: 0000000000000001 R09: 0000000000000001 R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000000 R15: ffff88811e87eb80 FS: 0000000000000000(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000077 CR3: 000000000508a000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400