Modules linked in: BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0010) - not-present page PGD 800000001fadb067 P4D 800000001fadb067 PUD 60f61067 PMD 0 Oops: Oops: 0010 [#2] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 5497 Comm: syz.1.52 Tainted: G D 6.11.0-rc5-next-20240827-syzkaller #0 Tainted: [D]=DIE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Oops: general protection fault, probably for non-canonical address 0xdfffc5000401cfd0: 0000 [#3] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 5497 Comm: syz.1.52 Tainted: G D 6.11.0-rc5-next-20240827-syzkaller #0 Tainted: [D]=DIE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:format_decode+0x4f1/0x1bb0 Code: 85 ed 0f 00 00 48 c7 c3 00 ff ff ff 48 8b 44 24 10 48 23 18 e9 65 03 00 00 e8 0b c2 da f5 eb 05 e8 04 c2 da f5 48 8b 44 24 30 <42> 80 3c 30 00 74 0d 48 8d bc 24 80 00 00 00 e8 3b 9a 43 f6 4c 89 RSP: 0018:ffffc9000401cee0 EFLAGS: 00010093 RAX: ffffc9000401cfd0 RBX: ffffffff8c086305 RCX: ffff888020cdbc00 RDX: 0000000000000000 RSI: ffffffff90033ac0 RDI: 0000000000000025 RBP: ffffc9000401cfd0 R08: 0000000000000001 R09: ffffffff8bb9496a R10: 0000000000000002 R11: ffff888020cdbc00 R12: ffffffff8c0862c0 R13: ffffffff8c086305 R14: dffffc0000000000 R15: 0000000000000025 FS: 0000555566c61500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000401dac8 CR3: 000000001f388000 CR4: 00000000003526f0 Call Trace: __pv_queued_spin_lock_slowpath+0x5b5/0xdb0 kernel/locking/qspinlock.c:415 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:584 [inline] queued_spin_lock_slowpath+0x18/0x30 arch/x86/include/asm/qspinlock.h:51 queued_spin_lock include/asm-generic/qspinlock.h:114 [inline] oops_begin+0xaf/0xc0 arch/x86/kernel/dumpstack.c:347 page_fault_oops+0x21d/0xcc0 arch/x86/mm/fault.c:703 handle_page_fault arch/x86/mm/fault.c:1481 [inline] exc_page_fault+0x5ed/0x8c0 arch/x86/mm/fault.c:1539 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0010:0x18 Code: Unable to access opcode bytes at 0xffffffffffffffee. RSP: 0018:ffffc9000401d418 EFLAGS: 00010093 RAX: ffffffff81a3095f RBX: 0000000000000000 RCX: ffff888020cdbc00 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffff81a307e6 R09: 1ffffffff20386c5 R10: dffffc0000000000 R11: fffffbfff20386c6 R12: 000000000000000d R13: 1ffff92000803a98 R14: 000000000000003c R15: ffffffff8bc9edaf Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0000:0x1ffff92000803e38 Code: Unable to access opcode bytes at 0x1ffff92000803e0e. RSP: 0000:1ffff92000803e38 EFLAGS: 00000093 ORIG_RAX: 0000000000000000 RAX: ffffc9000401f220 RBX: ffffffff8196ced0 RCX: 16d4dc6ba8038400 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc9000401f240 RBP: ffffffff8e092889 R08: ffffc90000000001 R09: 0000000000000000 R10: ffffc90000000000 R11: fffff52000803e44 R12: 0000000045e0360e R13: 1ffff92000803e10 R14: ffffffff8bc9e950 R15: ffffffff8e088a62 FS: 0000555566c61500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0000 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffee CR3: 000000001f388000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: 85 ed test %ebp,%ebp 2: 0f 00 00 sldt (%rax) 5: 48 c7 c3 00 ff ff ff mov $0xffffffffffffff00,%rbx c: 48 8b 44 24 10 mov 0x10(%rsp),%rax 11: 48 23 18 and (%rax),%rbx 14: e9 65 03 00 00 jmp 0x37e 19: e8 0b c2 da f5 call 0xf5dac229 1e: eb 05 jmp 0x25 20: e8 04 c2 da f5 call 0xf5dac229 25: 48 8b 44 24 30 mov 0x30(%rsp),%rax * 2a: 42 80 3c 30 00 cmpb $0x0,(%rax,%r14,1) <-- trapping instruction 2f: 74 0d je 0x3e 31: 48 8d bc 24 80 00 00 lea 0x80(%rsp),%rdi 38: 00 39: e8 3b 9a 43 f6 call 0xf6439a79 3e: 4c rex.WR 3f: 89 .byte 0x89