================================================================== BUG: KASAN: null-ptr-deref in instrument_atomic_read_write include/linux/instrumented.h:96 [inline] BUG: KASAN: null-ptr-deref in atomic_fetch_add_relaxed include/linux/atomic/atomic-instrumented.h:252 [inline] BUG: KASAN: null-ptr-deref in __refcount_add include/linux/refcount.h:193 [inline] BUG: KASAN: null-ptr-deref in __refcount_inc include/linux/refcount.h:250 [inline] BUG: KASAN: null-ptr-deref in refcount_inc include/linux/refcount.h:267 [inline] BUG: KASAN: null-ptr-deref in sock_hold include/net/sock.h:777 [inline] BUG: KASAN: null-ptr-deref in unix_stream_bpf_update_proto+0xf8/0x33c net/unix/unix_bpf.c:171 Write of size 4 at addr 0000000000000080 by task syz-executor.2/8091 CPU: 1 PID: 8091 Comm: syz-executor.2 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233 show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 print_report+0xe4/0x514 mm/kasan/report.c:478 kasan_report+0xd8/0x138 mm/kasan/report.c:588 kasan_check_range+0x254/0x294 mm/kasan/generic.c:187 __kasan_check_write+0x20/0x30 mm/kasan/shadow.c:37 instrument_atomic_read_write include/linux/instrumented.h:96 [inline] atomic_fetch_add_relaxed include/linux/atomic/atomic-instrumented.h:252 [inline] __refcount_add include/linux/refcount.h:193 [inline] __refcount_inc include/linux/refcount.h:250 [inline] refcount_inc include/linux/refcount.h:267 [inline] sock_hold include/net/sock.h:777 [inline] unix_stream_bpf_update_proto+0xf8/0x33c net/unix/unix_bpf.c:171 sock_map_init_proto net/core/sock_map.c:190 [inline] sock_map_link+0x874/0xbcc net/core/sock_map.c:294 sock_map_update_common+0xe8/0x51c net/core/sock_map.c:483 sock_map_update_elem_sys+0x378/0x674 net/core/sock_map.c:577 bpf_map_update_value+0x260/0x850 kernel/bpf/syscall.c:167 map_update_elem+0x588/0x6c0 kernel/bpf/syscall.c:1526 __sys_bpf+0x25c/0x5dc kernel/bpf/syscall.c:5371 __do_sys_bpf kernel/bpf/syscall.c:5487 [inline] __se_sys_bpf kernel/bpf/syscall.c:5485 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5485 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 ================================================================== Unable to handle kernel NULL pointer dereference at virtual address 0000000000000080 Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=0000000114f0c000 [0000000000000080] pgd=080000010939d003, p4d=080000010939d003, pud=0800000110a1f003, pmd=0000000000000000 Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 8091 Comm: syz-executor.2 Tainted: G B 6.7.0-rc4-syzkaller-gd46efae31672 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __lse_atomic_fetch_add_relaxed arch/arm64/include/asm/atomic_lse.h:62 [inline] pc : arch_atomic_fetch_add_relaxed arch/arm64/include/asm/atomic.h:49 [inline] pc : raw_atomic_fetch_add_relaxed include/linux/atomic/atomic-arch-fallback.h:747 [inline] pc : atomic_fetch_add_relaxed include/linux/atomic/atomic-instrumented.h:253 [inline] pc : __refcount_add include/linux/refcount.h:193 [inline] pc : __refcount_inc include/linux/refcount.h:250 [inline] pc : refcount_inc include/linux/refcount.h:267 [inline] pc : sock_hold include/net/sock.h:777 [inline] pc : unix_stream_bpf_update_proto+0x104/0x33c net/unix/unix_bpf.c:171 lr : arch_atomic_fetch_add_relaxed arch/arm64/include/asm/atomic.h:49 [inline] lr : raw_atomic_fetch_add_relaxed include/linux/atomic/atomic-arch-fallback.h:747 [inline] lr : atomic_fetch_add_relaxed include/linux/atomic/atomic-instrumented.h:253 [inline] lr : __refcount_add include/linux/refcount.h:193 [inline] lr : __refcount_inc include/linux/refcount.h:250 [inline] lr : refcount_inc include/linux/refcount.h:267 [inline] lr : sock_hold include/net/sock.h:777 [inline] lr : unix_stream_bpf_update_proto+0x100/0x33c net/unix/unix_bpf.c:171 sp : ffff800099fe7840 x29: ffff800099fe7840 x28: ffff0000dbe6c000 x27: 1ffff000133fcf18 x26: ffff8000894f86e8 x25: ffff000126873000 x24: 0000000000000000 x23: dfff800000000000 x22: ffff0000dbe6c000 x21: 0000000000000080 x20: ffff000126873000 x19: ffff0000dbe6c000 x18: 1fffe000368261ce x17: 0000000000000000 x16: ffff800080520d54 x15: 0000000000000001 x14: 1ffff000122a4f38 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000040000 x10: 000000000000e143 x9 : ffff80009fad3000 x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000001 x5 : ffff800099fe7018 x4 : ffff80008e5d1ea0 x3 : ffff8000801bb798 x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: arch_atomic_fetch_add_relaxed arch/arm64/include/asm/atomic.h:49 [inline] raw_atomic_fetch_add_relaxed include/linux/atomic/atomic-arch-fallback.h:747 [inline] atomic_fetch_add_relaxed include/linux/atomic/atomic-instrumented.h:253 [inline] __refcount_add include/linux/refcount.h:193 [inline] __refcount_inc include/linux/refcount.h:250 [inline] refcount_inc include/linux/refcount.h:267 [inline] sock_hold include/net/sock.h:777 [inline] unix_stream_bpf_update_proto+0x104/0x33c net/unix/unix_bpf.c:171 sock_map_init_proto net/core/sock_map.c:190 [inline] sock_map_link+0x874/0xbcc net/core/sock_map.c:294 sock_map_update_common+0xe8/0x51c net/core/sock_map.c:483 sock_map_update_elem_sys+0x378/0x674 net/core/sock_map.c:577 bpf_map_update_value+0x260/0x850 kernel/bpf/syscall.c:167 map_update_elem+0x588/0x6c0 kernel/bpf/syscall.c:1526 __sys_bpf+0x25c/0x5dc kernel/bpf/syscall.c:5371 __do_sys_bpf kernel/bpf/syscall.c:5487 [inline] __se_sys_bpf kernel/bpf/syscall.c:5485 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5485 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 Code: 97a8a853 d503201f 97a8a5f9 52800028 (b82802b6) ---[ end trace 0000000000000000 ]---