BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 8000000101f82067 P4D 8000000101f82067 PUD 0 Oops: Oops: 0000 [#1] SMP PTI CPU: 0 UID: 0 PID: 2884 Comm: syz.3.17 Not tainted syzkaller #0 PREEMPT(none) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 RIP: 0010:__io_uring_show_fdinfo io_uring/fdinfo.c:104 [inline] RIP: 0010:io_uring_show_fdinfo+0x1b2/0x790 io_uring/fdinfo.c:254 Code: 0a 89 44 24 18 41 8b 07 0f ba e0 10 0f 82 93 01 00 00 49 8b 8f d0 00 00 00 89 ea 21 f2 44 8b 2c 91 41 39 f5 0f 87 72 01 00 00 <0f> b6 3c 25 00 00 00 00 44 89 eb 8b 4c 24 18 d3 e3 48 c1 e3 06 49 RSP: 0018:ffffc90001893c08 EFLAGS: 00010293 RAX: 0000000000000008 RBX: 00000000fffffffc RCX: ffff88810df80040 RDX: 0000000000000000 RSI: 00000000000001ff RDI: ffff888105ea30aa RBP: 0000000000000000 R08: 00000000fffffffc R09: 0000000000000032 R10: 0000000000000037 R11: 0000000000000003 R12: 0000000000000000 R13: 0000000000000000 R14: ffff88810eefe570 R15: ffff8881076a5000 FS: 00007f65a42bf6c0(0000) GS:ffff8882b4a14000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000011165c000 CR4: 00000000003506f0 Call Trace: seq_show+0x18e/0x1d0 fs/proc/fd.c:68 seq_read_iter+0x195/0x480 fs/seq_file.c:230 seq_read+0x132/0x160 fs/seq_file.c:162 vfs_read+0xe2/0x360 fs/read_write.c:570 ksys_read+0x74/0xf0 fs/read_write.c:715 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x8f/0x250 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f65a444efc9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f65a42bf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 00007f65a46a5fa0 RCX: 00007f65a444efc9 RDX: 0000000000002020 RSI: 00002000000040c0 RDI: 0000000000000004 RBP: 00007f65a44d1f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f65a46a6038 R14: 00007f65a46a5fa0 R15: 00007ffe9a1e8848 Modules linked in: CR2: 0000000000000000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__io_uring_show_fdinfo io_uring/fdinfo.c:104 [inline] RIP: 0010:io_uring_show_fdinfo+0x1b2/0x790 io_uring/fdinfo.c:254 Code: 0a 89 44 24 18 41 8b 07 0f ba e0 10 0f 82 93 01 00 00 49 8b 8f d0 00 00 00 89 ea 21 f2 44 8b 2c 91 41 39 f5 0f 87 72 01 00 00 <0f> b6 3c 25 00 00 00 00 44 89 eb 8b 4c 24 18 d3 e3 48 c1 e3 06 49 RSP: 0018:ffffc90001893c08 EFLAGS: 00010293 RAX: 0000000000000008 RBX: 00000000fffffffc RCX: ffff88810df80040 RDX: 0000000000000000 RSI: 00000000000001ff RDI: ffff888105ea30aa RBP: 0000000000000000 R08: 00000000fffffffc R09: 0000000000000032 R10: 0000000000000037 R11: 0000000000000003 R12: 0000000000000000 R13: 0000000000000000 R14: ffff88810eefe570 R15: ffff8881076a5000 FS: 00007f65a42bf6c0(0000) GS:ffff8882b4a14000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000011165c000 CR4: 00000000003506f0 ---------------- Code disassembly (best guess): 0: 0a 89 44 24 18 41 or 0x41182444(%rcx),%cl 6: 8b 07 mov (%rdi),%eax 8: 0f ba e0 10 bt $0x10,%eax c: 0f 82 93 01 00 00 jb 0x1a5 12: 49 8b 8f d0 00 00 00 mov 0xd0(%r15),%rcx 19: 89 ea mov %ebp,%edx 1b: 21 f2 and %esi,%edx 1d: 44 8b 2c 91 mov (%rcx,%rdx,4),%r13d 21: 41 39 f5 cmp %esi,%r13d 24: 0f 87 72 01 00 00 ja 0x19c * 2a: 0f b6 3c 25 00 00 00 movzbl 0x0,%edi <-- trapping instruction 31: 00 32: 44 89 eb mov %r13d,%ebx 35: 8b 4c 24 18 mov 0x18(%rsp),%ecx 39: d3 e3 shl %cl,%ebx 3b: 48 c1 e3 06 shl $0x6,%rbx 3f: 49 rex.WB