BUG: kernel NULL pointer dereference, address: 0000000000000180 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 8000000168ff4067 P4D 8000000168ff4067 PUD 16b16c067 PMD 0 Oops: Oops: 0000 [#1] PREEMPT SMP PTI CPU: 0 PID: 570 Comm: kworker/0:2 Not tainted 6.10.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: rcu_gp srcu_invoke_callbacks RIP: 0010:rcu_seq_current kernel/rcu/rcu.h:138 [inline] RIP: 0010:srcu_invoke_callbacks+0x66/0x1c0 kernel/rcu/srcutree.c:1733 Code: 00 00 48 8b 6f 70 48 8d 7c 24 08 e8 84 d2 00 00 4c 8d b3 e0 fe ff ff 4c 89 f7 e8 25 36 b5 01 4c 8d bb 20 ff ff ff 48 8b 45 38 <48> 8b b0 80 01 00 00 4c 89 ff e8 0b d9 00 00 80 7b a8 00 0f 85 c3 RSP: 0018:ffffc90001447db8 EFLAGS: 00010082 RAX: 0000000000000000 RBX: ffffe8ffffc173e0 RCX: 0000000000000001 RDX: 00000000f681636c RSI: ffffffff8383ad78 RDI: ffffe8ffffc172c0 RBP: ffff8881738842c0 R08: 0000000000000001 R09: ffff8881017d9bc0 R10: 0000000000000018 R11: ffffffff8123c170 R12: ffff88810008a600 R13: ffff888237c30d40 R14: ffffe8ffffc172c0 R15: ffffe8ffffc17300 FS: 0000000000000000(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000180 CR3: 0000000174dfc000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: process_one_work kernel/workqueue.c:3231 [inline] process_scheduled_works+0x2ac/0x5c0 kernel/workqueue.c:3312 worker_thread+0x23e/0x300 kernel/workqueue.c:3393 kthread+0xea/0x100 kernel/kthread.c:389 ret_from_fork+0x32/0x40 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Modules linked in: CR2: 0000000000000180 ---[ end trace 0000000000000000 ]--- RIP: 0010:rcu_seq_current kernel/rcu/rcu.h:138 [inline] RIP: 0010:srcu_invoke_callbacks+0x66/0x1c0 kernel/rcu/srcutree.c:1733 Code: 00 00 48 8b 6f 70 48 8d 7c 24 08 e8 84 d2 00 00 4c 8d b3 e0 fe ff ff 4c 89 f7 e8 25 36 b5 01 4c 8d bb 20 ff ff ff 48 8b 45 38 <48> 8b b0 80 01 00 00 4c 89 ff e8 0b d9 00 00 80 7b a8 00 0f 85 c3 RSP: 0018:ffffc90001447db8 EFLAGS: 00010082 RAX: 0000000000000000 RBX: ffffe8ffffc173e0 RCX: 0000000000000001 RDX: 00000000f681636c RSI: ffffffff8383ad78 RDI: ffffe8ffffc172c0 RBP: ffff8881738842c0 R08: 0000000000000001 R09: ffff8881017d9bc0 R10: 0000000000000018 R11: ffffffff8123c170 R12: ffff88810008a600 R13: ffff888237c30d40 R14: ffffe8ffffc172c0 R15: ffffe8ffffc17300 FS: 0000000000000000(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000180 CR3: 0000000174dfc000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: 48 8b 6f 70 mov 0x70(%rdi),%rbp 6: 48 8d 7c 24 08 lea 0x8(%rsp),%rdi b: e8 84 d2 00 00 call 0xd294 10: 4c 8d b3 e0 fe ff ff lea -0x120(%rbx),%r14 17: 4c 89 f7 mov %r14,%rdi 1a: e8 25 36 b5 01 call 0x1b53644 1f: 4c 8d bb 20 ff ff ff lea -0xe0(%rbx),%r15 26: 48 8b 45 38 mov 0x38(%rbp),%rax * 2a: 48 8b b0 80 01 00 00 mov 0x180(%rax),%rsi <-- trapping instruction 31: 4c 89 ff mov %r15,%rdi 34: e8 0b d9 00 00 call 0xd944 39: 80 7b a8 00 cmpb $0x0,-0x58(%rbx) 3d: 0f .byte 0xf 3e: 85 c3 test %eax,%ebx