BUG: kernel NULL pointer dereference, address: 0000000000000010 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 8000000035765067 P4D 8000000035765067 PUD 0 Oops: Oops: 0000 [#1] SMP KASAN PTI CPU: 0 UID: 0 PID: 5912 Comm: kworker/0:6 Not tainted syzkaller #0 PREEMPT_{RT,(full)} Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 Workqueue: usb_hub_wq hub_event RIP: 0010:kcov_remote_area_get kernel/kcov.c:142 [inline] RIP: 0010:kcov_remote_start+0x2a2/0x6f0 kernel/kcov.c:906 Code: 07 8d 4c 8b b8 b0 bb c5 91 bd 00 00 04 00 eb 4f 41 8b ae a4 00 00 00 49 c7 c7 40 d7 7f 8d 4d 8b 3f 49 81 ff 40 d7 7f 8d 74 4c <41> 39 6f 10 75 ee 4c 89 ff e8 40 c2 ca 02 84 c0 74 0e 49 8b 07 49 RSP: 0018:ffffc9000531f748 EFLAGS: 00010207 RAX: 0000000000000000 RBX: ffff88802eca1e00 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffff8b3f4b00 RBP: 0000000000100000 R08: 0000000000000000 R09: ffffffff8ac7bb81 R10: dffffc0000000000 R11: fffffbfff1deecaf R12: 0000000000000002 R13: 0000000000000001 R14: ffff888027143f00 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff888126bcd000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000010 CR3: 0000000029734000 CR4: 00000000003526f0 Call Trace: kcov_remote_start_usb include/linux/kcov.h:55 [inline] hub_event+0x158/0x4a20 drivers/usb/core/hub.c:5888 process_one_work kernel/workqueue.c:3263 [inline] process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x4b9/0x870 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: CR2: 0000000000000010 ---[ end trace 0000000000000000 ]--- RIP: 0010:kcov_remote_area_get kernel/kcov.c:142 [inline] RIP: 0010:kcov_remote_start+0x2a2/0x6f0 kernel/kcov.c:906 Code: 07 8d 4c 8b b8 b0 bb c5 91 bd 00 00 04 00 eb 4f 41 8b ae a4 00 00 00 49 c7 c7 40 d7 7f 8d 4d 8b 3f 49 81 ff 40 d7 7f 8d 74 4c <41> 39 6f 10 75 ee 4c 89 ff e8 40 c2 ca 02 84 c0 74 0e 49 8b 07 49 RSP: 0018:ffffc9000531f748 EFLAGS: 00010207 RAX: 0000000000000000 RBX: ffff88802eca1e00 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffff8b3f4b00 RBP: 0000000000100000 R08: 0000000000000000 R09: ffffffff8ac7bb81 R10: dffffc0000000000 R11: fffffbfff1deecaf R12: 0000000000000002 R13: 0000000000000001 R14: ffff888027143f00 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff888126bcd000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000010 CR3: 0000000029734000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess), 2 bytes skipped: 0: 4c 8b b8 b0 bb c5 91 mov -0x6e3a4450(%rax),%r15 7: bd 00 00 04 00 mov $0x40000,%ebp c: eb 4f jmp 0x5d e: 41 8b ae a4 00 00 00 mov 0xa4(%r14),%ebp 15: 49 c7 c7 40 d7 7f 8d mov $0xffffffff8d7fd740,%r15 1c: 4d 8b 3f mov (%r15),%r15 1f: 49 81 ff 40 d7 7f 8d cmp $0xffffffff8d7fd740,%r15 26: 74 4c je 0x74 * 28: 41 39 6f 10 cmp %ebp,0x10(%r15) <-- trapping instruction 2c: 75 ee jne 0x1c 2e: 4c 89 ff mov %r15,%rdi 31: e8 40 c2 ca 02 call 0x2cac276 36: 84 c0 test %al,%al 38: 74 0e je 0x48 3a: 49 8b 07 mov (%r15),%rax 3d: 49 rex.WB