BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 1eab3c067 P4D 1eab3c067 PUD 1e5b79067 PMD 0 
Oops: 0010 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 980 Comm: syz-executor.2 Not tainted 5.4.274-syzkaller-00002-g6f97bd951d82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
RIP: 0010:0x0
Code: Bad RIP value.
RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010206
RAX: ffffffff8154d7aa RBX: 0000000000000100 RCX: ffff8881edc53f00
RDX: 0000000080000100 RSI: 0000000000000000 RDI: ffff8881ddad71c0
RBP: ffff8881f6f09ec8 R08: ffffffff8154d3ee R09: 0000000000000003
R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffff99b0
R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881ddad71c0
FS:  00007f01af57d6c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 00000001f33fd000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <IRQ>
 call_timer_fn+0x36/0x390 kernel/time/timer.c:1448
 expire_timers kernel/time/timer.c:1493 [inline]
 __run_timers+0x879/0xbe0 kernel/time/timer.c:1817
 run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1830
 __do_softirq+0x23b/0x6b7 kernel/softirq.c:292
 invoke_softirq kernel/softirq.c:373 [inline]
 irq_exit+0x195/0x1c0 kernel/softirq.c:413
 exiting_irq arch/x86/include/asm/apic.h:538 [inline]
 smp_apic_timer_interrupt+0x11a/0x460 arch/x86/kernel/apic/apic.c:1149
 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834
 </IRQ>
RIP: 0010:memset+0x1/0x40 mm/kasan/common.c:105
Code: 7e ff 88 e8 09 00 00 c3 90 89 f6 48 8b 0c 24 31 d2 e9 93 22 00 00 0f 1f 00 89 f6 48 8b 0c 24 ba 01 00 00 00 e9 80 22 00 00 55 <41> 56 53 48 89 d3 41 89 f6 48 89 fd 48 8b 4c 24 18 48 89 d6 ba 01
RSP: 0018:ffff8881ebcbeb10 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13
RAX: f2f2f200f1f1f1f1 RBX: dffffc0000000000 RCX: 1ffff1103d797d6c
RDX: 0000000000000060 RSI: 0000000000000000 RDI: ffff8881ebcbec20
RBP: ffff8881ebcbec10 R08: dffffc0000000000 R09: ffff8881ebcbedd0
R10: 0000000000000002 R11: dffffc0000000001 R12: 0000000000000000
R13: ffff8881ebcbec20 R14: ffff8881ebcbed00 R15: ffff8881edc53f00
 __unwind_start+0x90/0x890 arch/x86/kernel/unwind_orc.c:619
 unwind_start arch/x86/include/asm/unwind.h:60 [inline]
 arch_stack_walk+0xdd/0x140 arch/x86/kernel/stacktrace.c:24
 stack_trace_save+0x118/0x1c0 kernel/stacktrace.c:123
 save_stack mm/kasan/common.c:70 [inline]
 set_track mm/kasan/common.c:78 [inline]
 __kasan_kmalloc+0x171/0x210 mm/kasan/common.c:529
 kmalloc include/linux/slab.h:556 [inline]
 kzalloc include/linux/slab.h:690 [inline]
 copy_verifier_state+0x581/0xbf0 kernel/bpf/verifier.c:746
 is_state_visited kernel/bpf/verifier.c:7702 [inline]
 do_check+0x3286/0x9820 kernel/bpf/verifier.c:7837
 bpf_check+0x2169/0xb340 kernel/bpf/verifier.c:9637
 bpf_prog_load kernel/bpf/syscall.c:1724 [inline]
 __do_sys_bpf kernel/bpf/syscall.c:2891 [inline]
 __se_sys_bpf+0x8139/0xbcb0 kernel/bpf/syscall.c:2849
 do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x5c/0xc1
RIP: 0033:0x7f01b0202ea9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f01af57d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f01b0339f80 RCX: 00007f01b0202ea9
RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
RBP: 00007f01b0271ff4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007f01b0339f80 R15: 00007fff7c307538
Modules linked in:
CR2: 0000000000000000
---[ end trace 6044c5eeb09f82d7 ]---
RIP: 0010:0x0
Code: Bad RIP value.
RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010206
RAX: ffffffff8154d7aa RBX: 0000000000000100 RCX: ffff8881edc53f00
RDX: 0000000080000100 RSI: 0000000000000000 RDI: ffff8881ddad71c0
RBP: ffff8881f6f09ec8 R08: ffffffff8154d3ee R09: 0000000000000003
R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffff99b0
R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881ddad71c0
FS:  00007f01af57d6c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 00000001f33fd000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	7e ff                	jle    0x1
   2:	88 e8                	mov    %ch,%al
   4:	09 00                	or     %eax,(%rax)
   6:	00 c3                	add    %al,%bl
   8:	90                   	nop
   9:	89 f6                	mov    %esi,%esi
   b:	48 8b 0c 24          	mov    (%rsp),%rcx
   f:	31 d2                	xor    %edx,%edx
  11:	e9 93 22 00 00       	jmp    0x22a9
  16:	0f 1f 00             	nopl   (%rax)
  19:	89 f6                	mov    %esi,%esi
  1b:	48 8b 0c 24          	mov    (%rsp),%rcx
  1f:	ba 01 00 00 00       	mov    $0x1,%edx
  24:	e9 80 22 00 00       	jmp    0x22a9
  29:	55                   	push   %rbp
* 2a:	41 56                	push   %r14 <-- trapping instruction
  2c:	53                   	push   %rbx
  2d:	48 89 d3             	mov    %rdx,%rbx
  30:	41 89 f6             	mov    %esi,%r14d
  33:	48 89 fd             	mov    %rdi,%rbp
  36:	48 8b 4c 24 18       	mov    0x18(%rsp),%rcx
  3b:	48 89 d6             	mov    %rdx,%rsi
  3e:	ba                   	.byte 0xba
  3f:	01                   	.byte 0x1