BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 1eaeee067 P4D 1eaeee067 PUD 0 
Oops: 0010 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 5890 Comm: syz.3.2148 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
RIP: 0010:0x0
Code: Bad RIP value.
RSP: 0018:ffff8881f6e09cf0 EFLAGS: 00010202
RAX: ffffffff8150a590 RBX: 0000000000000101 RCX: ffff8881e34ccec0
RDX: 0000000000000101 RSI: 0000000000000000 RDI: ffff8881e565b1c0
RBP: ffff8881f6e09d30 R08: 0000000000000004 R09: 0000000000000003
R10: ffffed103edc1398 R11: 1ffff1103edc1398 R12: 00000000ffffc700
R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881e565b1c0
FS:  00007f5c04bf26c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 00000001e2208000 CR4: 00000000003406b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
 <IRQ>
 call_timer_fn+0x3c/0x380 kernel/time/timer.c:1448
 expire_timers kernel/time/timer.c:1493 [inline]
 __run_timers+0x81d/0xb60 kernel/time/timer.c:1817
 run_timer_softirq+0x6a/0xf0 kernel/time/timer.c:1830
 __do_softirq+0x236/0x660 kernel/softirq.c:292
 invoke_softirq kernel/softirq.c:373 [inline]
 irq_exit+0x197/0x1c0 kernel/softirq.c:413
 exiting_irq arch/x86/include/asm/apic.h:539 [inline]
 smp_apic_timer_interrupt+0x11d/0x490 arch/x86/kernel/apic/apic.c:1161
 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834
 </IRQ>
RIP: 0010:jhash2 include/linux/jhash.h:125 [inline]
RIP: 0010:hash_stack lib/stackdepot.c:156 [inline]
RIP: 0010:stack_depot_save+0x54/0x4c0 lib/stackdepot.c:237
Code: 0f 84 57 01 00 00 41 89 f7 49 89 fe 43 8d 3c 3f 46 8d 24 fd 7b 71 f5 75 83 ff 04 0f 82 87 00 00 00 45 89 e3 44 89 e1 4c 89 f6 <03> 0e 44 03 5e 04 44 03 66 08 45 89 e0 41 c1 c0 04 44 29 e1 41 31
RSP: 0018:ffff8881d432f6f0 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13
RAX: 0000000000000000 RBX: ffff8881ecabeb00 RCX: 0000000089167fac
RDX: 0000000000000800 RSI: ffff8881d432f75c RDI: 0000000000000019
RBP: ffff8881d432f740 R08: 000000005620b8ba R09: 00000000bfabc65d
R10: 0000000065c826aa R11: 000000008f71a170 R12: 00000000007a3aea
R13: 0000000000000020 R14: ffff8881d432f750 R15: 000000000000000e
 save_stack mm/kasan/common.c:72 [inline]
 set_track mm/kasan/common.c:78 [inline]
 kasan_set_free_info mm/kasan/common.c:345 [inline]
 __kasan_slab_free+0x223/0x280 mm/kasan/common.c:487
 kasan_slab_free+0xe/0x10 mm/kasan/common.c:496
 slab_free_hook mm/slub.c:1455 [inline]
 slab_free_freelist_hook+0xb7/0x180 mm/slub.c:1494
 slab_free mm/slub.c:3080 [inline]
 kfree+0xbe/0x260 mm/slub.c:4071
 context_add_hash+0x103/0x170 security/selinux/ss/services.c:1488
 context_struct_to_sid security/selinux/ss/services.c:1501 [inline]
 security_compute_sid+0xf93/0x13f0 security/selinux/ss/services.c:1865
 security_transition_sid+0x7d/0x90 security/selinux/ss/services.c:1890
 socket_sockcreate_sid security/selinux/hooks.c:4585 [inline]
 selinux_socket_create+0x1c6/0x290 security/selinux/hooks.c:4619
 security_socket_create+0x77/0xb0 security/security.c:2014
 __sock_create+0xce/0x740 net/socket.c:1382
 sock_create net/socket.c:1478 [inline]
 __sys_socketpair+0x1a7/0x5a0 net/socket.c:1578
 __do_sys_socketpair net/socket.c:1631 [inline]
 __se_sys_socketpair net/socket.c:1628 [inline]
 __x64_sys_socketpair+0x9b/0xb0 net/socket.c:1628
 do_syscall_64+0xcf/0x170 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x5c/0xc1
RIP: 0033:0x7f5c06589969
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f5c04bf2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035
RAX: ffffffffffffffda RBX: 00007f5c067b0fa0 RCX: 00007f5c06589969
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001
RBP: 00007f5c0660bab1 R08: 0000000000000000 R09: 0000000000000000
R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f5c067b0fa0 R15: 00007ffece96dad8
Modules linked in:
CR2: 0000000000000000
---[ end trace 506031ee46dbf083 ]---
RIP: 0010:0x0
Code: Bad RIP value.
RSP: 0018:ffff8881f6e09cf0 EFLAGS: 00010202
RAX: ffffffff8150a590 RBX: 0000000000000101 RCX: ffff8881e34ccec0
RDX: 0000000000000101 RSI: 0000000000000000 RDI: ffff8881e565b1c0
RBP: ffff8881f6e09d30 R08: 0000000000000004 R09: 0000000000000003
R10: ffffed103edc1398 R11: 1ffff1103edc1398 R12: 00000000ffffc700
R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881e565b1c0
FS:  00007f5c04bf26c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 00000001e2208000 CR4: 00000000003406b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
----------------
Code disassembly (best guess):
   0:	0f 84 57 01 00 00    	je     0x15d
   6:	41 89 f7             	mov    %esi,%r15d
   9:	49 89 fe             	mov    %rdi,%r14
   c:	43 8d 3c 3f          	lea    (%r15,%r15,1),%edi
  10:	46 8d 24 fd 7b 71 f5 	lea    0x75f5717b(,%r15,8),%r12d
  17:	75
  18:	83 ff 04             	cmp    $0x4,%edi
  1b:	0f 82 87 00 00 00    	jb     0xa8
  21:	45 89 e3             	mov    %r12d,%r11d
  24:	44 89 e1             	mov    %r12d,%ecx
  27:	4c 89 f6             	mov    %r14,%rsi
* 2a:	03 0e                	add    (%rsi),%ecx <-- trapping instruction
  2c:	44 03 5e 04          	add    0x4(%rsi),%r11d
  30:	44 03 66 08          	add    0x8(%rsi),%r12d
  34:	45 89 e0             	mov    %r12d,%r8d
  37:	41 c1 c0 04          	rol    $0x4,%r8d
  3b:	44 29 e1             	sub    %r12d,%ecx
  3e:	41                   	rex.B
  3f:	31                   	.byte 0x31