Oops: general protection fault, probably for non-canonical address 0xdffffc000000000b: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000058-0x000000000000005f] CPU: 1 UID: 0 PID: 2838 Comm: syslogd Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:pick_next_entity kernel/sched/fair.c:5547 [inline] RIP: 0010:pick_task_fair+0x89/0x1e0 kernel/sched/fair.c:8966 Code: c0 0f 84 0c 01 00 00 4d 89 ee eb 6b 4c 89 f7 be 01 00 00 00 e8 08 26 fe ff 48 8d 78 59 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 <42> 0f b6 14 3a 38 ca 7f 08 84 d2 0f 85 ed 00 00 00 80 78 59 00 0f RSP: 0018:ffffc9000187f580 EFLAGS: 00010002 RAX: 0000000000000000 RBX: ffff8881f57395c0 RCX: 0000000000000001 RDX: 000000000000000b RSI: 000000540e9eab31 RDI: 0000000000000059 RBP: ffffed103eae72d2 R08: 0000000000000002 R09: 1ffff1103eae73ee R10: ffff8881f5739708 R11: 0000000000000000 R12: ffff8881f5739690 R13: ffff8881f5739680 R14: ffff8881f5739680 R15: dffffc0000000000 FS: 00007f6cdc927c80(0000) GS:ffff8882687ce000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd56c2001c6 CR3: 0000000117964000 CR4: 00000000003506f0 Call Trace: pick_next_task_fair+0x8f/0x2000 kernel/sched/fair.c:8990 __pick_next_task kernel/sched/core.c:5929 [inline] pick_next_task kernel/sched/core.c:6468 [inline] __schedule+0x540/0x4220 kernel/sched/core.c:6852 __schedule_loop kernel/sched/core.c:6993 [inline] schedule+0xdd/0x390 kernel/sched/core.c:7008 schedule_timeout+0x1b2/0x280 kernel/time/sleep_timeout.c:75 __skb_wait_for_more_packets+0x383/0x610 net/core/datagram.c:123 __unix_dgram_recvmsg+0x22e/0xc30 net/unix/af_unix.c:2584 unix_dgram_recvmsg+0xd0/0x110 net/unix/af_unix.c:2670 sock_recvmsg_nosec net/socket.c:1078 [inline] sock_recvmsg+0x1a4/0x1f0 net/socket.c:1100 sock_read_iter+0x2c6/0x3c0 net/socket.c:1170 new_sync_read fs/read_write.c:493 [inline] vfs_read+0x957/0xb30 fs/read_write.c:574 ksys_read+0x1f8/0x250 fs/read_write.c:717 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0x7b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f6cdca77407 Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff RSP: 002b:00007fff46393930 EFLAGS: 00000202 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 00007f6cdc927c80 RCX: 00007f6cdca77407 RDX: 00000000000000ff RSI: 000055861025c300 RDI: 0000000000000000 RBP: 000055861025c2c0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000202 R12: 000055861025c373 R13: 0000000000000000 R14: 000055861025c300 R15: 00005585f4510d98 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:pick_next_entity kernel/sched/fair.c:5547 [inline] RIP: 0010:pick_task_fair+0x89/0x1e0 kernel/sched/fair.c:8966 Code: c0 0f 84 0c 01 00 00 4d 89 ee eb 6b 4c 89 f7 be 01 00 00 00 e8 08 26 fe ff 48 8d 78 59 48 89 fa 48 89 f9 48 c1 ea 03 83 e1 07 <42> 0f b6 14 3a 38 ca 7f 08 84 d2 0f 85 ed 00 00 00 80 78 59 00 0f RSP: 0018:ffffc9000187f580 EFLAGS: 00010002 RAX: 0000000000000000 RBX: ffff8881f57395c0 RCX: 0000000000000001 RDX: 000000000000000b RSI: 000000540e9eab31 RDI: 0000000000000059 RBP: ffffed103eae72d2 R08: 0000000000000002 R09: 1ffff1103eae73ee R10: ffff8881f5739708 R11: 0000000000000000 R12: ffff8881f5739690 R13: ffff8881f5739680 R14: ffff8881f5739680 R15: dffffc0000000000 FS: 00007f6cdc927c80(0000) GS:ffff8882687ce000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd56c2001c6 CR3: 0000000117964000 CR4: 00000000003506f0 ---------------- Code disassembly (best guess): 0: c0 0f 84 rorb $0x84,(%rdi) 3: 0c 01 or $0x1,%al 5: 00 00 add %al,(%rax) 7: 4d 89 ee mov %r13,%r14 a: eb 6b jmp 0x77 c: 4c 89 f7 mov %r14,%rdi f: be 01 00 00 00 mov $0x1,%esi 14: e8 08 26 fe ff call 0xfffe2621 19: 48 8d 78 59 lea 0x59(%rax),%rdi 1d: 48 89 fa mov %rdi,%rdx 20: 48 89 f9 mov %rdi,%rcx 23: 48 c1 ea 03 shr $0x3,%rdx 27: 83 e1 07 and $0x7,%ecx * 2a: 42 0f b6 14 3a movzbl (%rdx,%r15,1),%edx <-- trapping instruction 2f: 38 ca cmp %cl,%dl 31: 7f 08 jg 0x3b 33: 84 d2 test %dl,%dl 35: 0f 85 ed 00 00 00 jne 0x128 3b: 80 78 59 00 cmpb $0x0,0x59(%rax) 3f: 0f .byte 0xf