BUG: kernel NULL pointer dereference, address: 0000000000000010 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 800000004e52a067 P4D 800000004e52a067 PUD 0 Oops: Oops: 0000 [#1] SMP KASAN PTI CPU: 1 UID: 0 PID: 21993 Comm: vhost-21991 Tainted: G L syzkaller #0 PREEMPT_{RT,(full)} Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 RIP: 0010:kcov_remote_area_get kernel/kcov.c:142 [inline] RIP: 0010:kcov_remote_start+0x2a1/0x710 kernel/kcov.c:920 Code: 5e 8d 4c 8b b8 18 44 29 92 bd 00 00 04 00 eb 4f 41 8b ae a4 00 00 00 49 c7 c7 40 96 c2 8d 4d 8b 3f 49 81 ff 40 96 c2 8d 74 4c <41> 39 6f 10 75 ee 4c 89 ff e8 01 70 db 02 84 c0 74 0e 49 8b 07 49 RSP: 0018:ffffc9000d76fcb0 EFLAGS: 00010207 RAX: 0000000000000000 RBX: ffff88802f1a5a00 RCX: 0000000000000000 RDX: 000000005108b000 RSI: 0000000000000001 RDI: ffffffff8b861520 RBP: 0000000000100000 R08: ffffffff8b14a050 R09: ffffffff8dbcd480 R10: dffffc0000000000 R11: fffffbfff1e9250f R12: 0000000000000002 R13: 0000000000000001 R14: ffff888036a03a00 R15: 0000000000000000 FS: 00007f650a4b66c0(0000) GS:ffff888126695000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000010 CR3: 000000002cd60000 CR4: 00000000003526f0 Call Trace: kcov_remote_start_common include/linux/kcov.h:50 [inline] vhost_run_work_list+0x129/0x1e0 drivers/vhost/vhost.c:453 vhost_task_fn+0x2ef/0x4a0 kernel/vhost_task.c:49 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: CR2: 0000000000000010 ---[ end trace 0000000000000000 ]--- RIP: 0010:kcov_remote_area_get kernel/kcov.c:142 [inline] RIP: 0010:kcov_remote_start+0x2a1/0x710 kernel/kcov.c:920 Code: 5e 8d 4c 8b b8 18 44 29 92 bd 00 00 04 00 eb 4f 41 8b ae a4 00 00 00 49 c7 c7 40 96 c2 8d 4d 8b 3f 49 81 ff 40 96 c2 8d 74 4c <41> 39 6f 10 75 ee 4c 89 ff e8 01 70 db 02 84 c0 74 0e 49 8b 07 49 RSP: 0018:ffffc9000d76fcb0 EFLAGS: 00010207 RAX: 0000000000000000 RBX: ffff88802f1a5a00 RCX: 0000000000000000 RDX: 000000005108b000 RSI: 0000000000000001 RDI: ffffffff8b861520 RBP: 0000000000100000 R08: ffffffff8b14a050 R09: ffffffff8dbcd480 R10: dffffc0000000000 R11: fffffbfff1e9250f R12: 0000000000000002 R13: 0000000000000001 R14: ffff888036a03a00 R15: 0000000000000000 FS: 00007f650a4b66c0(0000) GS:ffff888126695000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000010 CR3: 000000002cd60000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: 5e pop %rsi 1: 8d 4c 8b b8 lea -0x48(%rbx,%rcx,4),%ecx 5: 18 44 29 92 sbb %al,-0x6e(%rcx,%rbp,1) 9: bd 00 00 04 00 mov $0x40000,%ebp e: eb 4f jmp 0x5f 10: 41 8b ae a4 00 00 00 mov 0xa4(%r14),%ebp 17: 49 c7 c7 40 96 c2 8d mov $0xffffffff8dc29640,%r15 1e: 4d 8b 3f mov (%r15),%r15 21: 49 81 ff 40 96 c2 8d cmp $0xffffffff8dc29640,%r15 28: 74 4c je 0x76 * 2a: 41 39 6f 10 cmp %ebp,0x10(%r15) <-- trapping instruction 2e: 75 ee jne 0x1e 30: 4c 89 ff mov %r15,%rdi 33: e8 01 70 db 02 call 0x2db7039 38: 84 c0 test %al,%al 3a: 74 0e je 0x4a 3c: 49 8b 07 mov (%r15),%rax 3f: 49 rex.WB