Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
Mem abort info:
ESR = 0x0000000086000005
EC = 0x21: IABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x05: level 1 translation fault
user pgtable: 4k pages, 48-bit VAs, pgdp=000000011125c000
[0000000000000000] pgd=080000012e08e003, p4d=080000012e08e003, pud=0000000000000000
Internal error: Oops: 0000000086000005 [#1] PREEMPT SMP
Modules linked in:
CPU: 1 UID: 0 PID: 16513 Comm: syz.2.4233 Not tainted 6.12.0-rc1-syzkaller-g9852d85ec9d4 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : 0x0
lr : cipso_v4_sock_setattr+0x2a8/0x3c0 net/ipv4/cipso_ipv4.c:1910
sp : ffff8000a0887a90
x29: ffff8000a0887aa0 x28: ffff80008dd60a50 x27: 0000000000000000
x26: 1fffe0001a804813 x25: dfff800000000000 x24: ffff0000dd331e00
x23: 0000000000000000 x22: ffff0000c7490568 x21: 0000000000000000
x20: ffff0000d4024080 x19: ffff0000c7490000 x18: ffff0000d2500240
x17: ffff8000800614c8 x16: ffff8000805848f0 x15: 0000000000000001
x14: 00000000ffff8000 x13: 00000000bf99c98f x12: 0000000000000003
x11: 0000000000040000 x10: 0000000000001873 x9 : 1fffe00018e920fb
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 000000000000003f
x5 : 0000000000000040 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000002 x1 : 0000000000000000 x0 : ffff0000c7490000
Call trace:
0x0
netlbl_sock_setattr+0x2e4/0x338 net/netlabel/netlabel_kapi.c:1000
smack_netlbl_add+0xb0/0x160 security/smack/smack_lsm.c:2586
smack_socket_post_create+0xa8/0x158 security/smack/smack_lsm.c:2966
security_socket_post_create+0xc0/0x348 security/security.c:4544
__sock_create+0x4c8/0x884 net/socket.c:1592
sock_create net/socket.c:1627 [inline]
__sys_socket_create net/socket.c:1664 [inline]
__sys_socket+0x134/0x340 net/socket.c:1711
__do_sys_socket net/socket.c:1725 [inline]
__se_sys_socket net/socket.c:1723 [inline]
__arm64_sys_socket+0x7c/0x94 net/socket.c:1723
__invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712
el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730
el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598
Code: ???????? ???????? ???????? ???????? (????????)
---[ end trace 0000000000000000 ]---