8<--- cut here --- Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read [00000000] *pgd=85c42003, *pmd=e95cc003 Internal error: Oops: 207 [#1] PREEMPT SMP ARM Modules linked in: CPU: 1 PID: 21024 Comm: syz-executor.1 Not tainted 6.9.0-rc1-syzkaller #0 Hardware name: ARM-Versatile Express PC is at page_zonenum include/linux/mmzone.h:1100 [inline] PC is at __kmap_local_page_prot+0xc/0x74 mm/highmem.c:573 LR is at kmap_local_page include/linux/highmem-internal.h:73 [inline] LR is at copy_page_to_iter+0xf8/0x184 lib/iov_iter.c:360 pc : [<80479dc0>] lr : [<807eb2dc>] psr: 60000113 sp : dfa89d40 ip : dfa89d50 fp : dfa89d4c r10: 00000018 r9 : 828584e8 r8 : 00000000 r7 : 00000000 r6 : 00000000 r5 : 00000000 r4 : 8535c000 r3 : 00c00000 r2 : 0000071f r1 : 00000000 r0 : 00000000 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 85003840 DAC: 00000000 Register r0 information: NULL pointer Register r1 information: NULL pointer Register r2 information: non-paged memory Register r3 information: non-paged memory Register r4 information: slab kmalloc-1k start 8535c000 pointer offset 0 size 1024 Register r5 information: NULL pointer Register r6 information: NULL pointer Register r7 information: NULL pointer Register r8 information: NULL pointer Register r9 information: non-slab/vmalloc memory Register r10 information: non-paged memory Register r11 information: 2-page vmalloc region starting at 0xdfa88000 allocated at kernel_clone+0xac/0x3cc kernel/fork.c:2796 Register r12 information: 2-page vmalloc region starting at 0xdfa88000 allocated at kernel_clone+0xac/0x3cc kernel/fork.c:2796 Process syz-executor.1 (pid: 21024, stack limit = 0xdfa88000) Stack: (0xdfa89d40 to 0xdfa8a000) 9d40: dfa89d84 dfa89d50 807eb2dc 80479dc0 dfa89d74 dfa89ea0 8024c880 8535c000 9d60: 8535c000 00000000 00000000 00000000 0000000d 00000018 dfa89dd4 dfa89d88 9d80: 8140b1dc 807eb1f0 40000113 84901440 85b6f400 85b6f4d0 8454de00 85b6f4d8 9da0: dfa89ea0 00000000 dfa89dd4 8454de00 0000000d 85b6f400 83f4bc00 00000001 9dc0: 00000000 00000000 dfa89e44 dfa89dd8 8162dc08 8140b0f8 00000000 00000000 9de0: 00000000 85b6f4d0 85b6f4c0 7fffffff 8454de88 85b6f4ec 8454e034 dfa89e90 9e00: 00000000 83f4bc00 802a2fcc 00000100 00000122 4ebea8a2 dfa89e90 8162dab8 9e20: dfa89e90 84901400 00000000 00000000 00000000 0000000d dfa89e64 dfa89e48 9e40: 8162cca4 8162dac4 00000000 00000000 00000000 8162cc6c dfa89e84 dfa89e68 9e60: 8137a7c8 8162cc78 00000000 00000000 84901400 dfa89edc dfa89f8c dfa89e88 9e80: 8137d0a8 8137a784 fffffff7 00000001 00000000 00000000 00000000 00000000 9ea0: 00000000 00000000 20000240 0000000d 00000001 00000000 00000000 00000000 9ec0: 00000000 00000000 00000000 00000000 00000000 00000000 dfa89f04 00000000 9ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9f00: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9f20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9f40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 4ebea8a2 9f60: 8261ca0c 00000000 00000000 0014c2d4 00000124 80200288 83f4bc00 00000124 9f80: dfa89fa4 dfa89f90 8137d144 8137cfec 00000000 00000000 00000000 dfa89fa8 9fa0: 80200060 8137d134 00000000 00000000 00000007 20000240 0000000d 00000000 9fc0: 00000000 00000000 0014c2d4 00000124 7efe332e 7efe332f 003d0f00 76b280fc 9fe0: 76b27f08 76b27ef8 000167f8 00050bc0 60000010 00000007 00000000 00000000 Call trace: [<80479db4>] (__kmap_local_page_prot) from [<807eb2dc>] (kmap_local_page include/linux/highmem-internal.h:73 [inline]) [<80479db4>] (__kmap_local_page_prot) from [<807eb2dc>] (copy_page_to_iter+0xf8/0x184 lib/iov_iter.c:360) [<807eb1e4>] (copy_page_to_iter) from [<8140b1dc>] (sk_msg_recvmsg+0xf0/0x3cc net/core/skmsg.c:437) r10:00000018 r9:0000000d r8:00000000 r7:00000000 r6:00000000 r5:8535c000 r4:8535c000 [<8140b0ec>] (sk_msg_recvmsg) from [<8162dc08>] (unix_bpf_recvmsg net/unix/unix_bpf.c:73 [inline]) [<8140b0ec>] (sk_msg_recvmsg) from [<8162dc08>] (unix_bpf_recvmsg+0x150/0x444 net/unix/unix_bpf.c:50) r10:00000000 r9:00000000 r8:00000001 r7:83f4bc00 r6:85b6f400 r5:0000000d r4:8454de00 [<8162dab8>] (unix_bpf_recvmsg) from [<8162cca4>] (unix_dgram_recvmsg+0x38/0x4c net/unix/af_unix.c:2529) r10:0000000d r9:00000000 r8:00000000 r7:00000000 r6:84901400 r5:dfa89e90 r4:8162dab8 [<8162cc6c>] (unix_dgram_recvmsg) from [<8137a7c8>] (sock_recvmsg_nosec net/socket.c:1046 [inline]) [<8162cc6c>] (unix_dgram_recvmsg) from [<8137a7c8>] (sock_recvmsg+0x50/0x78 net/socket.c:1068) r4:8162cc6c [<8137a778>] (sock_recvmsg) from [<8137d0a8>] (__sys_recvfrom+0xc8/0x148 net/socket.c:2242) r7:dfa89edc r6:84901400 r5:00000000 r4:00000000 [<8137cfe0>] (__sys_recvfrom) from [<8137d144>] (__do_sys_recvfrom net/socket.c:2260 [inline]) [<8137cfe0>] (__sys_recvfrom) from [<8137d144>] (sys_recvfrom+0x1c/0x24 net/socket.c:2256) r10:00000124 r9:83f4bc00 r8:80200288 r7:00000124 r6:0014c2d4 r5:00000000 r4:00000000 [<8137d128>] (sys_recvfrom) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:66) Exception stack(0xdfa89fa8 to 0xdfa89ff0) 9fa0: 00000000 00000000 00000007 20000240 0000000d 00000000 9fc0: 00000000 00000000 0014c2d4 00000124 7efe332e 7efe332f 003d0f00 76b280fc 9fe0: 76b27f08 76b27ef8 000167f8 00050bc0 Code: eaffffe8 e1a0c00d e92dd800 e24cb004 (e5901000) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: eaffffe8 b 0xffffffa8 4: e1a0c00d mov ip, sp 8: e92dd800 push {fp, ip, lr, pc} c: e24cb004 sub fp, ip, #4 * 10: e5901000 ldr r1, [r0] <-- trapping instruction