8<--- cut here --- Unable to handle kernel NULL pointer dereference at virtual address 00000018 when write [00000018] *pgd=8fbd1003, *pmd=fe51c003 Internal error: Oops: a07 [#1] PREEMPT SMP ARM Modules linked in: CPU: 0 PID: 1700 Comm: syz-executor.1 Not tainted 6.8.0-rc1-syzkaller #0 Hardware name: ARM-Versatile Express PC is at pagemap_scan_init_bounce_buffer fs/proc/task_mmu.c:2400 [inline] PC is at do_pagemap_scan+0x29c/0x6c0 fs/proc/task_mmu.c:2446 LR is at kmalloc_array include/linux/slab.h:627 [inline] LR is at pagemap_scan_init_bounce_buffer fs/proc/task_mmu.c:2395 [inline] LR is at do_pagemap_scan+0x268/0x6c0 fs/proc/task_mmu.c:2446 pc : [<8058c878>] lr : [<8058c844>] psr: 20000013 sp : eca05dc8 ip : 00000000 fp : eca05eb4 r10: eca05e00 r9 : 84599800 r8 : 00000000 r7 : 00000000 r6 : 00000000 r5 : 20ff4000 r4 : 851e0000 r3 : 20ffa000 r2 : 00000000 r1 : 00000000 r0 : 00000010 Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 857bea00 DAC: fffffffd Register r0 information: zero-size pointer Register r1 information: NULL pointer Register r2 information: NULL pointer Register r3 information: non-paged memory Register r4 information: slab mm_struct start 851e0000 pointer offset 0 size 712 Register r5 information: non-paged memory Register r6 information: NULL pointer Register r7 information: NULL pointer Register r8 information: NULL pointer Register r9 information: slab task_struct start 84599800 pointer offset 0 size 3072 Register r10 information: 2-page vmalloc region starting at 0xeca04000 allocated at kernel_clone+0xac/0x3c8 kernel/fork.c:2902 Register r11 information: 2-page vmalloc region starting at 0xeca04000 allocated at kernel_clone+0xac/0x3c8 kernel/fork.c:2902 Register r12 information: NULL pointer Process syz-executor.1 (pid: 1700, stack limit = 0xeca04000) Stack: (0xeca05dc8 to 0xeca06000) 5dc0: 00000000 00000000 10000000 200002c0 00000001 00000000 5de0: 00000000 20ff4000 00000000 00000000 00000000 00000000 00000000 00000000 5e00: 00000060 00000000 00000000 00000000 20ff4000 00000000 20ffa000 00000000 5e20: 00000000 00000000 20000240 00000000 00000000 10000000 ffffffff 00000000 5e40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5e60: 00000000 00000000 00000010 00000000 00000000 00000000 20000240 00000000 5e80: c0606610 01669dd0 eca05ea4 c0606610 00000000 9887c781 200002c0 9887c780 5ea0: 00000003 84599800 eca05ec4 eca05eb8 8058ccc4 8058c5e8 eca05fa4 eca05ec8 5ec0: 80502000 8058cca8 00050bd0 00000000 00000000 00000000 eca05f04 eca05ee8 5ee0: 8020c124 8020d0f0 00000000 00000001 81860620 ecac8b10 eca05f44 eca05f08 5f00: 8020d178 8020c10c 00000000 00000000 8020c9cc eca05fac 84599800 00000001 5f20: ecac8b10 84599800 eca05f44 eca05f38 81854f98 81854e68 eca05f5c eca05f48 5f40: 8024c824 80279930 40000000 eca05fb0 eca05f84 eca05f60 80203134 8024c7e0 5f60: 8261c978 eca05fb0 0006b400 ecac8b10 8020301c 01669dd0 eca05fac 00000000 5f80: 00000000 0014c2c8 00000036 80200288 84599800 00000036 00000000 eca05fa8 5fa0: 80200060 80501ef4 00000000 00000000 00000003 c0606610 200002c0 00000000 5fc0: 00000000 00000000 0014c2c8 00000036 7ed9f326 7ed9f327 003d0f00 76b410fc 5fe0: 76b40f08 76b40ef8 000167e8 00050bd0 60000010 00000003 00000000 00000000 Backtrace: [<8058c5dc>] (do_pagemap_scan) from [<8058ccc4>] (do_pagemap_cmd+0x28/0x34 fs/proc/task_mmu.c:2513) r10:84599800 r9:00000003 r8:9887c780 r7:200002c0 r6:9887c781 r5:00000000 r4:c0606610 [<8058cc9c>] (do_pagemap_cmd) from [<80502000>] (vfs_ioctl fs/ioctl.c:51 [inline]) [<8058cc9c>] (do_pagemap_cmd) from [<80502000>] (do_vfs_ioctl fs/ioctl.c:831 [inline]) [<8058cc9c>] (do_pagemap_cmd) from [<80502000>] (__do_sys_ioctl fs/ioctl.c:869 [inline]) [<8058cc9c>] (do_pagemap_cmd) from [<80502000>] (sys_ioctl+0x118/0xb58 fs/ioctl.c:857) [<80501ee8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:66) Exception stack(0xeca05fa8 to 0xeca05ff0) 5fa0: 00000000 00000000 00000003 c0606610 200002c0 00000000 5fc0: 00000000 00000000 0014c2c8 00000036 7ed9f326 7ed9f327 003d0f00 76b410fc 5fe0: 76b40f08 76b40ef8 000167e8 00050bd0 r10:00000036 r9:84599800 r8:80200288 r7:00000036 r6:0014c2c8 r5:00000000 r4:00000000 Code: e51b309c e51b208c e50b203c e3a02000 (e1c060f8) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: e51b309c ldr r3, [fp, #-156] @ 0xffffff64 4: e51b208c ldr r2, [fp, #-140] @ 0xffffff74 8: e50b203c str r2, [fp, #-60] @ 0xffffffc4 c: e3a02000 mov r2, #0 * 10: e1c060f8 strd r6, [r0, #8] <-- trapping instruction