el0_svc_common.constprop.0+0xc4/0x254 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x9c/0xcc arch/arm64/kernel/syscall.c:181 el0_svc+0x70/0x29c arch/arm64/kernel/entry-common.c:616 el0t_64_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:634 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 Unable to handle kernel paging request at virtual address dfff80000000000a KASAN: null-ptr-deref in range [0x0000000000000050-0x0000000000000057] Mem abort info: ESR = 0x96000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004 CM = 0, WnR = 0 [dfff80000000000a] address between user and kernel address ranges Internal error: Oops: 96000004 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 20660 Comm: syz-executor.1 Not tainted 5.18.0-rc3-syzkaller #0 Hardware name: linux,dummy-virt (DT) pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __dentry_path+0x188/0x3bc fs/d_path.c:342 lr : read_seqbegin include/linux/seqlock.h:840 [inline] lr : read_seqbegin_or_lock include/linux/seqlock.h:1144 [inline] lr : __dentry_path+0xe4/0x3bc fs/d_path.c:341 sp : ffff800012db79b0 x29: ffff800012db79b0 x28: 1ffff000025b6f5c x27: ffff80000c91b000 x26: 1ffff000025b6f46 x25: ffff80000df33b00 x24: 0000000000000000 x23: ffff800012db7ae0 x22: ffff80000dd24640 x21: ffff800012db7a50 x20: dfff800000000000 x19: 00000000000000b0 x18: 0000000000000000 x17: ffff8000088665a0 x16: ffff800008093314 x15: ffff800008092430 x14: 1ffff000025b6efa x13: 00000000000000da x12: ffff7000025b6f03 x11: 1ffff000025b6f02 x10: ffff7000025b6f02 x9 : dfff800000000000 x8 : ffff800012db7817 x7 : 0000000000000001 x6 : 00008ffffda490fe x5 : ffff800012db7810 x4 : 1ffff000025b6f16 x3 : 1fffe00001c69a09 x2 : 000000000000000a x1 : 0000000000000000 x0 : 0000000000000050 Call trace: __dentry_path+0x188/0x3bc fs/d_path.c:342 dentry_path_raw+0xb0/0x104 fs/d_path.c:367 kvm_uevent_notify_change.part.0+0x1b0/0x3a0 arch/arm64/kvm/../../../virt/kvm/kvm_main.c:5492 kvm_uevent_notify_change arch/arm64/kvm/../../../virt/kvm/kvm_main.c:5459 [inline] kvm_destroy_vm+0x70/0x7b0 arch/arm64/kvm/../../../virt/kvm/kvm_main.c:1198 kvm_put_kvm+0x70/0xa0 arch/arm64/kvm/../../../virt/kvm/kvm_main.c:1264 kvm_dev_ioctl_create_vm arch/arm64/kvm/../../../virt/kvm/kvm_main.c:4795 [inline] kvm_dev_ioctl+0x634/0x14c0 arch/arm64/kvm/../../../virt/kvm/kvm_main.c:4811 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:870 [inline] __se_sys_ioctl fs/ioctl.c:856 [inline] __arm64_sys_ioctl+0x120/0x190 fs/ioctl.c:856 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x6c/0x260 arch/arm64/kernel/syscall.c:52 el0_svc_common.constprop.0+0xc4/0x254 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x9c/0xcc arch/arm64/kernel/syscall.c:181 el0_svc+0x70/0x29c arch/arm64/kernel/entry-common.c:616 el0t_64_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:634 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 Code: 54000120 aa1b03e1 91014020 d343fc02 (38f46842) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 54000120 b.eq 0x24 // b.none 4: aa1b03e1 mov x1, x27 8: 91014020 add x0, x1, #0x50 c: d343fc02 lsr x2, x0, #3 * 10: 38f46842 ldrsb w2, [x2, x20] <-- trapping instruction