Unable to handle kernel NULL pointer dereference at virtual address 0000000000000012 Mem abort info: ESR = 0x0000000096000005 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: level 1 translation fault Data abort info: ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=000000010678c000 [0000000000000012] pgd=080000011a21a403, p4d=080000011a21a403, pud=0000000000000000 Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Modules linked in: CPU: 0 UID: 0 PID: 6493 Comm: kworker/0:4 Not tainted 6.14.0-rc5-syzkaller-g77c95b8c7a16 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: slub_flushwq flush_cpu_slab pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __put_partials+0x44/0x250 mm/slub.c:3125 lr : put_partials mm/slub.c:3172 [inline] lr : flush_cpu_slab+0x1c8/0x270 mm/slub.c:3307 sp : ffff8000a49079d0 x29: ffff8000a49079d0 x28: 0000000000000200 x27: 1fffe0001de7fb72 x26: ffff0000d06e2710 x25: 0000000000000002 x24: 0000000000000002 x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000002 x20: 0000000000000000 x19: ffff0000d7a5a780 x18: 1ffff00014920f14 x17: ffff80008fbbd000 x16: ffff8000804696fc x15: 0000000000000001 x14: 1ffff00011f780cb x13: ffff8000a4908000 x12: 0000000000000003 x11: 0000000000000000 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : 00000000000000c0 x7 : ffff800080b5a2f0 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000006 x1 : 0000000000000002 x0 : ffff0000d7a5a780 Call trace: __put_partials+0x44/0x250 mm/slub.c:3125 (P) put_partials mm/slub.c:3172 [inline] flush_cpu_slab+0x1c8/0x270 mm/slub.c:3307 process_one_work+0x810/0x1638 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x97c/0xeec kernel/workqueue.c:3400 kthread+0x65c/0x7b0 kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862 Code: aa1f03f7 5280401c aa1503f8 aa1503f9 (f8410f35) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: aa1f03f7 mov x23, xzr 4: 5280401c mov w28, #0x200 // #512 8: aa1503f8 mov x24, x21 c: aa1503f9 mov x25, x21 * 10: f8410f35 ldr x21, [x25, #16]! <-- trapping instruction