process 'syz.4.25' launched './file2' with NULL argv: empty string added Internal error: Oops - BTI: 0000000036000001 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 4254 Comm: syz.4.25 Not tainted 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 pstate: 42400405 (nZcv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=jc) pc : store_status mm/migrate.c:1660 [inline] pc : do_pages_move mm/migrate.c:1862 [inline] pc : kernel_move_pages mm/migrate.c:2051 [inline] pc : __do_sys_move_pages mm/migrate.c:2065 [inline] pc : __se_sys_move_pages mm/migrate.c:2060 [inline] pc : __arm64_sys_move_pages+0xf54/0x19d4 mm/migrate.c:2060 lr : store_status mm/migrate.c:1660 [inline] lr : do_pages_move mm/migrate.c:1862 [inline] lr : kernel_move_pages mm/migrate.c:2051 [inline] lr : __do_sys_move_pages mm/migrate.c:2065 [inline] lr : __se_sys_move_pages mm/migrate.c:2060 [inline] lr : __arm64_sys_move_pages+0xf30/0x19d4 mm/migrate.c:2060 sp : ffff80001ff57b20 x29: ffff80001ff57d20 x28: 0000000000000000 x27: ffff700003feaf78 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000000000000 x22: ffff0000c1144500 x21: 00000000fffffff2 x20: 00000000fffffff2 x19: dfff800000000000 x18: 1fffe0003421cd96 x17: ffff800016d04000 x16: ffff80000884b464 x15: ffff8000167e4500 x14: ffff0000cd812540 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000000 x10: 0000ffffffffffff x9 : 0000000000000000 x8 : 0000000000000000 x7 : ffff800008750ed4 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000001 x2 : 0000000000000008 x1 : 0000000000000001 x0 : 0000000000000000 Call trace: store_status mm/migrate.c:1660 [inline] do_pages_move mm/migrate.c:1862 [inline] kernel_move_pages mm/migrate.c:2051 [inline] __do_sys_move_pages mm/migrate.c:2065 [inline] __se_sys_move_pages mm/migrate.c:2060 [inline] __arm64_sys_move_pages+0xf54/0x19d4 mm/migrate.c:2060 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 Code: d503229f 2a1903f4 2a1903e0 b8000935 (2a1403e1) ---[ end trace a359dd8b1ab90e9e ]--- ---------------- Code disassembly (best guess): 0: d503229f csdb 4: 2a1903f4 mov w20, w25 8: 2a1903e0 mov w0, w25 c: b8000935 sttr w21, [x9] * 10: 2a1403e1 mov w1, w20 <-- trapping instruction