8<--- cut here --- Unable to handle kernel NULL pointer dereference at virtual address 00000018 when write [00000018] *pgd=8508a003, *pmd=fe656003 Internal error: Oops: a05 [#1] PREEMPT SMP ARM Modules linked in: CPU: 0 PID: 3986 Comm: syz-executor.1 Not tainted 6.9.0-syzkaller #0 Hardware name: ARM-Versatile Express PC is at pagemap_scan_init_bounce_buffer fs/proc/task_mmu.c:2409 [inline] PC is at do_pagemap_scan+0x2ac/0x6f8 fs/proc/task_mmu.c:2455 LR is at kmalloc_noprof include/linux/slab.h:664 [inline] LR is at kmalloc_array_noprof include/linux/slab.h:699 [inline] LR is at pagemap_scan_init_bounce_buffer fs/proc/task_mmu.c:2404 [inline] LR is at do_pagemap_scan+0x278/0x6f8 fs/proc/task_mmu.c:2455 pc : [<805a9530>] lr : [<805a94fc>] psr: 20000013 sp : dfc6de18 ip : dfc6de18 fp : dfc6df04 r10: 00000000 r9 : 00000000 r8 : 00000000 r7 : dfc6de50 r6 : 836f2400 r5 : 00000000 r4 : 84260600 r3 : 00000000 r2 : 00000000 r1 : 00000000 r0 : 00000010 Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84fc3540 DAC: fffffffd Register r0 information: zero-size pointer Register r1 information: NULL pointer Register r2 information: NULL pointer Register r3 information: NULL pointer Register r4 information: slab mm_struct start 84260600 pointer offset 0 size 712 Register r5 information: NULL pointer Register r6 information: slab task_struct start 836f2400 pointer offset 0 size 3072 Register r7 information: 2-page vmalloc region starting at 0xdfc6c000 allocated at kernel_clone+0xac/0x3e4 kernel/fork.c:2797 Register r8 information: NULL pointer Register r9 information: NULL pointer Register r10 information: NULL pointer Register r11 information: 2-page vmalloc region starting at 0xdfc6c000 allocated at kernel_clone+0xac/0x3e4 kernel/fork.c:2797 Register r12 information: 2-page vmalloc region starting at 0xdfc6c000 allocated at kernel_clone+0xac/0x3e4 kernel/fork.c:2797 Process syz-executor.1 (pid: 3986, stack limit = 0xdfc6c000) Stack: (0xdfc6de18 to 0xdfc6e000) de00: 00000000 00000000 de20: 00000000 00000000 20000040 00000001 00000000 00000000 00000000 00000000 de40: 00000000 00000000 00000000 00000000 00000060 00000000 00000000 00000000 de60: 00000000 00000000 00000000 00000000 00000000 00000000 00000007 00000000 de80: 00000000 00000001 ffffffff 00000000 00000000 00000000 00000000 00000000 dea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000010 00000000 dec0: 00000000 00000000 00000007 00000000 c0606610 01ac849b dfc6def4 c0606610 dee0: 00000000 845d00c1 20000040 845d00c0 00000004 836f2400 dfc6df14 dfc6df08 df00: 805a99a4 805a9290 dfc6dfa4 dfc6df18 8051c364 805a9988 836f2400 00000001 df20: ecac8b10 836f2400 dfc6df44 dfc6df38 819018f4 819017c4 dfc6df5c dfc6df48 df40: 8024d45c 8027d278 40000000 dfc6dfb0 dfc6df84 dfc6df60 80202df4 8024d418 df60: 8261c90c dfc6dfb0 0006bd90 ecac8b10 80202cdc 01ac849b dfc6dfac 00000000 df80: 00000000 0014c2c8 00000036 8020029c 836f2400 00000036 00000000 dfc6dfa8 dfa0: 80200060 8051c23c 00000000 00000000 00000004 c0606610 20000040 00000000 dfc0: 00000000 00000000 0014c2c8 00000036 7eaa932e 7eaa932f 003d0f00 76ba10fc dfe0: 76ba0f08 76ba0ef8 00016d28 00051560 60000010 00000004 00000000 00000000 Call trace: [<805a9284>] (do_pagemap_scan) from [<805a99a4>] (do_pagemap_cmd+0x28/0x34 fs/proc/task_mmu.c:2522) r10:836f2400 r9:00000004 r8:845d00c0 r7:20000040 r6:845d00c1 r5:00000000 r4:c0606610 [<805a997c>] (do_pagemap_cmd) from [<8051c364>] (vfs_ioctl fs/ioctl.c:51 [inline]) [<805a997c>] (do_pagemap_cmd) from [<8051c364>] (do_vfs_ioctl fs/ioctl.c:861 [inline]) [<805a997c>] (do_pagemap_cmd) from [<8051c364>] (__do_sys_ioctl fs/ioctl.c:905 [inline]) [<805a997c>] (do_pagemap_cmd) from [<8051c364>] (sys_ioctl+0x134/0xda4 fs/ioctl.c:893) [<8051c230>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67) Exception stack(0xdfc6dfa8 to 0xdfc6dff0) dfa0: 00000000 00000000 00000004 c0606610 20000040 00000000 dfc0: 00000000 00000000 0014c2c8 00000036 7eaa932e 7eaa932f 003d0f00 76ba10fc dfe0: 76ba0f08 76ba0ef8 00016d28 00051560 r10:00000036 r9:836f2400 r8:8020029c r7:00000036 r6:0014c2c8 r5:00000000 r4:00000000 Code: e51b309c e51b108c e50b103c e3a01000 (e1c080f8) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: e51b309c ldr r3, [fp, #-156] @ 0xffffff64 4: e51b108c ldr r1, [fp, #-140] @ 0xffffff74 8: e50b103c str r1, [fp, #-60] @ 0xffffffc4 c: e3a01000 mov r1, #0 * 10: e1c080f8 strd r8, [r0, #8] <-- trapping instruction