8<--- cut here --- Unable to handle kernel NULL pointer dereference at virtual address 00000018 when write [00000018] *pgd=873fd003, *pmd=fe174003 Internal error: Oops: a07 [#1] PREEMPT SMP ARM Modules linked in: CPU: 0 PID: 26411 Comm: syz-executor.1 Not tainted 6.7.0-syzkaller #0 Hardware name: ARM-Versatile Express PC is at pagemap_scan_init_bounce_buffer fs/proc/task_mmu.c:2384 [inline] PC is at do_pagemap_scan+0x308/0x698 fs/proc/task_mmu.c:2431 LR is at 0x10 pc : [<80582d00>] lr : [<00000010>] psr: 20000013 sp : eb739dd0 ip : 00000000 fp : eb739eb4 r10: eb739e00 r9 : 00000000 r8 : 84183c00 r7 : 00000000 r6 : 86ac8900 r5 : 20ffd000 r4 : 00000000 r3 : 20ffe000 r2 : 00000000 r1 : 00000000 r0 : 00000000 Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84eea080 DAC: fffffffd Register r0 information: NULL pointer Register r1 information: NULL pointer Register r2 information: NULL pointer Register r3 information: non-paged memory Register r4 information: NULL pointer Register r5 information: non-paged memory Register r6 information: slab mm_struct start 86ac8900 pointer offset 0 size 712 Register r7 information: NULL pointer Register r8 information: slab task_struct start 84183c00 pointer offset 0 size 3072 Register r9 information: NULL pointer Register r10 information: 2-page vmalloc region starting at 0xeb738000 allocated at kernel_clone+0xac/0x41c kernel/fork.c:2907 Register r11 information: 2-page vmalloc region starting at 0xeb738000 allocated at kernel_clone+0xac/0x41c kernel/fork.c:2907 Register r12 information: NULL pointer Process syz-executor.1 (pid: 26411, stack limit = 0xeb738000) Stack: (0xeb739dd0 to 0xeb73a000) 9dc0: 00000000 00000000 00010000 200001c0 9de0: 20ffd000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9e00: 00000060 00000000 00000000 00000000 20ffd000 00000000 20ffe000 00000000 9e20: 00000000 00000000 20000080 00000000 00000000 00010000 ffffffff 00000000 9e40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9e60: 00000000 00000000 00000010 00000000 00000000 00000000 20000080 00000000 9e80: c0606610 104fc926 eb739ea4 c0606610 00000000 87428a81 200001c0 87428a80 9ea0: 00000003 84183c00 eb739ec4 eb739eb8 805830b8 80582a04 eb739fa4 eb739ec8 9ec0: 804f9bec 8058309c 00050b40 00000000 00000000 00000000 eb739f04 eb739ee8 9ee0: 8020c0ac 8020d078 00000000 00000001 8185f968 ecac8b10 eb739f44 eb739f08 9f00: 8020d100 8020c094 000f4240 00000000 8020c954 eb739fac 84183c00 00000001 9f20: ecac8b10 84183c00 eb739f44 eb739f38 81854328 818541f8 eb739f5c eb739f48 9f40: 8024c5d8 802792c8 40000000 eb739fb0 eb739f84 eb739f60 802030e4 8024c594 9f60: 8261c928 eb739fb0 0006b370 ecac8b10 80202fcc 104fc926 eb739fac 00000000 9f80: 00000000 0014c2c8 00000036 80200288 84183c00 00000036 00000000 eb739fa8 9fa0: 80200060 804f9ae0 00000000 00000000 00000003 c0606610 200001c0 00000000 9fc0: 00000000 00000000 0014c2c8 00000036 7ef5132e 7ef5132f 003d0f00 76b420fc 9fe0: 76b41f08 76b41ef8 000167d0 00050b40 60000010 00000003 00000000 00000000 Backtrace: [<805829f8>] (do_pagemap_scan) from [<805830b8>] (do_pagemap_cmd+0x28/0x34 fs/proc/task_mmu.c:2495) r10:84183c00 r9:00000003 r8:87428a80 r7:200001c0 r6:87428a81 r5:00000000 r4:c0606610 [<80583090>] (do_pagemap_cmd) from [<804f9bec>] (vfs_ioctl fs/ioctl.c:51 [inline]) [<80583090>] (do_pagemap_cmd) from [<804f9bec>] (do_vfs_ioctl fs/ioctl.c:831 [inline]) [<80583090>] (do_pagemap_cmd) from [<804f9bec>] (__do_sys_ioctl fs/ioctl.c:869 [inline]) [<80583090>] (do_pagemap_cmd) from [<804f9bec>] (sys_ioctl+0x118/0xb58 fs/ioctl.c:857) [<804f9ad4>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:66) Exception stack(0xeb739fa8 to 0xeb739ff0) 9fa0: 00000000 00000000 00000003 c0606610 200001c0 00000000 9fc0: 00000000 00000000 0014c2c8 00000036 7ef5132e 7ef5132f 003d0f00 76b420fc 9fe0: 76b41f08 76b41ef8 000167d0 00050b40 r10:00000036 r9:84183c00 r8:80200288 r7:00000036 r6:0014c2c8 r5:00000000 r4:00000000 Code: e51b2098 e51b108c e50b103c e3a01000 (e1ce00f8) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: e51b2098 ldr r2, [fp, #-152] @ 0xffffff68 4: e51b108c ldr r1, [fp, #-140] @ 0xffffff74 8: e50b103c str r1, [fp, #-60] @ 0xffffffc4 c: e3a01000 mov r1, #0 * 10: e1ce00f8 strd r0, [lr, #8] <-- trapping instruction