8<--- cut here ---
Unable to handle kernel NULL pointer dereference at virtual address 00000018 when write
[00000018] *pgd=84fcd003, *pmd=fb899003
Internal error: Oops: a05 [#1] PREEMPT SMP ARM
Modules linked in:
CPU: 1 PID: 4340 Comm: syz-executor.1 Not tainted 6.9.0-syzkaller #0
Hardware name: ARM-Versatile Express
PC is at pagemap_scan_init_bounce_buffer fs/proc/task_mmu.c:2409 [inline]
PC is at do_pagemap_scan+0x2ac/0x6f8 fs/proc/task_mmu.c:2455
LR is at kmalloc_noprof include/linux/slab.h:664 [inline]
LR is at kmalloc_array_noprof include/linux/slab.h:699 [inline]
LR is at pagemap_scan_init_bounce_buffer fs/proc/task_mmu.c:2404 [inline]
LR is at do_pagemap_scan+0x278/0x6f8 fs/proc/task_mmu.c:2455
pc : [<805a9530>]    lr : [<805a94fc>]    psr: 20000013
sp : df9e9e18  ip : df9e9e18  fp : df9e9f04
r10: 00000000  r9 : 00000000  r8 : 00000000
r7 : df9e9e50  r6 : 83ecec00  r5 : 00000000  r4 : 852ac900
r3 : 00000000  r2 : 00000000  r1 : 00000000  r0 : 00000010
Flags: nzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment none
Control: 30c5387d  Table: 8501bb40  DAC: 00000000
Register r0 information: zero-size pointer
Register r1 information: NULL pointer
Register r2 information: NULL pointer
Register r3 information: NULL pointer
Register r4 information: slab mm_struct start 852ac900 pointer offset 0 size 712
Register r5 information: NULL pointer
Register r6 information: slab task_struct start 83ecec00 pointer offset 0 size 3072
Register r7 information: 2-page vmalloc region starting at 0xdf9e8000 allocated at kernel_clone+0xac/0x3e4 kernel/fork.c:2797
Register r8 information: NULL pointer
Register r9 information: NULL pointer
Register r10 information: NULL pointer
Register r11 information: 2-page vmalloc region starting at 0xdf9e8000 allocated at kernel_clone+0xac/0x3e4 kernel/fork.c:2797
Register r12 information: 2-page vmalloc region starting at 0xdf9e8000 allocated at kernel_clone+0xac/0x3e4 kernel/fork.c:2797
Process syz-executor.1 (pid: 4340, stack limit = 0xdf9e8000)
Stack: (0xdf9e9e18 to 0xdf9ea000)
9e00:                                                       00000000 00000000
9e20: 00000000 00000000 20000040 00000001 00000000 00000000 00000000 00000000
9e40: 00000000 00000000 00000000 00000000 00000060 00000000 00000000 00000000
9e60: 00000000 00000000 00000000 00000000 00000000 00000000 00000007 00000000
9e80: 00000000 00000001 ffffffff 00000000 00000000 00000000 00000000 00000000
9ea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000010 00000000
9ec0: 00000000 00000000 00000007 00000000 c0606610 cf9284f2 df9e9ef4 c0606610
9ee0: 00000000 84f82481 20000040 84f82480 00000004 83ecec00 df9e9f14 df9e9f08
9f00: 805a99a4 805a9290 df9e9fa4 df9e9f18 8051c364 805a9988 83ecec00 00000001
9f20: ecac8b10 83ecec00 df9e9f44 df9e9f38 819018f4 819017c4 df9e9f5c df9e9f48
9f40: 8024d45c 8027d278 40000000 df9e9fb0 df9e9f84 df9e9f60 80202df4 8024d418
9f60: 8261c90c df9e9fb0 0006bd90 ecac8b10 80202cdc cf9284f2 df9e9fac 00000000
9f80: 00000000 0014c2c8 00000036 8020029c 83ecec00 00000036 00000000 df9e9fa8
9fa0: 80200060 8051c23c 00000000 00000000 00000004 c0606610 20000040 00000000
9fc0: 00000000 00000000 0014c2c8 00000036 7e96132e 7e96132f 003d0f00 76b280fc
9fe0: 76b27f08 76b27ef8 00016d28 00051560 60000010 00000004 00000000 00000000
Call trace: 
[<805a9284>] (do_pagemap_scan) from [<805a99a4>] (do_pagemap_cmd+0x28/0x34 fs/proc/task_mmu.c:2522)
 r10:83ecec00 r9:00000004 r8:84f82480 r7:20000040 r6:84f82481 r5:00000000
 r4:c0606610
[<805a997c>] (do_pagemap_cmd) from [<8051c364>] (vfs_ioctl fs/ioctl.c:51 [inline])
[<805a997c>] (do_pagemap_cmd) from [<8051c364>] (do_vfs_ioctl fs/ioctl.c:861 [inline])
[<805a997c>] (do_pagemap_cmd) from [<8051c364>] (__do_sys_ioctl fs/ioctl.c:905 [inline])
[<805a997c>] (do_pagemap_cmd) from [<8051c364>] (sys_ioctl+0x134/0xda4 fs/ioctl.c:893)
[<8051c230>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67)
Exception stack(0xdf9e9fa8 to 0xdf9e9ff0)
9fa0:                   00000000 00000000 00000004 c0606610 20000040 00000000
9fc0: 00000000 00000000 0014c2c8 00000036 7e96132e 7e96132f 003d0f00 76b280fc
9fe0: 76b27f08 76b27ef8 00016d28 00051560
 r10:00000036 r9:83ecec00 r8:8020029c r7:00000036 r6:0014c2c8 r5:00000000
 r4:00000000
Code: e51b309c e51b108c e50b103c e3a01000 (e1c080f8) 
---[ end trace 0000000000000000 ]---
----------------
Code disassembly (best guess):
   0:	e51b309c 	ldr	r3, [fp, #-156]	@ 0xffffff64
   4:	e51b108c 	ldr	r1, [fp, #-140]	@ 0xffffff74
   8:	e50b103c 	str	r1, [fp, #-60]	@ 0xffffffc4
   c:	e3a01000 	mov	r1, #0
* 10:	e1c080f8 	strd	r8, [r0, #8] <-- trapping instruction