Unable to handle kernel NULL pointer dereference at virtual address 0000000000000012 Mem abort info: ESR = 0x0000000096000005 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: level 1 translation fault Data abort info: ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=0000000114300000 [0000000000000012] pgd=0800000106dd8403, p4d=0800000106dd8403, pud=0800000111495403, pmd=0000000000000000 Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Modules linked in: CPU: 1 UID: 0 PID: 27 Comm: kworker/1:1 Not tainted 6.13.0-rc7-syzkaller-g1950a0af2d55 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: slub_flushwq flush_cpu_slab pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __put_partials+0x44/0x250 mm/slub.c:3129 lr : put_partials mm/slub.c:3176 [inline] lr : flush_cpu_slab+0x1c8/0x270 mm/slub.c:3311 sp : ffff800097b87a50 x29: ffff800097b87a50 x28: 0000000000000200 x27: 1fffe00018372b5a x26: ffff0000c1092808 x25: 0000000000000002 x24: 0000000000000002 x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000002 x20: 0000000000000000 x19: ffff0000c77ff8c0 x18: 1fffe00036700e7e x17: ffff80008f99d000 x16: ffff8000804642d0 x15: 0000000000000001 x14: 1ffff00011f340ca x13: ffff800097b88000 x12: 0000000000000003 x11: 0000000000000000 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : 00000000000000c0 x7 : ffff800080b514e4 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000006 x1 : 0000000000000002 x0 : ffff0000c77ff8c0 Call trace: __put_partials+0x44/0x250 mm/slub.c:3129 (P) put_partials mm/slub.c:3176 [inline] flush_cpu_slab+0x1c8/0x270 mm/slub.c:3311 process_one_work+0x7a8/0x15cc kernel/workqueue.c:3236 process_scheduled_works kernel/workqueue.c:3317 [inline] worker_thread+0x97c/0xeec kernel/workqueue.c:3398 kthread+0x288/0x310 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862 Code: aa1f03f7 5280401c aa1503f8 aa1503f9 (f8410f35) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: aa1f03f7 mov x23, xzr 4: 5280401c mov w28, #0x200 // #512 8: aa1503f8 mov x24, x21 c: aa1503f9 mov x25, x21 * 10: f8410f35 ldr x21, [x25, #16]! <-- trapping instruction