8<--- cut here --- Unable to handle kernel NULL pointer dereference at virtual address 00000108 when read [00000108] *pgd=8490b003, *pmd=fe6a8003 Internal error: Oops: 207 [#1] PREEMPT SMP ARM Modules linked in: CPU: 1 PID: 4747 Comm: syz-executor.0 Not tainted 6.2.0-rc2-syzkaller #0 Hardware name: ARM-Versatile Express PC is at nfc_llcp_find_local+0x24/0x6c net/nfc/llcp_core.c:286 LR is at nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1610 pc : [<81719bb4>] lr : [<8171bcac>] psr: 00000013 sp : eb055e40 ip : eb055e50 fp : eb055e4c r10: 5ac3c35a r9 : 7efffd08 r8 : 850c5c10 r7 : 88aa9000 r6 : 88aa9024 r5 : 8408005c r4 : 84080000 r3 : 84080c00 r2 : 825d06b8 r1 : 84080000 r0 : 00000100 Flags: nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 853e8380 DAC: 00000000 Register r0 information: non-paged memory Register r1 information: slab kmalloc-1k start 84080000 pointer offset 0 size 1024 Register r2 information: non-slab/vmalloc memory Register r3 information: slab kmalloc-1k start 84080c00 pointer offset 0 size 1024 Register r4 information: slab kmalloc-1k start 84080000 pointer offset 0 size 1024 Register r5 information: slab kmalloc-1k start 84080000 pointer offset 92 size 1024 Register r6 information: slab kmalloc-2k start 88aa9000 pointer offset 36 size 2048 Register r7 information: slab kmalloc-2k start 88aa9000 pointer offset 0 size 2048 Register r8 information: slab cred_jar start 850c5c00 pointer offset 16 size 176 Register r9 information: 2-page vmalloc region starting at 0x7f000000 allocated at bpf_jit_alloc_exec+0x10/0x14 kernel/bpf/core.c:998 Register r10 information: non-paged memory Register r11 information: 2-page vmalloc region starting at 0xeb054000 allocated at kernel_clone+0x9c/0x400 kernel/fork.c:2681 Register r12 information: 2-page vmalloc region starting at 0xeb054000 allocated at kernel_clone+0x9c/0x400 kernel/fork.c:2681 Process syz-executor.0 (pid: 4747, stack limit = 0xeb054000) Stack: (0xeb055e40 to 0xeb056000) 5e40: eb055e64 eb055e50 8171bcac 81719b9c 84080000 8408005c eb055e7c eb055e68 5e60: 81713584 8171bca8 88aa9024 88aa9024 eb055ea4 eb055e80 81720014 81713504 5e80: 853e8fc0 000e001b 82c23550 83a47050 850c5c10 7efffd08 eb055ebc eb055ea8 5ea0: 80a335cc 8171ff8c 8417b480 000e001b eb055ef4 eb055ec0 804b2c18 80a335c0 5ec0: 00000020 802a1740 eb055f14 eb055ed8 8417bc00 84b92a84 84b92280 826475e4 5ee0: 84b92ab4 7efffd08 eb055f04 eb055ef8 804b2e74 804b2ba0 eb055f2c eb055f08 5f00: 802666a4 804b2e70 84b92280 eb055fb0 80200288 fffffe30 80200288 7efffd08 5f20: eb055fac eb055f30 8020c078 80266624 eb055f54 eb055f40 7efffd08 8240c44c 5f40: 817b9a28 80274b14 eb055f94 eb055f58 804d6520 817b9a08 84b92280 00000000 5f60: 00000000 4ee886ef 00000005 00000000 00000000 0014c2b8 000001b4 4ee886ef 5f80: 84b92280 00000000 00000000 0014c2b8 000001b4 80200288 84b92280 000001b4 5fa0: 00000000 eb055fb0 80200088 8020bc60 00000000 ffffffff 00000000 00000000 5fc0: 00000000 00000000 0014c2b8 000001b4 7eaca3d2 76b236d0 7eaca544 76b2320c 5fe0: 76b23020 76b23010 00016f9c 0004df50 60000010 00000003 00000000 00000000 Backtrace: [<81719b90>] (nfc_llcp_find_local) from [<8171bcac>] (nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1610) [<8171bc9c>] (nfc_llcp_unregister_device) from [<81713584>] (nfc_unregister_device+0x8c/0x118 net/nfc/core.c:1179) r5:8408005c r4:84080000 [<817134f8>] (nfc_unregister_device) from [<81720014>] (nci_unregister_device+0x94/0x98 net/nfc/nci/core.c:1303) r5:88aa9024 r4:88aa9024 [<8171ff80>] (nci_unregister_device) from [<80a335cc>] (virtual_ncidev_close+0x18/0x30 drivers/nfc/virtual_ncidev.c:163) r9:7efffd08 r8:850c5c10 r7:83a47050 r6:82c23550 r5:000e001b r4:853e8fc0 [<80a335b4>] (virtual_ncidev_close) from [<804b2c18>] (__fput+0x84/0x264 fs/file_table.c:320) r5:000e001b r4:8417b480 [<804b2b94>] (__fput) from [<804b2e74>] (____fput+0x10/0x14 fs/file_table.c:348) r9:7efffd08 r8:84b92ab4 r7:826475e4 r6:84b92280 r5:84b92a84 r4:8417bc00 [<804b2e64>] (____fput) from [<802666a4>] (task_work_run+0x8c/0xb4 kernel/task_work.c:179) [<80266618>] (task_work_run) from [<8020c078>] (resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]) [<80266618>] (task_work_run) from [<8020c078>] (do_work_pending+0x424/0x528 arch/arm/kernel/signal.c:630) r9:7efffd08 r8:80200288 r7:fffffe30 r6:80200288 r5:eb055fb0 r4:84b92280 [<8020bc54>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x20) Exception stack(0xeb055fb0 to 0xeb055ff8) 5fa0: 00000000 ffffffff 00000000 00000000 5fc0: 00000000 00000000 0014c2b8 000001b4 7eaca3d2 76b236d0 7eaca544 76b2320c 5fe0: 76b23020 76b23010 00016f9c 0004df50 60000010 00000003 r10:000001b4 r9:84b92280 r8:80200288 r7:000001b4 r6:0014c2b8 r5:00000000 r4:00000000 Code: e1a01000 e5b20004 e1500002 0a000005 (e5903008) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: e1a01000 mov r1, r0 4: e5b20004 ldr r0, [r2, #4]! 8: e1500002 cmp r0, r2 c: 0a000005 beq 0x28 * 10: e5903008 ldr r3, [r0, #8] <-- trapping instruction