8<--- cut here --- Unable to handle kernel NULL pointer dereference at virtual address 00000108 when read [00000108] *pgd=8546d003, *pmd=fe50b003 Internal error: Oops: 207 [#1] PREEMPT SMP ARM Modules linked in: CPU: 0 PID: 6343 Comm: syz-executor.1 Not tainted 6.3.0-rc1-syzkaller #0 Hardware name: ARM-Versatile Express PC is at nfc_llcp_find_local+0x24/0x6c net/nfc/llcp_core.c:287 LR is at nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611 pc : [<8173ecc0>] lr : [<81740db8>] psr: 000f0013 sp : e869de40 ip : e869de50 fp : e869de4c r10: 5ac3c35a r9 : 7efffd08 r8 : 8324c910 r7 : 8511b000 r6 : 8511b024 r5 : 83e2d45c r4 : 83e2d400 r3 : 83345800 r2 : 825d5cd0 r1 : 83e2d400 r0 : 00000100 Flags: nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 85470740 DAC: fffffffd Register r0 information: non-paged memory Register r1 information: slab kmalloc-1k start 83e2d400 pointer offset 0 size 1024 Register r2 information: non-slab/vmalloc memory Register r3 information: slab kmalloc-1k start 83345800 pointer offset 0 size 1024 Register r4 information: slab kmalloc-1k start 83e2d400 pointer offset 0 size 1024 Register r5 information: slab kmalloc-1k start 83e2d400 pointer offset 92 size 1024 Register r6 information: slab kmalloc-2k start 8511b000 pointer offset 36 size 2048 Register r7 information: slab kmalloc-2k start 8511b000 pointer offset 0 size 2048 Register r8 information: slab cred_jar start 8324c900 pointer offset 16 size 176 Register r9 information: 2-page vmalloc region starting at 0x7f000000 allocated at bpf_jit_alloc_exec+0x10/0x14 kernel/bpf/core.c:1000 Register r10 information: non-paged memory Register r11 information: 2-page vmalloc region starting at 0xe869c000 allocated at kernel_clone+0x9c/0x3e0 kernel/fork.c:2684 Register r12 information: 2-page vmalloc region starting at 0xe869c000 allocated at kernel_clone+0x9c/0x3e0 kernel/fork.c:2684 Process syz-executor.1 (pid: 6343, stack limit = 0xe869c000) Stack: (0xe869de40 to 0xe869e000) de40: e869de64 e869de50 81740db8 8173eca8 83e2d400 83e2d45c e869de7c e869de68 de60: 81738678 81740db4 8511b024 8511b024 e869dea4 e869de80 81745120 817385f8 de80: 85470f00 000e001b 82ccd198 82b8bc50 8324c910 7efffd08 e869debc e869dea8 dea0: 80a554a8 81745098 82a36b40 000e001b e869def4 e869dec0 804bfb60 80a5549c dec0: 802768c8 802a2fb8 8020c2c4 8020d320 00000000 828fd884 828fd080 8264e5e0 dee0: 828fd8b4 7efffd08 e869df04 e869def8 804bfdbc 804bfae8 e869df2c e869df08 df00: 802673d8 804bfdb8 828fd080 e869dfb0 80200288 fffffe30 80200288 7efffd08 df20: e869dfac e869df30 8020c020 80267358 804bfa94 80267124 7efffd08 8240c44c df40: e869df6c e869df50 804b8e88 804bfa18 00000003 83f9ab00 83f9ab40 82a36b40 df60: e869df94 e869df70 804e189c 804b8e2c 00000004 01ecc4c0 00000000 1c2942b3 df80: 80200288 00000004 01ecc4c0 00000000 00000006 80200288 828fd080 00000006 dfa0: 00000000 e869dfb0 80200088 8020bc08 00000000 00000002 00000000 00000003 dfc0: 00000004 01ecc4c0 00000000 00000006 00140000 000003e8 7edcb504 00000000 dfe0: 32a20000 7edcb3f8 0002a430 0002a8ec 80000010 00000003 00000000 00000000 Backtrace: [<8173ec9c>] (nfc_llcp_find_local) from [<81740db8>] (nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611) [<81740da8>] (nfc_llcp_unregister_device) from [<81738678>] (nfc_unregister_device+0x8c/0x118 net/nfc/core.c:1179) r5:83e2d45c r4:83e2d400 [<817385ec>] (nfc_unregister_device) from [<81745120>] (nci_unregister_device+0x94/0x98 net/nfc/nci/core.c:1303) r5:8511b024 r4:8511b024 [<8174508c>] (nci_unregister_device) from [<80a554a8>] (virtual_ncidev_close+0x18/0x30 drivers/nfc/virtual_ncidev.c:163) r9:7efffd08 r8:8324c910 r7:82b8bc50 r6:82ccd198 r5:000e001b r4:85470f00 [<80a55490>] (virtual_ncidev_close) from [<804bfb60>] (__fput+0x84/0x264 fs/file_table.c:321) r5:000e001b r4:82a36b40 [<804bfadc>] (__fput) from [<804bfdbc>] (____fput+0x10/0x14 fs/file_table.c:349) r9:7efffd08 r8:828fd8b4 r7:8264e5e0 r6:828fd080 r5:828fd884 r4:00000000 [<804bfdac>] (____fput) from [<802673d8>] (task_work_run+0x8c/0xb4 kernel/task_work.c:179) [<8026734c>] (task_work_run) from [<8020c020>] (resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]) [<8026734c>] (task_work_run) from [<8020c020>] (do_work_pending+0x424/0x528 arch/arm/kernel/signal.c:630) r9:7efffd08 r8:80200288 r7:fffffe30 r6:80200288 r5:e869dfb0 r4:828fd080 [<8020bbfc>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x20) Exception stack(0xe869dfb0 to 0xe869dff8) dfa0: 00000000 00000002 00000000 00000003 dfc0: 00000004 01ecc4c0 00000000 00000006 00140000 000003e8 7edcb504 00000000 dfe0: 32a20000 7edcb3f8 0002a430 0002a8ec 80000010 00000003 r10:00000006 r9:828fd080 r8:80200288 r7:00000006 r6:00000000 r5:01ecc4c0 r4:00000004 Code: e1a01000 e5b20004 e1500002 0a000005 (e5903008) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: e1a01000 mov r1, r0 4: e5b20004 ldr r0, [r2, #4]! 8: e1500002 cmp r0, r2 c: 0a000005 beq 0x28 * 10: e5903008 ldr r3, [r0, #8] <-- trapping instruction