================================================================== BUG: KASAN: null-ptr-deref in llcp_sock_getname+0x242/0x3b0 net/nfc/llcp_sock.c:519 Read of size 1 at addr 0000000000000000 by task syz-executor.5/6418 CPU: 1 PID: 6418 Comm: syz-executor.5 Not tainted 5.9.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d6/0x29e lib/dump_stack.c:118 __kasan_report mm/kasan/report.c:517 [inline] kasan_report+0x151/0x1d0 mm/kasan/report.c:530 check_memory_region_inline mm/kasan/generic.c:183 [inline] check_memory_region+0x2b5/0x2f0 mm/kasan/generic.c:192 memcpy+0x25/0x60 mm/kasan/common.c:105 llcp_sock_getname+0x242/0x3b0 net/nfc/llcp_sock.c:519 __sys_getpeername+0x180/0x270 net/socket.c:1940 __do_sys_getpeername net/socket.c:1953 [inline] __se_sys_getpeername net/socket.c:1950 [inline] __x64_sys_getpeername+0x77/0x90 net/socket.c:1950 do_syscall_64+0x31/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45d5b9 Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f2b3b069c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000034 RAX: ffffffffffffffda RBX: 00000000000040c0 RCX: 000000000045d5b9 RDX: 0000000020003600 RSI: 0000000020004080 RDI: 0000000000000007 RBP: 000000000118cf80 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118cf4c R13: 00007ffcc8bc5f8f R14: 00007f2b3b06a9c0 R15: 000000000118cf4c ==================================================================