8<--- cut here --- Unable to handle kernel NULL pointer dereference at virtual address 00000108 when read [00000108] *pgd=85340003, *pmd=f20ce003 Internal error: Oops: 207 [#1] PREEMPT SMP ARM Modules linked in: CPU: 1 PID: 9288 Comm: syz-executor.0 Not tainted 6.3.0-rc5-syzkaller #0 Hardware name: ARM-Versatile Express PC is at nfc_llcp_find_local+0x24/0x6c net/nfc/llcp_core.c:287 LR is at nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611 pc : [<81738b74>] lr : [<8173ac6c>] psr: 00000013 sp : eca15e40 ip : eca15e50 fp : eca15e4c r10: 5ac3c35a r9 : 7efffd08 r8 : 831fc6d0 r7 : 84d67800 r6 : 84d67824 r5 : 8504105c r4 : 85041000 r3 : 85040800 r2 : 825d5d90 r1 : 85041000 r0 : 00000100 Flags: nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 8531eb40 DAC: 00000000 Register r0 information: non-paged memory Register r1 information: slab kmalloc-1k start 85041000 pointer offset 0 size 1024 Register r2 information: non-slab/vmalloc memory Register r3 information: slab kmalloc-1k start 85040800 pointer offset 0 size 1024 Register r4 information: slab kmalloc-1k start 85041000 pointer offset 0 size 1024 Register r5 information: slab kmalloc-1k start 85041000 pointer offset 92 size 1024 Register r6 information: slab kmalloc-2k start 84d67800 pointer offset 36 size 2048 Register r7 information: slab kmalloc-2k start 84d67800 pointer offset 0 size 2048 Register r8 information: slab cred_jar start 831fc6c0 pointer offset 16 size 176 Register r9 information: 2-page vmalloc region starting at 0x7f000000 allocated at bpf_jit_alloc_exec+0x10/0x14 kernel/bpf/core.c:1000 Register r10 information: non-paged memory Register r11 information: 2-page vmalloc region starting at 0xeca14000 allocated at kernel_clone+0x9c/0x3d4 kernel/fork.c:2679 Register r12 information: 2-page vmalloc region starting at 0xeca14000 allocated at kernel_clone+0x9c/0x3d4 kernel/fork.c:2679 Process syz-executor.0 (pid: 9288, stack limit = 0xeca14000) Stack: (0xeca15e40 to 0xeca16000) 5e40: eca15e64 eca15e50 8173ac6c 81738b5c 85041000 8504105c eca15e7c eca15e68 5e60: 8173252c 8173ac68 84d67824 84d67824 eca15ea4 eca15e80 8173efd4 817324ac 5e80: 8530ab40 000e001b 8358bf68 833a7a50 831fc6d0 7efffd08 eca15ebc eca15ea8 5ea0: 80a51714 8173ef4c 850c59c0 000e001b eca15ef4 eca15ec0 804be208 80a51708 5ec0: 80276808 802a2574 eca15ef4 eca15ed8 00000000 832b4184 832b3980 8264e5e0 5ee0: 832b41b4 7efffd08 eca15f04 eca15ef8 804be464 804be190 eca15f2c eca15f08 5f00: 802670ec 804be460 832b3980 eca15fb0 80200288 fffffe30 80200288 7efffd08 5f20: eca15fac eca15f30 8020bfd0 8026706c eca15f54 eca15f40 7efffd08 8240c44c 5f40: 850c59c0 00000000 eca15f74 eca15f58 804b7530 804be0c0 850c59c0 831ff600 5f60: 831ff640 00000006 eca15f94 eca15f78 804e0928 804b74d4 00000007 a6b9c751 5f80: 76b48000 00000007 014174c0 76b48000 00000006 80200288 832b3980 00000006 5fa0: 00000000 eca15fb0 80200088 8020bbb8 00000000 00000002 00000000 00000006 5fc0: 00000007 014174c0 76b48000 00000006 000001f4 76b4d998 0014c280 00000000 5fe0: 2cc20000 7ea433f8 0002a448 0002a904 80000010 00000006 00000000 00000000 Backtrace: [<81738b50>] (nfc_llcp_find_local) from [<8173ac6c>] (nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611) [<8173ac5c>] (nfc_llcp_unregister_device) from [<8173252c>] (nfc_unregister_device+0x8c/0x118 net/nfc/core.c:1179) r5:8504105c r4:85041000 [<817324a0>] (nfc_unregister_device) from [<8173efd4>] (nci_unregister_device+0x94/0x98 net/nfc/nci/core.c:1303) r5:84d67824 r4:84d67824 [<8173ef40>] (nci_unregister_device) from [<80a51714>] (virtual_ncidev_close+0x18/0x30 drivers/nfc/virtual_ncidev.c:163) r9:7efffd08 r8:831fc6d0 r7:833a7a50 r6:8358bf68 r5:000e001b r4:8530ab40 [<80a516fc>] (virtual_ncidev_close) from [<804be208>] (__fput+0x84/0x264 fs/file_table.c:321) r5:000e001b r4:850c59c0 [<804be184>] (__fput) from [<804be464>] (____fput+0x10/0x14 fs/file_table.c:349) r9:7efffd08 r8:832b41b4 r7:8264e5e0 r6:832b3980 r5:832b4184 r4:00000000 [<804be454>] (____fput) from [<802670ec>] (task_work_run+0x8c/0xb4 kernel/task_work.c:179) [<80267060>] (task_work_run) from [<8020bfd0>] (resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]) [<80267060>] (task_work_run) from [<8020bfd0>] (do_work_pending+0x424/0x528 arch/arm/kernel/signal.c:630) r9:7efffd08 r8:80200288 r7:fffffe30 r6:80200288 r5:eca15fb0 r4:832b3980 [<8020bbac>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x20) Exception stack(0xeca15fb0 to 0xeca15ff8) 5fa0: 00000000 00000002 00000000 00000006 5fc0: 00000007 014174c0 76b48000 00000006 000001f4 76b4d998 0014c280 00000000 5fe0: 2cc20000 7ea433f8 0002a448 0002a904 80000010 00000006 r10:00000006 r9:832b3980 r8:80200288 r7:00000006 r6:76b48000 r5:014174c0 r4:00000007 Code: e1a01000 e5b20004 e1500002 0a000005 (e5903008) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: e1a01000 mov r1, r0 4: e5b20004 ldr r0, [r2, #4]! 8: e1500002 cmp r0, r2 c: 0a000005 beq 0x28 * 10: e5903008 ldr r3, [r0, #8] <-- trapping instruction