8<--- cut here --- Unable to handle kernel NULL pointer dereference at virtual address 00000108 when read [00000108] *pgd=85b26003, *pmd=e6c16003 Internal error: Oops: 207 [#1] PREEMPT SMP ARM Modules linked in: CPU: 0 PID: 21626 Comm: syz-executor.0 Not tainted 6.2.0-syzkaller #0 Hardware name: ARM-Versatile Express PC is at nfc_llcp_find_local+0x24/0x6c net/nfc/llcp_core.c:287 LR is at nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611 pc : [<81739538>] lr : [<8173b630>] psr: 00000113 sp : ee5d9e40 ip : ee5d9e50 fp : ee5d9e4c r10: 5ac3c35a r9 : 7efffd08 r8 : 83d23490 r7 : 84934000 r6 : 84934024 r5 : 8579285c r4 : 85792800 r3 : 8581f400 r2 : 825d5b90 r1 : 85792800 r0 : 00000100 Flags: nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 85971140 DAC: fffffffd Register r0 information: non-paged memory Register r1 information: slab kmalloc-1k start 85792800 pointer offset 0 size 1024 Register r2 information: non-slab/vmalloc memory Register r3 information: slab kmalloc-1k start 8581f400 pointer offset 0 size 1024 Register r4 information: slab kmalloc-1k start 85792800 pointer offset 0 size 1024 Register r5 information: slab kmalloc-1k start 85792800 pointer offset 92 size 1024 Register r6 information: slab kmalloc-2k start 84934000 pointer offset 36 size 2048 Register r7 information: slab kmalloc-2k start 84934000 pointer offset 0 size 2048 Register r8 information: slab cred_jar start 83d23480 pointer offset 16 size 176 Register r9 information: 2-page vmalloc region starting at 0x7f000000 allocated at bpf_jit_alloc_exec+0x10/0x14 kernel/bpf/core.c:1000 Register r10 information: non-paged memory Register r11 information: 2-page vmalloc region starting at 0xee5d8000 allocated at kernel_clone+0x9c/0x3e0 kernel/fork.c:2687 Register r12 information: 2-page vmalloc region starting at 0xee5d8000 allocated at kernel_clone+0x9c/0x3e0 kernel/fork.c:2687 Process syz-executor.0 (pid: 21626, stack limit = 0xee5d8000) Stack: (0xee5d9e40 to 0xee5da000) 9e40: ee5d9e64 ee5d9e50 8173b630 81739520 85792800 8579285c ee5d9e7c ee5d9e68 9e60: 81732f00 8173b62c 84934024 84934024 ee5d9ea4 ee5d9e80 8173f998 81732e80 9e80: 859711c0 000e001b 83532bb0 83935650 83d23490 7efffd08 ee5d9ebc ee5d9ea8 9ea0: 80a53780 8173f910 8599fa80 000e001b ee5d9ef4 ee5d9ec0 804c0730 80a53774 9ec0: 80277010 802a3884 8020c2d8 8020d334 00000000 83295884 83295080 8264e5e0 9ee0: 832958b4 7efffd08 ee5d9f04 ee5d9ef8 804c098c 804c06b8 ee5d9f2c ee5d9f08 9f00: 80267aec 804c0988 83295080 ee5d9fb0 80200288 fffffe30 80200288 7efffd08 9f20: ee5d9fac ee5d9f30 8020c034 80267a6c 804c0664 80267838 7efffd08 8240c44c 9f40: ee5d9f6c ee5d9f50 804b9ad0 804c05e8 00000003 828e1200 828e1240 8599fa80 9f60: ee5d9f94 ee5d9f70 804e2434 804b9a74 00000004 0294c4c0 0025eba8 62db512a 9f80: 80200288 00000004 0294c4c0 0025eba8 00000006 80200288 83295080 00000006 9fa0: 00000000 ee5d9fb0 80200088 8020bc1c 00000000 00000002 00000000 00000003 9fc0: 00000004 0294c4c0 0025eba8 00000006 00140000 000003e8 0014c430 00000000 9fe0: 2ca20000 7efac3f8 0002a430 0002a8ec 80000010 00000003 00000000 00000000 Backtrace: [<81739514>] (nfc_llcp_find_local) from [<8173b630>] (nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611) [<8173b620>] (nfc_llcp_unregister_device) from [<81732f00>] (nfc_unregister_device+0x8c/0x118 net/nfc/core.c:1179) r5:8579285c r4:85792800 [<81732e74>] (nfc_unregister_device) from [<8173f998>] (nci_unregister_device+0x94/0x98 net/nfc/nci/core.c:1303) r5:84934024 r4:84934024 [<8173f904>] (nci_unregister_device) from [<80a53780>] (virtual_ncidev_close+0x18/0x30 drivers/nfc/virtual_ncidev.c:163) r9:7efffd08 r8:83d23490 r7:83935650 r6:83532bb0 r5:000e001b r4:859711c0 [<80a53768>] (virtual_ncidev_close) from [<804c0730>] (__fput+0x84/0x264 fs/file_table.c:321) r5:000e001b r4:8599fa80 [<804c06ac>] (__fput) from [<804c098c>] (____fput+0x10/0x14 fs/file_table.c:349) r9:7efffd08 r8:832958b4 r7:8264e5e0 r6:83295080 r5:83295884 r4:00000000 [<804c097c>] (____fput) from [<80267aec>] (task_work_run+0x8c/0xb4 kernel/task_work.c:179) [<80267a60>] (task_work_run) from [<8020c034>] (resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]) [<80267a60>] (task_work_run) from [<8020c034>] (do_work_pending+0x424/0x528 arch/arm/kernel/signal.c:630) r9:7efffd08 r8:80200288 r7:fffffe30 r6:80200288 r5:ee5d9fb0 r4:83295080 [<8020bc10>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x20) Exception stack(0xee5d9fb0 to 0xee5d9ff8) 9fa0: 00000000 00000002 00000000 00000003 9fc0: 00000004 0294c4c0 0025eba8 00000006 00140000 000003e8 0014c430 00000000 9fe0: 2ca20000 7efac3f8 0002a430 0002a8ec 80000010 00000003 r10:00000006 r9:83295080 r8:80200288 r7:00000006 r6:0025eba8 r5:0294c4c0 r4:00000004 Code: e1a01000 e5b20004 e1500002 0a000005 (e5903008) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: e1a01000 mov r1, r0 4: e5b20004 ldr r0, [r2, #4]! 8: e1500002 cmp r0, r2 c: 0a000005 beq 0x28 * 10: e5903008 ldr r3, [r0, #8] <-- trapping instruction