8<--- cut here --- Unable to handle kernel NULL pointer dereference at virtual address 00000108 when read [00000108] *pgd=85342003, *pmd=f32e6003 Internal error: Oops: 207 [#1] PREEMPT SMP ARM Modules linked in: CPU: 1 PID: 9743 Comm: syz-executor.1 Not tainted 6.2.0-syzkaller #0 Hardware name: ARM-Versatile Express PC is at nfc_llcp_find_local+0x24/0x6c net/nfc/llcp_core.c:287 LR is at nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611 pc : [<81742130>] lr : [<81744228>] psr: 00000013 sp : eb991e40 ip : eb991e50 fp : eb991e4c r10: 5ac3c35a r9 : 7efffd08 r8 : 83de1e50 r7 : 84a0f800 r6 : 84a0f824 r5 : 850d985c r4 : 850d9800 r3 : 850db000 r2 : 825d5cd0 r1 : 850d9800 r0 : 00000100 Flags: nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 8514d200 DAC: 00000000 Register r0 information: non-paged memory Register r1 information: slab kmalloc-1k start 850d9800 pointer offset 0 size 1024 Register r2 information: non-slab/vmalloc memory Register r3 information: slab kmalloc-1k start 850db000 pointer offset 0 size 1024 Register r4 information: slab kmalloc-1k start 850d9800 pointer offset 0 size 1024 Register r5 information: slab kmalloc-1k start 850d9800 pointer offset 92 size 1024 Register r6 information: slab kmalloc-2k start 84a0f800 pointer offset 36 size 2048 Register r7 information: slab kmalloc-2k start 84a0f800 pointer offset 0 size 2048 Register r8 information: slab cred_jar start 83de1e40 pointer offset 16 size 176 Register r9 information: 2-page vmalloc region starting at 0x7f000000 allocated at bpf_jit_alloc_exec+0x10/0x14 kernel/bpf/core.c:1000 Register r10 information: non-paged memory Register r11 information: 2-page vmalloc region starting at 0xeb990000 allocated at kernel_clone+0x9c/0x3e0 kernel/fork.c:2684 Register r12 information: 2-page vmalloc region starting at 0xeb990000 allocated at kernel_clone+0x9c/0x3e0 kernel/fork.c:2684 Process syz-executor.1 (pid: 9743, stack limit = 0xeb990000) Stack: (0xeb991e40 to 0xeb992000) 1e40: eb991e64 eb991e50 81744228 81742118 850d9800 850d985c eb991e7c eb991e68 1e60: 8173bae8 81744224 84a0f824 84a0f824 eb991ea4 eb991e80 81748590 8173ba68 1e80: 850b2840 000e001b 82ce2dd0 83a49850 83de1e50 7efffd08 eb991ebc eb991ea8 1ea0: 80a57a68 81748508 84e8dcc0 000e001b eb991ef4 eb991ec0 804c1c98 80a57a5c 1ec0: 80277048 802a38bc 8020c2d8 8020d334 00000000 8506cd04 8506c500 8264e5e0 1ee0: 8506cd34 7efffd08 eb991f04 eb991ef8 804c1ef4 804c1c20 eb991f2c eb991f08 1f00: 80267ad4 804c1ef0 8506c500 eb991fb0 80200288 fffffe30 80200288 7efffd08 1f20: eb991fac eb991f30 8020c034 80267a54 804c1bcc 80267820 7efffd08 8240c44c 1f40: eb991f6c eb991f50 804bafb8 804c1b50 00000003 82b82d00 82b82d40 84e8dcc0 1f60: eb991f94 eb991f70 804e39ec 804baf5c 00000004 02c474c0 00000000 8f015cd0 1f80: 80200288 00000004 02c474c0 00000000 00000006 80200288 8506c500 00000006 1fa0: 00000000 eb991fb0 80200088 8020bc1c 00000000 00000002 00000000 00000003 1fc0: 00000004 02c474c0 00000000 00000006 00140000 000003e8 7ebfe504 00000000 1fe0: 32b20000 7ebfe3f8 0002a430 0002a8ec 80000010 00000003 00000000 00000000 Backtrace: [<8174210c>] (nfc_llcp_find_local) from [<81744228>] (nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611) [<81744218>] (nfc_llcp_unregister_device) from [<8173bae8>] (nfc_unregister_device+0x8c/0x118 net/nfc/core.c:1179) r5:850d985c r4:850d9800 [<8173ba5c>] (nfc_unregister_device) from [<81748590>] (nci_unregister_device+0x94/0x98 net/nfc/nci/core.c:1303) r5:84a0f824 r4:84a0f824 [<817484fc>] (nci_unregister_device) from [<80a57a68>] (virtual_ncidev_close+0x18/0x30 drivers/nfc/virtual_ncidev.c:163) r9:7efffd08 r8:83de1e50 r7:83a49850 r6:82ce2dd0 r5:000e001b r4:850b2840 [<80a57a50>] (virtual_ncidev_close) from [<804c1c98>] (__fput+0x84/0x264 fs/file_table.c:321) r5:000e001b r4:84e8dcc0 [<804c1c14>] (__fput) from [<804c1ef4>] (____fput+0x10/0x14 fs/file_table.c:349) r9:7efffd08 r8:8506cd34 r7:8264e5e0 r6:8506c500 r5:8506cd04 r4:00000000 [<804c1ee4>] (____fput) from [<80267ad4>] (task_work_run+0x8c/0xb4 kernel/task_work.c:179) [<80267a48>] (task_work_run) from [<8020c034>] (resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]) [<80267a48>] (task_work_run) from [<8020c034>] (do_work_pending+0x424/0x528 arch/arm/kernel/signal.c:630) r9:7efffd08 r8:80200288 r7:fffffe30 r6:80200288 r5:eb991fb0 r4:8506c500 [<8020bc10>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x20) Exception stack(0xeb991fb0 to 0xeb991ff8) 1fa0: 00000000 00000002 00000000 00000003 1fc0: 00000004 02c474c0 00000000 00000006 00140000 000003e8 7ebfe504 00000000 1fe0: 32b20000 7ebfe3f8 0002a430 0002a8ec 80000010 00000003 r10:00000006 r9:8506c500 r8:80200288 r7:00000006 r6:00000000 r5:02c474c0 r4:00000004 Code: e1a01000 e5b20004 e1500002 0a000005 (e5903008) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: e1a01000 mov r1, r0 4: e5b20004 ldr r0, [r2, #4]! 8: e1500002 cmp r0, r2 c: 0a000005 beq 0x28 * 10: e5903008 ldr r3, [r0, #8] <-- trapping instruction