8<--- cut here --- Unable to handle kernel NULL pointer dereference at virtual address 00000108 when read [00000108] *pgd=8611b003, *pmd=f5148003 Internal error: Oops: 207 [#1] PREEMPT SMP ARM Modules linked in: CPU: 1 PID: 17225 Comm: syz-executor.1 Not tainted 6.4.0-rc3-syzkaller #0 Hardware name: ARM-Versatile Express PC is at nfc_llcp_find_local+0x24/0x6c net/nfc/llcp_core.c:287 LR is at nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611 pc : [<8175c894>] lr : [<8175e98c>] psr: 000f0013 sp : ee6b1e40 ip : ee6b1e50 fp : ee6b1e4c r10: 5ac3c35a r9 : 7efffd08 r8 : 85ba9250 r7 : 85abc000 r6 : 85abc024 r5 : 8627305c r4 : 86273000 r3 : 86411800 r2 : 827d6f4c r1 : 86273000 r0 : 00000100 Flags: nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 85bb1480 DAC: 00000000 Register r0 information: non-paged memory Register r1 information: slab kmalloc-1k start 86273000 pointer offset 0 size 1024 Register r2 information: non-slab/vmalloc memory Register r3 information: slab kmalloc-1k start 86411800 pointer offset 0 size 1024 Register r4 information: slab kmalloc-1k start 86273000 pointer offset 0 size 1024 Register r5 information: slab kmalloc-1k start 86273000 pointer offset 92 size 1024 Register r6 information: slab kmalloc-2k start 85abc000 pointer offset 36 size 2048 Register r7 information: slab kmalloc-2k start 85abc000 pointer offset 0 size 2048 Register r8 information: slab cred_jar start 85ba9240 pointer offset 16 size 168 Register r9 information: 2-page vmalloc region starting at 0x7f000000 allocated at bpf_jit_alloc_exec+0x10/0x14 kernel/bpf/core.c:1000 Register r10 information: non-paged memory Register r11 information: 2-page vmalloc region starting at 0xee6b0000 allocated at kernel_clone+0x9c/0x3dc kernel/fork.c:2918 Register r12 information: 2-page vmalloc region starting at 0xee6b0000 allocated at kernel_clone+0x9c/0x3dc kernel/fork.c:2918 Process syz-executor.1 (pid: 17225, stack limit = 0xee6b0000) Stack: (0xee6b1e40 to 0xee6b2000) 1e40: ee6b1e64 ee6b1e50 8175e98c 8175c87c 86273000 8627305c ee6b1e7c ee6b1e68 1e60: 8175624c 8175e988 85abc024 85abc024 ee6b1ea4 ee6b1e80 81762cf4 817561cc 1e80: 861a4c40 000e001b 838e6dd0 8432e650 85ba9250 7efffd08 ee6b1ebc ee6b1ea8 1ea0: 80a68c68 81762c6c 83520000 000e001b ee6b1ef4 ee6b1ec0 804cfe98 80a68c5c 1ec0: 80277dd0 802a6080 ee6b1efc ee6b1ed8 00000000 831fc2cc 831fbac0 828515e0 1ee0: 831fc2fc 7efffd08 ee6b1f04 ee6b1ef8 804d00f4 804cfe20 ee6b1f2c ee6b1f08 1f00: 802678b4 804d00f0 831fbac0 ee6b1fb0 80200288 fffffe30 80200288 7efffd08 1f20: ee6b1fac ee6b1f30 8020c00c 80267834 ee6b1f54 ee6b1f40 7efffd08 8260c44c 1f40: 83520000 00000000 ee6b1f74 ee6b1f58 804c90d4 804cfd50 83520000 83603d00 1f60: 83603d40 00000006 ee6b1f94 ee6b1f78 804f27d4 804c9078 00000007 37894584 1f80: 00000000 00000007 025874c0 00000000 00000006 80200288 831fbac0 00000006 1fa0: 00000000 ee6b1fb0 80200088 8020bbec 00000000 00000002 00000000 00000006 1fc0: 00000007 025874c0 00000000 00000006 00140000 000003e8 0014c3a0 00000000 1fe0: 30220000 7e8ec3f8 0002a448 0002a904 80000010 00000006 00000000 00000000 Backtrace: [<8175c870>] (nfc_llcp_find_local) from [<8175e98c>] (nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611) [<8175e97c>] (nfc_llcp_unregister_device) from [<8175624c>] (nfc_unregister_device+0x8c/0x118 net/nfc/core.c:1179) r5:8627305c r4:86273000 [<817561c0>] (nfc_unregister_device) from [<81762cf4>] (nci_unregister_device+0x94/0x98 net/nfc/nci/core.c:1303) r5:85abc024 r4:85abc024 [<81762c60>] (nci_unregister_device) from [<80a68c68>] (virtual_ncidev_close+0x18/0x30 drivers/nfc/virtual_ncidev.c:163) r9:7efffd08 r8:85ba9250 r7:8432e650 r6:838e6dd0 r5:000e001b r4:861a4c40 [<80a68c50>] (virtual_ncidev_close) from [<804cfe98>] (__fput+0x84/0x264 fs/file_table.c:321) r5:000e001b r4:83520000 [<804cfe14>] (__fput) from [<804d00f4>] (____fput+0x10/0x14 fs/file_table.c:349) r9:7efffd08 r8:831fc2fc r7:828515e0 r6:831fbac0 r5:831fc2cc r4:00000000 [<804d00e4>] (____fput) from [<802678b4>] (task_work_run+0x8c/0xb4 kernel/task_work.c:179) [<80267828>] (task_work_run) from [<8020c00c>] (resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]) [<80267828>] (task_work_run) from [<8020c00c>] (do_work_pending+0x42c/0x538 arch/arm/kernel/signal.c:630) r9:7efffd08 r8:80200288 r7:fffffe30 r6:80200288 r5:ee6b1fb0 r4:831fbac0 [<8020bbe0>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x20) Exception stack(0xee6b1fb0 to 0xee6b1ff8) 1fa0: 00000000 00000002 00000000 00000006 1fc0: 00000007 025874c0 00000000 00000006 00140000 000003e8 0014c3a0 00000000 1fe0: 30220000 7e8ec3f8 0002a448 0002a904 80000010 00000006 r10:00000006 r9:831fbac0 r8:80200288 r7:00000006 r6:00000000 r5:025874c0 r4:00000007 Code: e1a01000 e5b20004 e1500002 0a000005 (e5903008) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: e1a01000 mov r1, r0 4: e5b20004 ldr r0, [r2, #4]! 8: e1500002 cmp r0, r2 c: 0a000005 beq 0x28 * 10: e5903008 ldr r3, [r0, #8] <-- trapping instruction