8<--- cut here --- Unable to handle kernel NULL pointer dereference at virtual address 00000108 when read [00000108] *pgd=853ed003, *pmd=f158a003 Internal error: Oops: 207 [#1] PREEMPT SMP ARM Modules linked in: CPU: 0 PID: 16888 Comm: syz-executor.1 Not tainted 6.2.0-syzkaller #0 Hardware name: ARM-Versatile Express PC is at nfc_llcp_find_local+0x24/0x6c net/nfc/llcp_core.c:287 LR is at nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611 pc : [<81742240>] lr : [<81744338>] psr: 000f0013 sp : ea775e40 ip : ea775e50 fp : ea775e4c r10: 5ac3c35a r9 : 7efffd08 r8 : 83e3fa90 r7 : 83e1f800 r6 : 83e1f824 r5 : 840bd45c r4 : 840bd400 r3 : 840bc000 r2 : 825d5cd0 r1 : 840bd400 r0 : 00000100 Flags: nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 850fc680 DAC: fffffffd Register r0 information: non-paged memory Register r1 information: slab kmalloc-1k start 840bd400 pointer offset 0 size 1024 Register r2 information: non-slab/vmalloc memory Register r3 information: slab kmalloc-1k start 840bc000 pointer offset 0 size 1024 Register r4 information: slab kmalloc-1k start 840bd400 pointer offset 0 size 1024 Register r5 information: slab kmalloc-1k start 840bd400 pointer offset 92 size 1024 Register r6 information: slab kmalloc-2k start 83e1f800 pointer offset 36 size 2048 Register r7 information: slab kmalloc-2k start 83e1f800 pointer offset 0 size 2048 Register r8 information: slab cred_jar start 83e3fa80 pointer offset 16 size 176 Register r9 information: 2-page vmalloc region starting at 0x7f000000 allocated at bpf_jit_alloc_exec+0x10/0x14 kernel/bpf/core.c:1000 Register r10 information: non-paged memory Register r11 information: 2-page vmalloc region starting at 0xea774000 allocated at kernel_clone+0x9c/0x3e0 kernel/fork.c:2684 Register r12 information: 2-page vmalloc region starting at 0xea774000 allocated at kernel_clone+0x9c/0x3e0 kernel/fork.c:2684 Process syz-executor.1 (pid: 16888, stack limit = 0xea774000) Stack: (0xea775e40 to 0xea776000) 5e40: ea775e64 ea775e50 81744338 81742228 840bd400 840bd45c ea775e7c ea775e68 5e60: 8173bbf8 81744334 83e1f824 83e1f824 ea775ea4 ea775e80 817486a0 8173bb78 5e80: 850fce00 000e001b 834e0088 82955c50 83e3fa90 7efffd08 ea775ebc ea775ea8 5ea0: 80a57b58 81748618 839b8600 000e001b ea775ef4 ea775ec0 804c1e48 80a57b4c 5ec0: 80276f98 802a380c 8020c2d8 8020d334 00000000 830b1384 830b0b80 8264e5e0 5ee0: 830b13b4 7efffd08 ea775f04 ea775ef8 804c20a4 804c1dd0 ea775f2c ea775f08 5f00: 80267a24 804c20a0 830b0b80 ea775fb0 80200288 fffffe30 80200288 7efffd08 5f20: ea775fac ea775f30 8020c034 802679a4 804c1d7c 80267770 7efffd08 8240c44c 5f40: ea775f6c ea775f50 804bb170 804c1d00 00000003 83ca1700 83ca1740 839b8600 5f60: ea775f94 ea775f70 804e3b9c 804bb114 00000004 026a84c0 000ed631 b7ea2f4f 5f80: 80200288 00000004 026a84c0 000ed631 00000006 80200288 830b0b80 00000006 5fa0: 00000000 ea775fb0 80200088 8020bc1c 00000000 00000002 00000000 00000003 5fc0: 00000004 026a84c0 000ed631 00000006 00140000 000003e8 0014c3a0 00000000 5fe0: 2c920000 7eb783f8 0002a430 0002a8ec 80000010 00000003 00000000 00000000 Backtrace: [<8174221c>] (nfc_llcp_find_local) from [<81744338>] (nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611) [<81744328>] (nfc_llcp_unregister_device) from [<8173bbf8>] (nfc_unregister_device+0x8c/0x118 net/nfc/core.c:1179) r5:840bd45c r4:840bd400 [<8173bb6c>] (nfc_unregister_device) from [<817486a0>] (nci_unregister_device+0x94/0x98 net/nfc/nci/core.c:1303) r5:83e1f824 r4:83e1f824 [<8174860c>] (nci_unregister_device) from [<80a57b58>] (virtual_ncidev_close+0x18/0x30 drivers/nfc/virtual_ncidev.c:163) r9:7efffd08 r8:83e3fa90 r7:82955c50 r6:834e0088 r5:000e001b r4:850fce00 [<80a57b40>] (virtual_ncidev_close) from [<804c1e48>] (__fput+0x84/0x264 fs/file_table.c:321) r5:000e001b r4:839b8600 [<804c1dc4>] (__fput) from [<804c20a4>] (____fput+0x10/0x14 fs/file_table.c:349) r9:7efffd08 r8:830b13b4 r7:8264e5e0 r6:830b0b80 r5:830b1384 r4:00000000 [<804c2094>] (____fput) from [<80267a24>] (task_work_run+0x8c/0xb4 kernel/task_work.c:179) [<80267998>] (task_work_run) from [<8020c034>] (resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]) [<80267998>] (task_work_run) from [<8020c034>] (do_work_pending+0x424/0x528 arch/arm/kernel/signal.c:630) r9:7efffd08 r8:80200288 r7:fffffe30 r6:80200288 r5:ea775fb0 r4:830b0b80 [<8020bc10>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x20) Exception stack(0xea775fb0 to 0xea775ff8) 5fa0: 00000000 00000002 00000000 00000003 5fc0: 00000004 026a84c0 000ed631 00000006 00140000 000003e8 0014c3a0 00000000 5fe0: 2c920000 7eb783f8 0002a430 0002a8ec 80000010 00000003 r10:00000006 r9:830b0b80 r8:80200288 r7:00000006 r6:000ed631 r5:026a84c0 r4:00000004 Code: e1a01000 e5b20004 e1500002 0a000005 (e5903008) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: e1a01000 mov r1, r0 4: e5b20004 ldr r0, [r2, #4]! 8: e1500002 cmp r0, r2 c: 0a000005 beq 0x28 * 10: e5903008 ldr r3, [r0, #8] <-- trapping instruction