8<--- cut here --- Unable to handle kernel NULL pointer dereference at virtual address 00000108 when read [00000108] *pgd=85278003, *pmd=fe676003 Internal error: Oops: 207 [#1] PREEMPT SMP ARM Modules linked in: CPU: 0 PID: 17732 Comm: syz-executor.0 Not tainted 6.2.0-rc6-syzkaller #0 Hardware name: ARM-Versatile Express PC is at nfc_llcp_find_local+0x24/0x6c net/nfc/llcp_core.c:287 LR is at nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611 pc : [<8171a964>] lr : [<8171ca5c>] psr: 000f0013 sp : eac71e40 ip : eac71e50 fp : eac71e4c r10: 5ac3c35a r9 : 7efffd08 r8 : 82b7b850 r7 : 85170800 r6 : 85170824 r5 : 84e6ac5c r4 : 84e6ac00 r3 : 84e69400 r2 : 825d0678 r1 : 84e6ac00 r0 : 00000100 Flags: nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 852ee700 DAC: fffffffd Register r0 information: non-paged memory Register r1 information: slab kmalloc-1k start 84e6ac00 pointer offset 0 size 1024 Register r2 information: non-slab/vmalloc memory Register r3 information: slab kmalloc-1k start 84e69400 pointer offset 0 size 1024 Register r4 information: slab kmalloc-1k start 84e6ac00 pointer offset 0 size 1024 Register r5 information: slab kmalloc-1k start 84e6ac00 pointer offset 92 size 1024 Register r6 information: slab kmalloc-2k start 85170800 pointer offset 36 size 2048 Register r7 information: slab kmalloc-2k start 85170800 pointer offset 0 size 2048 Register r8 information: slab cred_jar start 82b7b840 pointer offset 16 size 176 Register r9 information: 2-page vmalloc region starting at 0x7f000000 allocated at bpf_jit_alloc_exec+0x10/0x14 kernel/bpf/core.c:998 Register r10 information: non-paged memory Register r11 information: 2-page vmalloc region starting at 0xeac70000 allocated at kernel_clone+0x9c/0x400 kernel/fork.c:2681 Register r12 information: 2-page vmalloc region starting at 0xeac70000 allocated at kernel_clone+0x9c/0x400 kernel/fork.c:2681 Process syz-executor.0 (pid: 17732, stack limit = 0xeac70000) Stack: (0xeac71e40 to 0xeac72000) 1e40: eac71e64 eac71e50 8171ca5c 8171a94c 84e6ac00 84e6ac5c eac71e7c eac71e68 1e60: 8171432c 8171ca58 85170824 85170824 eac71ea4 eac71e80 81720dc4 817142ac 1e80: 851c4c40 000e001b 835902a8 82bb0e50 82b7b850 7efffd08 eac71ebc eac71ea8 1ea0: 80a33c4c 81720d3c 84fb1cc0 000e001b eac71ef4 eac71ec0 804b2dd0 80a33c40 1ec0: 80275a80 802a1750 8020c31c 8020d378 00000000 83dcaa84 83dca280 826475e4 1ee0: 83dcaab4 7efffd08 eac71f04 eac71ef8 804b302c 804b2d58 eac71f2c eac71f08 1f00: 80266680 804b3028 83dca280 eac71fb0 80200288 fffffe30 80200288 7efffd08 1f20: eac71fac eac71f30 8020c078 80266600 804b2d04 802663cc 7efffd08 8240c44c 1f40: eac71f6c eac71f50 804ac100 804b2c88 00000003 82a2c300 82a2c340 84fb1cc0 1f60: eac71f94 eac71f70 804d5458 804ac0a8 00000004 02ab94c0 00000000 6635ede0 1f80: 80200288 00000004 02ab94c0 00000000 00000006 80200288 83dca280 00000006 1fa0: 00000000 eac71fb0 80200088 8020bc60 00000000 00000002 00000000 00000003 1fc0: 00000004 02ab94c0 00000000 00000006 00140000 000003e8 7e96d514 00000000 1fe0: 2c620000 7e96d408 0002a3e0 0002a89c 80000010 00000003 00000000 00000000 Backtrace: [<8171a940>] (nfc_llcp_find_local) from [<8171ca5c>] (nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611) [<8171ca4c>] (nfc_llcp_unregister_device) from [<8171432c>] (nfc_unregister_device+0x8c/0x118 net/nfc/core.c:1179) r5:84e6ac5c r4:84e6ac00 [<817142a0>] (nfc_unregister_device) from [<81720dc4>] (nci_unregister_device+0x94/0x98 net/nfc/nci/core.c:1303) r5:85170824 r4:85170824 [<81720d30>] (nci_unregister_device) from [<80a33c4c>] (virtual_ncidev_close+0x18/0x30 drivers/nfc/virtual_ncidev.c:163) r9:7efffd08 r8:82b7b850 r7:82bb0e50 r6:835902a8 r5:000e001b r4:851c4c40 [<80a33c34>] (virtual_ncidev_close) from [<804b2dd0>] (__fput+0x84/0x264 fs/file_table.c:320) r5:000e001b r4:84fb1cc0 [<804b2d4c>] (__fput) from [<804b302c>] (____fput+0x10/0x14 fs/file_table.c:348) r9:7efffd08 r8:83dcaab4 r7:826475e4 r6:83dca280 r5:83dcaa84 r4:00000000 [<804b301c>] (____fput) from [<80266680>] (task_work_run+0x8c/0xb4 kernel/task_work.c:179) [<802665f4>] (task_work_run) from [<8020c078>] (resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]) [<802665f4>] (task_work_run) from [<8020c078>] (do_work_pending+0x424/0x528 arch/arm/kernel/signal.c:630) r9:7efffd08 r8:80200288 r7:fffffe30 r6:80200288 r5:eac71fb0 r4:83dca280 [<8020bc54>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x20) Exception stack(0xeac71fb0 to 0xeac71ff8) 1fa0: 00000000 00000002 00000000 00000003 1fc0: 00000004 02ab94c0 00000000 00000006 00140000 000003e8 7e96d514 00000000 1fe0: 2c620000 7e96d408 0002a3e0 0002a89c 80000010 00000003 r10:00000006 r9:83dca280 r8:80200288 r7:00000006 r6:00000000 r5:02ab94c0 r4:00000004 Code: e1a01000 e5b20004 e1500002 0a000005 (e5903008) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: e1a01000 mov r1, r0 4: e5b20004 ldr r0, [r2, #4]! 8: e1500002 cmp r0, r2 c: 0a000005 beq 0x28 * 10: e5903008 ldr r3, [r0, #8] <-- trapping instruction