8<--- cut here --- Unable to handle kernel paging request at virtual address 6f6d657a when read [6f6d657a] *pgd=8534b003, *pmd=00000000 Internal error: Oops: 206 [#1] PREEMPT SMP ARM Modules linked in: CPU: 0 PID: 8747 Comm: syz-executor.1 Not tainted 6.2.0-rc6-syzkaller #0 Hardware name: ARM-Versatile Express PC is at nfc_llcp_find_local+0x24/0x6c net/nfc/llcp_core.c:287 LR is at nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611 pc : [<8171a9b4>] lr : [<8171caac>] psr: 90000013 sp : eceb9e40 ip : eceb9e50 fp : eceb9e4c r10: 5ac3c35a r9 : 7efffd08 r8 : 8323ce50 r7 : 8513a800 r6 : 8513a824 r5 : 8535e45c r4 : 8535e400 r3 : 84fe6000 r2 : 825d0678 r1 : 8535e400 r0 : 6f6d6572 Flags: NzcV IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 8529fa40 DAC: fffffffd Register r0 information: non-paged memory Register r1 information: slab kmalloc-1k start 8535e400 pointer offset 0 size 1024 Register r2 information: non-slab/vmalloc memory Register r3 information: slab kmalloc-1k start 84fe6000 pointer offset 0 size 1024 Register r4 information: slab kmalloc-1k start 8535e400 pointer offset 0 size 1024 Register r5 information: slab kmalloc-1k start 8535e400 pointer offset 92 size 1024 Register r6 information: slab kmalloc-2k start 8513a800 pointer offset 36 size 2048 Register r7 information: slab kmalloc-2k start 8513a800 pointer offset 0 size 2048 Register r8 information: slab cred_jar start 8323ce40 pointer offset 16 size 176 Register r9 information: 2-page vmalloc region starting at 0x7f000000 allocated at bpf_jit_alloc_exec+0x10/0x14 kernel/bpf/core.c:998 Register r10 information: non-paged memory Register r11 information: 2-page vmalloc region starting at 0xeceb8000 allocated at kernel_clone+0x9c/0x400 kernel/fork.c:2681 Register r12 information: 2-page vmalloc region starting at 0xeceb8000 allocated at kernel_clone+0x9c/0x400 kernel/fork.c:2681 Process syz-executor.1 (pid: 8747, stack limit = 0xeceb8000) Stack: (0xeceb9e40 to 0xeceba000) 9e40: eceb9e64 eceb9e50 8171caac 8171a99c 8535e400 8535e45c eceb9e7c eceb9e68 9e60: 8171437c 8171caa8 8513a824 8513a824 eceb9ea4 eceb9e80 81720e14 817142fc 9e80: 8529f840 000e001b 82ec3d48 83ac0050 8323ce50 7efffd08 eceb9ebc eceb9ea8 9ea0: 80a33c4c 81720d8c 850a1180 000e001b eceb9ef4 eceb9ec0 804b2dd0 80a33c40 9ec0: 80275a80 802a1750 00000000 84155c00 00000000 84156404 84155c00 826475e4 9ee0: 84156434 7efffd08 eceb9f04 eceb9ef8 804b302c 804b2d58 eceb9f2c eceb9f08 9f00: 80266680 804b3028 84155c00 eceb9fb0 80200288 fffffe30 80200288 7efffd08 9f20: eceb9fac eceb9f30 8020c078 80266600 00000000 00000000 7efffd08 8240c44c 9f40: 00000000 828d9a00 828d9a40 0000003f eceb9f84 eceb9f60 804d6018 804d5e54 9f60: 00000006 00000000 0014c464 0000003f 80200288 84155c00 eceb9fa4 79415cc7 9f80: 804d6ddc 00000000 00000000 0014c464 0000003f 80200288 84155c00 0000003f 9fa0: 00000000 eceb9fb0 80200088 8020bc60 00000003 00000003 00000000 00000000 9fc0: 00000000 00000000 0014c464 0000003f 7ecdd3d2 76b776d0 7ecdd544 76b7720c 9fe0: 76b77020 76b77010 00016f9c 0004df50 60000010 00000006 00000000 00000000 Backtrace: [<8171a990>] (nfc_llcp_find_local) from [<8171caac>] (nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611) [<8171ca9c>] (nfc_llcp_unregister_device) from [<8171437c>] (nfc_unregister_device+0x8c/0x118 net/nfc/core.c:1179) r5:8535e45c r4:8535e400 [<817142f0>] (nfc_unregister_device) from [<81720e14>] (nci_unregister_device+0x94/0x98 net/nfc/nci/core.c:1303) r5:8513a824 r4:8513a824 [<81720d80>] (nci_unregister_device) from [<80a33c4c>] (virtual_ncidev_close+0x18/0x30 drivers/nfc/virtual_ncidev.c:163) r9:7efffd08 r8:8323ce50 r7:83ac0050 r6:82ec3d48 r5:000e001b r4:8529f840 [<80a33c34>] (virtual_ncidev_close) from [<804b2dd0>] (__fput+0x84/0x264 fs/file_table.c:320) r5:000e001b r4:850a1180 [<804b2d4c>] (__fput) from [<804b302c>] (____fput+0x10/0x14 fs/file_table.c:348) r9:7efffd08 r8:84156434 r7:826475e4 r6:84155c00 r5:84156404 r4:00000000 [<804b301c>] (____fput) from [<80266680>] (task_work_run+0x8c/0xb4 kernel/task_work.c:179) [<802665f4>] (task_work_run) from [<8020c078>] (resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]) [<802665f4>] (task_work_run) from [<8020c078>] (do_work_pending+0x424/0x528 arch/arm/kernel/signal.c:630) r9:7efffd08 r8:80200288 r7:fffffe30 r6:80200288 r5:eceb9fb0 r4:84155c00 [<8020bc54>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x20) Exception stack(0xeceb9fb0 to 0xeceb9ff8) 9fa0: 00000003 00000003 00000000 00000000 9fc0: 00000000 00000000 0014c464 0000003f 7ecdd3d2 76b776d0 7ecdd544 76b7720c 9fe0: 76b77020 76b77010 00016f9c 0004df50 60000010 00000006 r10:0000003f r9:84155c00 r8:80200288 r7:0000003f r6:0014c464 r5:00000000 r4:00000000 Code: e1a01000 e5b20004 e1500002 0a000005 (e5903008) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: e1a01000 mov r1, r0 4: e5b20004 ldr r0, [r2, #4]! 8: e1500002 cmp r0, r2 c: 0a000005 beq 0x28 * 10: e5903008 ldr r3, [r0, #8] <-- trapping instruction