8<--- cut here --- Unable to handle kernel paging request at virtual address 6f6d657a when read [6f6d657a] *pgd=853c7003, *pmd=00000000 Internal error: Oops: 206 [#1] PREEMPT SMP ARM Modules linked in: CPU: 1 PID: 28149 Comm: syz-executor.0 Not tainted 6.2.0-rc5-syzkaller #0 Hardware name: ARM-Versatile Express PC is at nfc_llcp_find_local+0x24/0x6c net/nfc/llcp_core.c:287 LR is at nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611 pc : [<8171acb4>] lr : [<8171cdac>] psr: 90000013 sp : eb00de40 ip : eb00de50 fp : eb00de4c r10: 5ac3c35a r9 : 7efffd08 r8 : 83ea59d0 r7 : 85931000 r6 : 85931024 r5 : 852bd85c r4 : 852bd800 r3 : 8517a000 r2 : 825d0678 r1 : 852bd800 r0 : 6f6d6572 Flags: NzcV IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 84a9a300 DAC: 00000000 Register r0 information: non-paged memory Register r1 information: slab kmalloc-1k start 852bd800 pointer offset 0 size 1024 Register r2 information: non-slab/vmalloc memory Register r3 information: slab kmalloc-1k start 8517a000 pointer offset 0 size 1024 Register r4 information: slab kmalloc-1k start 852bd800 pointer offset 0 size 1024 Register r5 information: slab kmalloc-1k start 852bd800 pointer offset 92 size 1024 Register r6 information: slab kmalloc-2k start 85931000 pointer offset 36 size 2048 Register r7 information: slab kmalloc-2k start 85931000 pointer offset 0 size 2048 Register r8 information: slab cred_jar start 83ea59c0 pointer offset 16 size 176 Register r9 information: 2-page vmalloc region starting at 0x7f000000 allocated at bpf_jit_alloc_exec+0x10/0x14 kernel/bpf/core.c:998 Register r10 information: non-paged memory Register r11 information: 2-page vmalloc region starting at 0xeb00c000 allocated at kernel_clone+0x9c/0x400 kernel/fork.c:2681 Register r12 information: 2-page vmalloc region starting at 0xeb00c000 allocated at kernel_clone+0x9c/0x400 kernel/fork.c:2681 Process syz-executor.0 (pid: 28149, stack limit = 0xeb00c000) Stack: (0xeb00de40 to 0xeb00e000) de40: eb00de64 eb00de50 8171cdac 8171ac9c 852bd800 852bd85c eb00de7c eb00de68 de60: 8171467c 8171cda8 85931024 85931024 eb00dea4 eb00de80 81721114 817145fc de80: 84a9a540 000e001b 834d9660 83880250 83ea59d0 7efffd08 eb00debc eb00dea8 dea0: 80a33c24 8172108c 859956c0 000e001b eb00def4 eb00dec0 804b2d84 80a33c18 dec0: 80275a80 802a1750 eb00df14 eb00ded8 85995b40 83140804 83140000 826475e4 dee0: 83140834 7efffd08 eb00df04 eb00def8 804b2fe0 804b2d0c eb00df2c eb00df08 df00: 80266680 804b2fdc 83140000 eb00dfb0 80200288 fffffe30 80200288 7efffd08 df20: eb00dfac eb00df30 8020c078 80266600 eb00df54 eb00df40 7efffd08 8240c44c df40: 817bacc0 80274b30 eb00df94 eb00df58 804d668c 817baca0 83140000 00000000 df60: 00000000 de589405 eb00dfac 00000000 00000000 0014c3d8 000001b4 de589405 df80: 83140000 00000000 00000000 0014c3d8 000001b4 80200288 83140000 000001b4 dfa0: 00000000 eb00dfb0 80200088 8020bc60 00000000 ffffffff 00000000 00000000 dfc0: 00000000 00000000 0014c3d8 000001b4 7e8953d2 76bad6d0 7e895544 76bad20c dfe0: 76bad020 76bad010 00016f9c 0004df50 60000010 00000003 00000000 00000000 Backtrace: [<8171ac90>] (nfc_llcp_find_local) from [<8171cdac>] (nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1611) [<8171cd9c>] (nfc_llcp_unregister_device) from [<8171467c>] (nfc_unregister_device+0x8c/0x118 net/nfc/core.c:1179) r5:852bd85c r4:852bd800 [<817145f0>] (nfc_unregister_device) from [<81721114>] (nci_unregister_device+0x94/0x98 net/nfc/nci/core.c:1303) r5:85931024 r4:85931024 [<81721080>] (nci_unregister_device) from [<80a33c24>] (virtual_ncidev_close+0x18/0x30 drivers/nfc/virtual_ncidev.c:163) r9:7efffd08 r8:83ea59d0 r7:83880250 r6:834d9660 r5:000e001b r4:84a9a540 [<80a33c0c>] (virtual_ncidev_close) from [<804b2d84>] (__fput+0x84/0x264 fs/file_table.c:320) r5:000e001b r4:859956c0 [<804b2d00>] (__fput) from [<804b2fe0>] (____fput+0x10/0x14 fs/file_table.c:348) r9:7efffd08 r8:83140834 r7:826475e4 r6:83140000 r5:83140804 r4:85995b40 [<804b2fd0>] (____fput) from [<80266680>] (task_work_run+0x8c/0xb4 kernel/task_work.c:179) [<802665f4>] (task_work_run) from [<8020c078>] (resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]) [<802665f4>] (task_work_run) from [<8020c078>] (do_work_pending+0x424/0x528 arch/arm/kernel/signal.c:630) r9:7efffd08 r8:80200288 r7:fffffe30 r6:80200288 r5:eb00dfb0 r4:83140000 [<8020bc54>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x20) Exception stack(0xeb00dfb0 to 0xeb00dff8) dfa0: 00000000 ffffffff 00000000 00000000 dfc0: 00000000 00000000 0014c3d8 000001b4 7e8953d2 76bad6d0 7e895544 76bad20c dfe0: 76bad020 76bad010 00016f9c 0004df50 60000010 00000003 r10:000001b4 r9:83140000 r8:80200288 r7:000001b4 r6:0014c3d8 r5:00000000 r4:00000000 Code: e1a01000 e5b20004 e1500002 0a000005 (e5903008) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: e1a01000 mov r1, r0 4: e5b20004 ldr r0, [r2, #4]! 8: e1500002 cmp r0, r2 c: 0a000005 beq 0x28 * 10: e5903008 ldr r3, [r0, #8] <-- trapping instruction