8<--- cut here --- Unable to handle kernel paging request at virtual address 6f6d657a when read [6f6d657a] *pgd=850f7003, *pmd=00000000 Internal error: Oops: 206 [#1] PREEMPT SMP ARM Modules linked in: CPU: 0 PID: 31134 Comm: syz-executor.0 Not tainted 6.2.0-rc3-syzkaller #0 Hardware name: ARM-Versatile Express PC is at nfc_llcp_find_local+0x24/0x6c net/nfc/llcp_core.c:286 LR is at nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1610 pc : [<81719f3c>] lr : [<8171c034>] psr: 90000013 sp : ece55e40 ip : ece55e50 fp : ece55e4c r10: 5ac3c35a r9 : 7efffd08 r8 : 83acdd90 r7 : 84bd2800 r6 : 84bd2824 r5 : 895ec85c r4 : 895ec800 r3 : 69766564 r2 : 825d06f8 r1 : 895ec800 r0 : 6f6d6572 Flags: NzcV IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 8c660940 DAC: fffffffd Register r0 information: non-paged memory Register r1 information: slab kmalloc-1k start 895ec800 pointer offset 0 size 1024 Register r2 information: non-slab/vmalloc memory Register r3 information: non-paged memory Register r4 information: slab kmalloc-1k start 895ec800 pointer offset 0 size 1024 Register r5 information: slab kmalloc-1k start 895ec800 pointer offset 92 size 1024 Register r6 information: slab kmalloc-2k start 84bd2800 pointer offset 36 size 2048 Register r7 information: slab kmalloc-2k start 84bd2800 pointer offset 0 size 2048 Register r8 information: slab cred_jar start 83acdd80 pointer offset 16 size 176 Register r9 information: 2-page vmalloc region starting at 0x7f000000 allocated at bpf_jit_alloc_exec+0x10/0x14 kernel/bpf/core.c:998 Register r10 information: non-paged memory Register r11 information: 2-page vmalloc region starting at 0xece54000 allocated at kernel_clone+0x9c/0x400 kernel/fork.c:2681 Register r12 information: 2-page vmalloc region starting at 0xece54000 allocated at kernel_clone+0x9c/0x400 kernel/fork.c:2681 Process syz-executor.0 (pid: 31134, stack limit = 0xece54000) Stack: (0xece55e40 to 0xece56000) 5e40: ece55e64 ece55e50 8171c034 81719f24 895ec800 895ec85c ece55e7c ece55e68 5e60: 8171390c 8171c030 84bd2824 84bd2824 ece55ea4 ece55e80 8172039c 8171388c 5e80: 83e9db40 000e001b 834e75d8 83ade650 83acdd90 7efffd08 ece55ebc ece55ea8 5ea0: 80a33724 81720314 8505c180 000e001b ece55ef4 ece55ec0 804b2c88 80a33718 5ec0: 80275aa0 802a17b0 8020c31c 8020d378 00000000 851d4d04 851d4500 826475e4 5ee0: 851d4d34 7efffd08 ece55f04 ece55ef8 804b2ee4 804b2c10 ece55f2c ece55f08 5f00: 802666a4 804b2ee0 851d4500 ece55fb0 80200288 fffffe30 80200288 7efffd08 5f20: ece55fac ece55f30 8020c078 80266624 804b2bbc 802663f0 7efffd08 8240c44c 5f40: ece55f6c ece55f50 804abfb8 804b2b40 00000003 840e4e00 840e4e40 8505c180 5f60: ece55f94 ece55f70 804d5310 804abf60 00000004 0185a4c0 002aaf77 c1373395 5f80: 80200288 00000004 0185a4c0 002aaf77 00000006 80200288 851d4500 00000006 5fa0: 00000000 ece55fb0 80200088 8020bc60 00000000 00000002 00000000 00000003 5fc0: 00000004 0185a4c0 002aaf77 00000006 00140000 000003e8 0014c3a0 00000000 5fe0: 2be60000 7ed34408 0002a3e0 0002a89c 80000010 00000003 00000000 00000000 Backtrace: [<81719f18>] (nfc_llcp_find_local) from [<8171c034>] (nfc_llcp_unregister_device+0x10/0xbc net/nfc/llcp_core.c:1610) [<8171c024>] (nfc_llcp_unregister_device) from [<8171390c>] (nfc_unregister_device+0x8c/0x118 net/nfc/core.c:1179) r5:895ec85c r4:895ec800 [<81713880>] (nfc_unregister_device) from [<8172039c>] (nci_unregister_device+0x94/0x98 net/nfc/nci/core.c:1303) r5:84bd2824 r4:84bd2824 [<81720308>] (nci_unregister_device) from [<80a33724>] (virtual_ncidev_close+0x18/0x30 drivers/nfc/virtual_ncidev.c:163) r9:7efffd08 r8:83acdd90 r7:83ade650 r6:834e75d8 r5:000e001b r4:83e9db40 [<80a3370c>] (virtual_ncidev_close) from [<804b2c88>] (__fput+0x84/0x264 fs/file_table.c:320) r5:000e001b r4:8505c180 [<804b2c04>] (__fput) from [<804b2ee4>] (____fput+0x10/0x14 fs/file_table.c:348) r9:7efffd08 r8:851d4d34 r7:826475e4 r6:851d4500 r5:851d4d04 r4:00000000 [<804b2ed4>] (____fput) from [<802666a4>] (task_work_run+0x8c/0xb4 kernel/task_work.c:179) [<80266618>] (task_work_run) from [<8020c078>] (resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]) [<80266618>] (task_work_run) from [<8020c078>] (do_work_pending+0x424/0x528 arch/arm/kernel/signal.c:630) r9:7efffd08 r8:80200288 r7:fffffe30 r6:80200288 r5:ece55fb0 r4:851d4500 [<8020bc54>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x20) Exception stack(0xece55fb0 to 0xece55ff8) 5fa0: 00000000 00000002 00000000 00000003 5fc0: 00000004 0185a4c0 002aaf77 00000006 00140000 000003e8 0014c3a0 00000000 5fe0: 2be60000 7ed34408 0002a3e0 0002a89c 80000010 00000003 r10:00000006 r9:851d4500 r8:80200288 r7:00000006 r6:002aaf77 r5:0185a4c0 r4:00000004 Code: e1a01000 e5b20004 e1500002 0a000005 (e5903008) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: e1a01000 mov r1, r0 4: e5b20004 ldr r0, [r2, #4]! 8: e1500002 cmp r0, r2 c: 0a000005 beq 0x28 * 10: e5903008 ldr r3, [r0, #8] <-- trapping instruction