Warning: Permanently added '10.128.0.182' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 64.617151][ T8403] ================================================================== [ 64.625247][ T8403] BUG: KASAN: use-after-free in __lock_acquire+0x3e6f/0x54c0 [ 64.632640][ T8403] Read of size 8 at addr ffff888143e62468 by task syz-executor787/8403 [ 64.640881][ T8403] [ 64.643202][ T8403] CPU: 0 PID: 8403 Comm: syz-executor787 Not tainted 5.12.0-rc7-syzkaller #0 [ 64.651962][ T8403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.662014][ T8403] Call Trace: executing program executing program executing program executing program executing program executing program executing program [ 64.665288][ T8403] dump_stack+0x141/0x1d7 [ 64.669630][ T8403] ? __lock_acquire+0x3e6f/0x54c0 [ 64.674674][ T8403] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 64.681717][ T8403] ? __lock_acquire+0x3e6f/0x54c0 [ 64.686747][ T8403] ? __lock_acquire+0x3e6f/0x54c0 [ 64.691796][ T8403] kasan_report.cold+0x7c/0xd8 [ 64.696572][ T8403] ? __lock_acquire+0x15d0/0x54c0 [ 64.701611][ T8403] ? __lock_acquire+0x3e6f/0x54c0 [ 64.706649][ T8403] __lock_acquire+0x3e6f/0x54c0 [ 64.711535][ T8403] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 64.717621][ T8403] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 64.723620][ T8403] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 64.729626][ T8403] lock_acquire+0x1ab/0x740 [ 64.734226][ T8403] ? nfc_llcp_sock_unlink+0x1d/0x1c0 [ 64.739519][ T8403] ? lock_release+0x720/0x720 [ 64.744206][ T8403] ? llcp_sock_release+0x1df/0x580 [ 64.749336][ T8403] ? mark_held_locks+0x9f/0xe0 [ 64.754120][ T8403] _raw_write_lock+0x2a/0x40 [ 64.758714][ T8403] ? nfc_llcp_sock_unlink+0x1d/0x1c0 [ 64.764095][ T8403] nfc_llcp_sock_unlink+0x1d/0x1c0 [ 64.769237][ T8403] llcp_sock_release+0x286/0x580 [ 64.774188][ T8403] __sock_release+0xcd/0x280 [ 64.778784][ T8403] sock_close+0x18/0x20 [ 64.782949][ T8403] __fput+0x288/0x920 [ 64.786942][ T8403] ? __sock_release+0x280/0x280 [ 64.791804][ T8403] task_work_run+0xdd/0x1a0 [ 64.796321][ T8403] do_exit+0xbfc/0x2a60 [ 64.800495][ T8403] ? mm_update_next_owner+0x7a0/0x7a0 [ 64.805877][ T8403] ? lock_downgrade+0x6e0/0x6e0 [ 64.810744][ T8403] do_group_exit+0x125/0x310 [ 64.815344][ T8403] __x64_sys_exit_group+0x3a/0x50 [ 64.820391][ T8403] do_syscall_64+0x2d/0x70 [ 64.824816][ T8403] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 64.830723][ T8403] RIP: 0033:0x43e989 [ 64.834620][ T8403] Code: Unable to access opcode bytes at RIP 0x43e95f. [ 64.841459][ T8403] RSP: 002b:00007ffdbf122818 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 64.849879][ T8403] RAX: ffffffffffffffda RBX: 00000000004b02f0 RCX: 000000000043e989 [ 64.857855][ T8403] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 64.865832][ T8403] RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000000000000001 [ 64.873812][ T8403] R10: 0000000000080800 R11: 0000000000000246 R12: 00000000004b02f0 [ 64.881809][ T8403] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 [ 64.889792][ T8403] [ 64.892110][ T8403] Allocated by task 1: [ 64.896170][ T8403] kasan_save_stack+0x1b/0x40 [ 64.900859][ T8403] __kasan_kmalloc+0x99/0xc0 [ 64.905457][ T8403] nfc_llcp_register_device+0x45/0x9d0 [ 64.910925][ T8403] nfc_register_device+0x6d/0x360 [ 64.915955][ T8403] nfcsim_device_new+0x345/0x5c1 [ 64.920916][ T8403] nfcsim_init+0x71/0x14d [ 64.925267][ T8403] do_one_initcall+0x103/0x650 [ 64.930034][ T8403] kernel_init_freeable+0x63e/0x6c2 [ 64.935232][ T8403] kernel_init+0xd/0x1b8 [ 64.939495][ T8403] ret_from_fork+0x1f/0x30 [ 64.943948][ T8403] [ 64.946264][ T8403] Freed by task 8402: [ 64.950232][ T8403] kasan_save_stack+0x1b/0x40 [ 64.954912][ T8403] kasan_set_track+0x1c/0x30 [ 64.959504][ T8403] kasan_set_free_info+0x20/0x30 [ 64.964451][ T8403] __kasan_slab_free+0xf5/0x130 [ 64.969309][ T8403] slab_free_freelist_hook+0x92/0x210 [ 64.974692][ T8403] kfree+0xe5/0x7f0 [ 64.978508][ T8403] nfc_llcp_local_put+0x194/0x200 [ 64.983544][ T8403] llcp_sock_destruct+0x81/0x150 [ 64.988492][ T8403] __sk_destruct+0x4b/0x900 [ 64.992997][ T8403] sk_destruct+0xbd/0xe0 [ 64.997245][ T8403] __sk_free+0xef/0x3d0 [ 65.001405][ T8403] sk_free+0x78/0xa0 [ 65.005299][ T8403] llcp_sock_release+0x3c9/0x580 [ 65.010250][ T8403] __sock_release+0xcd/0x280 [ 65.014930][ T8403] sock_close+0x18/0x20 [ 65.019089][ T8403] __fput+0x288/0x920 [ 65.023082][ T8403] task_work_run+0xdd/0x1a0 [ 65.027596][ T8403] do_exit+0xbfc/0x2a60 [ 65.031768][ T8403] do_group_exit+0x125/0x310 [ 65.036481][ T8403] __x64_sys_exit_group+0x3a/0x50 [ 65.041508][ T8403] do_syscall_64+0x2d/0x70 [ 65.046020][ T8403] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 65.051926][ T8403] [ 65.054244][ T8403] The buggy address belongs to the object at ffff888143e62000 [ 65.054244][ T8403] which belongs to the cache kmalloc-2k of size 2048 [ 65.068294][ T8403] The buggy address is located 1128 bytes inside of [ 65.068294][ T8403] 2048-byte region [ffff888143e62000, ffff888143e62800) [ 65.081768][ T8403] The buggy address belongs to the page: [ 65.087394][ T8403] page:ffffea00050f9800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x143e60 [ 65.097637][ T8403] head:ffffea00050f9800 order:3 compound_mapcount:0 compound_pincount:0 [ 65.105962][ T8403] flags: 0x57ff00000010200(slab|head) [ 65.111469][ T8403] raw: 057ff00000010200 dead000000000100 dead000000000122 ffff888010842000 [ 65.120063][ T8403] raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000 [ 65.128641][ T8403] page dumped because: kasan: bad access detected [ 65.135049][ T8403] [ 65.137368][ T8403] Memory state around the buggy address: [ 65.142994][ T8403] ffff888143e62300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.151053][ T8403] ffff888143e62380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.159120][ T8403] >ffff888143e62400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.167176][ T8403] ^ [ 65.174629][ T8403] ffff888143e62480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.182694][ T8403] ffff888143e62500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.190756][ T8403] ================================================================== [ 65.198813][ T8403] Disabling lock debugging due to kernel taint [ 65.204952][ T8403] Kernel panic - not syncing: panic_on_warn set ... [ 65.211644][ T8403] CPU: 0 PID: 8403 Comm: syz-executor787 Tainted: G B 5.12.0-rc7-syzkaller #0 [ 65.221888][ T8403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 65.231949][ T8403] Call Trace: [ 65.235227][ T8403] dump_stack+0x141/0x1d7 [ 65.239564][ T8403] panic+0x306/0x73d [ 65.243469][ T8403] ? __warn_printk+0xf3/0xf3 [ 65.248069][ T8403] ? __lock_acquire+0x3e6f/0x54c0 [ 65.253194][ T8403] ? __lock_acquire+0x3e6f/0x54c0 [ 65.258228][ T8403] ? __lock_acquire+0x3e6f/0x54c0 [ 65.263265][ T8403] end_report.cold+0x5a/0x5a [ 65.267881][ T8403] kasan_report.cold+0x6a/0xd8 [ 65.272655][ T8403] ? __lock_acquire+0x15d0/0x54c0 [ 65.277688][ T8403] ? __lock_acquire+0x3e6f/0x54c0 [ 65.282724][ T8403] __lock_acquire+0x3e6f/0x54c0 [ 65.287580][ T8403] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 65.293566][ T8403] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 65.299547][ T8403] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 65.305534][ T8403] lock_acquire+0x1ab/0x740 [ 65.310044][ T8403] ? nfc_llcp_sock_unlink+0x1d/0x1c0 [ 65.315337][ T8403] ? lock_release+0x720/0x720 [ 65.320026][ T8403] ? llcp_sock_release+0x1df/0x580 [ 65.325146][ T8403] ? mark_held_locks+0x9f/0xe0 [ 65.329913][ T8403] _raw_write_lock+0x2a/0x40 [ 65.334513][ T8403] ? nfc_llcp_sock_unlink+0x1d/0x1c0 [ 65.339809][ T8403] nfc_llcp_sock_unlink+0x1d/0x1c0 [ 65.344930][ T8403] llcp_sock_release+0x286/0x580 [ 65.349874][ T8403] __sock_release+0xcd/0x280 [ 65.354573][ T8403] sock_close+0x18/0x20 [ 65.358732][ T8403] __fput+0x288/0x920 [ 65.362725][ T8403] ? __sock_release+0x280/0x280 [ 65.367584][ T8403] task_work_run+0xdd/0x1a0 [ 65.372096][ T8403] do_exit+0xbfc/0x2a60 [ 65.376258][ T8403] ? mm_update_next_owner+0x7a0/0x7a0 [ 65.381653][ T8403] ? lock_downgrade+0x6e0/0x6e0 [ 65.386508][ T8403] do_group_exit+0x125/0x310 [ 65.391104][ T8403] __x64_sys_exit_group+0x3a/0x50 [ 65.396132][ T8403] do_syscall_64+0x2d/0x70 [ 65.400551][ T8403] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 65.406464][ T8403] RIP: 0033:0x43e989 [ 65.410354][ T8403] Code: Unable to access opcode bytes at RIP 0x43e95f. [ 65.417191][ T8403] RSP: 002b:00007ffdbf122818 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 65.425610][ T8403] RAX: ffffffffffffffda RBX: 00000000004b02f0 RCX: 000000000043e989 [ 65.433625][ T8403] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 65.441598][ T8403] RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000000000000001 [ 65.449569][ T8403] R10: 0000000000080800 R11: 0000000000000246 R12: 00000000004b02f0 [ 65.457542][ T8403] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 [ 65.466112][ T8403] Kernel Offset: disabled [ 65.470430][ T8403] Rebooting in 86400 seconds..