Warning: Permanently added '10.128.0.53' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 36.809718] ================================================================== [ 36.817227] BUG: KASAN: use-after-free in nfc_llcp_getsockopt+0x4c4/0x4d0 [ 36.824170] Read of size 2 at addr ffff8880adecd68e by task syz-executor850/8120 [ 36.831709] [ 36.833341] CPU: 0 PID: 8120 Comm: syz-executor850 Not tainted 4.19.190-syzkaller #0 [ 36.841257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.850611] Call Trace: [ 36.853201] dump_stack+0x1fc/0x2ef executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 36.856833] print_address_description.cold+0x54/0x219 [ 36.862116] kasan_report_error.cold+0x8a/0x1b9 [ 36.866789] ? nfc_llcp_getsockopt+0x4c4/0x4d0 [ 36.871384] __asan_report_load2_noabort+0x88/0x90 [ 36.876322] ? nfc_llcp_getsockopt+0x4c4/0x4d0 [ 36.880912] nfc_llcp_getsockopt+0x4c4/0x4d0 [ 36.885343] __sys_getsockopt+0x135/0x210 [ 36.889508] ? kernel_setsockopt+0x1c0/0x1c0 [ 36.893928] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 36.899301] __x64_sys_getsockopt+0xba/0x150 [ 36.903717] ? lockdep_hardirqs_on+0x3a8/0x5c0 executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 36.908300] do_syscall_64+0xf9/0x620 [ 36.912108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 36.917315] RIP: 0033:0x445a09 [ 36.920507] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 36.939584] RSP: 002b:00007fd941fdf2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 36.947297] RAX: ffffffffffffffda RBX: 00000000004ca420 RCX: 0000000000445a09 executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 36.954575] RDX: 0000000000000003 RSI: 0000000000000118 RDI: 0000000000000003 [ 36.961867] RBP: 00000000004ca42c R08: 00000000207a0cb3 R09: 0000000000000000 [ 36.969289] R10: 0000000020000100 R11: 0000000000000246 R12: 000000000049a074 [ 36.976566] R13: 6905fecae4b90cfa R14: 652e79726f6d656d R15: 00000000004ca428 [ 36.983846] [ 36.985472] Allocated by task 1: [ 36.988855] kmem_cache_alloc_trace+0x12f/0x380 [ 36.993563] nfc_llcp_register_device+0x45/0x9b0 [ 36.998319] nfc_register_device+0x6d/0x360 [ 37.002668] nfcsim_device_new+0x333/0x5af [ 37.006927] nfcsim_init+0x71/0x14d executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.010585] do_one_initcall+0xf1/0x740 [ 37.014608] kernel_init_freeable+0x9a6/0xa98 [ 37.019109] kernel_init+0xd/0x1b6 [ 37.022649] ret_from_fork+0x24/0x30 [ 37.026354] [ 37.027984] Freed by task 8106: [ 37.031263] kfree+0xcc/0x210 [ 37.034366] nfc_llcp_local_put+0x155/0x1b0 [ 37.039037] llcp_sock_destruct+0x7b/0x140 [ 37.043277] __sk_destruct+0x4b/0x8a0 [ 37.047086] __sk_free+0x165/0x3b0 [ 37.050626] sk_free+0x3b/0x50 [ 37.053825] llcp_sock_release+0x37a/0x520 executing program executing program executing program executing program executing program executing program executing program executing program [ 37.058064] __sock_release+0xcd/0x2a0 [ 37.061955] sock_close+0x15/0x20 [ 37.065408] __fput+0x2ce/0x890 [ 37.068693] task_work_run+0x148/0x1c0 [ 37.072582] do_exit+0xbf3/0x2be0 [ 37.076041] do_group_exit+0x125/0x310 [ 37.079932] get_signal+0x3f2/0x1f70 [ 37.083650] do_signal+0x8f/0x1670 [ 37.087190] exit_to_usermode_loop+0x204/0x2a0 [ 37.091772] do_syscall_64+0x538/0x620 [ 37.095662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.100846] [ 37.102488] The buggy address belongs to the object at ffff8880adecd3c0 executing program executing program executing program executing program executing program executing program executing program executing program [ 37.102488] which belongs to the cache kmalloc-2048 of size 2048 [ 37.115328] The buggy address is located 718 bytes inside of [ 37.115328] 2048-byte region [ffff8880adecd3c0, ffff8880adecdbc0) [ 37.127296] The buggy address belongs to the page: [ 37.132232] page:ffffea0002b7b300 count:1 mapcount:0 mapping:ffff88813bff0c40 index:0x0 compound_mapcount: 0 [ 37.142201] flags: 0xfff00000008100(slab|head) [ 37.146789] raw: 00fff00000008100 ffffea0002b79688 ffffea0002b0b708 ffff88813bff0c40 executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.154680] raw: 0000000000000000 ffff8880adecc2c0 0000000100000003 0000000000000000 [ 37.162560] page dumped because: kasan: bad access detected [ 37.168285] [ 37.169915] Memory state around the buggy address: [ 37.174847] ffff8880adecd580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.182221] ffff8880adecd600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.189581] >ffff8880adecd680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.196937] ^ [ 37.200565] ffff8880adecd700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.207923] ffff8880adecd780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.215276] ================================================================== [ 37.224624] Disabling lock debugging due to kernel taint [ 37.246870] Kernel panic - not syncing: panic_on_warn set ... [ 37.246870] executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.254263] CPU: 0 PID: 8120 Comm: syz-executor850 Tainted: G B 4.19.190-syzkaller #0 [ 37.263530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.272910] Call Trace: [ 37.275510] dump_stack+0x1fc/0x2ef [ 37.279149] panic+0x26a/0x50e [ 37.282342] ? __warn_printk+0xf3/0xf3 [ 37.286230] ? preempt_schedule_common+0x45/0xc0 [ 37.290984] ? ___preempt_schedule+0x16/0x18 [ 37.295394] ? trace_hardirqs_on+0x55/0x210 [ 37.299720] kasan_end_report+0x43/0x49 [ 37.303725] kasan_report_error.cold+0xa7/0x1b9 executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.308400] ? nfc_llcp_getsockopt+0x4c4/0x4d0 [ 37.312991] __asan_report_load2_noabort+0x88/0x90 [ 37.317933] ? nfc_llcp_getsockopt+0x4c4/0x4d0 [ 37.322517] nfc_llcp_getsockopt+0x4c4/0x4d0 [ 37.326927] __sys_getsockopt+0x135/0x210 [ 37.331075] ? kernel_setsockopt+0x1c0/0x1c0 [ 37.335503] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 37.340864] __x64_sys_getsockopt+0xba/0x150 [ 37.345302] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 37.349883] do_syscall_64+0xf9/0x620 [ 37.353687] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.358878] RIP: 0033:0x445a09 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.362068] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 37.381053] RSP: 002b:00007fd941fdf2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 37.388758] RAX: ffffffffffffffda RBX: 00000000004ca420 RCX: 0000000000445a09 [ 37.396288] RDX: 0000000000000003 RSI: 0000000000000118 RDI: 0000000000000003 [ 37.403556] RBP: 00000000004ca42c R08: 00000000207a0cb3 R09: 0000000000000000 executing program executing program executing program [ 37.410823] R10: 0000000020000100 R11: 0000000000000246 R12: 000000000049a074 [ 37.418093] R13: 6905fecae4b90cfa R14: 652e79726f6d656d R15: 00000000004ca428 [ 37.426127] Kernel Offset: disabled [ 37.429840] Rebooting in 86400 seconds..