================================================================== BUG: KASAN: slab-use-after-free in hlist_add_head include/linux/list.h:1026 [inline] BUG: KASAN: slab-use-after-free in binder_add_device+0x98/0xb0 drivers/android/binder.c:6932 Write of size 8 at addr ffff0000126a7408 by task syz-executor/3478 CPU: 0 UID: 0 PID: 3478 Comm: syz-executor Not tainted 6.13.0-syzkaller-09030-g6d61a53dd6f5 #0 Hardware name: linux,dummy-virt (DT) Call trace: show_stack+0x18/0x24 arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xa4/0xf4 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xf4/0x5a0 mm/kasan/report.c:489 kasan_report+0xc8/0x108 mm/kasan/report.c:602 __asan_report_store8_noabort+0x20/0x2c mm/kasan/report_generic.c:386 hlist_add_head include/linux/list.h:1026 [inline] binder_add_device+0x98/0xb0 drivers/android/binder.c:6932 binderfs_binder_device_create.isra.0+0x798/0x960 drivers/android/binderfs.c:210 binderfs_fill_super+0x668/0xe9c drivers/android/binderfs.c:729 vfs_get_super fs/super.c:1280 [inline] get_tree_nodev+0xac/0x148 fs/super.c:1299 binderfs_fs_context_get_tree+0x18/0x24 drivers/android/binderfs.c:749 vfs_get_tree+0x74/0x280 fs/super.c:1814 do_new_mount fs/namespace.c:3560 [inline] path_mount+0x750/0x1684 fs/namespace.c:3887 do_mount fs/namespace.c:3900 [inline] __do_sys_mount fs/namespace.c:4111 [inline] __se_sys_mount fs/namespace.c:4088 [inline] __arm64_sys_mount+0x26c/0x4d8 fs/namespace.c:4088 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x6c/0x258 arch/arm64/kernel/syscall.c:49 el0_svc_common.constprop.0+0xac/0x230 arch/arm64/kernel/syscall.c:132 do_el0_svc_compat+0x40/0x68 arch/arm64/kernel/syscall.c:157 el0_svc_compat+0x4c/0x17c arch/arm64/kernel/entry-common.c:887 el0t_32_sync_handler+0x98/0x13c arch/arm64/kernel/entry-common.c:897 el0t_32_sync+0x19c/0x1a0 arch/arm64/kernel/entry.S:605 Allocated by task 3284: kasan_save_stack+0x3c/0x64 mm/kasan/common.c:47 kasan_save_track+0x20/0x3c mm/kasan/common.c:68 kasan_save_alloc_info+0x40/0x54 mm/kasan/generic.c:562 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0xb8/0xbc mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __kmalloc_cache_noprof+0x1b4/0x3d0 mm/slub.c:4325 kmalloc_noprof include/linux/slab.h:901 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] binderfs_binder_device_create.isra.0+0x140/0x960 drivers/android/binderfs.c:147 binderfs_fill_super+0x668/0xe9c drivers/android/binderfs.c:729 vfs_get_super fs/super.c:1280 [inline] get_tree_nodev+0xac/0x148 fs/super.c:1299 binderfs_fs_context_get_tree+0x18/0x24 drivers/android/binderfs.c:749 vfs_get_tree+0x74/0x280 fs/super.c:1814 do_new_mount fs/namespace.c:3560 [inline] path_mount+0x750/0x1684 fs/namespace.c:3887 do_mount fs/namespace.c:3900 [inline] __do_sys_mount fs/namespace.c:4111 [inline] __se_sys_mount fs/namespace.c:4088 [inline] __arm64_sys_mount+0x26c/0x4d8 fs/namespace.c:4088 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x6c/0x258 arch/arm64/kernel/syscall.c:49 el0_svc_common.constprop.0+0xac/0x230 arch/arm64/kernel/syscall.c:132 do_el0_svc_compat+0x40/0x68 arch/arm64/kernel/syscall.c:157 el0_svc_compat+0x4c/0x17c arch/arm64/kernel/entry-common.c:887 el0t_32_sync_handler+0x98/0x13c arch/arm64/kernel/entry-common.c:897 el0t_32_sync+0x19c/0x1a0 arch/arm64/kernel/entry.S:605 Freed by task 3284: kasan_save_stack+0x3c/0x64 mm/kasan/common.c:47 kasan_save_track+0x20/0x3c mm/kasan/common.c:68 kasan_save_free_info+0x4c/0x74 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x50/0x6c mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2353 [inline] slab_free mm/slub.c:4609 [inline] kfree+0x1bc/0x444 mm/slub.c:4757 binderfs_evict_inode+0x1c4/0x214 drivers/android/binderfs.c:278 evict+0x2d0/0x6b0 fs/inode.c:796 iput_final fs/inode.c:1946 [inline] iput fs/inode.c:1972 [inline] iput+0x3b0/0x6b4 fs/inode.c:1958 dentry_unlink_inode+0x208/0x46c fs/dcache.c:422 __dentry_kill+0x150/0x52c fs/dcache.c:625 shrink_kill fs/dcache.c:1070 [inline] shrink_dentry_list+0x114/0x3a4 fs/dcache.c:1097 shrink_dcache_parent+0x158/0x364 fs/dcache.c:1531 do_one_tree fs/dcache.c:1560 [inline] shrink_dcache_for_umount+0x88/0x304 fs/dcache.c:1577 generic_shutdown_super+0x60/0x2e8 fs/super.c:620 kill_anon_super fs/super.c:1237 [inline] kill_litter_super+0x68/0xa4 fs/super.c:1247 binderfs_kill_super+0x38/0x88 drivers/android/binderfs.c:791 deactivate_locked_super+0x98/0x17c fs/super.c:473 deactivate_super fs/super.c:506 [inline] deactivate_super+0xb0/0xd4 fs/super.c:502 cleanup_mnt+0x174/0x324 fs/namespace.c:1413 __cleanup_mnt+0x14/0x20 fs/namespace.c:1420 task_work_run+0x128/0x210 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0x7a0/0x2044 kernel/exit.c:938 do_group_exit+0xa4/0x208 kernel/exit.c:1087 get_signal+0x1a60/0x1b08 kernel/signal.c:3036 do_signal+0x1f4/0x620 arch/arm64/kernel/signal.c:1658 do_notify_resume+0x18c/0x258 arch/arm64/kernel/entry-common.c:148 exit_to_user_mode_prepare arch/arm64/kernel/entry-common.c:169 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:178 [inline] el0_svc_compat+0xfc/0x17c arch/arm64/kernel/entry-common.c:888 el0t_32_sync_handler+0x98/0x13c arch/arm64/kernel/entry-common.c:897 el0t_32_sync+0x19c/0x1a0 arch/arm64/kernel/entry.S:605 The buggy address belongs to the object at ffff0000126a7400 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 8 bytes inside of freed 512-byte region [ffff0000126a7400, ffff0000126a7600) The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x526a4 head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 anon flags: 0x1ffc00000000040(head|node=0|zone=0|lastcpupid=0x7ff) page_type: f5(slab) raw: 01ffc00000000040 ffff00000d401c80 0000000000000000 dead000000000001 raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 head: 01ffc00000000040 ffff00000d401c80 0000000000000000 dead000000000001 head: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 head: 01ffc00000000002 fffffdffc049a901 ffffffffffffffff 0000000000000000 head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff0000126a7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff0000126a7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff0000126a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff0000126a7480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff0000126a7500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ==================================================================