hidraw: raw HID events driver (C) Jiri Kosina usbcore: registered new interface driver usbhid usbhid: USB HID core driver ion_heap_create: Heap type is disabled: 1 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory accessgeneral protection fault: 0000 [#1] PREEMPT SMP KASAN[ 3.766991] ================================================================== BUG: KASAN: use-after-free in debug_spin_lock_before kernel/locking/spinlock_debug.c:83 [inline] BUG: KASAN: use-after-free in do_raw_spin_lock+0x2e6/0x370 kernel/locking/spinlock_debug.c:135 Read of size 4 at addr ffff8801d7c86d34 by task system/344 CPU: 0 PID: 344 Comm: system Not tainted 4.4.205-syzkaller #0 0000000000000000 2dceebc82597e26f ffff8801d7f57bb8 ffffffff81a5ec4b 0000000000000000 ffffea00075f2180 ffff8801d7c86d34 0000000000000004 ffff8801da5ff980 ffff8801d7f57bf0 ffffffff81475901 0000000000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xcb/0x130 lib/dump_stack.c:56 [] print_address_description+0x6f/0x21b mm/kasan/report.c:252 [] kasan_report_error mm/kasan/report.c:351 [inline] [] kasan_report mm/kasan/report.c:408 [inline] [] kasan_report.cold+0x8c/0x2be mm/kasan/report.c:393 [] __asan_report_load4_noabort+0x14/0x20 mm/kasan/report.c:428 [] debug_spin_lock_before kernel/locking/spinlock_debug.c:83 [inline] [] do_raw_spin_lock+0x2e6/0x370 kernel/locking/spinlock_debug.c:135 [] __raw_spin_lock include/linux/spinlock_api_smp.h:145 [inline] [] _raw_spin_lock+0x40/0x50 kernel/locking/spinlock.c:151 [] spin_lock include/linux/spinlock.h:302 [inline] [] ion_heap_freelist_size drivers/staging/android/ion/ion_heap.c:176 [inline] [] ion_heap_deferred_free+0x100/0x3c0 drivers/staging/android/ion/ion_heap.c:232 [] kthread+0x273/0x310 kernel/kthread.c:211 [] ret_from_fork+0x55/0x80 arch/x86/entry/entry_64.S:510 Allocated by task 1: [] save_stack_trace+0x26/0x50 arch/x86/kernel/stacktrace.c:63 [] save_stack mm/kasan/kasan.c:512 [inline] [] set_track mm/kasan/kasan.c:524 [inline] [] kasan_kmalloc.part.0+0x62/0xf0 mm/kasan/kasan.c:616 [] kasan_kmalloc+0xb7/0xd0 mm/kasan/kasan.c:601 [] kmem_cache_alloc_trace+0x123/0x2d0 mm/slub.c:2642 [] kmalloc include/linux/slab.h:476 [inline] [] kzalloc include/linux/slab.h:620 [inline] [] ion_system_heap_create+0x4b/0x2c0 drivers/staging/android/ion/ion_system_heap.c:283 [] ion_heap_create+0x156/0x1b0 drivers/staging/android/ion/ion_heap.c:328 [] ion_dummy_init+0x1e5/0x36d drivers/staging/android/ion/ion_dummy_driver.c:106 [] do_one_initcall+0x13b/0x260 init/main.c:793 [] do_initcall_level init/main.c:858 [inline] [] do_initcalls init/main.c:866 [inline] [] do_basic_setup init/main.c:884 [inline] [] kernel_init_freeable+0x2fa/0x3c3 init/main.c:1029 [] kernel_init+0x12/0x15e init/main.c:957 [] ret_from_fork+0x55/0x80 arch/x86/entry/entry_64.S:510 Freed by task 1: [] save_stack_trace+0x26/0x50 arch/x86/kernel/stacktrace.c:63 [] save_stack mm/kasan/kasan.c:512 [inline] [] set_track mm/kasan/kasan.c:524 [inline] [] kasan_slab_free+0xb0/0x190 mm/kasan/kasan.c:589 [] slab_free_hook mm/slub.c:1383 [inline] [] slab_free_freelist_hook mm/slub.c:1405 [inline] [] slab_free mm/slub.c:2859 [inline] [] kfree+0xf4/0x310 mm/slub.c:3749 [] ion_system_heap_destroy+0x9a/0xc0 drivers/staging/android/ion/ion_system_heap.c:323 [] ion_heap_destroy+0x6a/0xd0 drivers/staging/android/ion/ion_heap.c:369 [] ion_dummy_init+0x2c1/0x36d drivers/staging/android/ion/ion_dummy_driver.c:116 [] do_one_initcall+0x13b/0x260 init/main.c:793 [] do_initcall_level init/main.c:858 [inline] [] do_initcalls init/main.c:866 [inline] [] do_basic_setup init/main.c:884 [inline] [] kernel_init_freeable+0x2fa/0x3c3 init/main.c:1029 [] kernel_init+0x12/0x15e init/main.c:957 [] ret_from_fork+0x55/0x80 arch/x86/entry/entry_64.S:510 The buggy address belongs to the object at ffff8801d7c86c80 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 180 bytes inside of 512-byte region [ffff8801d7c86c80, ffff8801d7c86e80) The buggy address belongs to the page: Modules linked in: CPU: 1 PID: 1 Comm: swapper/0 Not tainted 4.4.205-syzkaller #0 task: ffff8801da5f0000 task.stack: ffff8801da5f8000 RIP: 0010:[] [] ion_heap_destroy+0x32/0xd0 drivers/staging/android/ion/ion_heap.c:363 RSP: 0000:ffff8801da5ffda8 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: 0000000000000010 RCX: 0000000000000000 RDX: 0000000000000003 RSI: ffffffff820ae06c RDI: 000000000000001a RBP: ffff8801da5ffdb8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffffffffffffffea R13: ffff8801d80a77e8 R14: dffffc0000000000 R15: ffffffffffffffea FS: 0000000000000000(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000002e0a000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: dffffc0000000000 ffffffffffffffea ffff8801da5ffdf0 ffffffff8324d8e0 ffffffff82e11080 ffff8801d80a5480 dffffc0000000000 ffffffff8324d61f ffff8801da5ffeb0 ffff8801da5ffed8 ffffffff810004ab 0000000082ab2920 Call Trace: [] ion_dummy_init+0x2c1/0x36d drivers/staging/android/ion/ion_dummy_driver.c:116 [] do_one_initcall+0x13b/0x260 init/main.c:793 [] do_initcall_level init/main.c:858 [inline] [] do_initcalls init/main.c:866 [inline] [] do_basic_setup init/main.c:884 [inline] [] kernel_init_freeable+0x2fa/0x3c3 init/main.c:1029 [] kernel_init+0x12/0x15e init/main.c:957 [] ret_from_fork+0x55/0x80 arch/x86/entry/entry_64.S:510 Code: 89 fc 48 83 ec 08 e8 1e d8 24 ff 4d 85 e4 74 53 e8 14 d8 24 ff 49 8d 7c 24 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 83 00 00 00 41 8b 54 24 30 RIP [] ion_heap_destroy+0x32/0xd0 drivers/staging/android/ion/ion_heap.c:363 RSP ---[ end trace cb45787eee5b8914 ]---