[syzbot] KASAN: use-after-free Read in rfkill_blocked

17 views
Skip to first unread message

syzbot

unread,
Nov 24, 2022, 1:24:36 AM11/24/22
to da...@davemloft.net, edum...@google.com, joha...@sipsolutions.net, ku...@kernel.org, linux-...@vger.kernel.org, linux-w...@vger.kernel.org, net...@vger.kernel.org, pab...@redhat.com, syzkall...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 0966d385830d riscv: Fix auipc+jalr relocation range checks
git tree: git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes
console output: https://syzkaller.appspot.com/x/log.txt?x=11196d0d880000
kernel config: https://syzkaller.appspot.com/x/.config?x=6295d67591064921
dashboard link: https://syzkaller.appspot.com/bug?extid=0299462c067009827b2a
compiler: riscv64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
userspace arch: riscv64

Unfortunately, I don't have any reproducer for this issue yet.

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+029946...@syzkaller.appspotmail.com

==================================================================
BUG: KASAN: use-after-free in __lock_acquire+0x8ee/0x333e kernel/locking/lockdep.c:4897
Read of size 8 at addr ffffaf8024249018 by task syz-executor.0/7946

CPU: 0 PID: 7946 Comm: syz-executor.0 Not tainted 5.17.0-rc1-syzkaller-00002-g0966d385830d #0
Hardware name: riscv-virtio,qemu (DT)
Call Trace:
[<ffffffff8000a228>] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:113
[<ffffffff831668cc>] show_stack+0x34/0x40 arch/riscv/kernel/stacktrace.c:119
[<ffffffff831756ba>] __dump_stack lib/dump_stack.c:88 [inline]
[<ffffffff831756ba>] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:106
[<ffffffff8047479e>] print_address_description.constprop.0+0x2a/0x330 mm/kasan/report.c:255
[<ffffffff80474d4c>] __kasan_report mm/kasan/report.c:442 [inline]
[<ffffffff80474d4c>] kasan_report+0x184/0x1e0 mm/kasan/report.c:459
[<ffffffff80475b20>] check_region_inline mm/kasan/generic.c:183 [inline]
[<ffffffff80475b20>] __asan_load8+0x6e/0x96 mm/kasan/generic.c:256
[<ffffffff80112b70>] __lock_acquire+0x8ee/0x333e kernel/locking/lockdep.c:4897
[<ffffffff80116582>] lock_acquire.part.0+0x1d0/0x424 kernel/locking/lockdep.c:5639
[<ffffffff8011682a>] lock_acquire+0x54/0x6a kernel/locking/lockdep.c:5612
[<ffffffff831afa2c>] __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
[<ffffffff831afa2c>] _raw_spin_lock_irqsave+0x3e/0x62 kernel/locking/spinlock.c:162
[<ffffffff83034f0a>] rfkill_blocked+0x22/0x62 net/rfkill/core.c:941
[<ffffffff830b8862>] nfc_dev_up+0x8e/0x26c net/nfc/core.c:102
[<ffffffff830bb742>] nfc_genl_dev_up+0x5e/0x8a net/nfc/netlink.c:770
[<ffffffff8296f9ae>] genl_family_rcv_msg_doit+0x19a/0x23c net/netlink/genetlink.c:731
[<ffffffff82970420>] genl_family_rcv_msg net/netlink/genetlink.c:775 [inline]
[<ffffffff82970420>] genl_rcv_msg+0x236/0x3ba net/netlink/genetlink.c:792
[<ffffffff8296ded2>] netlink_rcv_skb+0xf8/0x2be net/netlink/af_netlink.c:2494
[<ffffffff8296ecb2>] genl_rcv+0x36/0x4c net/netlink/genetlink.c:803
[<ffffffff8296cbcc>] netlink_unicast_kernel net/netlink/af_netlink.c:1317 [inline]
[<ffffffff8296cbcc>] netlink_unicast+0x40e/0x5fe net/netlink/af_netlink.c:1343
[<ffffffff8296d29c>] netlink_sendmsg+0x4e0/0x994 net/netlink/af_netlink.c:1919
[<ffffffff826d264e>] sock_sendmsg_nosec net/socket.c:705 [inline]
[<ffffffff826d264e>] sock_sendmsg+0xa0/0xc4 net/socket.c:725
[<ffffffff826d4dd4>] ____sys_sendmsg+0x46e/0x484 net/socket.c:2413
[<ffffffff826d8bca>] ___sys_sendmsg+0x16c/0x1f6 net/socket.c:2467
[<ffffffff826d8e78>] __sys_sendmsg+0xba/0x150 net/socket.c:2496
[<ffffffff826d8f3a>] __do_sys_sendmsg net/socket.c:2505 [inline]
[<ffffffff826d8f3a>] sys_sendmsg+0x2c/0x3a net/socket.c:2503
[<ffffffff80005716>] ret_from_syscall+0x0/0x2

Allocated by task 7946:
stack_trace_save+0xa6/0xd8 kernel/stacktrace.c:122
kasan_save_stack+0x2c/0x58 mm/kasan/common.c:38
kasan_set_track mm/kasan/common.c:45 [inline]
set_alloc_info mm/kasan/common.c:436 [inline]
____kasan_kmalloc mm/kasan/common.c:515 [inline]
____kasan_kmalloc mm/kasan/common.c:474 [inline]
__kasan_kmalloc+0x80/0xb2 mm/kasan/common.c:524
kasan_kmalloc include/linux/kasan.h:270 [inline]
__kmalloc+0x190/0x318 mm/slub.c:4424
kmalloc include/linux/slab.h:586 [inline]
kzalloc include/linux/slab.h:715 [inline]
rfkill_alloc+0x96/0x1aa net/rfkill/core.c:983
nfc_register_device+0xe4/0x29e net/nfc/core.c:1129
nci_register_device+0x538/0x612 net/nfc/nci/core.c:1252
virtual_ncidev_open+0x82/0x12c drivers/nfc/virtual_ncidev.c:143
misc_open+0x272/0x2c8 drivers/char/misc.c:141
chrdev_open+0x1d4/0x478 fs/char_dev.c:414
do_dentry_open+0x2a4/0x7d4 fs/open.c:824
vfs_open+0x52/0x5e fs/open.c:959
do_open fs/namei.c:3476 [inline]
path_openat+0x12b6/0x189e fs/namei.c:3609
do_filp_open+0x10e/0x22a fs/namei.c:3636
do_sys_openat2+0x174/0x31e fs/open.c:1214
do_sys_open fs/open.c:1230 [inline]
__do_sys_openat fs/open.c:1246 [inline]
sys_openat+0xdc/0x164 fs/open.c:1241
ret_from_syscall+0x0/0x2

Freed by task 7944:
stack_trace_save+0xa6/0xd8 kernel/stacktrace.c:122
kasan_save_stack+0x2c/0x58 mm/kasan/common.c:38
kasan_set_track+0x1a/0x26 mm/kasan/common.c:45
kasan_set_free_info+0x1e/0x3a mm/kasan/generic.c:370
____kasan_slab_free mm/kasan/common.c:366 [inline]
____kasan_slab_free+0x15e/0x180 mm/kasan/common.c:328
__kasan_slab_free+0x10/0x18 mm/kasan/common.c:374
kasan_slab_free include/linux/kasan.h:236 [inline]
slab_free_hook mm/slub.c:1728 [inline]
slab_free_freelist_hook+0x8e/0x1cc mm/slub.c:1754
slab_free mm/slub.c:3509 [inline]
kfree+0xe0/0x3e4 mm/slub.c:4562
rfkill_release+0x20/0x2a net/rfkill/core.c:831
device_release+0x66/0x148 drivers/base/core.c:2229
kobject_cleanup lib/kobject.c:705 [inline]
kobject_release lib/kobject.c:736 [inline]
kref_put include/linux/kref.h:65 [inline]
kobject_put+0x1bc/0x38e lib/kobject.c:753
put_device+0x28/0x3a drivers/base/core.c:3512
rfkill_destroy+0x2a/0x3c net/rfkill/core.c:1142
nfc_unregister_device+0xac/0x232 net/nfc/core.c:1167
nci_unregister_device+0x168/0x182 net/nfc/nci/core.c:1298
virtual_ncidev_close+0x9c/0xbc drivers/nfc/virtual_ncidev.c:163
__fput+0x164/0x502 fs/file_table.c:311
____fput+0x1a/0x24 fs/file_table.c:344
task_work_run+0xdc/0x154 kernel/task_work.c:164
tracehook_notify_resume include/linux/tracehook.h:188 [inline]
do_notify_resume+0x894/0xa56 arch/riscv/kernel/signal.c:320
ret_from_exception+0x0/0x10

Last potentially related work creation:
stack_trace_save+0xa6/0xd8 kernel/stacktrace.c:122
kasan_save_stack+0x2c/0x58 mm/kasan/common.c:38
__kasan_record_aux_stack+0xc4/0xdc mm/kasan/generic.c:348
kasan_record_aux_stack_noalloc+0xe/0x16 mm/kasan/generic.c:358
insert_work+0x40/0x1d4 kernel/workqueue.c:1368
__queue_work+0x4ec/0xed0 kernel/workqueue.c:1534
queue_work_on+0xe8/0xfe kernel/workqueue.c:1562
queue_work include/linux/workqueue.h:502 [inline]
schedule_work include/linux/workqueue.h:563 [inline]
rfkill_register+0x46e/0x60e net/rfkill/core.c:1089
nfc_register_device+0x10a/0x29e net/nfc/core.c:1132
nci_register_device+0x538/0x612 net/nfc/nci/core.c:1252
virtual_ncidev_open+0x82/0x12c drivers/nfc/virtual_ncidev.c:143
misc_open+0x272/0x2c8 drivers/char/misc.c:141
chrdev_open+0x1d4/0x478 fs/char_dev.c:414
do_dentry_open+0x2a4/0x7d4 fs/open.c:824
vfs_open+0x52/0x5e fs/open.c:959
do_open fs/namei.c:3476 [inline]
path_openat+0x12b6/0x189e fs/namei.c:3609
do_filp_open+0x10e/0x22a fs/namei.c:3636
do_sys_openat2+0x174/0x31e fs/open.c:1214
do_sys_open fs/open.c:1230 [inline]
__do_sys_openat fs/open.c:1246 [inline]
sys_openat+0xdc/0x164 fs/open.c:1241
ret_from_syscall+0x0/0x2

The buggy address belongs to the object at ffffaf8024249000
which belongs to the cache kmalloc-2k of size 2048
The buggy address is located 24 bytes inside of
2048-byte region [ffffaf8024249000, ffffaf8024249800)
The buggy address belongs to the page:
page:ffffaf807b073440 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4448
head:ffffaf807b073440 order:3 compound_mapcount:0 compound_pincount:0
flags: 0xa000010200(slab|head|section=20|node=0|zone=0)
raw: 000000a000010200 0000000000000100 0000000000000122 ffffaf8007202000
raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000
raw: 00000000000007ff
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 3932, ts 2633362768300, free_ts 2631908277000
__set_page_owner+0x48/0x136 mm/page_owner.c:183
set_page_owner include/linux/page_owner.h:31 [inline]
post_alloc_hook+0xd0/0x10a mm/page_alloc.c:2427
prep_new_page mm/page_alloc.c:2434 [inline]
get_page_from_freelist+0x8da/0x12d8 mm/page_alloc.c:4165
__alloc_pages+0x150/0x3b6 mm/page_alloc.c:5389
alloc_pages+0x132/0x2a6 mm/mempolicy.c:2271
alloc_slab_page.constprop.0+0xc2/0xfa mm/slub.c:1799
allocate_slab mm/slub.c:1944 [inline]
new_slab+0x25a/0x2cc mm/slub.c:2004
___slab_alloc+0x56e/0x918 mm/slub.c:3018
__slab_alloc.constprop.0+0x50/0x8c mm/slub.c:3105
slab_alloc_node mm/slub.c:3196 [inline]
__kmalloc_node_track_caller+0x26c/0x362 mm/slub.c:4957
kmalloc_reserve net/core/skbuff.c:354 [inline]
__alloc_skb+0xee/0x2e4 net/core/skbuff.c:426
alloc_skb include/linux/skbuff.h:1158 [inline]
nlmsg_new include/net/netlink.h:953 [inline]
rtmsg_ifinfo_build_skb+0x62/0x142 net/core/rtnetlink.c:3829
unregister_netdevice_many+0x7dc/0xf50 net/core/dev.c:10419
default_device_exit_batch+0x28a/0x2dc net/core/dev.c:10945
ops_exit_list+0xcc/0xe8 net/core/net_namespace.c:173
cleanup_net+0x430/0x732 net/core/net_namespace.c:597
page last free stack trace:
__reset_page_owner+0x4a/0xea mm/page_owner.c:142
reset_page_owner include/linux/page_owner.h:24 [inline]
free_pages_prepare mm/page_alloc.c:1352 [inline]
free_pcp_prepare+0x29c/0x45e mm/page_alloc.c:1404
free_unref_page_prepare mm/page_alloc.c:3325 [inline]
free_unref_page+0x6a/0x31e mm/page_alloc.c:3404
free_the_page mm/page_alloc.c:706 [inline]
__free_pages+0xe2/0x112 mm/page_alloc.c:5474
__free_slab+0x122/0x27c mm/slub.c:2028
free_slab mm/slub.c:2043 [inline]
discard_slab+0x4c/0x7a mm/slub.c:2049
__unfreeze_partials+0x16a/0x18e mm/slub.c:2536
put_cpu_partial+0xf6/0x162 mm/slub.c:2612
__slab_free+0x166/0x29c mm/slub.c:3378
do_slab_free mm/slub.c:3497 [inline]
___cache_free+0x17c/0x354 mm/slub.c:3516
qlink_free mm/kasan/quarantine.c:157 [inline]
qlist_free_all+0x7c/0x132 mm/kasan/quarantine.c:176
kasan_quarantine_reduce+0x14c/0x1c8 mm/kasan/quarantine.c:283
__kasan_slab_alloc+0x5c/0x98 mm/kasan/common.c:446
kasan_slab_alloc include/linux/kasan.h:260 [inline]
slab_post_alloc_hook mm/slab.h:732 [inline]
slab_alloc_node mm/slub.c:3230 [inline]
kmem_cache_alloc_node+0x368/0x41c mm/slub.c:3266
__alloc_skb+0x234/0x2e4 net/core/skbuff.c:414
alloc_skb include/linux/skbuff.h:1158 [inline]
nlmsg_new include/net/netlink.h:953 [inline]
inet6_netconf_notify_devconf+0xb6/0x1f2 net/ipv6/addrconf.c:584

Memory state around the buggy address:
ffffaf8024248f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
ffffaf8024248f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
>ffffaf8024249000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
^
ffffaf8024249080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ffffaf8024249100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

Johannes Berg

unread,
Nov 25, 2022, 4:09:24 AM11/25/22
to syzbot, da...@davemloft.net, edum...@google.com, ku...@kernel.org, linux-...@vger.kernel.org, linux-w...@vger.kernel.org, net...@vger.kernel.org, pab...@redhat.com, syzkall...@googlegroups.com, Krzysztof Kozlowski
Looks like an NFC issue to me, Krzysztof?

I mean, rfkill got allocated by nfc_register_device(), freed by
nfc_unregister_device(), and then used by nfc_dev_up(). Seems like the
last bit shouldn't be possible after nfc_unregister_device()?

johannes

syzbot

unread,
Nov 27, 2022, 2:57:55 PM11/27/22
to krzysztof...@linaro.org, krzysztof...@linaro.org, syzkall...@googlegroups.com
> On 25/11/2022 10:09, Johannes Berg wrote:
>> Looks like an NFC issue to me, Krzysztof?
>>
>> I mean, rfkill got allocated by nfc_register_device(), freed by
>> nfc_unregister_device(), and then used by nfc_dev_up(). Seems like the
>> last bit shouldn't be possible after nfc_unregister_device()?
>>
>> johannes
>>
>> On Wed, 2022-11-23 at 22:24 -0800, syzbot wrote:
>>> Hello,
>>>
>>> syzbot found the following issue on:
>>>
>>> HEAD commit: 0966d385830d riscv: Fix auipc+jalr relocation range checks
>>> git tree: git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes
>>> console output: https://syzkaller.appspot.com/x/log.txt?x=11196d0d880000
>>> kernel config: https://syzkaller.appspot.com/x/.config?x=6295d67591064921
>>> dashboard link: https://syzkaller.appspot.com/bug?extid=0299462c067009827b2a
>>> compiler: riscv64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
>>> userspace arch: riscv64
>>>
>>> Unfortunately, I don't have any reproducer for this issue yet.
>>>
>>> IMPORTANT: if you fix the issue, please add the following tag to the commit:
>>> Reported-by: syzbot+029946...@syzkaller.appspotmail.com
>>>
>>> ==================================================================
>>> BUG: KASAN: use-after-free in __lock_acquire+0x8ee/0x333e kernel/locking/lockdep.c:4897
>>> Read of size 8 at addr ffffaf8024249018 by task syz-executor.0/7946
>>>
>
> #syz test: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master

This crash does not have a reproducer. I cannot test it.

>
> Best regards,
> Krzysztof
>

Krzysztof Kozlowski

unread,
Nov 27, 2022, 2:59:40 PM11/27/22
to Johannes Berg, syzbot, da...@davemloft.net, edum...@google.com, ku...@kernel.org, linux-...@vger.kernel.org, linux-w...@vger.kernel.org, net...@vger.kernel.org, pab...@redhat.com, syzkall...@googlegroups.com
On 25/11/2022 10:09, Johannes Berg wrote:
There were several issues found recently in virtual NCI driver, so this
might be one of them. There is no reproducer, though...

Best regards,
Krzysztof

Dmitry Vyukov

unread,
Nov 28, 2022, 5:07:36 AM11/28/22
to Krzysztof Kozlowski, Johannes Berg, syzbot, da...@davemloft.net, edum...@google.com, ku...@kernel.org, linux-...@vger.kernel.org, linux-w...@vger.kernel.org, net...@vger.kernel.org, pab...@redhat.com, syzkall...@googlegroups.com
Hi Krzysztof,

Do you think it's related specifically to the virtual driver?

I would assume it's a bug in the NCI core itself related to dynamic
device destructions. This should affect e.g. USB devices as well.

It's an issue only in the virtual driver. It means that the virtual
driver uses the NCI core incorrectly, not the way all real drivers use
it. If so the question is: what is the difference? We need to fix it.
It's not useful to have unrealistic test drivers -- we both get false
positives and don't get true positives.

I think the issue may be localized from the KASAN report itself w/o a
reproducer.
Is there proper synchronization between
nfc_unregister_device/rfkill_destroy and nfc_dev_up/rfkill_blocked?
Something that prevents rfkill_blocked to be called after
rfkill_destroy? If not, then that's the issue.

Krzysztof Kozlowski

unread,
Nov 28, 2022, 5:15:20 AM11/28/22
to Dmitry Vyukov, Johannes Berg, syzbot, da...@davemloft.net, edum...@google.com, ku...@kernel.org, linux-...@vger.kernel.org, linux-w...@vger.kernel.org, net...@vger.kernel.org, pab...@redhat.com, syzkall...@googlegroups.com
Both, although maybe not this particular issue. There were like five
separate reports last few days...

>
> I would assume it's a bug in the NCI core itself related to dynamic
> device destructions. This should affect e.g. USB devices as well.

Earlier this year there was a bigger fix for unregister path in NFC -
see commits:
da5c0f119203 (nfc_unregister_device+nfc_fw_download
ef27324e2c (nci_unregister_device+nci_cmd_work)
1b0e81416 (rfkill related)
and these pointed out inherent issues in locking/synchronization of NFC
core modules. I don't think we fixed all of the core issues, rather only
what was reported, so some specific scenarios.

> It's an issue only in the virtual driver. It means that the virtual
> driver uses the NCI core incorrectly, not the way all real drivers use
> it. If so the question is: what is the difference? We need to fix it.
> It's not useful to have unrealistic test drivers -- we both get false
> positives and don't get true positives.
>
> I think the issue may be localized from the KASAN report itself w/o a
> reproducer.
> Is there proper synchronization between
> nfc_unregister_device/rfkill_destroy and nfc_dev_up/rfkill_blocked?
> Something that prevents rfkill_blocked to be called after
> rfkill_destroy? If not, then that's the issue.

Mentioned 1b0e81416a tried to do this and that time I had impression fix
is correct. However it seems it is not... (or not enough)

Best regards,
Krzysztof

Lin Horse

unread,
Nov 28, 2022, 7:34:53 PM11/28/22
to syzkaller-bugs
#syz test: https://github.com/torvalds/linux.git 0ad6bded175e829c2ca261529c9dce39a32a042d

For recent bugs reported by the syzkaller, including
* This one: (https://groups.google.com/g/syzkaller-bugs/c/Q3uJsbto4TE)
* BUG: unable to handle kernel NULL pointer dereference in nci_send_cmd (https://groups.google.com/g/syzkaller-bugs/c/Rbip-w2vhbE/m/FdtaY3EWDwAJ_
* BUG: unable to handle kernel NULL pointer dereference in nci_cmd_timer (https://groups.google.com/g/syzkaller-bugs/c/XSWT_ivhidY/m/-eLFqLYuDwAJ)

I believe these are all the same issues (see stack traces, all related to nci_dev_up race)
hence they all should have been fixed with the upstream 

The root cause of this bug is that the big NCI_UNREG, which is used to prevent the UAF/NPD, is cleaned out if somewhere unexpected.

Regards

Aleksandr Nogikh

unread,
Nov 29, 2022, 6:06:45 AM11/29/22
to Lin Horse, syzkaller-bugs
Hi Lin,

I've just made syzbot more tolerant to newlines and whitespaces during
command parsing, so let's try again:

#syz test: https://github.com/torvalds/linux.git
0ad6bded175e829c2ca261529c9dce39a32a042d


> --
> You received this message because you are subscribed to the Google Groups "syzkaller-bugs" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to syzkaller-bug...@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller-bugs/0daaeb04-d6fd-41bf-aeaf-505c7cbdcc92n%40googlegroups.com.

syzbot

unread,
Nov 29, 2022, 6:06:47 AM11/29/22
to nog...@google.com, kylin.f...@gmail.com, nog...@google.com, syzkall...@googlegroups.com
> Hi Lin,
>
> I've just made syzbot more tolerant to newlines and whitespaces during
> command parsing, so let's try again:
>
> #syz test: https://github.com/torvalds/linux.git

This crash does not have a reproducer. I cannot test it.

> To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller-bugs/CANp29Y535aSwMHfPrhSkhjeXYJihkhrPZ3g4gzyfKNG8uHe%2BQw%40mail.gmail.com.

Dmitry Vyukov

unread,
Nov 30, 2022, 4:32:27 AM11/30/22
to Krzysztof Kozlowski, 马麟, Johannes Berg, syzbot, linux-...@vger.kernel.org, linux-w...@vger.kernel.org, net...@vger.kernel.org, syzkall...@googlegroups.com
On Mon, 28 Nov 2022 at 11:15, Krzysztof Kozlowski
#syz dup: WARNING in nci_send_cmd
Reply all
Reply to author
Forward
Message has been deleted
0 new messages