Sensor A: Test Pattern: 75% Colorbar
Sensor A: Vertical Flip: false
Sensor A: Horizontal Flip: false
Sensor A: ================== END STATUS ==================
==================================================================
BUG: KASAN: slab-out-of-bounds in __anon_vma_interval_tree_insert mm/interval_tree.c:72 [inline]
BUG: KASAN: slab-out-of-bounds in anon_vma_interval_tree_insert+0x313/0x3d0 mm/interval_tree.c:83
Read of size 8 at addr ffff8880b0142218 by task syz-executor.2/8137
CPU: 1 PID: 8137 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1fc/0x2ef lib/dump_stack.c:118
print_address_description.cold+0x54/0x219 mm/kasan/report.c:256
kasan_report_error.cold+0x8a/0x1b9 mm/kasan/report.c:354
kasan_report mm/kasan/report.c:412 [inline]
__asan_report_load8_noabort+0x88/0x90 mm/kasan/report.c:433
__anon_vma_interval_tree_insert mm/interval_tree.c:72 [inline]
anon_vma_interval_tree_insert+0x313/0x3d0 mm/interval_tree.c:83
anon_vma_chain_link mm/rmap.c:144 [inline]
anon_vma_clone+0x23f/0x5e0 mm/rmap.c:279
anon_vma_fork+0x82/0x630 mm/rmap.c:332
dup_mmap kernel/fork.c:504 [inline]
dup_mm kernel/fork.c:1285 [inline]
copy_mm kernel/fork.c:1341 [inline]
copy_process.part.0+0x360f/0x8260 kernel/fork.c:1913
copy_process kernel/fork.c:1710 [inline]
_do_fork+0x22f/0xf30 kernel/fork.c:2219
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f07a216048b
Code: ed 0f 85 60 01 00 00 64 4c 8b 0c 25 10 00 00 00 45 31 c0 4d 8d 91 d0 02 00 00 31 d2 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 89 00 00 00 41 89 c5 85 c0 0f 85 90 00 00
RSP: 002b:00007fff1ae86fa0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f07a216048b
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011
RBP: 0000000000000001 R08: 0000000000000000 R09: 0000555557438400
R10: 00005555574386d0 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000000 R14: 0000000000000001 R15: 00007fff1ae87080
Allocated by task 8134:
kmem_cache_alloc+0x122/0x370 mm/slab.c:3559
anon_vma_chain_alloc mm/rmap.c:129 [inline]
anon_vma_clone+0xe0/0x5e0 mm/rmap.c:269
anon_vma_fork+0x82/0x630 mm/rmap.c:332
dup_mmap kernel/fork.c:504 [inline]
dup_mm kernel/fork.c:1285 [inline]
copy_mm kernel/fork.c:1341 [inline]
copy_process.part.0+0x360f/0x8260 kernel/fork.c:1913
copy_process kernel/fork.c:1710 [inline]
_do_fork+0x22f/0xf30 kernel/fork.c:2219
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
Freed by task 17152:
__cache_free mm/slab.c:3503 [inline]
kmem_cache_free+0x7f/0x260 mm/slab.c:3765
anon_vma_chain_free mm/rmap.c:134 [inline]
unlink_anon_vmas+0x2a4/0x840 mm/rmap.c:401
free_pgtables+0xe2/0x2f0 mm/memory.c:638
exit_mmap+0x2c8/0x530 mm/mmap.c:3094
__mmput kernel/fork.c:1016 [inline]
mmput+0x14e/0x4a0 kernel/fork.c:1037
exit_mm kernel/exit.c:549 [inline]
do_exit+0xaec/0x2be0 kernel/exit.c:857
do_group_exit+0x125/0x310 kernel/exit.c:967
get_signal+0x3f2/0x1f70 kernel/signal.c:2589
do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799
exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163
prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline]
syscall_return_slowpath arch/x86/entry/common.c:271 [inline]
do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296
entry_SYSCALL_64_after_hwframe+0x49/0xbe
The buggy address belongs to the object at ffff8880b01421c0
which belongs to the cache anon_vma_chain of size 80
The buggy address is located 8 bytes to the right of
80-byte region [ffff8880b01421c0, ffff8880b0142210)
The buggy address belongs to the page:
page:ffffea0002c05080 count:1 mapcount:0 mapping:ffff88823b833640 index:0x0
flags: 0xfff00000000100(slab)
raw: 00fff00000000100 ffffea0002960348 ffffea0002653a48 ffff88823b833640
raw: 0000000000000000 ffff8880b0142000 0000000100000024 0000000000000000
page dumped because: kasan: bad access detected
Memory state around the buggy address:
ffff8880b0142100: 00 00 00 00 00 00 fc fc fc fc fb fb fb fb fb fb
ffff8880b0142180: fb fb fb fb fc fc fc fc fb fb fb fb fb fb fb fb
>ffff8880b0142200: fb fb fc fc fc fc 00 00 00 00 00 00 00 00 00 00
^
ffff8880b0142280: fc fc fc fc fb fb fb fb fb fb fb fb fb fb fc fc
ffff8880b0142300: fc fc fb fb fb fb fb fb fb fb fb fb fc fc fc fc
==================================================================
Sensor A: ================= START STATUS =================
Sensor A: Test Pattern: 75% Colorbar
Sensor A: Vertical Flip: false
Sensor A: Horizontal Flip: false
Sensor A: ================== END STATUS ==================