Warning: Permanently added '10.128.0.19' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 67.543393][ T9001] ================================================================== [ 67.551647][ T9001] BUG: KASAN: slab-out-of-bounds in resample_shrink+0x4cd/0x820 [ 67.559809][ T9001] Read of size 2 at addr ffff8880940b8a00 by task syz-executor858/9001 [ 67.568037][ T9001] [ 67.570376][ T9001] CPU: 0 PID: 9001 Comm: syz-executor858 Not tainted 5.6.0-rc3-syzkaller #0 [ 67.579527][ T9001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 executing program [ 67.591732][ T9001] Call Trace: [ 67.595113][ T9001] dump_stack+0x1fb/0x318 [ 67.599573][ T9001] print_address_description+0x74/0x5c0 [ 67.605321][ T9001] ? vprintk_func+0x158/0x170 [ 67.610304][ T9001] ? printk+0x62/0x8d [ 67.614388][ T9001] ? vprintk_emit+0x2d4/0x3a0 [ 67.619084][ T9001] __kasan_report+0x149/0x1c0 [ 67.623895][ T9001] ? resample_shrink+0x4cd/0x820 [ 67.628905][ T9001] kasan_report+0x26/0x50 [ 67.633485][ T9001] __asan_report_load2_noabort+0x14/0x20 [ 67.639123][ T9001] resample_shrink+0x4cd/0x820 executing program [ 67.643898][ T9001] rate_transfer+0x51c/0x620 [ 67.648482][ T9001] ? resample_shrink+0x820/0x820 [ 67.653435][ T9001] snd_pcm_plug_read_transfer+0x1cc/0x270 [ 67.659148][ T9001] snd_pcm_oss_read+0x7a6/0xd70 [ 67.664609][ T9001] do_iter_read+0x4a2/0x5b0 [ 67.669209][ T9001] do_readv+0x18c/0x330 [ 67.673400][ T9001] ? check_preemption_disabled+0x44/0x260 [ 67.679378][ T9001] ? rcu_read_lock_sched_held+0x10b/0x170 [ 67.685462][ T9001] ? __kasan_check_write+0x14/0x20 [ 67.690563][ T9001] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 67.696007][ T9001] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 67.701828][ T9001] ? do_syscall_64+0x1d/0x1c0 [ 67.706491][ T9001] __x64_sys_readv+0x7d/0x90 [ 67.711084][ T9001] do_syscall_64+0xf7/0x1c0 [ 67.715931][ T9001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 67.721843][ T9001] RIP: 0033:0x4467e9 executing program [ 67.725735][ T9001] Code: e8 0c e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b 07 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 67.745702][ T9001] RSP: 002b:00007fe8f541ddb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 67.754128][ T9001] RAX: ffffffffffffffda RBX: 00000000006dbc28 RCX: 00000000004467e9 [ 67.762099][ T9001] RDX: 0000000000000001 RSI: 0000000020395000 RDI: 0000000000000003 [ 67.770351][ T9001] RBP: 00000000006dbc20 R08: 0000000000000000 R09: 0000000000000000 [ 67.778330][ T9001] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dbc2c [ 67.786315][ T9001] R13: 00007ffdbf15dd2f R14: 00007fe8f541e9c0 R15: 000000000000002d executing program [ 67.794316][ T9001] [ 67.796631][ T9001] Allocated by task 9001: [ 67.801138][ T9001] __kasan_kmalloc+0x118/0x1c0 [ 67.805893][ T9001] kasan_kmalloc+0x9/0x10 [ 67.810209][ T9001] __kmalloc_node+0x4d/0x60 [ 67.814794][ T9001] kvmalloc_node+0x85/0x110 [ 67.819399][ T9001] snd_pcm_plugin_alloc+0x167/0x760 [ 67.824678][ T9001] snd_pcm_plug_alloc+0x193/0x2e0 [ 67.829737][ T9001] snd_pcm_oss_change_params_locked+0x2b34/0x4350 [ 67.836157][ T9001] snd_pcm_oss_get_active_substream+0x22c/0x2a0 executing program [ 67.842396][ T9001] snd_pcm_oss_ioctl+0x1d66/0x4600 [ 67.847677][ T9001] __se_sys_ioctl+0x113/0x190 [ 67.852337][ T9001] __x64_sys_ioctl+0x7b/0x90 [ 67.856907][ T9001] do_syscall_64+0xf7/0x1c0 [ 67.861418][ T9001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 67.867308][ T9001] [ 67.869654][ T9001] Freed by task 8498: [ 67.873718][ T9001] __kasan_slab_free+0x12e/0x1e0 [ 67.879143][ T9001] kasan_slab_free+0xe/0x10 [ 67.883640][ T9001] kfree+0x10d/0x220 [ 67.888598][ T9001] load_elf_binary+0x2c73/0x3440 [ 67.893531][ T9001] search_binary_handler+0x190/0x5e0 [ 67.899002][ T9001] __do_execve_file+0x153b/0x1ca0 [ 67.904062][ T9001] __x64_sys_execve+0x94/0xb0 [ 67.908846][ T9001] do_syscall_64+0xf7/0x1c0 [ 67.913835][ T9001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 67.919930][ T9001] [ 67.922375][ T9001] The buggy address belongs to the object at ffff8880940b8800 [ 67.922375][ T9001] which belongs to the cache kmalloc-512 of size 512 [ 67.936416][ T9001] The buggy address is located 0 bytes to the right of executing program [ 67.936416][ T9001] 512-byte region [ffff8880940b8800, ffff8880940b8a00) [ 67.950340][ T9001] The buggy address belongs to the page: [ 67.955973][ T9001] page:ffffea0002502e00 refcount:1 mapcount:0 mapping:ffff8880aa400a80 index:0x0 [ 67.965633][ T9001] flags: 0xfffe0000000200(slab) [ 67.970536][ T9001] raw: 00fffe0000000200 ffffea0002787a08 ffffea00024147c8 ffff8880aa400a80 [ 67.979123][ T9001] raw: 0000000000000000 ffff8880940b8000 0000000100000004 0000000000000000 [ 67.988011][ T9001] page dumped because: kasan: bad access detected executing program [ 67.994948][ T9001] [ 67.997264][ T9001] Memory state around the buggy address: [ 68.003005][ T9001] ffff8880940b8900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 68.011308][ T9001] ffff8880940b8980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 68.020101][ T9001] >ffff8880940b8a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.028157][ T9001] ^ [ 68.032402][ T9001] ffff8880940b8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc executing program executing program [ 68.041042][ T9001] ffff8880940b8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.049530][ T9001] ================================================================== [ 68.058105][ T9001] Disabling lock debugging due to kernel taint [ 68.066801][ T9001] Kernel panic - not syncing: panic_on_warn set ... [ 68.073638][ T9001] CPU: 0 PID: 9001 Comm: syz-executor858 Tainted: G B 5.6.0-rc3-syzkaller #0 [ 68.083798][ T9001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.094123][ T9001] Call Trace: [ 68.097412][ T9001] dump_stack+0x1fb/0x318 [ 68.101979][ T9001] panic+0x264/0x7a9 [ 68.106313][ T9001] ? __kasan_report+0x193/0x1c0 [ 68.111178][ T9001] ? trace_hardirqs_on+0x34/0x80 [ 68.116500][ T9001] ? __kasan_report+0x193/0x1c0 [ 68.121552][ T9001] __kasan_report+0x1b9/0x1c0 [ 68.126369][ T9001] ? resample_shrink+0x4cd/0x820 [ 68.131425][ T9001] kasan_report+0x26/0x50 [ 68.135747][ T9001] __asan_report_load2_noabort+0x14/0x20 [ 68.141476][ T9001] resample_shrink+0x4cd/0x820 executing program executing program [ 68.146360][ T9001] rate_transfer+0x51c/0x620 [ 68.151650][ T9001] ? resample_shrink+0x820/0x820 [ 68.156613][ T9001] snd_pcm_plug_read_transfer+0x1cc/0x270 [ 68.162439][ T9001] snd_pcm_oss_read+0x7a6/0xd70 [ 68.167727][ T9001] do_iter_read+0x4a2/0x5b0 [ 68.172258][ T9001] do_readv+0x18c/0x330 [ 68.176536][ T9001] ? check_preemption_disabled+0x44/0x260 [ 68.182473][ T9001] ? rcu_read_lock_sched_held+0x10b/0x170 [ 68.188193][ T9001] ? __kasan_check_write+0x14/0x20 executing program [ 68.193394][ T9001] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 68.199395][ T9001] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 68.205478][ T9001] ? do_syscall_64+0x1d/0x1c0 [ 68.210174][ T9001] __x64_sys_readv+0x7d/0x90 [ 68.214754][ T9001] do_syscall_64+0xf7/0x1c0 [ 68.219332][ T9001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 68.225865][ T9001] RIP: 0033:0x4467e9 executing program [ 68.230231][ T9001] Code: e8 0c e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b 07 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 68.249987][ T9001] RSP: 002b:00007fe8f541ddb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 68.258484][ T9001] RAX: ffffffffffffffda RBX: 00000000006dbc28 RCX: 00000000004467e9 [ 68.267583][ T9001] RDX: 0000000000000001 RSI: 0000000020395000 RDI: 0000000000000003 [ 68.275925][ T9001] RBP: 00000000006dbc20 R08: 0000000000000000 R09: 0000000000000000 [ 68.283911][ T9001] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dbc2c [ 68.291964][ T9001] R13: 00007ffdbf15dd2f R14: 00007fe8f541e9c0 R15: 000000000000002d [ 68.301358][ T9001] Kernel Offset: disabled [ 68.305702][ T9001] Rebooting in 86400 seconds..