Warning: Permanently added '10.128.1.121' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 67.779313][ T8551] ================================================================== [ 67.787403][ T8551] BUG: KASAN: use-after-free in __lock_acquire+0x3e6f/0x54c0 [ 67.794809][ T8551] Read of size 8 at addr ffff8880152ca4d0 by task syz-executor585/8551 [ 67.803057][ T8551] [ 67.805392][ T8551] CPU: 1 PID: 8551 Comm: syz-executor585 Not tainted 5.11.0-next-20210224-syzkaller #0 [ 67.815027][ T8551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.825111][ T8551] Call Trace: executing program executing program [ 67.828396][ T8551] dump_stack+0xfa/0x151 [ 67.832758][ T8551] ? __lock_acquire+0x3e6f/0x54c0 [ 67.837792][ T8551] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 67.844846][ T8551] ? __lock_acquire+0x3e6f/0x54c0 [ 67.849890][ T8551] ? __lock_acquire+0x3e6f/0x54c0 [ 67.855041][ T8551] kasan_report.cold+0x7c/0xd8 [ 67.859826][ T8551] ? __lock_acquire+0x3e6f/0x54c0 [ 67.864869][ T8551] __lock_acquire+0x3e6f/0x54c0 [ 67.869763][ T8551] ? lock_acquire+0x1bb/0x730 executing program executing program [ 67.874450][ T8551] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 67.880450][ T8551] lock_acquire+0x1ab/0x730 [ 67.884970][ T8551] ? try_to_wake_up+0x98/0x14a0 [ 67.889841][ T8551] ? lock_release+0x710/0x710 [ 67.894795][ T8551] ? lock_downgrade+0x6d0/0x6d0 [ 67.900531][ T8551] ? __cpuhp_state_remove_instance+0x15e/0x5b0 [ 67.906707][ T8551] ? lock_is_held_type+0xd5/0x130 [ 67.911751][ T8551] ? _raw_spin_lock_irqsave+0x4e/0x50 [ 67.917142][ T8551] _raw_spin_lock_irqsave+0x39/0x50 [ 67.922363][ T8551] ? try_to_wake_up+0x98/0x14a0 executing program [ 67.927248][ T8551] try_to_wake_up+0x98/0x14a0 [ 67.931981][ T8551] ? migrate_swap_stop+0x9f0/0x9f0 [ 67.937107][ T8551] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 67.943361][ T8551] ? __cpuhp_state_remove_instance+0x3de/0x5b0 [ 67.949540][ T8551] io_wq_destroy+0x74/0x3d0 [ 67.954062][ T8551] __io_uring_files_cancel+0x195/0x230 [ 67.959538][ T8551] ? __io_uring_free+0xc0/0xc0 [ 67.964319][ T8551] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 67.970582][ T8551] ? __validate_process_creds+0x20c/0x370 executing program executing program [ 67.976318][ T8551] do_exit+0x299/0x2a60 [ 67.980490][ T8551] ? find_held_lock+0x2d/0x110 [ 67.985280][ T8551] ? lock_release+0x3bb/0x710 [ 67.989978][ T8551] ? mm_update_next_owner+0x7a0/0x7a0 [ 67.995376][ T8551] ? lock_downgrade+0x6d0/0x6d0 [ 68.000263][ T8551] ? _raw_spin_unlock_irq+0x1f/0x40 [ 68.005507][ T8551] do_group_exit+0x125/0x310 [ 68.010116][ T8551] __x64_sys_exit_group+0x3a/0x50 [ 68.015155][ T8551] do_syscall_64+0x2d/0x70 [ 68.019591][ T8551] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.025496][ T8551] RIP: 0033:0x43e989 [ 68.029397][ T8551] Code: 00 49 c7 c0 c0 ff ff ff be e7 00 00 00 ba 3c 00 00 00 eb 12 0f 1f 44 00 00 89 d0 0f 05 48 3d 00 f0 ff ff 77 1c f4 89 f0 0f 05 <48> 3d 00 f0 ff ff 76 e7 f7 d8 64 41 89 00 eb df 0f 1f 80 00 00 00 [ 68.049019][ T8551] RSP: 002b:00007ffce8f11728 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 68.057456][ T8551] RAX: ffffffffffffffda RBX: 00000000004b02f0 RCX: 000000000043e989 [ 68.065451][ T8551] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 68.073439][ T8551] RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000000010000000 [ 68.081426][ T8551] R10: 0000000000008011 R11: 0000000000000246 R12: 00000000004b02f0 [ 68.089415][ T8551] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 [ 68.097411][ T8551] [ 68.099762][ T8551] Allocated by task 8551: [ 68.104086][ T8551] kasan_save_stack+0x1b/0x40 [ 68.108774][ T8551] __kasan_slab_alloc+0x75/0x90 [ 68.113635][ T8551] kmem_cache_alloc_node+0x16d/0x3c0 [ 68.118928][ T8551] copy_process+0x613/0x6fd0 [ 68.123529][ T8551] kernel_clone+0xe7/0xab0 [ 68.127954][ T8551] io_wq_fork_thread+0xa7/0xe0 [ 68.132732][ T8551] io_wq_create+0x81c/0xab0 [ 68.137249][ T8551] io_uring_alloc_task_context+0x185/0x510 [ 68.143090][ T8551] io_uring_add_task_file+0x261/0x350 [ 68.148476][ T8551] io_uring_setup+0x14c7/0x2c20 [ 68.153341][ T8551] do_syscall_64+0x2d/0x70 [ 68.157772][ T8551] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.163680][ T8551] [ 68.166004][ T8551] Freed by task 12: [ 68.169807][ T8551] kasan_save_stack+0x1b/0x40 [ 68.174498][ T8551] kasan_set_track+0x1c/0x30 executing program executing program executing program [ 68.179098][ T8551] kasan_set_free_info+0x20/0x30 [ 68.184049][ T8551] __kasan_slab_free+0xf5/0x130 [ 68.188908][ T8551] slab_free_freelist_hook+0x72/0x1b0 [ 68.194303][ T8551] kmem_cache_free+0x8b/0x730 [ 68.198992][ T8551] __put_task_struct+0x267/0x3f0 [ 68.204049][ T8551] delayed_put_task_struct+0x1f6/0x340 [ 68.209528][ T8551] rcu_core+0x722/0x1280 [ 68.213820][ T8551] __do_softirq+0x29b/0x9f6 [ 68.218367][ T8551] [ 68.220727][ T8551] Last potentially related work creation: [ 68.226445][ T8551] kasan_save_stack+0x1b/0x40 executing program [ 68.231135][ T8551] kasan_record_aux_stack+0xe5/0x110 [ 68.236440][ T8551] call_rcu+0xb1/0x700 [ 68.240522][ T8551] put_task_struct_rcu_user+0x7f/0xb0 [ 68.245904][ T8551] __schedule+0x914/0x21a0 [ 68.250328][ T8551] schedule+0xcf/0x270 [ 68.254409][ T8551] do_nanosleep+0x268/0x6a0 [ 68.258923][ T8551] hrtimer_nanosleep+0x1f9/0x430 [ 68.263868][ T8551] common_nsleep+0xa2/0xc0 [ 68.268298][ T8551] __x64_sys_clock_nanosleep+0x2f4/0x430 [ 68.273963][ T8551] do_syscall_64+0x2d/0x70 executing program [ 68.278391][ T8551] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.284325][ T8551] [ 68.286646][ T8551] Second to last potentially related work creation: [ 68.293225][ T8551] kasan_save_stack+0x1b/0x40 [ 68.297930][ T8551] kasan_record_aux_stack+0xe5/0x110 [ 68.303490][ T8551] call_rcu+0xb1/0x700 [ 68.307569][ T8551] put_task_struct_rcu_user+0x7f/0xb0 [ 68.312957][ T8551] __schedule+0x914/0x21a0 [ 68.317388][ T8551] schedule+0xcf/0x270 [ 68.321466][ T8551] schedule_hrtimeout_range_clock+0x31d/0x370 [ 68.327549][ T8551] do_epoll_wait+0x1240/0x1920 [ 68.332332][ T8551] __x64_sys_epoll_wait+0x158/0x270 [ 68.337826][ T8551] do_syscall_64+0x2d/0x70 [ 68.342254][ T8551] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.348163][ T8551] [ 68.350498][ T8551] The buggy address belongs to the object at ffff8880152c9c00 [ 68.350498][ T8551] which belongs to the cache task_struct of size 6912 [ 68.365078][ T8551] The buggy address is located 2256 bytes inside of [ 68.365078][ T8551] 6912-byte region [ffff8880152c9c00, ffff8880152cb700) executing program [ 68.378543][ T8551] The buggy address belongs to the page: [ 68.384183][ T8551] page:000000006d434f3f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x152c8 [ 68.394348][ T8551] head:000000006d434f3f order:3 compound_mapcount:0 compound_pincount:0 [ 68.402681][ T8551] flags: 0xfff00000010200(slab|head) [ 68.408015][ T8551] raw: 00fff00000010200 0000000000000000 0000000300000001 ffff888140004000 [ 68.416618][ T8551] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000 [ 68.425208][ T8551] page dumped because: kasan: bad access detected [ 68.431615][ T8551] [ 68.433935][ T8551] Memory state around the buggy address: [ 68.439562][ T8551] ffff8880152ca380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.447631][ T8551] ffff8880152ca400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.455696][ T8551] >ffff8880152ca480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.463756][ T8551] ^ [ 68.470434][ T8551] ffff8880152ca500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb executing program executing program [ 68.478498][ T8551] ffff8880152ca580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.486561][ T8551] ================================================================== [ 68.494627][ T8551] Disabling lock debugging due to kernel taint [ 68.500935][ T8551] Kernel panic - not syncing: panic_on_warn set ... [ 68.507533][ T8551] CPU: 1 PID: 8551 Comm: syz-executor585 Tainted: G B 5.11.0-next-20210224-syzkaller #0 [ 68.518562][ T8551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.528630][ T8551] Call Trace: executing program [ 68.531935][ T8551] dump_stack+0xfa/0x151 [ 68.536195][ T8551] panic+0x306/0x73d [ 68.540110][ T8551] ? __warn_printk+0xf3/0xf3 [ 68.544730][ T8551] ? __lock_acquire+0x3e6f/0x54c0 [ 68.549764][ T8551] ? __lock_acquire+0x3e6f/0x54c0 [ 68.554825][ T8551] ? __lock_acquire+0x3e6f/0x54c0 [ 68.559860][ T8551] end_report.cold+0x5a/0x5a [ 68.564468][ T8551] kasan_report.cold+0x6a/0xd8 [ 68.569284][ T8551] ? __lock_acquire+0x3e6f/0x54c0 [ 68.574319][ T8551] __lock_acquire+0x3e6f/0x54c0 [ 68.579210][ T8551] ? lock_acquire+0x1bb/0x730 [ 68.583896][ T8551] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 68.589892][ T8551] lock_acquire+0x1ab/0x730 [ 68.594406][ T8551] ? try_to_wake_up+0x98/0x14a0 [ 68.599265][ T8551] ? lock_release+0x710/0x710 [ 68.603946][ T8551] ? lock_downgrade+0x6d0/0x6d0 [ 68.608800][ T8551] ? __cpuhp_state_remove_instance+0x15e/0x5b0 [ 68.614966][ T8551] ? lock_is_held_type+0xd5/0x130 [ 68.620000][ T8551] ? _raw_spin_lock_irqsave+0x4e/0x50 [ 68.625409][ T8551] _raw_spin_lock_irqsave+0x39/0x50 executing program [ 68.630643][ T8551] ? try_to_wake_up+0x98/0x14a0 [ 68.635507][ T8551] try_to_wake_up+0x98/0x14a0 [ 68.640220][ T8551] ? migrate_swap_stop+0x9f0/0x9f0 [ 68.645344][ T8551] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.651608][ T8551] ? __cpuhp_state_remove_instance+0x3de/0x5b0 [ 68.657776][ T8551] io_wq_destroy+0x74/0x3d0 [ 68.662303][ T8551] __io_uring_files_cancel+0x195/0x230 [ 68.667776][ T8551] ? __io_uring_free+0xc0/0xc0 [ 68.672554][ T8551] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 executing program executing program [ 68.678805][ T8551] ? __validate_process_creds+0x20c/0x370 [ 68.684539][ T8551] do_exit+0x299/0x2a60 [ 68.688709][ T8551] ? find_held_lock+0x2d/0x110 [ 68.693483][ T8551] ? lock_release+0x3bb/0x710 [ 68.698166][ T8551] ? mm_update_next_owner+0x7a0/0x7a0 [ 68.703553][ T8551] ? lock_downgrade+0x6d0/0x6d0 [ 68.708417][ T8551] ? _raw_spin_unlock_irq+0x1f/0x40 [ 68.713718][ T8551] do_group_exit+0x125/0x310 [ 68.718416][ T8551] __x64_sys_exit_group+0x3a/0x50 [ 68.723457][ T8551] do_syscall_64+0x2d/0x70 [ 68.727891][ T8551] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.733797][ T8551] RIP: 0033:0x43e989 [ 68.737710][ T8551] Code: 00 49 c7 c0 c0 ff ff ff be e7 00 00 00 ba 3c 00 00 00 eb 12 0f 1f 44 00 00 89 d0 0f 05 48 3d 00 f0 ff ff 77 1c f4 89 f0 0f 05 <48> 3d 00 f0 ff ff 76 e7 f7 d8 64 41 89 00 eb df 0f 1f 80 00 00 00 [ 68.757344][ T8551] RSP: 002b:00007ffce8f11728 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 68.765768][ T8551] RAX: ffffffffffffffda RBX: 00000000004b02f0 RCX: 000000000043e989 [ 68.773765][ T8551] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 executing program [ 68.781740][ T8551] RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000000010000000 [ 68.789738][ T8551] R10: 0000000000008011 R11: 0000000000000246 R12: 00000000004b02f0 [ 68.797730][ T8551] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 [ 68.806213][ T8551] Kernel Offset: disabled [ 68.810540][ T8551] Rebooting in 86400 seconds..