Warning: Permanently added '10.128.1.51' (ECDSA) to the list of known hosts. executing program [ 60.388774] audit: type=1400 audit(1569890881.338:36): avc: denied { map } for pid=7478 comm="syz-executor361" path="/root/syz-executor361844896" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 60.412648] ================================================================== [ 60.422431] BUG: KASAN: use-after-free in wait_consider_task+0x1b51/0x3910 [ 60.429426] Read of size 4 at addr ffff88809c2a4a6c by task syz-executor361/7478 [ 60.436937] [ 60.438585] CPU: 0 PID: 7478 Comm: syz-executor361 Not tainted 4.19.75 #0 [ 60.445488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.454831] Call Trace: [ 60.457414] dump_stack+0x172/0x1f0 [ 60.461026] ? wait_consider_task+0x1b51/0x3910 [ 60.465679] print_address_description.cold+0x7c/0x20d [ 60.470954] ? wait_consider_task+0x1b51/0x3910 [ 60.475607] kasan_report.cold+0x8c/0x2ba [ 60.479879] __asan_report_load4_noabort+0x14/0x20 [ 60.485496] wait_consider_task+0x1b51/0x3910 [ 60.489979] ? lockdep_hardirqs_on+0x415/0x5d0 [ 60.494547] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 60.499645] ? add_wait_queue+0x112/0x170 [ 60.503804] ? release_task+0x1630/0x1630 [ 60.507938] ? lock_acquire+0x16f/0x3f0 [ 60.511896] ? do_wait+0x3aa/0x9d0 [ 60.515424] ? kasan_check_write+0x14/0x20 [ 60.519649] do_wait+0x439/0x9d0 [ 60.523008] ? wait_consider_task+0x3910/0x3910 [ 60.527664] kernel_wait4+0x171/0x290 [ 60.531452] ? __ia32_sys_waitid+0x140/0x140 [ 60.535848] ? task_stopped_code+0x180/0x180 [ 60.540244] __do_sys_wait4+0x147/0x160 [ 60.544202] ? kernel_wait4+0x290/0x290 [ 60.548159] ? _copy_to_user+0xc9/0x120 [ 60.552117] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 60.557634] ? put_timespec64+0xda/0x140 [ 60.561676] ? nsecs_to_jiffies+0x30/0x30 [ 60.565816] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 60.570553] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 60.575289] ? do_syscall_64+0x26/0x620 [ 60.579246] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 60.584598] ? do_syscall_64+0x26/0x620 [ 60.588560] __x64_sys_wait4+0x97/0xf0 [ 60.592432] do_syscall_64+0xfd/0x620 [ 60.596218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 60.601386] RIP: 0033:0x40110a [ 60.604569] Code: c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 8b 05 ce 15 2d 00 85 c0 75 36 45 31 d2 48 63 d2 48 63 ff b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 d0 ff ff ff f7 [ 60.623978] RSP: 002b:00007ffebad6cd68 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 60.631688] RAX: ffffffffffffffda RBX: 0000000000001d37 RCX: 000000000040110a [ 60.638938] RDX: 0000000040000001 RSI: 00007ffebad6cd74 RDI: ffffffffffffffff [ 60.646189] RBP: 000000000000ebd6 R08: 0000000000000000 R09: 0000555555a21880 [ 60.653440] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004020c0 [ 60.660693] R13: 0000000000402150 R14: 0000000000000000 R15: 0000000000000000 [ 60.667953] [ 60.669562] Allocated by task 7478: [ 60.673177] save_stack+0x45/0xd0 [ 60.676610] kasan_kmalloc+0xce/0xf0 [ 60.680303] kasan_slab_alloc+0xf/0x20 [ 60.684175] kmem_cache_alloc_node+0x144/0x710 [ 60.688746] copy_process.part.0+0x1ce0/0x7a30 [ 60.693308] _do_fork+0x257/0xfd0 [ 60.696741] __x64_sys_clone+0xbf/0x150 [ 60.700709] do_syscall_64+0xfd/0x620 [ 60.704492] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 60.709654] [ 60.711261] Freed by task 7480: [ 60.714519] save_stack+0x45/0xd0 [ 60.717952] __kasan_slab_free+0x102/0x150 [ 60.722174] kasan_slab_free+0xe/0x10 [ 60.725952] kmem_cache_free+0x86/0x260 [ 60.729905] free_task+0xdd/0x120 [ 60.733336] __put_task_struct+0x20f/0x4c0 [ 60.737549] finish_task_switch+0x52b/0x780 [ 60.741850] __schedule+0x86e/0x1dc0 [ 60.745542] preempt_schedule_irq+0xb5/0x140 [ 60.749931] retint_kernel+0x1b/0x2d [ 60.753624] do_exit+0x1f06/0x2fa0 [ 60.757147] kthread+0x2c3/0x420 [ 60.760491] ret_from_fork+0x24/0x30 [ 60.764190] [ 60.765798] The buggy address belongs to the object at ffff88809c2a4600 [ 60.765798] which belongs to the cache task_struct of size 6080 [ 60.778531] The buggy address is located 1132 bytes inside of [ 60.778531] 6080-byte region [ffff88809c2a4600, ffff88809c2a5dc0) [ 60.790555] The buggy address belongs to the page: [ 60.795463] page:ffffea000270a900 count:1 mapcount:0 mapping:ffff88812c26d800 index:0x0 compound_mapcount: 0 [ 60.805413] flags: 0x1fffc0000008100(slab|head) [ 60.810066] raw: 01fffc0000008100 ffffea000244a988 ffffea000248fa88 ffff88812c26d800 [ 60.817937] raw: 0000000000000000 ffff88809c2a4600 0000000100000001 0000000000000000 [ 60.825802] page dumped because: kasan: bad access detected [ 60.831488] [ 60.833092] Memory state around the buggy address: [ 60.837999] ffff88809c2a4900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.845339] ffff88809c2a4980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.852678] >ffff88809c2a4a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.860012] ^ [ 60.866763] ffff88809c2a4a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.874110] ffff88809c2a4b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.881454] ================================================================== [ 60.888789] Disabling lock debugging due to kernel taint [ 60.894396] Kernel panic - not syncing: panic_on_warn set ... [ 60.894396] [ 60.901778] CPU: 0 PID: 7478 Comm: syz-executor361 Tainted: G B 4.19.75 #0 [ 60.910072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.919401] Call Trace: [ 60.921973] dump_stack+0x172/0x1f0 [ 60.925582] ? wait_consider_task+0x1b51/0x3910 [ 60.930229] panic+0x263/0x507 [ 60.933418] ? __warn_printk+0xf3/0xf3 [ 60.937290] ? retint_kernel+0x2d/0x2d [ 60.941170] ? trace_hardirqs_on+0x5e/0x220 [ 60.945488] ? wait_consider_task+0x1b51/0x3910 [ 60.950186] kasan_end_report+0x47/0x4f [ 60.954141] kasan_report.cold+0xa9/0x2ba [ 60.958275] __asan_report_load4_noabort+0x14/0x20 [ 60.963186] wait_consider_task+0x1b51/0x3910 [ 60.967675] ? lockdep_hardirqs_on+0x415/0x5d0 [ 60.972281] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 60.977365] ? add_wait_queue+0x112/0x170 [ 60.981517] ? release_task+0x1630/0x1630 [ 60.985678] ? lock_acquire+0x16f/0x3f0 [ 60.989664] ? do_wait+0x3aa/0x9d0 [ 60.993189] ? kasan_check_write+0x14/0x20 [ 60.997405] do_wait+0x439/0x9d0 [ 61.000771] ? wait_consider_task+0x3910/0x3910 [ 61.005431] kernel_wait4+0x171/0x290 [ 61.009211] ? __ia32_sys_waitid+0x140/0x140 [ 61.013602] ? task_stopped_code+0x180/0x180 [ 61.017993] __do_sys_wait4+0x147/0x160 [ 61.022014] ? kernel_wait4+0x290/0x290 [ 61.025982] ? _copy_to_user+0xc9/0x120 [ 61.029939] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 61.035457] ? put_timespec64+0xda/0x140 [ 61.039497] ? nsecs_to_jiffies+0x30/0x30 [ 61.043631] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 61.048365] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 61.053101] ? do_syscall_64+0x26/0x620 [ 61.057057] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 61.062400] ? do_syscall_64+0x26/0x620 [ 61.066363] __x64_sys_wait4+0x97/0xf0 [ 61.070231] do_syscall_64+0xfd/0x620 [ 61.074013] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 61.079192] RIP: 0033:0x40110a [ 61.082409] Code: c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 8b 05 ce 15 2d 00 85 c0 75 36 45 31 d2 48 63 d2 48 63 ff b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 d0 ff ff ff f7 [ 61.101296] RSP: 002b:00007ffebad6cd68 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 61.108994] RAX: ffffffffffffffda RBX: 0000000000001d37 RCX: 000000000040110a [ 61.116252] RDX: 0000000040000001 RSI: 00007ffebad6cd74 RDI: ffffffffffffffff [ 61.123544] RBP: 000000000000ebd6 R08: 0000000000000000 R09: 0000555555a21880 [ 61.130795] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004020c0 [ 61.138078] R13: 0000000000402150 R14: 0000000000000000 R15: 0000000000000000 [ 61.146722] Kernel Offset: disabled [ 61.150343] Rebooting in 86400 seconds..