Warning: Permanently added '10.128.0.112' (ECDSA) to the list of known hosts. executing program [ 47.991870] audit: type=1400 audit(1569312076.232:36): avc: denied { map } for pid=7542 comm="syz-executor303" path="/root/syz-executor303326129" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 48.021808] ================================================================== [ 48.029410] BUG: KASAN: use-after-free in wait_consider_task+0x1b51/0x3910 [ 48.036428] Read of size 4 at addr ffff88807a1dcaac by task sshd/7540 [ 48.043010] [ 48.044629] CPU: 0 PID: 7540 Comm: sshd Not tainted 4.19.75 #0 [ 48.050585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 48.060358] Call Trace: [ 48.062939] dump_stack+0x172/0x1f0 [ 48.066554] ? wait_consider_task+0x1b51/0x3910 [ 48.071211] print_address_description.cold+0x7c/0x20d [ 48.076473] ? wait_consider_task+0x1b51/0x3910 [ 48.081147] kasan_report.cold+0x8c/0x2ba [ 48.085285] __asan_report_load4_noabort+0x14/0x20 [ 48.090202] wait_consider_task+0x1b51/0x3910 [ 48.094689] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 48.099799] ? add_wait_queue+0x112/0x170 [ 48.103957] ? release_task+0x1630/0x1630 [ 48.108107] ? lock_acquire+0x16f/0x3f0 [ 48.112139] ? do_wait+0x3aa/0x9d0 [ 48.115769] ? kasan_check_write+0x14/0x20 [ 48.120015] do_wait+0x439/0x9d0 [ 48.123380] ? wait_consider_task+0x3910/0x3910 [ 48.128050] ? mark_held_locks+0x100/0x100 [ 48.132276] kernel_wait4+0x171/0x290 [ 48.136150] ? __ia32_sys_waitid+0x140/0x140 [ 48.140825] ? task_stopped_code+0x180/0x180 [ 48.145312] __do_sys_wait4+0x147/0x160 [ 48.149271] ? kernel_wait4+0x290/0x290 [ 48.153426] ? kasan_check_read+0x11/0x20 [ 48.157575] ? _copy_to_user+0xc9/0x120 [ 48.161554] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 48.167077] ? __x64_sys_rt_sigprocmask+0x21d/0x2e0 [ 48.172156] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 48.176997] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 48.181749] ? do_syscall_64+0x26/0x620 [ 48.185829] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 48.191291] ? do_syscall_64+0x26/0x620 [ 48.195269] __x64_sys_wait4+0x97/0xf0 [ 48.199149] do_syscall_64+0xfd/0x620 [ 48.202967] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 48.208143] RIP: 0033:0x7f72c98f2a3e [ 48.211859] Code: 90 90 90 90 90 90 90 90 90 90 90 90 48 83 ec 28 8b 05 c2 eb 2d 00 85 c0 75 1d 45 31 d2 48 63 d2 48 63 ff b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 48 83 c4 28 c3 89 54 24 08 48 89 74 24 10 [ 48.230956] RSP: 002b:00007ffca40d4130 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 48.238657] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f72c98f2a3e [ 48.245924] RDX: 0000000000000001 RSI: 00007ffca40d416c RDI: ffffffffffffffff [ 48.253192] RBP: 0000560506702c88 R08: 00007ffca40d4230 R09: 0101010101010101 [ 48.260448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000560506ce6c00 [ 48.267762] R13: 0000560506700fb4 R14: 0000000000000028 R15: 0000560506702ca0 [ 48.275041] [ 48.276651] Allocated by task 7540: [ 48.280282] save_stack+0x45/0xd0 [ 48.283723] kasan_kmalloc+0xce/0xf0 [ 48.287422] kasan_slab_alloc+0xf/0x20 [ 48.291298] kmem_cache_alloc_node+0x144/0x710 [ 48.295869] copy_process.part.0+0x1ce0/0x7a30 [ 48.300434] _do_fork+0x257/0xfd0 [ 48.303887] __x64_sys_clone+0xbf/0x150 [ 48.307860] do_syscall_64+0xfd/0x620 [ 48.311644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 48.316909] [ 48.318546] Freed by task 0: [ 48.321645] save_stack+0x45/0xd0 [ 48.325085] __kasan_slab_free+0x102/0x150 [ 48.329581] kasan_slab_free+0xe/0x10 [ 48.333380] kmem_cache_free+0x86/0x260 [ 48.337339] free_task+0xdd/0x120 [ 48.340800] __put_task_struct+0x20f/0x4c0 [ 48.345130] finish_task_switch+0x52b/0x780 [ 48.349530] __schedule+0x86e/0x1dc0 [ 48.353232] schedule_idle+0x58/0x80 [ 48.357571] do_idle+0x192/0x560 [ 48.360933] cpu_startup_entry+0xc8/0xe0 [ 48.365150] start_secondary+0x3e8/0x5b0 [ 48.369217] secondary_startup_64+0xa4/0xb0 [ 48.373624] [ 48.375257] The buggy address belongs to the object at ffff88807a1dc640 [ 48.375257] which belongs to the cache task_struct of size 6080 [ 48.387990] The buggy address is located 1132 bytes inside of [ 48.387990] 6080-byte region [ffff88807a1dc640, ffff88807a1dde00) [ 48.400370] The buggy address belongs to the page: [ 48.405290] page:ffffea0001e87700 count:1 mapcount:0 mapping:ffff88812c26d800 index:0x0 compound_mapcount: 0 [ 48.415614] flags: 0x1fffc0000008100(slab|head) [ 48.420282] raw: 01fffc0000008100 ffffea00024be008 ffffea0002576b88 ffff88812c26d800 [ 48.428160] raw: 0000000000000000 ffff88807a1dc640 0000000100000001 0000000000000000 [ 48.436033] page dumped because: kasan: bad access detected [ 48.442003] [ 48.443683] Memory state around the buggy address: [ 48.448624] ffff88807a1dc980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.455986] ffff88807a1dca00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.463853] >ffff88807a1dca80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.471195] ^ [ 48.475877] ffff88807a1dcb00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.483221] ffff88807a1dcb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.490575] ================================================================== [ 48.497932] Disabling lock debugging due to kernel taint [ 48.503475] Kernel panic - not syncing: panic_on_warn set ... [ 48.503475] [ 48.510853] CPU: 0 PID: 7540 Comm: sshd Tainted: G B 4.19.75 #0 [ 48.518237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 48.527578] Call Trace: [ 48.530191] dump_stack+0x172/0x1f0 [ 48.533804] ? wait_consider_task+0x1b51/0x3910 [ 48.538456] panic+0x263/0x507 [ 48.541645] ? __warn_printk+0xf3/0xf3 [ 48.545528] ? retint_kernel+0x2d/0x2d [ 48.549409] ? trace_hardirqs_on+0x5e/0x220 [ 48.553721] ? wait_consider_task+0x1b51/0x3910 [ 48.558377] kasan_end_report+0x47/0x4f [ 48.562352] kasan_report.cold+0xa9/0x2ba [ 48.566485] __asan_report_load4_noabort+0x14/0x20 [ 48.571398] wait_consider_task+0x1b51/0x3910 [ 48.575891] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 48.580977] ? add_wait_queue+0x112/0x170 [ 48.585122] ? release_task+0x1630/0x1630 [ 48.590466] ? lock_acquire+0x16f/0x3f0 [ 48.594447] ? do_wait+0x3aa/0x9d0 [ 48.598101] ? kasan_check_write+0x14/0x20 [ 48.602327] do_wait+0x439/0x9d0 [ 48.605678] ? wait_consider_task+0x3910/0x3910 [ 48.610328] ? mark_held_locks+0x100/0x100 [ 48.614664] kernel_wait4+0x171/0x290 [ 48.618448] ? __ia32_sys_waitid+0x140/0x140 [ 48.622880] ? task_stopped_code+0x180/0x180 [ 48.627543] __do_sys_wait4+0x147/0x160 [ 48.631502] ? kernel_wait4+0x290/0x290 [ 48.635460] ? kasan_check_read+0x11/0x20 [ 48.639602] ? _copy_to_user+0xc9/0x120 [ 48.643562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 48.649617] ? __x64_sys_rt_sigprocmask+0x21d/0x2e0 [ 48.654822] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 48.659846] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 48.664590] ? do_syscall_64+0x26/0x620 [ 48.669127] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 48.674629] ? do_syscall_64+0x26/0x620 [ 48.678621] __x64_sys_wait4+0x97/0xf0 [ 48.682511] do_syscall_64+0xfd/0x620 [ 48.686318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 48.691503] RIP: 0033:0x7f72c98f2a3e [ 48.695209] Code: 90 90 90 90 90 90 90 90 90 90 90 90 48 83 ec 28 8b 05 c2 eb 2d 00 85 c0 75 1d 45 31 d2 48 63 d2 48 63 ff b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 48 83 c4 28 c3 89 54 24 08 48 89 74 24 10 [ 48.714107] RSP: 002b:00007ffca40d4130 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 48.721812] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f72c98f2a3e [ 48.729122] RDX: 0000000000000001 RSI: 00007ffca40d416c RDI: ffffffffffffffff [ 48.736874] RBP: 0000560506702c88 R08: 00007ffca40d4230 R09: 0101010101010101 [ 48.744350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000560506ce6c00 [ 48.751622] R13: 0000560506700fb4 R14: 0000000000000028 R15: 0000560506702ca0 [ 48.759649] Kernel Offset: disabled [ 48.763292] Rebooting in 86400 seconds..