Warning: Permanently added '10.128.0.219' (ECDSA) to the list of known hosts. executing program [ 51.635954] audit: type=1400 audit(1569202536.366:36): avc: denied { map } for pid=7617 comm="syz-executor254" path="/root/syz-executor254692491" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 51.682718] ================================================================== [ 51.690189] BUG: KASAN: use-after-free in wait_consider_task+0x1b51/0x3910 [ 51.697414] Read of size 4 at addr ffff88809473246c by task sshd/7615 [ 51.704802] [ 51.706513] CPU: 0 PID: 7615 Comm: sshd Not tainted 4.19.75 #0 [ 51.712592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.721950] Call Trace: [ 51.724540] dump_stack+0x172/0x1f0 [ 51.728392] ? wait_consider_task+0x1b51/0x3910 [ 51.733068] print_address_description.cold+0x7c/0x20d [ 51.738885] ? wait_consider_task+0x1b51/0x3910 [ 51.744002] kasan_report.cold+0x8c/0x2ba [ 51.748163] __asan_report_load4_noabort+0x14/0x20 [ 51.753091] wait_consider_task+0x1b51/0x3910 [ 51.757581] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 51.762770] ? add_wait_queue+0x112/0x170 [ 51.767019] ? release_task+0x1630/0x1630 [ 51.771299] ? lock_acquire+0x16f/0x3f0 [ 51.775381] ? do_wait+0x3aa/0x9d0 [ 51.778921] ? kasan_check_write+0x14/0x20 [ 51.783149] do_wait+0x439/0x9d0 [ 51.786514] ? wait_consider_task+0x3910/0x3910 [ 51.791331] ? mark_held_locks+0x100/0x100 [ 51.795577] kernel_wait4+0x171/0x290 [ 51.799371] ? __ia32_sys_waitid+0x140/0x140 [ 51.803777] ? task_stopped_code+0x180/0x180 [ 51.808183] __do_sys_wait4+0x147/0x160 [ 51.812332] ? kernel_wait4+0x290/0x290 [ 51.816305] ? kasan_check_read+0x11/0x20 [ 51.820454] ? _copy_to_user+0xc9/0x120 [ 51.824602] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 51.830154] ? __x64_sys_rt_sigprocmask+0x21d/0x2e0 [ 51.835178] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 51.839944] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 51.844692] ? do_syscall_64+0x26/0x620 [ 51.848660] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.854027] ? do_syscall_64+0x26/0x620 [ 51.858001] __x64_sys_wait4+0x97/0xf0 [ 51.861902] do_syscall_64+0xfd/0x620 [ 51.865697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.870893] RIP: 0033:0x7f7cac6eea3e [ 51.874726] Code: 90 90 90 90 90 90 90 90 90 90 90 90 48 83 ec 28 8b 05 c2 eb 2d 00 85 c0 75 1d 45 31 d2 48 63 d2 48 63 ff b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 48 83 c4 28 c3 89 54 24 08 48 89 74 24 10 [ 51.893624] RSP: 002b:00007ffddf810ee0 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 51.901331] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7cac6eea3e [ 51.908606] RDX: 0000000000000001 RSI: 00007ffddf810f1c RDI: ffffffffffffffff [ 51.915878] RBP: 000055aaa3bcbc88 R08: 00007ffddf810fe0 R09: 0101010101010101 [ 51.923140] R10: 0000000000000000 R11: 0000000000000246 R12: 000055aaa4ea7af0 [ 51.930499] R13: 000055aaa3bc9fb4 R14: 0000000000000028 R15: 000055aaa3bcbca0 [ 51.937787] [ 51.939549] Allocated by task 7615: [ 51.943175] save_stack+0x45/0xd0 [ 51.946615] kasan_kmalloc+0xce/0xf0 [ 51.950335] kasan_slab_alloc+0xf/0x20 [ 51.954215] kmem_cache_alloc_node+0x144/0x710 [ 51.958783] copy_process.part.0+0x1ce0/0x7a30 [ 51.963350] _do_fork+0x257/0xfd0 [ 51.966797] __x64_sys_clone+0xbf/0x150 [ 51.970759] do_syscall_64+0xfd/0x620 [ 51.974571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.979810] [ 51.981432] Freed by task 0: [ 51.984463] save_stack+0x45/0xd0 [ 51.987934] __kasan_slab_free+0x102/0x150 [ 51.992164] kasan_slab_free+0xe/0x10 [ 51.995972] kmem_cache_free+0x86/0x260 [ 51.999956] free_task+0xdd/0x120 [ 52.003417] __put_task_struct+0x20f/0x4c0 [ 52.007907] finish_task_switch+0x52b/0x780 [ 52.012230] __schedule+0x86e/0x1dc0 [ 52.015964] schedule_idle+0x58/0x80 [ 52.020039] do_idle+0x192/0x560 [ 52.023403] cpu_startup_entry+0xc8/0xe0 [ 52.027718] start_secondary+0x3e8/0x5b0 [ 52.031908] secondary_startup_64+0xa4/0xb0 [ 52.036606] [ 52.038232] The buggy address belongs to the object at ffff888094732000 [ 52.038232] which belongs to the cache task_struct of size 6080 [ 52.050990] The buggy address is located 1132 bytes inside of [ 52.050990] 6080-byte region [ffff888094732000, ffff8880947337c0) [ 52.063035] The buggy address belongs to the page: [ 52.067954] page:ffffea000251cc80 count:1 mapcount:0 mapping:ffff88812c26d800 index:0x0 compound_mapcount: 0 [ 52.078761] flags: 0x1fffc0000008100(slab|head) [ 52.083569] raw: 01fffc0000008100 ffffea000254fc08 ffffea0001ed2308 ffff88812c26d800 [ 52.091820] raw: 0000000000000000 ffff888094732000 0000000100000001 0000000000000000 [ 52.099717] page dumped because: kasan: bad access detected [ 52.105422] [ 52.107050] Memory state around the buggy address: [ 52.111988] ffff888094732300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.119644] ffff888094732380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.127197] >ffff888094732400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.134563] ^ [ 52.141325] ffff888094732480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.148677] ffff888094732500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.156523] ================================================================== [ 52.163924] Disabling lock debugging due to kernel taint [ 52.169579] Kernel panic - not syncing: panic_on_warn set ... [ 52.169579] [ 52.176985] CPU: 0 PID: 7615 Comm: sshd Tainted: G B 4.19.75 #0 [ 52.184332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 52.193949] Call Trace: [ 52.196535] dump_stack+0x172/0x1f0 [ 52.200155] ? wait_consider_task+0x1b51/0x3910 [ 52.205035] panic+0x263/0x507 [ 52.208235] ? __warn_printk+0xf3/0xf3 [ 52.212117] ? retint_kernel+0x2d/0x2d [ 52.216015] ? trace_hardirqs_on+0x5e/0x220 [ 52.220346] ? wait_consider_task+0x1b51/0x3910 [ 52.225152] kasan_end_report+0x47/0x4f [ 52.229570] kasan_report.cold+0xa9/0x2ba [ 52.233747] __asan_report_load4_noabort+0x14/0x20 [ 52.238669] wait_consider_task+0x1b51/0x3910 [ 52.243156] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 52.248247] ? add_wait_queue+0x112/0x170 [ 52.252574] ? release_task+0x1630/0x1630 [ 52.256710] ? lock_acquire+0x16f/0x3f0 [ 52.260674] ? do_wait+0x3aa/0x9d0 [ 52.264213] ? kasan_check_write+0x14/0x20 [ 52.268720] do_wait+0x439/0x9d0 [ 52.272080] ? wait_consider_task+0x3910/0x3910 [ 52.276754] ? mark_held_locks+0x100/0x100 [ 52.280983] kernel_wait4+0x171/0x290 [ 52.284789] ? __ia32_sys_waitid+0x140/0x140 [ 52.289200] ? task_stopped_code+0x180/0x180 [ 52.293599] __do_sys_wait4+0x147/0x160 [ 52.297665] ? kernel_wait4+0x290/0x290 [ 52.301885] ? kasan_check_read+0x11/0x20 [ 52.306027] ? _copy_to_user+0xc9/0x120 [ 52.310094] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 52.315626] ? __x64_sys_rt_sigprocmask+0x21d/0x2e0 [ 52.320632] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 52.325380] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 52.330410] ? do_syscall_64+0x26/0x620 [ 52.334414] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 52.339901] ? do_syscall_64+0x26/0x620 [ 52.343871] __x64_sys_wait4+0x97/0xf0 [ 52.347867] do_syscall_64+0xfd/0x620 [ 52.351657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 52.356840] RIP: 0033:0x7f7cac6eea3e [ 52.360749] Code: 90 90 90 90 90 90 90 90 90 90 90 90 48 83 ec 28 8b 05 c2 eb 2d 00 85 c0 75 1d 45 31 d2 48 63 d2 48 63 ff b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 48 83 c4 28 c3 89 54 24 08 48 89 74 24 10 [ 52.380017] RSP: 002b:00007ffddf810ee0 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 52.387727] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7cac6eea3e [ 52.394985] RDX: 0000000000000001 RSI: 00007ffddf810f1c RDI: ffffffffffffffff [ 52.402261] RBP: 000055aaa3bcbc88 R08: 00007ffddf810fe0 R09: 0101010101010101 [ 52.409523] R10: 0000000000000000 R11: 0000000000000246 R12: 000055aaa4ea7af0 [ 52.416783] R13: 000055aaa3bc9fb4 R14: 0000000000000028 R15: 000055aaa3bcbca0 [ 52.426122] Kernel Offset: disabled [ 52.429875] Rebooting in 86400 seconds..