Warning: Permanently added '10.128.0.48' (ECDSA) to the list of known hosts. [ 42.104126] audit: type=1400 audit(1543148012.452:36): avc: denied { map } for pid=6193 comm="syz-executor635" path="/root/syz-executor635065489" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 42.109872] ================================================================== executing program [ 42.130582] audit: type=1400 audit(1543148012.452:37): avc: denied { map_create } for pid=6193 comm="syz-executor635" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 42.137913] BUG: KASAN: slab-out-of-bounds in queue_stack_map_push_elem+0x185/0x290 [ 42.137924] Write of size 262146 at addr ffff8881be2b7908 by task syz-executor635/6193 [ 42.137927] [ 42.137941] CPU: 0 PID: 6193 Comm: syz-executor635 Not tainted 4.20.0-rc3+ #128 [ 42.137949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 42.137954] Call Trace: [ 42.137975] dump_stack+0x244/0x39d [ 42.160945] audit: type=1400 audit(1543148012.452:38): avc: denied { map_read map_write } for pid=6193 comm="syz-executor635" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 42.168389] ? dump_stack_print_info.cold.1+0x20/0x20 [ 42.168402] ? printk+0xa7/0xcf [ 42.168416] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 42.168438] print_address_description.cold.7+0x9/0x1ff [ 42.242749] kasan_report.cold.8+0x242/0x309 [ 42.247136] ? queue_stack_map_push_elem+0x185/0x290 [ 42.252245] check_memory_region+0x13e/0x1b0 [ 42.256672] memcpy+0x37/0x50 [ 42.259770] queue_stack_map_push_elem+0x185/0x290 [ 42.264706] ? queue_map_pop_elem+0x30/0x30 [ 42.269024] map_update_elem+0x605/0xf60 [ 42.273086] __x64_sys_bpf+0x32d/0x520 [ 42.276966] ? bpf_prog_get+0x20/0x20 [ 42.280768] do_syscall_64+0x1b9/0x820 [ 42.284637] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 42.289980] ? syscall_return_slowpath+0x5e0/0x5e0 [ 42.294889] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 42.299714] ? trace_hardirqs_on_caller+0x310/0x310 [ 42.304710] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 42.309709] ? prepare_exit_to_usermode+0x291/0x3b0 [ 42.314710] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 42.319538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 42.324721] RIP: 0033:0x4400e9 [ 42.327892] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 42.346782] RSP: 002b:00007ffd13582498 EFLAGS: 00000213 ORIG_RAX: 0000000000000141 [ 42.354470] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 00000000004400e9 [ 42.361729] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000002 [ 42.368977] RBP: 00000000006ca018 R08: 0000000000000000 R09: 00000000004002c8 [ 42.376227] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000401970 [ 42.383474] R13: 0000000000401a00 R14: 0000000000000000 R15: 0000000000000000 [ 42.390723] [ 42.392330] Allocated by task 6193: [ 42.395944] save_stack+0x43/0xd0 [ 42.399390] kasan_kmalloc+0xc7/0xe0 [ 42.403085] __kmalloc_node+0x50/0x70 [ 42.406863] bpf_map_area_alloc+0x3f/0x90 [ 42.410987] queue_stack_map_alloc+0x192/0x290 [ 42.415554] map_create+0x3bd/0x1110 [ 42.419280] __x64_sys_bpf+0x303/0x520 [ 42.423146] do_syscall_64+0x1b9/0x820 [ 42.427009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 42.432175] [ 42.433791] Freed by task 3754: [ 42.437055] save_stack+0x43/0xd0 [ 42.440484] __kasan_slab_free+0x102/0x150 [ 42.444724] kasan_slab_free+0xe/0x10 [ 42.448505] kfree+0xcf/0x230 [ 42.451592] kernfs_fop_release+0x12b/0x1a0 [ 42.455914] __fput+0x385/0xa30 [ 42.459183] ____fput+0x15/0x20 [ 42.462442] task_work_run+0x1e8/0x2a0 [ 42.466308] exit_to_usermode_loop+0x318/0x380 [ 42.470875] do_syscall_64+0x6be/0x820 [ 42.474741] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 42.479926] [ 42.481532] The buggy address belongs to the object at ffff8881be2b77c0 [ 42.481532] which belongs to the cache kmalloc-512 of size 512 [ 42.494165] The buggy address is located 328 bytes inside of [ 42.494165] 512-byte region [ffff8881be2b77c0, ffff8881be2b79c0) [ 42.506013] The buggy address belongs to the page: [ 42.510920] page:ffffea0006f8adc0 count:1 mapcount:0 mapping:ffff8881da800940 index:0x0 [ 42.519041] flags: 0x2fffc0000000200(slab) [ 42.523279] raw: 02fffc0000000200 ffffea0006f8af08 ffffea0006eb00c8 ffff8881da800940 [ 42.531142] raw: 0000000000000000 ffff8881be2b7040 0000000100000006 0000000000000000 [ 42.538998] page dumped because: kasan: bad access detected [ 42.544679] [ 42.546296] Memory state around the buggy address: [ 42.551212] ffff8881be2b7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.558583] ffff8881be2b7880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.565920] >ffff8881be2b7900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 42.573253] ^ [ 42.578700] ffff8881be2b7980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.586034] ffff8881be2b7a00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 42.593366] ================================================================== [ 42.600696] Disabling lock debugging due to kernel taint [ 42.606133] Kernel panic - not syncing: panic_on_warn set ... [ 42.611998] CPU: 0 PID: 6193 Comm: syz-executor635 Tainted: G B 4.20.0-rc3+ #128 [ 42.620810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 42.630137] Call Trace: [ 42.632711] dump_stack+0x244/0x39d [ 42.636321] ? dump_stack_print_info.cold.1+0x20/0x20 [ 42.641491] panic+0x2ad/0x55c [ 42.644663] ? add_taint.cold.5+0x16/0x16 [ 42.648788] ? add_taint.cold.5+0x5/0x16 [ 42.652851] ? trace_hardirqs_off+0xaf/0x310 [ 42.657250] kasan_end_report+0x47/0x4f [ 42.661212] kasan_report.cold.8+0x76/0x309 [ 42.665513] ? queue_stack_map_push_elem+0x185/0x290 [ 42.670597] check_memory_region+0x13e/0x1b0 [ 42.674987] memcpy+0x37/0x50 [ 42.678069] queue_stack_map_push_elem+0x185/0x290 [ 42.682998] ? queue_map_pop_elem+0x30/0x30 [ 42.687319] map_update_elem+0x605/0xf60 [ 42.691373] __x64_sys_bpf+0x32d/0x520 [ 42.695240] ? bpf_prog_get+0x20/0x20 [ 42.699060] do_syscall_64+0x1b9/0x820 [ 42.702939] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 42.708288] ? syscall_return_slowpath+0x5e0/0x5e0 [ 42.713198] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 42.718021] ? trace_hardirqs_on_caller+0x310/0x310 [ 42.723027] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 42.728022] ? prepare_exit_to_usermode+0x291/0x3b0 [ 42.733019] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 42.737899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 42.743083] RIP: 0033:0x4400e9 [ 42.746256] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 42.765145] RSP: 002b:00007ffd13582498 EFLAGS: 00000213 ORIG_RAX: 0000000000000141 [ 42.772867] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 00000000004400e9 [ 42.780115] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000002 [ 42.787376] RBP: 00000000006ca018 R08: 0000000000000000 R09: 00000000004002c8 [ 42.794623] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000401970 [ 42.801881] R13: 0000000000401a00 R14: 0000000000000000 R15: 0000000000000000 [ 42.809985] Kernel Offset: disabled [ 42.813620] Rebooting in 86400 seconds..