Warning: Permanently added '10.128.1.20' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program [ 54.020561] audit: type=1400 audit(1581372030.166:36): avc: denied { map } for pid=8179 comm="syz-executor229" path="/root/syz-executor229105378" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 54.063612] ================================================================== [ 54.071238] BUG: KASAN: use-after-free in release_tty+0x47d/0x4d0 [ 54.077490] Write of size 8 at addr ffff88808bc7ef10 by task syz-executor229/8187 [ 54.085119] [ 54.086760] CPU: 0 PID: 8187 Comm: syz-executor229 Not tainted 4.19.102-syzkaller #0 [ 54.094638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.103992] Call Trace: [ 54.106610] dump_stack+0x197/0x210 [ 54.110260] ? release_tty+0x47d/0x4d0 [ 54.114174] print_address_description.cold+0x7c/0x20d [ 54.119526] ? release_tty+0x47d/0x4d0 [ 54.123406] kasan_report.cold+0x8c/0x2ba [ 54.127613] __asan_report_store8_noabort+0x17/0x20 [ 54.132684] release_tty+0x47d/0x4d0 [ 54.136412] tty_release_struct+0x3c/0x50 [ 54.140557] tty_release+0xbcb/0xe90 [ 54.144279] ? tty_release_struct+0x50/0x50 [ 54.148607] __fput+0x2dd/0x8b0 [ 54.152025] ____fput+0x16/0x20 [ 54.155313] task_work_run+0x145/0x1c0 [ 54.159202] do_exit+0xc1f/0x30d0 [ 54.162650] ? mm_update_next_owner+0x660/0x660 [ 54.167311] ? up_read+0x1a/0x110 [ 54.170762] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 54.176292] ? __do_page_fault+0x484/0xe90 [ 54.180521] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 54.185281] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 54.190043] do_group_exit+0x135/0x370 [ 54.193949] __x64_sys_exit_group+0x44/0x50 [ 54.198301] do_syscall_64+0xfd/0x620 [ 54.202098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 54.207285] RIP: 0033:0x43ff38 [ 54.210477] Code: Bad RIP value. [ 54.214007] RSP: 002b:00007ffec12e96b8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 54.222401] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000043ff38 [ 54.229665] RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 [ 54.236931] RBP: 00000000004bf950 R08: 00000000000000e7 R09: ffffffffffffffd0 [ 54.244251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 54.251519] R13: 00000000006d2180 R14: 0000000000000000 R15: 0000000000000000 [ 54.258844] [ 54.260473] Allocated by task 8187: [ 54.264106] save_stack+0x45/0xd0 [ 54.267549] kasan_kmalloc+0xce/0xf0 [ 54.271517] kmem_cache_alloc_trace+0x152/0x760 [ 54.276315] vc_allocate+0x1f5/0x760 [ 54.280041] con_install+0x52/0x410 [ 54.283662] tty_init_dev+0xf7/0x460 [ 54.287369] tty_open+0x4bf/0xb70 [ 54.290812] chrdev_open+0x245/0x6b0 [ 54.294522] do_dentry_open+0x4c3/0x1210 [ 54.298605] vfs_open+0xa0/0xd0 [ 54.301946] path_openat+0x10d8/0x44a0 [ 54.305841] do_filp_open+0x1a1/0x280 [ 54.309643] do_sys_open+0x3fe/0x550 [ 54.313396] __x64_sys_open+0x7e/0xc0 [ 54.317228] do_syscall_64+0xfd/0x620 [ 54.321027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 54.326202] [ 54.327817] Freed by task 8186: [ 54.331088] save_stack+0x45/0xd0 [ 54.334638] __kasan_slab_free+0x102/0x150 [ 54.338866] kasan_slab_free+0xe/0x10 [ 54.342662] kfree+0xcf/0x220 [ 54.345760] vt_disallocate_all+0x2bd/0x3e0 [ 54.350069] vt_ioctl+0xc38/0x2530 [ 54.353598] tty_ioctl+0x7f3/0x1510 [ 54.357215] do_vfs_ioctl+0xd5f/0x1380 [ 54.361089] ksys_ioctl+0xab/0xd0 [ 54.364534] __x64_sys_ioctl+0x73/0xb0 [ 54.368408] do_syscall_64+0xfd/0x620 [ 54.372216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 54.377409] [ 54.379035] The buggy address belongs to the object at ffff88808bc7ee00 [ 54.379035] which belongs to the cache kmalloc-2048 of size 2048 [ 54.391879] The buggy address is located 272 bytes inside of [ 54.391879] 2048-byte region [ffff88808bc7ee00, ffff88808bc7f600) [ 54.403841] The buggy address belongs to the page: [ 54.408780] page:ffffea00022f1f80 count:1 mapcount:0 mapping:ffff88812c31cc40 index:0x0 compound_mapcount: 0 [ 54.418747] flags: 0xfffe0000008100(slab|head) [ 54.423337] raw: 00fffe0000008100 ffffea0002a57888 ffffea000224fc88 ffff88812c31cc40 [ 54.431213] raw: 0000000000000000 ffff88808bc7e580 0000000100000003 0000000000000000 [ 54.439084] page dumped because: kasan: bad access detected [ 54.444782] [ 54.446396] Memory state around the buggy address: [ 54.451321] ffff88808bc7ee00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.458683] ffff88808bc7ee80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.466053] >ffff88808bc7ef00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.473414] ^ [ 54.477298] ffff88808bc7ef80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.484645] ffff88808bc7f000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.491993] ================================================================== [ 54.499382] Disabling lock debugging due to kernel taint [ 54.505904] Kernel panic - not syncing: panic_on_warn set ... [ 54.505904] [ 54.513290] CPU: 0 PID: 8187 Comm: syz-executor229 Tainted: G B 4.19.102-syzkaller #0 [ 54.522554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.531897] Call Trace: [ 54.534480] dump_stack+0x197/0x210 [ 54.538158] ? release_tty+0x47d/0x4d0 [ 54.542267] panic+0x26a/0x50e [ 54.545567] ? __warn_printk+0xf3/0xf3 [ 54.549448] ? release_tty+0x47d/0x4d0 [ 54.553328] ? preempt_schedule+0x4b/0x60 [ 54.557517] ? ___preempt_schedule+0x16/0x18 [ 54.561923] ? trace_hardirqs_on+0x5e/0x220 [ 54.566253] ? release_tty+0x47d/0x4d0 [ 54.571018] kasan_end_report+0x47/0x4f [ 54.575043] kasan_report.cold+0xa9/0x2ba [ 54.579234] __asan_report_store8_noabort+0x17/0x20 [ 54.584247] release_tty+0x47d/0x4d0 [ 54.587951] tty_release_struct+0x3c/0x50 [ 54.592098] tty_release+0xbcb/0xe90 [ 54.595814] ? tty_release_struct+0x50/0x50 [ 54.600135] __fput+0x2dd/0x8b0 [ 54.603405] ____fput+0x16/0x20 [ 54.606688] task_work_run+0x145/0x1c0 [ 54.610574] do_exit+0xc1f/0x30d0 [ 54.614046] ? mm_update_next_owner+0x660/0x660 [ 54.618724] ? up_read+0x1a/0x110 [ 54.622164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 54.627693] ? __do_page_fault+0x484/0xe90 [ 54.631942] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 54.636701] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 54.641461] do_group_exit+0x135/0x370 [ 54.645358] __x64_sys_exit_group+0x44/0x50 [ 54.649689] do_syscall_64+0xfd/0x620 [ 54.653578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 54.658873] RIP: 0033:0x43ff38 [ 54.662064] Code: 08 48 8d 84 24 30 08 00 00 be 00 04 00 00 48 89 ef 48 89 04 24 31 c0 e8 46 b0 fc ff e9 58 ff ff ff 90 48 8d 4c 24 30 48 8d 15 <60> 25 00 00 be 00 04 00 00 48 89 ef 31 c0 e8 b5 b2 fc ff e9 37 ff [ 54.680969] RSP: 002b:00007ffec12e96b8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 54.688670] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000043ff38 [ 54.695935] RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 [ 54.703198] RBP: 00000000004bf950 R08: 00000000000000e7 R09: ffffffffffffffd0 [ 54.710459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 54.717760] R13: 00000000006d2180 R14: 0000000000000000 R15: 0000000000000000 [ 54.726254] Kernel Offset: disabled [ 54.729895] Rebooting in 86400 seconds..