Warning: Permanently added '10.128.0.79' (ECDSA) to the list of known hosts. executing program [ 51.783105] audit: type=1400 audit(1569193556.257:36): avc: denied { map } for pid=7597 comm="syz-executor926" path="/root/syz-executor926710342" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 51.817780] ================================================================== [ 51.825265] BUG: KASAN: use-after-free in wait_consider_task+0x1b51/0x3910 [ 51.832294] Read of size 4 at addr ffff888092ff84ac by task syz-executor926/7597 [ 51.839813] [ 51.841430] CPU: 1 PID: 7597 Comm: syz-executor926 Not tainted 4.19.75 #0 [ 51.848335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.857672] Call Trace: [ 51.860249] dump_stack+0x172/0x1f0 [ 51.863864] ? wait_consider_task+0x1b51/0x3910 [ 51.868596] print_address_description.cold+0x7c/0x20d [ 51.873882] ? wait_consider_task+0x1b51/0x3910 [ 51.878545] kasan_report.cold+0x8c/0x2ba [ 51.882685] __asan_report_load4_noabort+0x14/0x20 [ 51.887604] wait_consider_task+0x1b51/0x3910 [ 51.892086] ? lockdep_hardirqs_on+0x415/0x5d0 [ 51.896667] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 51.901754] ? add_wait_queue+0x112/0x170 [ 51.905900] ? release_task+0x1630/0x1630 [ 51.910054] ? lock_acquire+0x16f/0x3f0 [ 51.914031] ? do_wait+0x3aa/0x9d0 [ 51.917580] ? kasan_check_write+0x14/0x20 [ 51.921805] do_wait+0x439/0x9d0 [ 51.925188] ? wait_consider_task+0x3910/0x3910 [ 51.930815] kernel_wait4+0x171/0x290 [ 51.934617] ? __ia32_sys_waitid+0x140/0x140 [ 51.939035] ? task_stopped_code+0x180/0x180 [ 51.943454] __do_sys_wait4+0x147/0x160 [ 51.947429] ? kernel_wait4+0x290/0x290 [ 51.951391] ? _copy_to_user+0xc9/0x120 [ 51.955362] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 51.960901] ? put_timespec64+0xda/0x140 [ 51.965049] ? nsecs_to_jiffies+0x30/0x30 [ 51.969188] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 51.973931] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 51.978672] ? do_syscall_64+0x26/0x620 [ 51.982738] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.988099] ? do_syscall_64+0x26/0x620 [ 51.992076] __x64_sys_wait4+0x97/0xf0 [ 51.996079] do_syscall_64+0xfd/0x620 [ 51.999885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 52.006024] RIP: 0033:0x4012fa [ 52.009205] Code: c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 8b 05 fe 13 2d 00 85 c0 75 36 45 31 d2 48 63 d2 48 63 ff b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 d0 ff ff ff f7 [ 52.028700] RSP: 002b:00007ffdc07d1288 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 52.036401] RAX: ffffffffffffffda RBX: 0000000000001dae RCX: 00000000004012fa [ 52.043658] RDX: 0000000040000001 RSI: 00007ffdc07d1294 RDI: ffffffffffffffff [ 52.050921] RBP: 000000000000ca36 R08: 0000000000000000 R09: 000055555640b880 [ 52.058177] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004022b0 [ 52.065886] R13: 0000000000402340 R14: 0000000000000000 R15: 0000000000000000 [ 52.073189] [ 52.074810] Allocated by task 7597: [ 52.078429] save_stack+0x45/0xd0 [ 52.081878] kasan_kmalloc+0xce/0xf0 [ 52.086044] kasan_slab_alloc+0xf/0x20 [ 52.090089] kmem_cache_alloc_node+0x144/0x710 [ 52.094655] copy_process.part.0+0x1ce0/0x7a30 [ 52.099232] _do_fork+0x257/0xfd0 [ 52.102671] __x64_sys_clone+0xbf/0x150 [ 52.106632] do_syscall_64+0xfd/0x620 [ 52.110419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 52.116021] [ 52.117630] Freed by task 5: [ 52.120637] save_stack+0x45/0xd0 [ 52.124073] __kasan_slab_free+0x102/0x150 [ 52.128299] kasan_slab_free+0xe/0x10 [ 52.132084] kmem_cache_free+0x86/0x260 [ 52.136047] free_task+0xdd/0x120 [ 52.140182] __put_task_struct+0x20f/0x4c0 [ 52.144399] finish_task_switch+0x52b/0x780 [ 52.148705] __schedule+0x86e/0x1dc0 [ 52.152402] schedule+0x92/0x1c0 [ 52.155771] worker_thread+0x248/0xe40 [ 52.159730] kthread+0x354/0x420 [ 52.163353] ret_from_fork+0x24/0x30 [ 52.167335] [ 52.169214] The buggy address belongs to the object at ffff888092ff8040 [ 52.169214] which belongs to the cache task_struct of size 6080 [ 52.181963] The buggy address is located 1132 bytes inside of [ 52.181963] 6080-byte region [ffff888092ff8040, ffff888092ff9800) [ 52.194210] The buggy address belongs to the page: [ 52.199223] page:ffffea00024bfe00 count:1 mapcount:0 mapping:ffff88812c26d800 index:0x0 compound_mapcount: 0 [ 52.210741] flags: 0x1fffc0000008100(slab|head) [ 52.215500] raw: 01fffc0000008100 ffffea00024d6908 ffffea00024a7e88 ffff88812c26d800 [ 52.223381] raw: 0000000000000000 ffff888092ff8040 0000000100000001 0000000000000000 [ 52.231245] page dumped because: kasan: bad access detected [ 52.236957] [ 52.238582] Memory state around the buggy address: [ 52.243755] ffff888092ff8380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.251097] ffff888092ff8400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.258463] >ffff888092ff8480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.265814] ^ [ 52.270479] ffff888092ff8500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.277840] ffff888092ff8580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.285200] ================================================================== [ 52.292563] Disabling lock debugging due to kernel taint [ 52.298259] Kernel panic - not syncing: panic_on_warn set ... [ 52.298259] [ 52.305642] CPU: 1 PID: 7597 Comm: syz-executor926 Tainted: G B 4.19.75 #0 [ 52.314039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 52.323460] Call Trace: [ 52.326039] dump_stack+0x172/0x1f0 [ 52.329670] ? wait_consider_task+0x1b51/0x3910 [ 52.334323] panic+0x263/0x507 [ 52.337512] ? __warn_printk+0xf3/0xf3 [ 52.341396] ? retint_kernel+0x2d/0x2d [ 52.345268] ? trace_hardirqs_on+0x5e/0x220 [ 52.349573] ? wait_consider_task+0x1b51/0x3910 [ 52.354225] kasan_end_report+0x47/0x4f [ 52.358184] kasan_report.cold+0xa9/0x2ba [ 52.362336] __asan_report_load4_noabort+0x14/0x20 [ 52.367252] wait_consider_task+0x1b51/0x3910 [ 52.371731] ? lockdep_hardirqs_on+0x415/0x5d0 [ 52.376395] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 52.381928] ? add_wait_queue+0x112/0x170 [ 52.386065] ? release_task+0x1630/0x1630 [ 52.390201] ? lock_acquire+0x16f/0x3f0 [ 52.394159] ? do_wait+0x3aa/0x9d0 [ 52.397705] ? kasan_check_write+0x14/0x20 [ 52.401923] do_wait+0x439/0x9d0 [ 52.405288] ? wait_consider_task+0x3910/0x3910 [ 52.409947] kernel_wait4+0x171/0x290 [ 52.413755] ? __ia32_sys_waitid+0x140/0x140 [ 52.419174] ? task_stopped_code+0x180/0x180 [ 52.423579] __do_sys_wait4+0x147/0x160 [ 52.427539] ? kernel_wait4+0x290/0x290 [ 52.431511] ? _copy_to_user+0xc9/0x120 [ 52.435471] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 52.441719] ? put_timespec64+0xda/0x140 [ 52.445856] ? nsecs_to_jiffies+0x30/0x30 [ 52.449998] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 52.454750] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 52.459488] ? do_syscall_64+0x26/0x620 [ 52.463638] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 52.468982] ? do_syscall_64+0x26/0x620 [ 52.472940] __x64_sys_wait4+0x97/0xf0 [ 52.476810] do_syscall_64+0xfd/0x620 [ 52.480594] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 52.485762] RIP: 0033:0x4012fa [ 52.489026] Code: c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 8b 05 fe 13 2d 00 85 c0 75 36 45 31 d2 48 63 d2 48 63 ff b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 d0 ff ff ff f7 [ 52.507920] RSP: 002b:00007ffdc07d1288 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 52.515621] RAX: ffffffffffffffda RBX: 0000000000001dae RCX: 00000000004012fa [ 52.522894] RDX: 0000000040000001 RSI: 00007ffdc07d1294 RDI: ffffffffffffffff [ 52.530152] RBP: 000000000000ca36 R08: 0000000000000000 R09: 000055555640b880 [ 52.537418] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004022b0 [ 52.544669] R13: 0000000000402340 R14: 0000000000000000 R15: 0000000000000000 [ 52.553256] Kernel Offset: disabled [ 52.556887] Rebooting in 86400 seconds..