================================================================== BUG: KASAN: use-after-free in tick_sched_handle+0x16f/0x190 kernel/time/tick-sched.c:161 Read of size 8 at addr ffff8880602ad020 by task syz-executor4/19815 BUG: unable to handle kernel NULL pointer dereference at 00000000000000fc #PF error: [normal kernel read fault] CPU: 1 PID: 19815 Comm: syz-executor4 Not tainted 4.20.0+ #8 PGD 97852067 P4D 97852067 PUD a9267067 PMD 0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Oops: 0000 [#1] PREEMPT SMP KASAN Call Trace: CPU: 0 PID: 19809 Comm: syz-executor1 Not tainted 4.20.0+ #8 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 RIP: 0010:qlink_to_object mm/kasan/quarantine.c:137 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:142 [inline] RIP: 0010:qlist_free_all+0x2f/0x150 mm/kasan/quarantine.c:167 Code: 57 41 56 41 55 41 54 49 89 f4 53 48 83 ec 08 48 8b 37 48 85 f6 0f 84 0d 01 00 00 4d 85 e4 49 89 fe 4d 89 e7 0f 84 8c 00 00 00 <49> 63 87 fc 00 00 00 4c 8b 2e 48 29 c6 48 83 3d c4 98 cc 07 00 0f RSP: 0018:ffff88806623f5c8 EFLAGS: 00010202 print_address_description.cold+0x7c/0x20d mm/kasan/report.c:187 RAX: ffffea0001848600 RBX: 0000000000000286 RCX: ffffea0001848600 RDX: 0000000000000001 RSI: ffff88806121fd98 RDI: 0000000000000007 RBP: ffff88806623f5f8 R08: ffff88806c334700 R09: 0000000000000000 kasan_report.cold+0x1b/0x40 mm/kasan/report.c:317 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: ffff88806121fd98 R14: ffff88806623f608 R15: 0000000000000000 __asan_report_load8_noabort+0x14/0x20 mm/kasan/generic_report.c:135 FS: 00007f074ea29700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 tick_sched_handle+0x16f/0x190 kernel/time/tick-sched.c:161 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 tick_sched_timer+0x47/0x130 kernel/time/tick-sched.c:1271 CR2: 00000000000000fc CR3: 000000008a217000 CR4: 00000000001406f0 __run_hrtimer kernel/time/hrtimer.c:1389 [inline] __hrtimer_run_queues+0x3a7/0x1050 kernel/time/hrtimer.c:1451 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: quarantine_reduce+0x17b/0x1b0 mm/kasan/quarantine.c:260 kasan_kmalloc+0xa3/0xe0 mm/kasan/common.c:463 kasan_slab_alloc+0xf/0x20 mm/kasan/common.c:397 slab_post_alloc_hook mm/slab.h:444 [inline] slab_alloc_node mm/slab.c:3322 [inline] kmem_cache_alloc_node+0x131/0x710 mm/slab.c:3629 __alloc_skb+0xf4/0x730 net/core/skbuff.c:196 hrtimer_interrupt+0x314/0x770 kernel/time/hrtimer.c:1509 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1035 [inline] smp_apic_timer_interrupt+0x18d/0x760 arch/x86/kernel/apic/apic.c:1060 alloc_skb include/linux/skbuff.h:1011 [inline] sock_wmalloc+0x16d/0x1f0 net/core/sock.c:1943 pppol2tp_sendmsg+0x23b/0x6b0 net/l2tp/l2tp_ppp.c:302 sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xdd/0x130 net/socket.c:631 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 ___sys_sendmsg+0x409/0x910 net/socket.c:2116 Allocated by task 2270600118: __sys_sendmmsg+0x246/0x6f0 net/socket.c:2211 __do_sys_sendmmsg net/socket.c:2240 [inline] __se_sys_sendmmsg net/socket.c:2237 [inline] __x64_sys_sendmmsg+0x9d/0x100 net/socket.c:2237 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457ec9 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f074ea28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457ec9 RDX: 0000000000000209 RSI: 00000000200047c0 RDI: 0000000000000004 RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f074ea296d4 R13: 00000000004c4b74 R14: 00000000004d8290 R15: 00000000ffffffff Modules linked in: CR2: 00000000000000fc BUG: unable to handle kernel paging request at ffffffff8cf13780 #PF error: [normal kernel read fault] PGD 9874067 P4D 9874067 PUD 9875063 PMD 0 Thread overran stack, or stack corrupted Oops: 0000 [#2] PREEMPT SMP KASAN CPU: 1 PID: 19815 Comm: syz-executor4 Tainted: G D 4.20.0+ #8 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:depot_fetch_stack+0x10/0x30 lib/stackdepot.c:202 Code: e6 7b 22 fe e9 20 fe ff ff 48 89 df e8 d9 7b 22 fe e9 f1 fd ff ff 90 90 90 90 89 f8 c1 ef 11 25 ff ff 1f 00 81 e7 f0 3f 00 00 <48> 03 3c c5 80 f3 f4 8b 8b 47 0c 48 83 c7 18 c7 46 10 00 00 00 00 RSP: 0018:ffff8880ae707b38 EFLAGS: 00010006 RAX: 00000000001f8880 RBX: ffff8880602ad7ac RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffff8880ae707b40 RDI: 0000000000003ff0 RBP: ffff8880ae707b68 R08: 000000000000001d R09: ffffed1015ce3ef9 R10: ffffed1015ce3ef8 R11: ffff8880ae71f7c7 R12: ffffea000180ab40 R13: ffff8880602ad020 R14: ffff88808fadac40 R15: ffff8880602ad7a8 FS: 00007f36c12ff700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffff8cf13780 CR3: 00000000a470b000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: describe_object mm/kasan/report.c:158 [inline] print_address_description.cold+0x16a/0x20d mm/kasan/report.c:194 kasan_report.cold+0x1b/0x40 mm/kasan/report.c:317 __asan_report_load8_noabort+0x14/0x20 mm/kasan/generic_report.c:135 tick_sched_handle+0x16f/0x190 kernel/time/tick-sched.c:161 tick_sched_timer+0x47/0x130 kernel/time/tick-sched.c:1271 __run_hrtimer kernel/time/hrtimer.c:1389 [inline] __hrtimer_run_queues+0x3a7/0x1050 kernel/time/hrtimer.c:1451 hrtimer_interrupt+0x314/0x770 kernel/time/hrtimer.c:1509 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1035 [inline] smp_apic_timer_interrupt+0x18d/0x760 arch/x86/kernel/apic/apic.c:1060 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 Modules linked in: CR2: ffffffff8cf13780 ---[ end trace 9097b276ee5cc91b ]--- RIP: 0010:qlink_to_object mm/kasan/quarantine.c:137 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:142 [inline] RIP: 0010:qlist_free_all+0x2f/0x150 mm/kasan/quarantine.c:167 Code: 57 41 56 41 55 41 54 49 89 f4 53 48 83 ec 08 48 8b 37 48 85 f6 0f 84 0d 01 00 00 4d 85 e4 49 89 fe 4d 89 e7 0f 84 8c 00 00 00 <49> 63 87 fc 00 00 00 4c 8b 2e 48 29 c6 48 83 3d c4 98 cc 07 00 0f RSP: 0018:ffff88806623f5c8 EFLAGS: 00010202 RAX: ffffea0001848600 RBX: 0000000000000286 RCX: ffffea0001848600 RDX: 0000000000000001 RSI: ffff88806121fd98 RDI: 0000000000000007 RBP: ffff88806623f5f8 R08: ffff88806c334700 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: ffff88806121fd98 R14: ffff88806623f608 R15: 0000000000000000 FS: 00007f36c12ff700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffff8cf13780 CR3: 00000000a470b000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400