Process accounting resumed ================================================================== BUG: KASAN: use-after-free in add_chain fs/minix/itree_common.c:14 [inline] BUG: KASAN: use-after-free in get_branch fs/minix/itree_common.c:52 [inline] BUG: KASAN: use-after-free in get_block+0x110f/0x1380 fs/minix/itree_common.c:160 Read of size 2 at addr ffff888086983644 by task syz-executor267/7261 CPU: 0 PID: 7261 Comm: syz-executor267 Not tainted 5.7.0-rc1-next-20200415-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x188/0x20d lib/dump_stack.c:118 print_address_description.constprop.0.cold+0xd3/0x315 mm/kasan/report.c:382 __kasan_report.cold+0x35/0x4d mm/kasan/report.c:511 kasan_report+0x33/0x50 mm/kasan/common.c:625 add_chain fs/minix/itree_common.c:14 [inline] get_branch fs/minix/itree_common.c:52 [inline] get_block+0x110f/0x1380 fs/minix/itree_common.c:160 minix_get_block+0xe5/0x110 fs/minix/inode.c:376 __block_write_begin_int+0x490/0x1b00 fs/buffer.c:2039 __block_write_begin fs/buffer.c:2089 [inline] block_write_begin+0x58/0x2e0 fs/buffer.c:2148 minix_write_begin+0x35/0xe0 fs/minix/inode.c:412 generic_perform_write+0x20a/0x4e0 mm/filemap.c:3308 __generic_file_write_iter+0x24c/0x610 mm/filemap.c:3437 generic_file_write_iter+0x3f3/0x630 mm/filemap.c:3469 call_write_iter include/linux/fs.h:1907 [inline] new_sync_write+0x4a2/0x700 fs/read_write.c:484 __vfs_write+0xc9/0x100 fs/read_write.c:497 __kernel_write+0x11c/0x3a0 fs/read_write.c:516 do_acct_process+0xcdc/0x10e0 kernel/acct.c:522 slow_acct_process kernel/acct.c:581 [inline] acct_process+0x50e/0x5b7 kernel/acct.c:607 do_exit+0x1aef/0x2e10 kernel/exit.c:785 do_group_exit+0x125/0x340 kernel/exit.c:893 __do_sys_exit_group kernel/exit.c:904 [inline] __se_sys_exit_group kernel/exit.c:902 [inline] __x64_sys_exit_group+0x3a/0x50 kernel/exit.c:902 do_syscall_64+0xf6/0x7d0 arch/x86/entry/common.c:295 entry_SYSCALL_64_after_hwframe+0x49/0xb3 RIP: 0033:0x444a58 Code: 00 00 be 3c 00 00 00 eb 19 66 0f 1f 84 00 00 00 00 00 48 89 d7 89 f0 0f 05 48 3d 00 f0 ff ff 77 21 f4 48 89 d7 44 89 c0 0f 05 <48> 3d 00 f0 ff ff 76 e0 f7 d8 64 41 89 01 eb d8 0f 1f 84 00 00 00 RSP: 002b:00007ffefac44ec8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000444a58 RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 RBP: 00000000004c50d0 R08: 00000000000000e7 R09: ffffffffffffffd4 R10: 00007ffefac44dd0 R11: 0000000000000246 R12: 0000000000000001 R13: 00000000006d7180 R14: 0000000000000000 R15: 0000000000000000 The buggy address belongs to the page: page:ffffea00021a60c0 refcount:0 mapcount:0 mapping:0000000015dbf7d2 index:0x1 flags: 0xfffe0000000000() raw: 00fffe0000000000 ffffea00021a1908 ffff8880ae63b188 0000000000000000 raw: 0000000000000001 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff888086983500: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888086983580: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff888086983600: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff888086983680: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888086983700: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================