INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added 'ci-upstream-next-kasan-gce-5,10.128.0.41' (ECDSA) to the list of known hosts. 2017/09/03 04:14:22 parsed 1 programs 2017/09/03 04:14:22 executed programs: 0 2017/09/03 04:14:27 executed programs: 789 syzkaller login: [ 58.193725] dev_remove_pack: ffff8801c5fecc80 not found [ 58.333862] ================================================================== [ 58.341281] BUG: KASAN: use-after-free in __list_add_valid+0xb1/0xd0 [ 58.347752] Read of size 8 at addr ffff8801c638b6b0 by task syz-executor6/5687 [ 58.355095] [ 58.356723] CPU: 0 PID: 5687 Comm: syz-executor6 Not tainted 4.13.0-rc7-next-20170901+ #13 [ 58.365116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 58.374459] Call Trace: [ 58.377042] dump_stack+0x194/0x257 [ 58.380670] ? arch_local_irq_restore+0x53/0x53 [ 58.385329] ? show_regs_print_info+0x65/0x65 [ 58.389816] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 58.394837] ? __list_add_valid+0xb1/0xd0 [ 58.398980] print_address_description+0x73/0x250 [ 58.403817] ? __list_add_valid+0xb1/0xd0 [ 58.407970] kasan_report+0x24e/0x340 [ 58.411781] __asan_report_load8_noabort+0x14/0x20 [ 58.416701] __list_add_valid+0xb1/0xd0 [ 58.420675] dev_add_pack+0x113/0x2b0 [ 58.424470] ? napi_skb_free_stolen_head+0x170/0x170 [ 58.429561] ? __lockdep_init_map+0xe4/0x650 [ 58.433966] ? lockdep_init_map+0x3d/0x70 [ 58.438122] register_prot_hook.part.49+0x95/0xb0 [ 58.442966] packet_create+0x820/0xb00 [ 58.446853] ? sock_destroy_inode+0x70/0x70 [ 58.451171] ? register_prot_hook.part.49+0xb0/0xb0 [ 58.456193] ? __sock_create+0x211/0x850 [ 58.460248] ? module_unload_free+0x5b0/0x5b0 [ 58.464746] ? lock_release+0xd70/0xd70 [ 58.468719] ? __lock_is_held+0xbc/0x140 [ 58.472793] __sock_create+0x4d4/0x850 [ 58.476682] ? ___sys_recvmsg+0x630/0x630 [ 58.480826] ? __fdget+0x18/0x20 [ 58.484191] ? SyS_futex+0x260/0x390 [ 58.487891] ? SyS_futex+0x269/0x390 [ 58.491616] ? SyS_setsockopt+0x215/0x360 [ 58.495784] SyS_socket+0xeb/0x200 [ 58.499316] ? entry_SYSCALL_64_fastpath+0x5/0xbe [ 58.504155] ? move_addr_to_kernel+0x60/0x60 [ 58.508554] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 58.513587] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 58.518366] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 58.523110] RIP: 0033:0x451e59 [ 58.526300] RSP: 002b:00007fb592bcdc08 EFLAGS: 00000216 ORIG_RAX: 0000000000000029 [ 58.534004] RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59 [ 58.541263] RDX: 0000000000000008 RSI: 0000000000080003 RDI: 0000000000000011 [ 58.548521] RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 [ 58.555781] R10: 0000000000000000 R11: 0000000000000216 R12: 0000000000000000 [ 58.563076] R13: 00007ffe3360db5f R14: 00007fb592bce9c0 R15: 0000000000000000 [ 58.570390] [ 58.572022] Allocated by task 5615: [ 58.575646] save_stack_trace+0x16/0x20 [ 58.579615] save_stack+0x43/0xd0 [ 58.583064] kasan_kmalloc+0xad/0xe0 [ 58.586769] kmem_cache_alloc_trace+0x136/0x750 [ 58.591439] fanout_add+0xa50/0x1190 [ 58.595144] packet_setsockopt+0xfdc/0x1e80 [ 58.599457] SyS_setsockopt+0x189/0x360 [ 58.603430] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 58.608171] [ 58.609805] Freed by task 5670: [ 58.613073] save_stack_trace+0x16/0x20 [ 58.617036] save_stack+0x43/0xd0 [ 58.620490] kasan_slab_free+0x71/0xc0 [ 58.624376] kfree+0xca/0x250 [ 58.627471] packet_release+0xa8f/0xd70 [ 58.631433] sock_release+0x8d/0x1e0 [ 58.635145] sock_close+0x16/0x20 [ 58.638598] __fput+0x333/0x7f0 [ 58.641896] ____fput+0x15/0x20 [ 58.645166] task_work_run+0x199/0x270 [ 58.649055] do_exit+0xa52/0x1b40 [ 58.652496] do_group_exit+0x149/0x400 [ 58.656370] get_signal+0x7e8/0x17e0 [ 58.660073] do_signal+0x94/0x1ee0 [ 58.663625] exit_to_usermode_loop+0x224/0x300 [ 58.668208] syscall_return_slowpath+0x42f/0x500 [ 58.672952] entry_SYSCALL_64_fastpath+0xbc/0xbe [ 58.677700] [ 58.679319] The buggy address belongs to the object at ffff8801c638ae00 [ 58.679319] which belongs to the cache kmalloc-4096 of size 4096 [ 58.692137] The buggy address is located 2224 bytes inside of [ 58.692137] 4096-byte region [ffff8801c638ae00, ffff8801c638be00) [ 58.704169] The buggy address belongs to the page: [ 58.709086] page:ffffea000718e280 count:1 mapcount:0 mapping:ffff8801c638ae00 index:0x0 compound_mapcount: 0 [ 58.719053] flags: 0x200000000008100(slab|head) [ 58.723724] raw: 0200000000008100 ffff8801c638ae00 0000000000000000 0000000100000001 [ 58.731601] raw: ffffea000718cc20 ffffea0007176da0 ffff8801dac00dc0 0000000000000000 [ 58.739512] page dumped because: kasan: bad access detected [ 58.745207] [ 58.746820] Memory state around the buggy address: [ 58.751737] ffff8801c638b580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.759085] ffff8801c638b600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.766430] >ffff8801c638b680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.773774] ^ [ 58.778692] ffff8801c638b700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.786040] ffff8801c638b780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.793386] ================================================================== [ 58.800730] Disabling lock debugging due to kernel taint [ 58.806314] Kernel panic - not syncing: panic_on_warn set ... [ 58.806314] [ 58.813678] CPU: 0 PID: 5687 Comm: syz-executor6 Tainted: G B 4.13.0-rc7-next-20170901+ #13 [ 58.823271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 58.832604] Call Trace: [ 58.835174] dump_stack+0x194/0x257 [ 58.838784] ? arch_local_irq_restore+0x53/0x53 [ 58.843437] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 58.848174] ? __list_add_valid+0x70/0xd0 [ 58.852304] panic+0x1e4/0x417 [ 58.855475] ? __warn+0x1d9/0x1d9 [ 58.858921] ? __list_add_valid+0xb1/0xd0 [ 58.863047] kasan_end_report+0x50/0x50 [ 58.866999] kasan_report+0x137/0x340 [ 58.870791] __asan_report_load8_noabort+0x14/0x20 [ 58.875709] __list_add_valid+0xb1/0xd0 [ 58.879667] dev_add_pack+0x113/0x2b0 [ 58.883445] ? napi_skb_free_stolen_head+0x170/0x170 [ 58.888536] ? __lockdep_init_map+0xe4/0x650 [ 58.892924] ? lockdep_init_map+0x3d/0x70 [ 58.897056] register_prot_hook.part.49+0x95/0xb0 [ 58.901876] packet_create+0x820/0xb00 [ 58.905745] ? sock_destroy_inode+0x70/0x70 [ 58.910054] ? register_prot_hook.part.49+0xb0/0xb0 [ 58.915049] ? __sock_create+0x211/0x850 [ 58.919090] ? module_unload_free+0x5b0/0x5b0 [ 58.923568] ? lock_release+0xd70/0xd70 [ 58.927526] ? __lock_is_held+0xbc/0x140 [ 58.931576] __sock_create+0x4d4/0x850 [ 58.935453] ? ___sys_recvmsg+0x630/0x630 [ 58.939580] ? __fdget+0x18/0x20 [ 58.942932] ? SyS_futex+0x260/0x390 [ 58.946631] ? SyS_futex+0x269/0x390 [ 58.950333] ? SyS_setsockopt+0x215/0x360 [ 58.954476] SyS_socket+0xeb/0x200 [ 58.957995] ? entry_SYSCALL_64_fastpath+0x5/0xbe [ 58.962833] ? move_addr_to_kernel+0x60/0x60 [ 58.967219] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 58.972246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 58.976987] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 58.981718] RIP: 0033:0x451e59 [ 58.984885] RSP: 002b:00007fb592bcdc08 EFLAGS: 00000216 ORIG_RAX: 0000000000000029 [ 58.992569] RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59 [ 58.999831] RDX: 0000000000000008 RSI: 0000000000080003 RDI: 0000000000000011 [ 59.007077] RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 [ 59.014337] R10: 0000000000000000 R11: 0000000000000216 R12: 0000000000000000 [ 59.021608] R13: 00007ffe3360db5f R14: 00007fb592bce9c0 R15: 0000000000000000 [ 59.029255] Dumping ftrace buffer: [ 59.032772] (ftrace buffer empty) [ 59.036452] Kernel Offset: disabled [ 59.040050] Rebooting in 86400 seconds..