INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added 'ci-upstream-next-kasan-gce-4,10.128.15.198' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 78.131175] irq bypass consumer (token ffff8801ca086d00) registration fails: -16 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 79.155464] ================================================================== [ 79.162860] BUG: KASAN: use-after-free in irq_bypass_register_consumer+0x4f0/0x500 [ 79.170534] Read of size 8 at addr ffff8801c571c1b8 by task syzkaller523245/6325 [ 79.178028] [ 79.179622] CPU: 1 PID: 6325 Comm: syzkaller523245 Not tainted 4.13.0-rc4-next-20170811 #1 [ 79.187985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.197331] Call Trace: [ 79.199885] dump_stack+0x194/0x257 [ 79.203480] ? arch_local_irq_restore+0x53/0x53 [ 79.208114] ? show_regs_print_info+0x65/0x65 [ 79.212578] ? irq_bypass_register_consumer+0x4f0/0x500 [ 79.217925] print_address_description+0x7f/0x260 [ 79.222746] ? irq_bypass_register_consumer+0x4f0/0x500 [ 79.228088] kasan_report+0x24e/0x340 [ 79.231856] __asan_report_load8_noabort+0x14/0x20 [ 79.236757] irq_bypass_register_consumer+0x4f0/0x500 [ 79.241925] ? __disconnect+0x1a0/0x1a0 [ 79.245895] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 79.250884] kvm_irqfd+0x137a/0x1d50 [ 79.254577] ? kvm_eventfd_init+0x2a0/0x2a0 [ 79.258876] ? find_held_lock+0x35/0x1d0 [ 79.262906] ? __might_fault+0x110/0x1d0 [ 79.266931] ? lock_downgrade+0x990/0x990 [ 79.271047] ? lock_release+0xa40/0xa40 [ 79.274990] ? check_same_owner+0x320/0x320 [ 79.279274] ? check_noncircular+0x20/0x20 [ 79.283479] ? __might_sleep+0x95/0x190 [ 79.287423] ? kasan_check_write+0x14/0x20 [ 79.291622] ? _copy_from_user+0x99/0x110 [ 79.295738] kvm_vm_ioctl+0x1079/0x1c40 [ 79.299684] ? kvm_set_memory_region+0x50/0x50 [ 79.304240] ? __lock_is_held+0xb6/0x140 [ 79.309358] ? check_noncircular+0x20/0x20 [ 79.313578] ? lru_cache_add+0x1c7/0x3a0 [ 79.317631] ? check_noncircular+0x20/0x20 [ 79.321844] ? lru_cache_add_file+0x20/0x20 [ 79.326156] ? __alloc_pages_nodemask+0x9e2/0xc40 [ 79.330996] ? page_add_new_anon_rmap+0x36c/0x750 [ 79.335862] ? find_held_lock+0x35/0x1d0 [ 79.339929] ? __fget+0x333/0x570 [ 79.343377] ? lock_downgrade+0x990/0x990 [ 79.347515] ? lock_release+0xa40/0xa40 [ 79.351476] ? __lock_is_held+0xb6/0x140 [ 79.355540] ? __fget+0x35c/0x570 [ 79.358988] ? iterate_fd+0x3f0/0x3f0 [ 79.362771] ? lock_acquire+0x1d5/0x580 [ 79.366734] ? find_held_lock+0x35/0x1d0 [ 79.370785] ? kvm_set_memory_region+0x50/0x50 [ 79.375352] do_vfs_ioctl+0x1b1/0x1520 [ 79.379231] ? __do_page_fault+0x51b/0xb60 [ 79.383450] ? ioctl_preallocate+0x2b0/0x2b0 [ 79.387847] ? selinux_capable+0x40/0x40 [ 79.391890] ? __change_page_attr_set_clr+0x1326/0x2740 [ 79.397238] ? downgrade_write+0x150/0x150 [ 79.401452] ? vmacache_find+0x61/0x270 [ 79.405424] ? security_file_ioctl+0x7d/0xb0 [ 79.409811] ? security_file_ioctl+0x89/0xb0 [ 79.414210] SyS_ioctl+0x8f/0xc0 [ 79.417567] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 79.422301] RIP: 0033:0x4460d9 [ 79.425466] RSP: 002b:00007fbb01c98dc8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 79.433167] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004460d9 [ 79.440410] RDX: 000000002000d000 RSI: 000000004020ae76 RDI: 00000000000000fe [ 79.447653] RBP: 0000000000000086 R08: 00007fbb01c99700 R09: 00007fbb01c99700 [ 79.454904] R10: 00007fbb01c99700 R11: 0000000000000202 R12: 0000000000000000 [ 79.462161] R13: 00007ffd74479e6f R14: 00007fbb01c999c0 R15: 0000000000000000 [ 79.469432] [ 79.471036] Allocated by task 6325: [ 79.474640] save_stack_trace+0x16/0x20 [ 79.478587] save_stack+0x43/0xd0 [ 79.482014] kasan_kmalloc+0xaa/0xd0 [ 79.485706] kmem_cache_alloc_trace+0x108/0x700 [ 79.490352] kvm_irqfd+0x16c/0x1d50 [ 79.493952] kvm_vm_ioctl+0x1079/0x1c40 [ 79.497898] do_vfs_ioctl+0x1b1/0x1520 [ 79.501760] SyS_ioctl+0x8f/0xc0 [ 79.505114] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 79.509855] [ 79.511456] Freed by task 1243: [ 79.514712] save_stack_trace+0x16/0x20 [ 79.518661] save_stack+0x43/0xd0 [ 79.522089] kasan_slab_free+0x6e/0xc0 [ 79.525949] kfree+0xd3/0x260 [ 79.529029] irqfd_shutdown+0x13c/0x1a0 [ 79.532979] process_one_work+0xbf3/0x1bc0 [ 79.537192] worker_thread+0x223/0x1860 [ 79.541143] kthread+0x35e/0x430 [ 79.544490] ret_from_fork+0x2a/0x40 [ 79.548184] [ 79.549788] The buggy address belongs to the object at ffff8801c571c040 [ 79.549788] which belongs to the cache kmalloc-512 of size 512 [ 79.562421] The buggy address is located 376 bytes inside of [ 79.562421] 512-byte region [ffff8801c571c040, ffff8801c571c240) [ 79.574279] The buggy address belongs to the page: [ 79.579183] page:ffffea0006330e20 count:1 mapcount:0 mapping:ffff8801c571c040 index:0x0 [ 79.587304] flags: 0x200000000000100(slab) [ 79.591519] raw: 0200000000000100 ffff8801c571c040 0000000000000000 0000000100000006 [ 79.599375] raw: ffffea000632f9b0 ffffea0006329ba0 ffff8801dbc00600 [ 79.605755] page dumped because: kasan: bad access detected [ 79.611437] [ 79.613039] Memory state around the buggy address: [ 79.617946] ffff8801c571c080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.625281] ffff8801c571c100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.632615] >ffff8801c571c180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.639948] ^ [ 79.645114] ffff8801c571c200: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc executing program [ 79.652461] ffff8801c571c280: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 79.659797] ================================================================== [ 79.667128] Disabling lock debugging due to kernel taint [ 79.672677] Kernel panic - not syncing: panic_on_warn set ... [ 79.672677] [ 79.680029] CPU: 1 PID: 6325 Comm: syzkaller523245 Tainted: G B 4.13.0-rc4-next-20170811 #1 [ 79.689617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.698943] Call Trace: [ 79.701511] dump_stack+0x194/0x257 [ 79.705115] ? arch_local_irq_restore+0x53/0x53 [ 79.709761] ? kasan_end_report+0x32/0x50 [ 79.713885] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 79.718620] ? irq_bypass_register_consumer+0x480/0x500 [ 79.723960] panic+0x1e4/0x417 [ 79.727129] ? __warn+0x1d9/0x1d9 [ 79.730568] ? irq_bypass_register_consumer+0x4f0/0x500 [ 79.735907] kasan_end_report+0x50/0x50 [ 79.739856] kasan_report+0x137/0x340 [ 79.743638] __asan_report_load8_noabort+0x14/0x20 [ 79.748547] irq_bypass_register_consumer+0x4f0/0x500 [ 79.753742] ? __disconnect+0x1a0/0x1a0 [ 79.757711] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 79.762712] kvm_irqfd+0x137a/0x1d50 [ 79.766415] ? kvm_eventfd_init+0x2a0/0x2a0 [ 79.770726] ? find_held_lock+0x35/0x1d0 [ 79.774774] ? __might_fault+0x110/0x1d0 [ 79.778808] ? lock_downgrade+0x990/0x990 [ 79.782932] ? lock_release+0xa40/0xa40 [ 79.786893] ? check_same_owner+0x320/0x320 [ 79.791190] ? check_noncircular+0x20/0x20 [ 79.795406] ? __might_sleep+0x95/0x190 [ 79.799364] ? kasan_check_write+0x14/0x20 [ 79.803587] ? _copy_from_user+0x99/0x110 [ 79.807711] kvm_vm_ioctl+0x1079/0x1c40 [ 79.811688] ? kvm_set_memory_region+0x50/0x50 [ 79.816245] ? __lock_is_held+0xb6/0x140 [ 79.820281] ? check_noncircular+0x20/0x20 [ 79.824493] ? lru_cache_add+0x1c7/0x3a0 [ 79.828527] ? check_noncircular+0x20/0x20 [ 79.832732] ? lru_cache_add_file+0x20/0x20 [ 79.837032] ? __alloc_pages_nodemask+0x9e2/0xc40 [ 79.841876] ? page_add_new_anon_rmap+0x36c/0x750 [ 79.846702] ? find_held_lock+0x35/0x1d0 [ 79.850756] ? __fget+0x333/0x570 [ 79.854197] ? lock_downgrade+0x990/0x990 [ 79.858321] ? lock_release+0xa40/0xa40 [ 79.862268] ? __lock_is_held+0xb6/0x140 [ 79.866309] ? __fget+0x35c/0x570 [ 79.869742] ? iterate_fd+0x3f0/0x3f0 [ 79.873516] ? lock_acquire+0x1d5/0x580 [ 79.877467] ? find_held_lock+0x35/0x1d0 [ 79.881513] ? kvm_set_memory_region+0x50/0x50 [ 79.886069] do_vfs_ioctl+0x1b1/0x1520 [ 79.889936] ? __do_page_fault+0x51b/0xb60 [ 79.894149] ? ioctl_preallocate+0x2b0/0x2b0 [ 79.898536] ? selinux_capable+0x40/0x40 [ 79.902574] ? __change_page_attr_set_clr+0x1326/0x2740 [ 79.907923] ? downgrade_write+0x150/0x150 [ 79.912149] ? vmacache_find+0x61/0x270 [ 79.916108] ? security_file_ioctl+0x7d/0xb0 [ 79.920493] ? security_file_ioctl+0x89/0xb0 [ 79.924881] SyS_ioctl+0x8f/0xc0 [ 79.928225] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 79.932950] RIP: 0033:0x4460d9 [ 79.936120] RSP: 002b:00007fbb01c98dc8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 79.943812] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004460d9 [ 79.951055] RDX: 000000002000d000 RSI: 000000004020ae76 RDI: 00000000000000fe [ 79.958298] RBP: 0000000000000086 R08: 00007fbb01c99700 R09: 00007fbb01c99700 [ 79.965564] R10: 00007fbb01c99700 R11: 0000000000000202 R12: 0000000000000000 [ 79.972820] R13: 00007ffd74479e6f R14: 00007fbb01c999c0 R15: 0000000000000000 [ 79.980366] Dumping ftrace buffer: [ 79.983881] (ftrace buffer empty) [ 79.987557] Kernel Offset: disabled [ 79.991147] Rebooting in 86400 seconds..