2017/09/13 18:56:36 parsed 1 programs 2017/09/13 18:56:36 executed programs: 0 syzkaller login: [ 31.103306] dev_remove_pack: ffff88003c199680 not found [ 31.124729] ================================================================== [ 31.126589] BUG: KASAN: use-after-free in __list_add_valid+0xb1/0xd0 [ 31.128173] Read of size 8 at addr ffff88003aaa3570 by task syz-executor3/3146 [ 31.129526] [ 31.129717] CPU: 0 PID: 3146 Comm: syz-executor3 Not tainted 4.13.0-next-20170913+ #3 [ 31.130567] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 [ 31.131445] Call Trace: [ 31.131726] dump_stack+0x194/0x257 [ 31.132126] ? arch_local_irq_restore+0x53/0x53 [ 31.132607] ? show_regs_print_info+0x65/0x65 [ 31.133069] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 31.133588] ? __list_add_valid+0xb1/0xd0 [ 31.134023] print_address_description+0x73/0x250 [ 31.134528] ? __list_add_valid+0xb1/0xd0 [ 31.134958] kasan_report+0x24e/0x340 [ 31.135370] __asan_report_load8_noabort+0x14/0x20 [ 31.135864] __list_add_valid+0xb1/0xd0 [ 31.136267] dev_add_pack+0x113/0x2b0 [ 31.136650] ? napi_skb_free_stolen_head+0x170/0x170 [ 31.137163] ? __lockdep_init_map+0xe4/0x650 [ 31.137608] ? lockdep_init_map+0x3d/0x70 [ 31.138031] register_prot_hook.part.49+0x95/0xb0 [ 31.138520] packet_create+0x820/0xb00 [ 31.138910] ? sock_destroy_inode+0x70/0x70 [ 31.139346] ? register_prot_hook.part.49+0xb0/0xb0 [ 31.139854] ? __sock_create+0x211/0x850 [ 31.140265] ? module_unload_free+0x5b0/0x5b0 [ 31.140721] ? lock_release+0xd70/0xd70 [ 31.141110] ? __lock_is_held+0xbc/0x140 [ 31.141517] __sock_create+0x4d4/0x850 [ 31.142899] ? ___sys_recvmsg+0x630/0x630 [ 31.143358] ? __fdget+0x18/0x20 [ 31.143694] ? SyS_futex+0x260/0x390 [ 31.144062] ? SyS_futex+0x269/0x390 [ 31.144440] ? SyS_getsockopt+0x1dd/0x340 [ 31.144879] SyS_socket+0xeb/0x200 [ 31.145260] ? entry_SYSCALL_64_fastpath+0x5/0xbe [ 31.145739] ? move_addr_to_kernel+0x60/0x60 [ 31.146200] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 31.146733] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 31.147221] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 31.147676] RIP: 0033:0x447299 [ 31.147998] RSP: 002b:00007fc3397bcc08 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 [ 31.148754] RAX: ffffffffffffffda RBX: 0000000000000011 RCX: 0000000000447299 [ 31.149489] RDX: 0000000000000300 RSI: 0000000000000802 RDI: 0000000000000011 [ 31.150219] RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 [ 31.150943] R10: 0000000000000000 R11: 0000000000000286 R12: 00000000ffffffff [ 31.151646] R13: 0000000000000b90 R14: 00000000006e3c50 R15: 0000000000000001 [ 31.152361] [ 31.152526] Allocated by task 3149: [ 31.152883] save_stack_trace+0x16/0x20 [ 31.153281] save_stack+0x43/0xd0 [ 31.153623] kasan_kmalloc+0xad/0xe0 [ 31.153986] kmem_cache_alloc_trace+0x136/0x750 [ 31.154452] fanout_add+0xa50/0x1190 [ 31.154815] packet_setsockopt+0xfdc/0x1e80 [ 31.155234] SyS_setsockopt+0x189/0x360 [ 31.155624] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 31.156086] [ 31.156251] Freed by task 3136: [ 31.156591] save_stack_trace+0x16/0x20 [ 31.156996] save_stack+0x43/0xd0 [ 31.157347] kasan_slab_free+0x71/0xc0 [ 31.157740] kfree+0xca/0x250 [ 31.158051] packet_release+0xa8f/0xd70 [ 31.158458] sock_release+0x8d/0x1e0 [ 31.158832] sock_close+0x16/0x20 [ 31.159176] __fput+0x333/0x7f0 [ 31.159500] ____fput+0x15/0x20 [ 31.159828] task_work_run+0x199/0x270 [ 31.160214] do_exit+0xa52/0x1b40 [ 31.160564] do_group_exit+0x149/0x400 [ 31.160950] get_signal+0x7e8/0x17e0 [ 31.161315] do_signal+0x94/0x1ee0 [ 31.161667] exit_to_usermode_loop+0x224/0x300 [ 31.162121] syscall_return_slowpath+0x42f/0x500 [ 31.162596] entry_SYSCALL_64_fastpath+0xbc/0xbe [ 31.163308] [ 31.163471] The buggy address belongs to the object at ffff88003aaa2cc0 [ 31.163471] which belongs to the cache kmalloc-4096 of size 4096 [ 31.164676] The buggy address is located 2224 bytes inside of [ 31.164676] 4096-byte region [ffff88003aaa2cc0, ffff88003aaa3cc0) [ 31.165814] The buggy address belongs to the page: [ 31.166312] page:ffffea0000eaa880 count:1 mapcount:0 mapping:ffff88003aaa2cc0 index:0x0 compound_mapcount: 0 [ 31.167283] flags: 0x100000000008100(slab|head) [ 31.167738] raw: 0100000000008100 ffff88003aaa2cc0 0000000000000000 0000000100000001 [ 31.168490] raw: ffffea0000eb3320 ffffea0000fa1ca0 ffff88003e800dc0 0000000000000000 [ 31.169239] page dumped because: kasan: bad access detected [ 31.169807] [ 31.169969] Memory state around the buggy address: [ 31.170441] ffff88003aaa3400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.171175] ffff88003aaa3480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.171899] >ffff88003aaa3500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.172632] ^ [ 31.173328] ffff88003aaa3580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.174063] ffff88003aaa3600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.174877] ================================================================== [ 31.175630] Disabling lock debugging due to kernel taint [ 31.176256] Kernel panic - not syncing: panic_on_warn set ... [ 31.176256] [ 31.176983] CPU: 0 PID: 3146 Comm: syz-executor3 Tainted: G B 4.13.0-next-20170913+ #3 [ 31.177886] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 [ 31.178694] Call Trace: [ 31.178955] dump_stack+0x194/0x257 [ 31.179319] ? arch_local_irq_restore+0x53/0x53 [ 31.179784] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 31.180257] ? assoc_array_gc+0x13b0/0x13c0 [ 31.180685] panic+0x1e4/0x417 [ 31.181003] ? __warn+0x1d9/0x1d9 [ 31.181351] ? __list_add_valid+0xb1/0xd0 [ 31.181763] kasan_end_report+0x50/0x50 [ 31.182163] kasan_report+0x137/0x340 [ 31.182548] __asan_report_load8_noabort+0x14/0x20 [ 31.183042] __list_add_valid+0xb1/0xd0 [ 31.183444] dev_add_pack+0x113/0x2b0 [ 31.183822] ? napi_skb_free_stolen_head+0x170/0x170 [ 31.185328] ? __lockdep_init_map+0xe4/0x650 [ 31.185773] ? lockdep_init_map+0x3d/0x70 [ 31.186213] register_prot_hook.part.49+0x95/0xb0 [ 31.186698] packet_create+0x820/0xb00 [ 31.187094] ? sock_destroy_inode+0x70/0x70 [ 31.187551] ? register_prot_hook.part.49+0xb0/0xb0 [ 31.188068] ? __sock_create+0x211/0x850 [ 31.188476] ? module_unload_free+0x5b0/0x5b0 [ 31.188929] ? lock_release+0xd70/0xd70 [ 31.189333] ? __lock_is_held+0xbc/0x140 [ 31.189742] __sock_create+0x4d4/0x850 [ 31.190128] ? ___sys_recvmsg+0x630/0x630 [ 31.190593] ? __fdget+0x18/0x20 [ 31.190927] ? SyS_futex+0x260/0x390 [ 31.191300] ? SyS_futex+0x269/0x390 [ 31.191672] ? SyS_getsockopt+0x1dd/0x340 [ 31.192086] SyS_socket+0xeb/0x200 [ 31.192439] ? entry_SYSCALL_64_fastpath+0x5/0xbe [ 31.192918] ? move_addr_to_kernel+0x60/0x60 [ 31.193352] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 31.193846] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 31.194329] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 31.194794] RIP: 0033:0x447299 [ 31.195107] RSP: 002b:00007fc3397bcc08 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 [ 31.195858] RAX: ffffffffffffffda RBX: 0000000000000011 RCX: 0000000000447299 [ 31.196582] RDX: 0000000000000300 RSI: 0000000000000802 RDI: 0000000000000011 [ 31.197286] RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 [ 31.198000] R10: 0000000000000000 R11: 0000000000000286 R12: 00000000ffffffff [ 31.198716] R13: 0000000000000b90 R14: 00000000006e3c50 R15: 0000000000000001 [ 31.199524] Dumping ftrace buffer: [ 31.199875] (ftrace buffer empty) [ 31.200185] Kernel Offset: disabled [ 31.200422] Rebooting in 86400 seconds..