INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added 'ci-upstream-next-kasan-gce-6,10.128.0.14' (ECDSA) to the list of known hosts. 2017/09/02 19:14:37 parsed 1 programs 2017/09/02 19:14:37 executed programs: 0 syzkaller login: [ 55.328714] dev_remove_pack: ffff8801c9089600 not found [ 55.369087] ================================================================== [ 55.376530] BUG: KASAN: use-after-free in __list_add_valid+0xb1/0xd0 [ 55.383016] Read of size 8 at addr ffff8801c8eaad70 by task syz-executor7/4404 [ 55.390366] [ 55.391994] CPU: 1 PID: 4404 Comm: syz-executor7 Not tainted 4.13.0-rc7-next-20170901+ #13 [ 55.400399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 55.409743] Call Trace: [ 55.412325] dump_stack+0x194/0x257 [ 55.415951] ? arch_local_irq_restore+0x53/0x53 [ 55.420615] ? show_regs_print_info+0x65/0x65 [ 55.425102] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 55.430126] ? __list_add_valid+0xb1/0xd0 [ 55.434271] print_address_description+0x73/0x250 [ 55.439107] ? __list_add_valid+0xb1/0xd0 [ 55.443252] kasan_report+0x24e/0x340 [ 55.447060] __asan_report_load8_noabort+0x14/0x20 [ 55.451986] __list_add_valid+0xb1/0xd0 [ 55.455961] dev_add_pack+0x113/0x2b0 [ 55.459760] ? napi_skb_free_stolen_head+0x170/0x170 [ 55.464859] ? __lockdep_init_map+0xe4/0x650 [ 55.469267] ? lockdep_init_map+0x3d/0x70 [ 55.473419] register_prot_hook.part.49+0x95/0xb0 [ 55.478262] packet_create+0x820/0xb00 [ 55.482146] ? sock_destroy_inode+0x70/0x70 [ 55.486468] ? register_prot_hook.part.49+0xb0/0xb0 [ 55.491481] ? __sock_create+0x211/0x850 [ 55.495540] ? module_unload_free+0x5b0/0x5b0 [ 55.500038] ? lock_release+0xd70/0xd70 [ 55.504017] ? __lock_is_held+0xbc/0x140 [ 55.508102] __sock_create+0x4d4/0x850 [ 55.511984] ? ___sys_recvmsg+0x630/0x630 [ 55.516264] ? ___sys_recvmsg+0x630/0x630 [ 55.520407] ? __fdget+0x18/0x20 [ 55.523777] ? SyS_futex+0x260/0x390 [ 55.527499] ? SyS_futex+0x269/0x390 [ 55.531206] ? SyS_getsockopt+0x1dd/0x340 [ 55.535356] SyS_socket+0xeb/0x200 [ 55.538923] ? entry_SYSCALL_64_fastpath+0x5/0xbe [ 55.543759] ? move_addr_to_kernel+0x60/0x60 [ 55.548162] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 55.553176] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 55.557938] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 55.562684] RIP: 0033:0x451e59 [ 55.565868] RSP: 002b:00007f5c5d167c08 EFLAGS: 00000216 ORIG_RAX: 0000000000000029 [ 55.573572] RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59 [ 55.580842] RDX: 0000000000000008 RSI: 0000000000080003 RDI: 0000000000000011 [ 55.588108] RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 [ 55.595375] R10: 0000000000000000 R11: 0000000000000216 R12: 00000000004bd180 [ 55.602636] R13: 00000000ffffffff R14: ffffffffffffffff R15: 0000000000000084 [ 55.609929] [ 55.611552] Allocated by task 4395: [ 55.615178] save_stack_trace+0x16/0x20 [ 55.619147] save_stack+0x43/0xd0 [ 55.622674] kasan_kmalloc+0xad/0xe0 [ 55.626381] kmem_cache_alloc_trace+0x136/0x750 [ 55.631046] fanout_add+0xa50/0x1190 [ 55.634861] packet_setsockopt+0xfdc/0x1e80 [ 55.639181] SyS_setsockopt+0x189/0x360 [ 55.643155] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 55.647901] [ 55.649520] Freed by task 4408: [ 55.652810] save_stack_trace+0x16/0x20 [ 55.656782] save_stack+0x43/0xd0 [ 55.660244] kasan_slab_free+0x71/0xc0 [ 55.664123] kfree+0xca/0x250 [ 55.667236] packet_release+0xa8f/0xd70 [ 55.671201] sock_release+0x8d/0x1e0 [ 55.674907] sock_close+0x16/0x20 [ 55.678352] __fput+0x333/0x7f0 [ 55.681625] ____fput+0x15/0x20 [ 55.684899] task_work_run+0x199/0x270 [ 55.688778] do_exit+0xa52/0x1b40 [ 55.692238] do_group_exit+0x149/0x400 [ 55.696115] get_signal+0x7e8/0x17e0 [ 55.699829] do_signal+0x94/0x1ee0 [ 55.703359] exit_to_usermode_loop+0x224/0x300 [ 55.707932] syscall_return_slowpath+0x42f/0x500 [ 55.712675] entry_SYSCALL_64_fastpath+0xbc/0xbe [ 55.717411] [ 55.719026] The buggy address belongs to the object at ffff8801c8eaa4c0 [ 55.719026] which belongs to the cache kmalloc-4096 of size 4096 [ 55.731845] The buggy address is located 2224 bytes inside of [ 55.731845] 4096-byte region [ffff8801c8eaa4c0, ffff8801c8eab4c0) [ 55.743871] The buggy address belongs to the page: [ 55.748785] page:ffffea000723aa80 count:1 mapcount:0 mapping:ffff8801c8eaa4c0 index:0x0 compound_mapcount: 0 [ 55.758746] flags: 0x200000000008100(slab|head) [ 55.763400] raw: 0200000000008100 ffff8801c8eaa4c0 0000000000000000 0000000100000001 [ 55.771277] raw: ffffea000723a820 ffffea000723aca0 ffff8801dac00dc0 0000000000000000 [ 55.779136] page dumped because: kasan: bad access detected [ 55.784825] [ 55.786433] Memory state around the buggy address: [ 55.791371] ffff8801c8eaac00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.798711] ffff8801c8eaac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.806052] >ffff8801c8eaad00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.813389] ^ [ 55.820397] ffff8801c8eaad80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.827739] ffff8801c8eaae00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.835078] ================================================================== [ 55.842415] Disabling lock debugging due to kernel taint [ 55.847939] Kernel panic - not syncing: panic_on_warn set ... [ 55.847939] [ 55.855302] CPU: 1 PID: 4404 Comm: syz-executor7 Tainted: G B 4.13.0-rc7-next-20170901+ #13 [ 55.864891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 55.874227] Call Trace: [ 55.876789] dump_stack+0x194/0x257 [ 55.880392] ? arch_local_irq_restore+0x53/0x53 [ 55.885038] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 55.889773] ? __list_add_valid+0x70/0xd0 [ 55.893933] panic+0x1e4/0x417 [ 55.897103] ? __warn+0x1d9/0x1d9 [ 55.900539] ? __list_add_valid+0xb1/0xd0 [ 55.904692] kasan_end_report+0x50/0x50 [ 55.908655] kasan_report+0x137/0x340 [ 55.912447] __asan_report_load8_noabort+0x14/0x20 [ 55.917362] __list_add_valid+0xb1/0xd0 [ 55.921313] dev_add_pack+0x113/0x2b0 [ 55.925086] ? napi_skb_free_stolen_head+0x170/0x170 [ 55.930169] ? __lockdep_init_map+0xe4/0x650 [ 55.934552] ? lockdep_init_map+0x3d/0x70 [ 55.938699] register_prot_hook.part.49+0x95/0xb0 [ 55.943525] packet_create+0x820/0xb00 [ 55.947397] ? sock_destroy_inode+0x70/0x70 [ 55.951694] ? register_prot_hook.part.49+0xb0/0xb0 [ 55.956684] ? __sock_create+0x211/0x850 [ 55.960733] ? module_unload_free+0x5b0/0x5b0 [ 55.965202] ? lock_release+0xd70/0xd70 [ 55.969149] ? __lock_is_held+0xbc/0x140 [ 55.973208] __sock_create+0x4d4/0x850 [ 55.977079] ? ___sys_recvmsg+0x630/0x630 [ 55.981207] ? ___sys_recvmsg+0x630/0x630 [ 55.985331] ? __fdget+0x18/0x20 [ 55.988673] ? SyS_futex+0x260/0x390 [ 55.992356] ? SyS_futex+0x269/0x390 [ 55.996040] ? SyS_getsockopt+0x1dd/0x340 [ 56.000181] SyS_socket+0xeb/0x200 [ 56.003697] ? entry_SYSCALL_64_fastpath+0x5/0xbe [ 56.008527] ? move_addr_to_kernel+0x60/0x60 [ 56.012923] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 56.017914] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 56.022649] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 56.027390] RIP: 0033:0x451e59 [ 56.030550] RSP: 002b:00007f5c5d167c08 EFLAGS: 00000216 ORIG_RAX: 0000000000000029 [ 56.038230] RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59 [ 56.045471] RDX: 0000000000000008 RSI: 0000000000080003 RDI: 0000000000000011 [ 56.052896] RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 [ 56.060137] R10: 0000000000000000 R11: 0000000000000216 R12: 00000000004bd180 [ 56.067379] R13: 00000000ffffffff R14: ffffffffffffffff R15: 0000000000000084 [ 56.074991] Dumping ftrace buffer: [ 56.078505] (ftrace buffer empty) [ 56.082181] Kernel Offset: disabled [ 56.085770] Rebooting in 86400 seconds..