INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added 'ci-upstream-mmots-kasan-gce-5,10.128.15.222' (ECDSA) to the list of known hosts. 2017/11/12 03:24:24 parsed 1 programs 2017/11/12 03:24:24 executed programs: 0 syzkaller login: [ 27.150051] ================================================================== [ 27.151210] BUG: KASAN: use-after-free in irq_bypass_register_consumer+0x4b4/0x500 [ 27.152238] Write of size 8 at addr ffff8801ca0a4e00 by task syz-executor4/3147 [ 27.153214] [ 27.153449] CPU: 1 PID: 3147 Comm: syz-executor4 Not tainted 4.14.0-rc8-mm1+ #21 [ 27.154436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 27.155678] Call Trace: [ 27.156038] dump_stack+0x194/0x257 [ 27.156547] ? arch_local_irq_restore+0x53/0x53 [ 27.157171] ? show_regs_print_info+0x65/0x65 [ 27.157779] ? irq_bypass_register_consumer+0x4b4/0x500 [ 27.158494] print_address_description+0x73/0x250 [ 27.159144] ? irq_bypass_register_consumer+0x4b4/0x500 [ 27.159857] kasan_report+0x25b/0x340 [ 27.160385] __asan_report_store8_noabort+0x17/0x20 [ 27.161052] irq_bypass_register_consumer+0x4b4/0x500 [ 27.161760] ? __disconnect+0x1a0/0x1a0 [ 27.162296] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 27.162964] ? trace_hardirqs_on+0xd/0x10 [ 27.163520] ? queue_work_on+0x106/0x1c0 [ 27.164071] kvm_irqfd+0x137a/0x1d50 [ 27.164569] ? check_noncircular+0x20/0x20 [ 27.165153] ? kvm_eventfd_init+0x2a0/0x2a0 [ 27.165739] ? find_held_lock+0x39/0x1d0 [ 27.166294] ? lock_downgrade+0x980/0x980 [ 27.166874] ? __might_fault+0xe0/0x1d0 [ 27.167415] ? lock_release+0xda0/0xda0 [ 27.167948] ? trace_event_raw_event_sched_switch+0x8a0/0x8a0 [ 27.168726] ? futex_wait+0x69e/0x990 [ 27.169237] ? kernel_text_address+0x102/0x140 [ 27.169882] ? __might_sleep+0x95/0x190 [ 27.170423] ? kasan_check_write+0x14/0x20 [ 27.174626] ? _copy_from_user+0x99/0x110 [ 27.178746] kvm_vm_ioctl+0x1079/0x1c40 [ 27.182690] ? save_stack+0x43/0xd0 [ 27.186287] ? kvm_set_memory_region+0x50/0x50 [ 27.190835] ? alloc_file+0x26/0x3a0 [ 27.194517] ? anon_inode_getfile+0x26d/0x490 [ 27.198980] ? eventfd_file_create.part.3+0x193/0x250 [ 27.204152] ? check_noncircular+0x20/0x20 [ 27.208361] ? do_futex+0x85b/0x2280 [ 27.212044] ? debug_mutex_init+0x1c/0x60 [ 27.216161] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 27.221141] ? __lockdep_init_map+0xe4/0x650 [ 27.225520] ? find_held_lock+0x39/0x1d0 [ 27.229568] ? lock_downgrade+0x980/0x980 [ 27.233688] ? __fget+0xbb/0x580 [ 27.237022] ? __raw_spin_lock_init+0x1c/0x100 [ 27.241574] ? lock_release+0xda0/0xda0 [ 27.245520] ? __lock_is_held+0xbc/0x140 [ 27.249561] ? __fget+0x362/0x580 [ 27.252990] ? iterate_fd+0x3f0/0x3f0 [ 27.256759] ? __lock_is_held+0xbc/0x140 [ 27.260799] ? kvm_set_memory_region+0x50/0x50 [ 27.265349] do_vfs_ioctl+0x1b1/0x1530 [ 27.269205] ? __fd_install+0x288/0x740 [ 27.273147] ? anon_inode_getfile+0x349/0x490 [ 27.277615] ? ioctl_preallocate+0x2b0/0x2b0 [ 27.281995] ? selinux_capable+0x40/0x40 [ 27.286051] ? SyS_futex+0x269/0x390 [ 27.289748] ? security_file_ioctl+0x89/0xb0 [ 27.294131] SyS_ioctl+0x8f/0xc0 [ 27.297470] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 27.302192] RIP: 0033:0x452879 [ 27.305349] RSP: 002b:00007f0bb71f1be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 [ 27.313023] RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452879 [ 27.320261] RDX: 0000000020227000 RSI: 000000004020ae76 RDI: 000000000000000f [ 27.327500] RBP: 0000000000000086 R08: 0000000000000000 R09: 0000000000000000 [ 27.334741] R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f1460 [ 27.341978] R13: 00000000ffffffff R14: 00007f0bb71f26d4 R15: 0000000000000000 [ 27.349232] [ 27.350829] Allocated by task 3147: [ 27.354437] save_stack+0x43/0xd0 [ 27.357858] kasan_kmalloc+0xad/0xe0 [ 27.361538] kmem_cache_alloc_trace+0x136/0x750 [ 27.366174] kvm_irqfd+0x16c/0x1d50 [ 27.369768] kvm_vm_ioctl+0x1079/0x1c40 [ 27.373708] do_vfs_ioctl+0x1b1/0x1530 [ 27.377561] SyS_ioctl+0x8f/0xc0 [ 27.380895] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 27.385612] [ 27.387208] Freed by task 24: [ 27.390279] save_stack+0x43/0xd0 [ 27.393697] kasan_slab_free+0x71/0xc0 [ 27.397551] kfree+0xca/0x250 [ 27.400625] irqfd_shutdown+0x13c/0x1a0 [ 27.404566] process_one_work+0xbfa/0x1bc0 [ 27.408764] worker_thread+0x223/0x1990 [ 27.412720] kthread+0x37a/0x440 [ 27.416053] ret_from_fork+0x24/0x30 [ 27.419730] [ 27.421328] The buggy address belongs to the object at ffff8801ca0a4c80 [ 27.421328] which belongs to the cache kmalloc-512 of size 512 [ 27.433951] The buggy address is located 384 bytes inside of [ 27.433951] 512-byte region [ffff8801ca0a4c80, ffff8801ca0a4e80) [ 27.445789] The buggy address belongs to the page: [ 27.450687] page:ffffea0007282900 count:1 mapcount:0 mapping:ffff8801ca0a4000 index:0x0 [ 27.458796] flags: 0x2fffc0000000100(slab) [ 27.463001] raw: 02fffc0000000100 ffff8801ca0a4000 0000000000000000 0000000100000006 [ 27.470852] raw: ffffea0007273760 ffffea0007273660 ffff8801db000940 0000000000000000 [ 27.478696] page dumped because: kasan: bad access detected [ 27.484369] [ 27.485965] Memory state around the buggy address: [ 27.490861] ffff8801ca0a4d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.498187] ffff8801ca0a4d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.505512] >ffff8801ca0a4e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.512836] ^ [ 27.516169] ffff8801ca0a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.523506] ffff8801ca0a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.530830] ================================================================== [ 27.538158] Disabling lock debugging due to kernel taint [ 27.543665] Kernel panic - not syncing: panic_on_warn set ... [ 27.543665] [ 27.551120] CPU: 1 PID: 3147 Comm: syz-executor4 Tainted: G B 4.14.0-rc8-mm1+ #21 [ 27.559924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 27.569245] Call Trace: [ 27.571806] dump_stack+0x194/0x257 [ 27.575403] ? arch_local_irq_restore+0x53/0x53 [ 27.580042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 27.584764] ? vsnprintf+0x1ed/0x1900 [ 27.588536] ? irq_bypass_register_consumer+0x460/0x500 [ 27.593868] panic+0x1e4/0x41c [ 27.597024] ? refcount_error_report+0x214/0x214 [ 27.601745] ? add_taint+0x1c/0x50 [ 27.605250] ? add_taint+0x1c/0x50 [ 27.608760] ? irq_bypass_register_consumer+0x4b4/0x500 [ 27.614090] kasan_end_report+0x50/0x50 [ 27.618027] kasan_report+0x144/0x340 [ 27.621796] __asan_report_store8_noabort+0x17/0x20 [ 27.626777] irq_bypass_register_consumer+0x4b4/0x500 [ 27.631933] ? __disconnect+0x1a0/0x1a0 [ 27.635875] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 27.640865] ? trace_hardirqs_on+0xd/0x10 [ 27.644978] ? queue_work_on+0x106/0x1c0 [ 27.649006] kvm_irqfd+0x137a/0x1d50 [ 27.652683] ? check_noncircular+0x20/0x20 [ 27.656892] ? kvm_eventfd_init+0x2a0/0x2a0 [ 27.661182] ? find_held_lock+0x39/0x1d0 [ 27.665213] ? lock_downgrade+0x980/0x980 [ 27.669328] ? __might_fault+0xe0/0x1d0 [ 27.673272] ? lock_release+0xda0/0xda0 [ 27.677212] ? trace_event_raw_event_sched_switch+0x8a0/0x8a0 [ 27.683065] ? futex_wait+0x69e/0x990 [ 27.686831] ? kernel_text_address+0x102/0x140 [ 27.691381] ? __might_sleep+0x95/0x190 [ 27.695327] ? kasan_check_write+0x14/0x20 [ 27.699533] ? _copy_from_user+0x99/0x110 [ 27.703652] kvm_vm_ioctl+0x1079/0x1c40 [ 27.707599] ? save_stack+0x43/0xd0 [ 27.711191] ? kvm_set_memory_region+0x50/0x50 [ 27.715736] ? alloc_file+0x26/0x3a0 [ 27.719414] ? anon_inode_getfile+0x26d/0x490 [ 27.723874] ? eventfd_file_create.part.3+0x193/0x250 [ 27.729032] ? check_noncircular+0x20/0x20 [ 27.733237] ? do_futex+0x85b/0x2280 [ 27.736914] ? debug_mutex_init+0x1c/0x60 [ 27.741026] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 27.746004] ? __lockdep_init_map+0xe4/0x650 [ 27.750388] ? find_held_lock+0x39/0x1d0 [ 27.754416] ? lock_downgrade+0x980/0x980 [ 27.758530] ? __fget+0xbb/0x580 [ 27.761860] ? __raw_spin_lock_init+0x1c/0x100 [ 27.766408] ? lock_release+0xda0/0xda0 [ 27.770346] ? __lock_is_held+0xbc/0x140 [ 27.774377] ? __fget+0x362/0x580 [ 27.777800] ? iterate_fd+0x3f0/0x3f0 [ 27.781567] ? __lock_is_held+0xbc/0x140 [ 27.785600] ? kvm_set_memory_region+0x50/0x50 [ 27.790156] do_vfs_ioctl+0x1b1/0x1530 [ 27.794007] ? __fd_install+0x288/0x740 [ 27.797946] ? anon_inode_getfile+0x349/0x490 [ 27.802408] ? ioctl_preallocate+0x2b0/0x2b0 [ 27.806784] ? selinux_capable+0x40/0x40 [ 27.810814] ? SyS_futex+0x269/0x390 [ 27.814501] ? security_file_ioctl+0x89/0xb0 [ 27.818876] SyS_ioctl+0x8f/0xc0 [ 27.822212] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 27.826933] RIP: 0033:0x452879 [ 27.830090] RSP: 002b:00007f0bb71f1be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 [ 27.837765] RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452879 [ 27.845002] RDX: 0000000020227000 RSI: 000000004020ae76 RDI: 000000000000000f [ 27.852238] RBP: 0000000000000086 R08: 0000000000000000 R09: 0000000000000000 [ 27.859470] R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f1460 [ 27.866705] R13: 00000000ffffffff R14: 00007f0bb71f26d4 R15: 0000000000000000 [ 27.874307] Dumping ftrace buffer: [ 27.877813] (ftrace buffer empty) [ 27.881490] Kernel Offset: disabled [ 27.885084] Rebooting in 86400 seconds..