2017/10/28 16:18:08 parsed 1 programs 2017/10/28 16:18:08 executed programs: 0 2017/10/28 16:18:13 executed programs: 23 syzkaller login: [ 23.269176] ================================================================== [ 23.269995] BUG: KASAN: use-after-free in packet_getsockopt+0xc72/0xe00 [ 23.270658] Read of size 8 at addr ffff88003d326b58 by task syz-executor0/3124 [ 23.271393] [ 23.271566] CPU: 2 PID: 3124 Comm: syz-executor0 Not tainted 4.14.0-rc5-next-20171018+ #8 [ 23.272377] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 [ 23.273205] Call Trace: [ 23.273488] dump_stack+0x194/0x257 [ 23.274401] ? arch_local_irq_restore+0x53/0x53 [ 23.274839] ? show_regs_print_info+0x65/0x65 [ 23.275227] ? lock_release+0xa40/0xa40 [ 23.275580] ? packet_getsockopt+0xc72/0xe00 [ 23.275966] print_address_description+0x73/0x250 [ 23.276393] ? packet_getsockopt+0xc72/0xe00 [ 23.276780] kasan_report+0x25b/0x340 [ 23.277120] __asan_report_load8_noabort+0x14/0x20 [ 23.277543] packet_getsockopt+0xc72/0xe00 [ 23.277907] ? packet_notifier+0x950/0x950 [ 23.278266] ? SYSC_perf_event_open+0x4c3/0x2e00 [ 23.278781] ? __fget_light+0x297/0x380 [ 23.279125] ? sock_has_perm+0x29c/0x400 [ 23.279481] ? selinux_secmark_relabel_packet+0xc0/0xc0 [ 23.279934] ? perf_event_set_output+0x5a0/0x5a0 [ 23.280364] ? putname+0xee/0x130 [ 23.280666] ? selinux_socket_getsockopt+0x36/0x40 [ 23.281096] ? security_socket_getsockopt+0x89/0xb0 [ 23.281536] SyS_getsockopt+0x178/0x340 [ 23.281878] ? SyS_setsockopt+0x360/0x360 [ 23.282236] ? entry_SYSCALL_64_fastpath+0x5/0xbe [ 23.282655] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 23.283084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 23.283493] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 23.283899] RIP: 0033:0x447c89 [ 23.284249] RSP: 002b:00007fed06654bd8 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 23.284963] RAX: ffffffffffffffda RBX: 00007fed066556cc RCX: 0000000000447c89 [ 23.285569] RDX: 0000000000000015 RSI: 0000000000000107 RDI: 0000000000000010 [ 23.286171] RBP: 0000000000000082 R08: 00000000208a5000 R09: 0000000000000000 [ 23.286786] R10: 0000000020ec8000 R11: 0000000000000246 R12: 0000000000000000 [ 23.287394] R13: 0000000000000000 R14: 00007fed066559c0 R15: 00007fed06655700 [ 23.288073] [ 23.288223] Allocated by task 3123: [ 23.288536] save_stack+0x43/0xd0 [ 23.288831] kasan_kmalloc+0xad/0xe0 [ 23.289143] kmem_cache_alloc_trace+0x136/0x750 [ 23.289538] fanout_add+0x27e/0x1480 [ 23.289855] packet_setsockopt+0xfdc/0x1e80 [ 23.290224] SyS_setsockopt+0x189/0x360 [ 23.290571] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 23.290970] [ 23.291112] Freed by task 3123: [ 23.291393] save_stack+0x43/0xd0 [ 23.291691] kasan_slab_free+0x71/0xc0 [ 23.292088] kfree+0xca/0x250 [ 23.292392] fanout_add+0x432/0x1480 [ 23.292753] packet_setsockopt+0xfdc/0x1e80 [ 23.293141] SyS_setsockopt+0x189/0x360 [ 23.293475] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 23.293869] [ 23.294013] The buggy address belongs to the object at ffff88003d326b40 [ 23.294013] which belongs to the cache kmalloc-128 of size 128 [ 23.295043] The buggy address is located 24 bytes inside of [ 23.295043] 128-byte region [ffff88003d326b40, ffff88003d326bc0) [ 23.295734] The buggy address belongs to the page: [ 23.298987] page:ffffea0000f4c980 count:1 mapcount:0 mapping:ffff88003d326000 index:0x0 [ 23.299735] flags: 0x100000000000100(slab) [ 23.300151] raw: 0100000000000100 ffff88003d326000 0000000000000000 0000000100000015 [ 23.300845] raw: ffffea0000f47020 ffffea0000f256a0 ffff88003e800640 0000000000000000 [ 23.301523] page dumped because: kasan: bad access detected [ 23.302003] [ 23.302144] Memory state around the buggy address: [ 23.302567] ffff88003d326a00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.303209] ffff88003d326a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.303848] >ffff88003d326b00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 23.304868] ^ [ 23.305452] ffff88003d326b80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.306098] ffff88003d326c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.306732] ================================================================== [ 23.307381] Disabling lock debugging due to kernel taint [ 23.307885] Kernel panic - not syncing: panic_on_warn set ... [ 23.307885] [ 23.313007] CPU: 2 PID: 3124 Comm: syz-executor0 Tainted: G B 4.14.0-rc5-next-20171018+ #8 [ 23.313887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 [ 23.314600] Call Trace: [ 23.314829] dump_stack+0x194/0x257 [ 23.315132] ? arch_local_irq_restore+0x53/0x53 [ 23.315499] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 23.315858] ? vsnprintf+0x1ed/0x1900 [ 23.316242] ? packet_getsockopt+0xbf0/0xe00 [ 23.316581] panic+0x1e4/0x41c [ 23.316827] ? refcount_error_report+0x214/0x214 [ 23.317251] ? add_taint+0x1c/0x50 [ 23.317517] ? add_taint+0x1c/0x50 [ 23.317785] ? packet_getsockopt+0xc72/0xe00 [ 23.318139] kasan_end_report+0x50/0x50 [ 23.318437] kasan_report+0x144/0x340 [ 23.318723] __asan_report_load8_noabort+0x14/0x20 [ 23.319096] packet_getsockopt+0xc72/0xe00 [ 23.319416] ? packet_notifier+0x950/0x950 [ 23.319730] ? SYSC_perf_event_open+0x4c3/0x2e00 [ 23.320205] ? __fget_light+0x297/0x380 [ 23.320558] ? sock_has_perm+0x29c/0x400 [ 23.320880] ? selinux_secmark_relabel_packet+0xc0/0xc0 [ 23.321274] ? perf_event_set_output+0x5a0/0x5a0 [ 23.321631] ? putname+0xee/0x130 [ 23.321892] ? selinux_socket_getsockopt+0x36/0x40 [ 23.322262] ? security_socket_getsockopt+0x89/0xb0 [ 23.322627] SyS_getsockopt+0x178/0x340 [ 23.322918] ? SyS_setsockopt+0x360/0x360 [ 23.323225] ? entry_SYSCALL_64_fastpath+0x5/0xbe [ 23.323600] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 23.324345] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 23.324715] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 23.325070] RIP: 0033:0x447c89 [ 23.325301] RSP: 002b:00007fed06654bd8 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 23.325853] RAX: ffffffffffffffda RBX: 00007fed066556cc RCX: 0000000000447c89 [ 23.326386] RDX: 0000000000000015 RSI: 0000000000000107 RDI: 0000000000000010 [ 23.326908] RBP: 0000000000000082 R08: 00000000208a5000 R09: 0000000000000000 [ 23.327434] R10: 0000000020ec8000 R11: 0000000000000246 R12: 0000000000000000 [ 23.327970] R13: 0000000000000000 R14: 00007fed066559c0 R15: 00007fed06655700 [ 23.328683] Dumping ftrace buffer: [ 23.328963] (ftrace buffer empty) [ 23.329237] Kernel Offset: disabled [ 23.329505] Rebooting in 86400 seconds..