device syz7 left promiscuous mode device syz7 entered promiscuous mode ================================================================== BUG: KASAN: use-after-free in tick_sched_handle+0x149/0x160 kernel/time/tick-sched.c:152 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 0 PID: 1331 Comm: kworker/0:2 Not tainted 4.13.0-rc5-next-20170816+ #4 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8801d2a4c500 task.stack: ffff8801d29b0000 RIP: 0010:__switch_to+0x8f2/0x1310 arch/x86/kernel/process_64.c:520 RSP: 0018:ffff8801d29b76a0 EFLAGS: 00010092 RAX: ffff8801cde761c0 RBX: ffff8801d8734644 RCX: 0000000000000000 RDX: 1ffff10039bcec38 RSI: 0000000000000001 RDI: ffffed003a536ec8 RBP: ffff8801d8734648 R08: 0000000000000001 R09: 1ffff10033fe5efb R10: 0000001650af8d63 R11: 0000000000000000 R12: ffff8801c8e9a240 R13: ffff8801c5bfd440 R14: 0000000000000000 R15: ffff8801d2a4c500 FS: 0000000000000000(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000130 CR3: 000000019fe90000 CR4: 00000000001426f0 Call Trace: Code: c7 41 24 00 00 00 00 48 83 e7 f8 48 29 f9 83 c1 2c c1 e9 03 f3 48 ab 48 81 c4 98 01 00 00 4c 89 e0 5b 41 5c 41 5d 41 5e 41 5f 5d e9 33 05 00 00 b8 2b 00 00 00 8e e0 41 8e e7 e9 74 fb ff ff RIP: __switch_to+0x8f2/0x1310 arch/x86/kernel/process_64.c:520 RSP: ffff8801d29b76a0 ---[ end trace ce6b4ee8aca4852a ]--- Kernel panic - not syncing: Fatal exception Read of size 8 at addr ffff8801d2959a00 by task syz-executor1/14182 CPU: 1 PID: 14182 Comm: syz-executor1 Tainted: G D 4.13.0-rc5-next-20170816+ #4 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 print_address_description+0x73/0x250 mm/kasan/report.c:252 kasan_report_error mm/kasan/report.c:351 [inline] kasan_report+0x24e/0x340 mm/kasan/report.c:409 __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:430 tick_sched_handle+0x149/0x160 kernel/time/tick-sched.c:152 tick_sched_timer+0x42/0x120 kernel/time/tick-sched.c:1190 __run_hrtimer kernel/time/hrtimer.c:1213 [inline] __hrtimer_run_queues+0x349/0xe10 kernel/time/hrtimer.c:1277 hrtimer_interrupt+0x1c2/0x5e0 kernel/time/hrtimer.c:1311 local_apic_timer_interrupt+0x6b/0xa0 arch/x86/kernel/apic/apic.c:1019 smp_apic_timer_interrupt+0x71/0xa0 arch/x86/kernel/apic/apic.c:1043 apic_timer_interrupt+0x9d/0xb0 arch/x86/entry/entry_64.S:783 The buggy address belongs to the page: page:ffffea00074a5640 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0x200000000000000() raw: 0200000000000000 0000000000000000 0000000000000000 00000000ffffffff raw: dead000000000100 dead000000000200 0000000000000000 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801d2959900: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff8801d2959980: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff8801d2959a00: ff ff ff ff ff ff ff ff ff f1 f1 f1 f1 f8 f2 f2 ^ ffff8801d2959a80: f2 f2 f2 f2 f2 00 f2 f2 f2 f2 f2 f2 f2 00 f2 f2 ffff8801d2959b00: f2 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 ================================================================== Shutting down cpus with NMI Dumping ftrace buffer: (ftrace buffer empty) Kernel Offset: disabled Rebooting in 86400 seconds..