device lo entered promiscuous mode ================================================================== BUG: KASAN: slab-out-of-bounds in pfkey_msg2xfrm_state net/key/af_key.c:1227 [inline] BUG: KASAN: slab-out-of-bounds in pfkey_add+0x145d/0x3220 net/key/af_key.c:1506 Read of size 3104 at addr ffff8800b8dbe7c0 by task syz-executor0/11079 CPU: 1 PID: 11079 Comm: syz-executor0 Not tainted 4.4.136-gfb7e319 #59 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 e2723084791c8a29 ffff8800ad93f740 ffffffff81e0edad ffffea0002e36f80 ffff8800b8dbe7c0 0000000000000000 ffff8800b8dbe980 ffff8800b8dbe780 ffff8800ad93f778 ffffffff815159b6 ffff8800b8dbe7c0 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] print_address_description+0x6c/0x216 mm/kasan/report.c:252 [] kasan_report_error mm/kasan/report.c:351 [inline] [] kasan_report.cold.7+0x175/0x2f7 mm/kasan/report.c:408 [] check_memory_region_inline mm/kasan/kasan.c:325 [inline] [] check_memory_region+0x14f/0x1b0 mm/kasan/kasan.c:332 [] memcpy+0x23/0x50 mm/kasan/kasan.c:367 [] pfkey_msg2xfrm_state net/key/af_key.c:1227 [inline] [] pfkey_add+0x145d/0x3220 net/key/af_key.c:1506 [] pfkey_process+0x671/0x740 net/key/af_key.c:2834 [] pfkey_sendmsg+0x346/0xae0 net/key/af_key.c:3678 [] sock_sendmsg_nosec net/socket.c:625 [inline] [] sock_sendmsg+0xcc/0x110 net/socket.c:635 [] ___sys_sendmsg+0x745/0x880 net/socket.c:1962 [] __sys_sendmsg+0xd6/0x190 net/socket.c:1996 [] SYSC_sendmsg net/socket.c:2007 [inline] [] SyS_sendmsg+0x2d/0x50 net/socket.c:2003 [] entry_SYSCALL_64_fastpath+0x22/0x9e Allocated by task 11079: [] save_stack_trace+0x26/0x50 arch/x86/kernel/stacktrace.c:63 [] save_stack+0x43/0xd0 mm/kasan/kasan.c:512 [] set_track mm/kasan/kasan.c:524 [inline] [] kasan_kmalloc+0xc7/0xe0 mm/kasan/kasan.c:616 [] kasan_krealloc+0x64/0x80 mm/kasan/kasan.c:654 [] ksize+0x8a/0xf0 mm/slub.c:3727 [] __alloc_skb+0x133/0x600 net/core/skbuff.c:237 [] alloc_skb include/linux/skbuff.h:815 [inline] [] pfkey_sendmsg+0xfe/0xae0 net/key/af_key.c:3665 [] sock_sendmsg_nosec net/socket.c:625 [inline] [] sock_sendmsg+0xcc/0x110 net/socket.c:635 [] ___sys_sendmsg+0x745/0x880 net/socket.c:1962 [] __sys_sendmsg+0xd6/0x190 net/socket.c:1996 [] SYSC_sendmsg net/socket.c:2007 [inline] [] SyS_sendmsg+0x2d/0x50 net/socket.c:2003 [] entry_SYSCALL_64_fastpath+0x22/0x9e Freed by task 2026: [] save_stack_trace+0x26/0x50 arch/x86/kernel/stacktrace.c:63 [] save_stack+0x43/0xd0 mm/kasan/kasan.c:512 [] set_track mm/kasan/kasan.c:524 [inline] [] kasan_slab_free+0x72/0xc0 mm/kasan/kasan.c:589 [] slab_free_hook mm/slub.c:1383 [inline] [] slab_free_freelist_hook mm/slub.c:1405 [inline] [] slab_free mm/slub.c:2859 [inline] [] kfree+0xf4/0x310 mm/slub.c:3749 [] skb_free_head net/core/skbuff.c:571 [inline] [] skb_release_data+0x304/0x3b0 net/core/skbuff.c:602 [] skb_release_all+0x4a/0x60 net/core/skbuff.c:661 [] __kfree_skb net/core/skbuff.c:675 [inline] [] consume_skb+0xf3/0x3d0 net/core/skbuff.c:748 [] netlink_broadcast_filtered+0x2b2/0x9c0 net/netlink/af_netlink.c:1479 [] kobject_uevent_env+0x6d8/0xb80 lib/kobject_uevent.c:316 [] kobject_uevent+0x1f/0x30 lib/kobject_uevent.c:374 [] uevent_store+0x8a/0xe0 drivers/base/core.c:420 [] dev_attr_store+0x5e/0x90 drivers/base/core.c:137 [] sysfs_kf_write+0x114/0x180 fs/sysfs/file.c:141 [] kernfs_fop_write+0x2b3/0x400 fs/kernfs/file.c:312 [] __vfs_write+0x11c/0x3f0 fs/read_write.c:489 [] vfs_write+0x191/0x4e0 fs/read_write.c:538 [] SYSC_write fs/read_write.c:585 [inline] [] SyS_write+0xd9/0x1c0 fs/read_write.c:577 [] entry_SYSCALL_64_fastpath+0x22/0x9e The buggy address belongs to the object at ffff8800b8dbe780 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 64 bytes inside of 512-byte region [ffff8800b8dbe780, ffff8800b8dbe980) The buggy address belongs to the page: ================================= [ INFO: inconsistent lock state ] 4.4.136-gfb7e319 #59 Not tainted --------------------------------- inconsistent {IN-SOFTIRQ-R} -> {SOFTIRQ-ON-W} usage. syz-executor0/3918 [HC0[0]:SC0[0]:HE1:SE1] takes: (&(&n->hh.hh_lock)->seqcount){+.+-..}, at: [] i_mmap_lock_write include/linux/fs.h:520 [inline] (&(&n->hh.hh_lock)->seqcount){+.+-..}, at: [] unlink_file_vma+0x75/0xb0 mm/mmap.c:273 {IN-SOFTIRQ-R} state was registered at: [] mark_irqflags kernel/locking/lockdep.c:2799 [inline] [] __lock_acquire+0x10a1/0x5270 kernel/locking/lockdep.c:3169 [] lock_acquire+0x15e/0x450 kernel/locking/lockdep.c:3592 [] seqcount_lockdep_reader_access include/linux/seqlock.h:80 [inline] [] read_seqcount_begin include/linux/seqlock.h:163 [inline] [] read_seqbegin include/linux/seqlock.h:430 [inline] [] neigh_hh_output include/net/neighbour.h:455 [inline] [] dst_neigh_output include/net/dst.h:459 [inline] [] ip6_finish_output2+0xf35/0x1ca0 net/ipv6/ip6_output.c:113 [] ip6_finish_output+0x3b8/0x760 net/ipv6/ip6_output.c:131 [] NF_HOOK_COND include/linux/netfilter.h:240 [inline] [] ip6_output+0x1b8/0x520 net/ipv6/ip6_output.c:145 [] dst_output include/net/dst.h:498 [inline] [] NF_HOOK_THRESH.constprop.41+0x11f/0x310 include/linux/netfilter.h:226 [] NF_HOOK include/linux/netfilter.h:249 [inline] [] mld_sendpack+0x649/0xbd0 net/ipv6/mcast.c:1646 [] mld_send_cr net/ipv6/mcast.c:1932 [inline] [] mld_ifc_timer_expire+0x3ba/0x740 net/ipv6/mcast.c:2430 [] call_timer_fn+0x18c/0x870 kernel/time/timer.c:1185 [] __run_timers kernel/time/timer.c:1261 [inline] [] run_timer_softirq+0x642/0xb90 kernel/time/timer.c:1444 [] __do_softirq+0x22c/0xa1a kernel/softirq.c:273 [] invoke_softirq kernel/softirq.c:350 [inline] [] irq_exit+0x10d/0x140 kernel/softirq.c:391 [] exiting_irq arch/x86/include/asm/apic.h:653 [inline] [] smp_apic_timer_interrupt+0x81/0xa0 arch/x86/kernel/apic/apic.c:926 [] apic_timer_interrupt+0xa0/0xb0 arch/x86/entry/entry_64.S:741 [] arch_safe_halt arch/x86/include/asm/paravirt.h:117 [inline] [] default_idle+0x55/0x3c0 arch/x86/kernel/process.c:290 [] arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:281 [] default_idle_call+0x57/0x70 kernel/sched/idle.c:93 [] cpuidle_idle_call kernel/sched/idle.c:157 [inline] [] cpu_idle_loop kernel/sched/idle.c:253 [inline] [] cpu_startup_entry+0x6af/0x780 kernel/sched/idle.c:301 [] rest_init+0x188/0x18e init/main.c:410 [] start_kernel+0x6b3/0x6e7 init/main.c:682 [] x86_64_start_reservations+0x29/0x2b arch/x86/kernel/head64.c:196 [] x86_64_start_kernel+0x13f/0x162 arch/x86/kernel/head64.c:185 irq event stamp: 784011 hardirqs last enabled at (784011): [] buffered_rmqueue mm/page_alloc.c:2339 [inline] hardirqs last enabled at (784011): [] get_page_from_freelist+0x798/0x1a60 mm/page_alloc.c:2661 hardirqs last disabled at (784010): [] buffered_rmqueue mm/page_alloc.c:2283 [inline] hardirqs last disabled at (784010): [] get_page_from_freelist+0x4b0/0x1a60 mm/page_alloc.c:2661 softirqs last enabled at (783854): [] __do_softirq+0x4df/0xa1a kernel/softirq.c:299 softirqs last disabled at (783843): [] invoke_softirq kernel/softirq.c:350 [inline] softirqs last disabled at (783843): [] irq_exit+0x10d/0x140 kernel/softirq.c:391 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&(&n->hh.hh_lock)->seqcount); lock(&(&n->hh.hh_lock)->seqcount); *** DEADLOCK *** no locks held by syz-executor0/3918. stack backtrace: CPU: 0 PID: 3918 Comm: syz-executor0 Not tainted 4.4.136-gfb7e319 #59 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 c3133ed6b53d28a3 ffff8801bc847878 ffffffff81e0edad ffff8801d6d20000 ffffffff853e6ce0 ffff8801d6d208e0 ffff8801d6d20900 0000000000000001 ffff8801bc8478e8 ffffffff8140fa6f 0000000000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] print_usage_bug.cold.55+0x327/0x421 kernel/locking/lockdep.c:2267 [] valid_state kernel/locking/lockdep.c:2280 [inline] [] mark_lock_irq kernel/locking/lockdep.c:2493 [inline] [] mark_lock+0x2f2/0x1280 kernel/locking/lockdep.c:2933 [] mark_irqflags kernel/locking/lockdep.c:2817 [inline] [] __lock_acquire+0x112e/0x5270 kernel/locking/lockdep.c:3169 [] lock_acquire+0x15e/0x450 kernel/locking/lockdep.c:3592 [] down_write+0x41/0xa0 kernel/locking/rwsem.c:49 [] i_mmap_lock_write include/linux/fs.h:520 [inline] [] unlink_file_vma+0x75/0xb0 mm/mmap.c:273 [] free_pgtables+0xee/0x330 mm/memory.c:541 [] exit_mmap+0x1d8/0x3a0 mm/mmap.c:2928 [] __mmput kernel/fork.c:715 [inline] [] mmput+0xf8/0x2d0 kernel/fork.c:735 [] exit_mm kernel/exit.c:444 [inline] [] do_exit+0x8d8/0x26b0 kernel/exit.c:746 [] do_group_exit+0x111/0x330 kernel/exit.c:889 [] SYSC_exit_group kernel/exit.c:900 [inline] [] SyS_exit_group+0x1d/0x20 kernel/exit.c:898 [] entry_SYSCALL_64_fastpath+0x22/0x9e BUG: unable to handle kernel paging request at fffffffd4b808900 IP: [] cpuacct_charge+0x155/0x380 kernel/sched/cpuacct.c:247 PGD 440f067 PUD 0 Oops: 0000 [#1] PREEMPT SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 0 PID: 3918 Comm: syz-executor0 Not tainted 4.4.136-gfb7e319 #59 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8801d6d20000 task.stack: ffff8801bc840000 RIP: 0010:[] [] cpuacct_charge+0x155/0x380 kernel/sched/cpuacct.c:247 RSP: 0018:ffff8801db207a00 EFLAGS: 00010046 RAX: 1ffffffff089500f RBX: 0000000000018528 RCX: ffffffff84a14d00 RDX: fffffbffa9701120 RSI: fffffffd4b808900 RDI: ffffffff844a8078 RBP: ffff8801db207a40 R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000000000 R11: ffff8801d6d20000 R12: ffffffff844a7fa0 R13: dffffc0000000000 R14: 000000002602bc38 R15: ffffffffb8dbe780 FS: 0000000000000000(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffd4b808900 CR3: 00000000baeb3000 CR4: 00000000001606f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffffffff81224bc0 ffffffff811f10ac ffff88021fffd01b ffff8801d6ad8060 ffff8801d6ad8000 000000002602bc38 ffff8801d6ad80b0 0000000000000000 ffff8801db207a88 ffffffff811d9239 0000000000000005 ffff8801db31f4d8 Call Trace: [] update_curr+0x2c9/0x6d0 kernel/sched/fair.c:882 [] enqueue_entity kernel/sched/fair.c:3512 [inline] [] enqueue_task_fair+0x2fa/0x2790 kernel/sched/fair.c:4695 [] enqueue_task kernel/sched/core.c:858 [inline] [] activate_task+0x14d/0x280 kernel/sched/core.c:874 [] ttwu_activate kernel/sched/core.c:1736 [inline] [] ttwu_do_activate.constprop.109+0xbf/0x1e0 kernel/sched/core.c:1789 [] ttwu_queue kernel/sched/core.c:1934 [inline] [] try_to_wake_up+0x660/0xf00 kernel/sched/core.c:2068 [] default_wake_function+0x35/0x50 kernel/sched/core.c:3498 [] autoremove_wake_function+0x13/0x90 kernel/sched/wait.c:293 [] __wake_up_common+0xb6/0x150 kernel/sched/wait.c:73 [] __wake_up+0x34/0x50 kernel/sched/wait.c:95 [] wake_up_klogd_work_func+0x80/0x90 kernel/printk/printk.c:2736 [] irq_work_run_list+0xd7/0x140 kernel/irq_work.c:156 [] irq_work_tick+0x116/0x170 kernel/irq_work.c:182 [] update_process_times+0x69/0x70 kernel/time/timer.c:1430 [] tick_sched_handle.isra.15+0x55/0xf0 kernel/time/tick-sched.c:151 [] tick_sched_timer+0x72/0x120 kernel/time/tick-sched.c:1097 [] __run_hrtimer kernel/time/hrtimer.c:1261 [inline] [] __hrtimer_run_queues+0x3ad/0x1000 kernel/time/hrtimer.c:1325 [] hrtimer_interrupt+0x1b1/0x430 kernel/time/hrtimer.c:1359 [] local_apic_timer_interrupt+0x74/0xa0 arch/x86/kernel/apic/apic.c:901 [] smp_apic_timer_interrupt+0x7c/0xa0 arch/x86/kernel/apic/apic.c:925 [] apic_timer_interrupt+0xa0/0xb0 arch/x86/entry/entry_64.S:741 [] down_write+0x41/0xa0 kernel/locking/rwsem.c:49 [] i_mmap_lock_write include/linux/fs.h:520 [inline] [] unlink_file_vma+0x75/0xb0 mm/mmap.c:273 [] free_pgtables+0xee/0x330 mm/memory.c:541 [] exit_mmap+0x1d8/0x3a0 mm/mmap.c:2928 [] __mmput kernel/fork.c:715 [inline] [] mmput+0xf8/0x2d0 kernel/fork.c:735 [] exit_mm kernel/exit.c:444 [inline] [] do_exit+0x8d8/0x26b0 kernel/exit.c:746 [] do_group_exit+0x111/0x330 kernel/exit.c:889 [] SYSC_exit_group kernel/exit.c:900 [inline] [] SyS_exit_group+0x1d/0x20 kernel/exit.c:898 [] entry_SYSCALL_64_fastpath+0x22/0x9e Code: 49 8d bc 24 d8 00 00 00 48 89 f8 48 c1 e8 03 42 80 3c 28 00 0f 85 c4 01 00 00 49 8b 9c 24 d8 00 00 00 80 3a 00 0f 85 8f 01 00 00 <4a> 03 1c f9 48 89 d8 48 c1 e8 03 42 80 3c 28 00 0f 85 be 01 00 RIP [] cpuacct_charge+0x155/0x380 kernel/sched/cpuacct.c:247 RSP CR2: fffffffd4b808900 ---[ end trace 80c510ec26f8703a ]---