INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added 'ci-upstream-mmots-kasan-gce-9,10.128.0.15' (ECDSA) to the list of known hosts. 2017/09/22 01:32:42 parsed 1 programs 2017/09/22 01:32:42 executed programs: 0 syzkaller login: [ 43.647768] ================================================================== [ 43.655190] BUG: KASAN: use-after-free in packet_getsockopt+0xc72/0xe00 [ 43.661916] Read of size 8 at addr ffff8801d10a43d8 by task syz-executor4/3195 [ 43.669244] [ 43.670847] CPU: 1 PID: 3195 Comm: syz-executor4 Not tainted 4.13.0-mm1+ #7 [ 43.677915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 43.687241] Call Trace: [ 43.689803] dump_stack+0x194/0x257 [ 43.693408] ? arch_local_irq_restore+0x53/0x53 [ 43.698049] ? show_regs_print_info+0x65/0x65 [ 43.702518] ? lock_release+0xd70/0xd70 [ 43.706469] ? packet_getsockopt+0xc72/0xe00 [ 43.710852] print_address_description+0x73/0x250 [ 43.715667] ? packet_getsockopt+0xc72/0xe00 [ 43.720048] kasan_report+0x24e/0x340 [ 43.723823] __asan_report_load8_noabort+0x14/0x20 [ 43.728721] packet_getsockopt+0xc72/0xe00 [ 43.732931] ? packet_notifier+0x950/0x950 [ 43.737139] ? SYSC_perf_event_open+0x4c3/0x2e00 [ 43.741880] ? __fget_light+0x29d/0x390 [ 43.745827] ? sock_has_perm+0x29c/0x400 [ 43.749866] ? selinux_tun_dev_create+0xc0/0xc0 [ 43.754509] ? perf_event_set_output+0x5a0/0x5a0 [ 43.759241] ? exit_to_usermode_loop+0x98/0x300 [ 43.763887] ? trace_hardirqs_off+0xd/0x10 [ 43.768093] ? exit_to_usermode_loop+0x1a8/0x300 [ 43.772826] ? selinux_socket_getsockopt+0x36/0x40 [ 43.777731] ? security_socket_getsockopt+0x89/0xb0 [ 43.782723] SyS_getsockopt+0x178/0x340 [ 43.786671] ? SyS_setsockopt+0x360/0x360 [ 43.790794] ? entry_SYSCALL_64_fastpath+0x5/0xbe [ 43.795609] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 43.800597] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 43.805330] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 43.810055] RIP: 0033:0x4520a9 [ 43.813216] RSP: 002b:00007f48bbf57c08 EFLAGS: 00000216 ORIG_RAX: 0000000000000037 [ 43.820897] RAX: ffffffffffffffda RBX: 00000000007180b0 RCX: 00000000004520a9 [ 43.828137] RDX: 0000000000000015 RSI: 0000000000000107 RDI: 000000000000000c [ 43.835376] RBP: 0000000000000082 R08: 00000000208a5000 R09: 0000000000000000 [ 43.842615] R10: 0000000020ec8000 R11: 0000000000000216 R12: 00000000004ba8d7 [ 43.849856] R13: 00000000ffffffff R14: 0000000020940000 R15: 0000000000000000 [ 43.857112] [ 43.858710] Allocated by task 3193: [ 43.862307] save_stack_trace+0x16/0x20 [ 43.866253] save_stack+0x43/0xd0 [ 43.869676] kasan_kmalloc+0xad/0xe0 [ 43.873362] kmem_cache_alloc_trace+0x136/0x750 [ 43.878002] fanout_add+0x345/0x1190 [ 43.881683] packet_setsockopt+0xfdc/0x1e80 [ 43.885976] SyS_setsockopt+0x189/0x360 [ 43.889919] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 43.894642] [ 43.896240] Freed by task 3193: [ 43.899488] save_stack_trace+0x16/0x20 [ 43.903431] save_stack+0x43/0xd0 [ 43.906852] kasan_slab_free+0x71/0xc0 [ 43.910708] kfree+0xca/0x250 [ 43.913784] fanout_add+0x2d0/0x1190 [ 43.917468] packet_setsockopt+0xfdc/0x1e80 [ 43.921758] SyS_setsockopt+0x189/0x360 [ 43.925699] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 43.930423] [ 43.932021] The buggy address belongs to the object at ffff8801d10a43c0 [ 43.932021] which belongs to the cache kmalloc-128 of size 128 [ 43.944644] The buggy address is located 24 bytes inside of [ 43.944644] 128-byte region [ffff8801d10a43c0, ffff8801d10a4440) [ 43.956400] The buggy address belongs to the page: [ 43.961310] page:ffffea0007442900 count:1 mapcount:0 mapping:ffff8801d10a4000 index:0x0 [ 43.969427] flags: 0x200000000000100(slab) [ 43.973633] raw: 0200000000000100 ffff8801d10a4000 0000000000000000 0000000100000015 [ 43.981482] raw: ffffea0007437ae0 ffffea0007393da0 ffff8801dac00640 0000000000000000 [ 43.989331] page dumped because: kasan: bad access detected [ 43.995007] [ 43.996605] Memory state around the buggy address: [ 44.001509] ffff8801d10a4280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 44.008839] ffff8801d10a4300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.016166] >ffff8801d10a4380: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 44.023495] ^ [ 44.029696] ffff8801d10a4400: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.037025] ffff8801d10a4480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 44.044351] ================================================================== [ 44.051676] Disabling lock debugging due to kernel taint [ 44.057175] Kernel panic - not syncing: panic_on_warn set ... [ 44.057175] [ 44.064508] CPU: 1 PID: 3195 Comm: syz-executor4 Tainted: G B 4.13.0-mm1+ #7 [ 44.072784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 44.082103] Call Trace: [ 44.084660] dump_stack+0x194/0x257 [ 44.088253] ? arch_local_irq_restore+0x53/0x53 [ 44.092890] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 44.097613] ? packet_getsockopt+0xc40/0xe00 [ 44.101988] panic+0x1e4/0x417 [ 44.105146] ? __warn+0x1d9/0x1d9 [ 44.108571] ? packet_getsockopt+0xc72/0xe00 [ 44.112946] kasan_end_report+0x50/0x50 [ 44.116886] kasan_report+0x137/0x340 [ 44.120652] __asan_report_load8_noabort+0x14/0x20 [ 44.125545] packet_getsockopt+0xc72/0xe00 [ 44.129747] ? packet_notifier+0x950/0x950 [ 44.133947] ? SYSC_perf_event_open+0x4c3/0x2e00 [ 44.138671] ? __fget_light+0x29d/0x390 [ 44.142612] ? sock_has_perm+0x29c/0x400 [ 44.146640] ? selinux_tun_dev_create+0xc0/0xc0 [ 44.151274] ? perf_event_set_output+0x5a0/0x5a0 [ 44.156001] ? exit_to_usermode_loop+0x98/0x300 [ 44.160638] ? trace_hardirqs_off+0xd/0x10 [ 44.164838] ? exit_to_usermode_loop+0x1a8/0x300 [ 44.169563] ? selinux_socket_getsockopt+0x36/0x40 [ 44.174459] ? security_socket_getsockopt+0x89/0xb0 [ 44.179444] SyS_getsockopt+0x178/0x340 [ 44.183389] ? SyS_setsockopt+0x360/0x360 [ 44.187503] ? entry_SYSCALL_64_fastpath+0x5/0xbe [ 44.192320] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 44.197300] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 44.202024] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 44.206745] RIP: 0033:0x4520a9 [ 44.209902] RSP: 002b:00007f48bbf57c08 EFLAGS: 00000216 ORIG_RAX: 0000000000000037 [ 44.217573] RAX: ffffffffffffffda RBX: 00000000007180b0 RCX: 00000000004520a9 [ 44.224809] RDX: 0000000000000015 RSI: 0000000000000107 RDI: 000000000000000c [ 44.232044] RBP: 0000000000000082 R08: 00000000208a5000 R09: 0000000000000000 [ 44.239278] R10: 0000000020ec8000 R11: 0000000000000216 R12: 00000000004ba8d7 [ 44.246513] R13: 00000000ffffffff R14: 0000000020940000 R15: 0000000000000000 [ 44.253793] Dumping ftrace buffer: [ 44.257302] (ftrace buffer empty) [ 44.260978] Kernel Offset: disabled [ 44.264572] Rebooting in 86400 seconds..