INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added 'ci-upstream-kasan-gce-2,10.128.0.47' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 31.690522] ================================================================== [ 31.691625] BUG: KASAN: double-free or invalid-free in selinux_tun_dev_free_security+0x15/0x20 [ 31.692793] [ 31.693027] CPU: 0 PID: 3001 Comm: syzkaller751022 Not tainted 4.13.0-rc5+ #43 [ 31.694001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 31.695235] Call Trace: [ 31.695593] dump_stack+0x194/0x257 [ 31.696087] ? arch_local_irq_restore+0x53/0x53 [ 31.696754] ? show_regs_print_info+0x65/0x65 [ 31.697383] ? mark_held_locks+0xaf/0x100 [ 31.697944] ? selinux_tun_dev_free_security+0x15/0x20 [ 31.698648] print_address_description+0x73/0x250 [ 31.699337] ? selinux_tun_dev_free_security+0x15/0x20 [ 31.700034] ? selinux_tun_dev_free_security+0x15/0x20 [ 31.700772] kasan_report_double_free+0x55/0x80 [ 31.701394] kasan_slab_free+0xa3/0xc0 [ 31.701915] kfree+0xca/0x250 [ 31.702339] selinux_tun_dev_free_security+0x15/0x20 [ 31.703016] security_tun_dev_free_security+0x48/0x80 [ 31.703710] __tun_chr_ioctl+0x2ce6/0x3d50 [ 31.704306] ? tun_select_queue+0x580/0x580 [ 31.704888] ? check_noncircular+0x20/0x20 [ 31.705461] ? __handle_mm_fault+0x577/0x3860 [ 31.706073] ? check_noncircular+0x20/0x20 [ 31.706667] ? check_noncircular+0x20/0x20 [ 31.707250] ? __pmd_alloc+0x4e0/0x4e0 [ 31.707788] ? check_same_owner+0x320/0x320 [ 31.708378] ? handle_mm_fault+0x23e/0x860 [ 31.708952] ? tun_chr_compat_ioctl+0x30/0x30 [ 31.709561] tun_chr_ioctl+0x2a/0x40 [ 31.710079] ? tun_chr_ioctl+0x2a/0x40 [ 31.710603] do_vfs_ioctl+0x1b1/0x1520 [ 31.711128] ? ioctl_preallocate+0x2b0/0x2b0 [ 31.715506] ? selinux_capable+0x40/0x40 [ 31.719540] ? __handle_mm_fault+0x3860/0x3860 [ 31.724099] ? security_file_ioctl+0x7d/0xb0 [ 31.728471] ? security_file_ioctl+0x89/0xb0 [ 31.732848] SyS_ioctl+0x8f/0xc0 [ 31.736193] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 31.740925] RIP: 0033:0x443e39 [ 31.744080] RSP: 002b:00007ffcb70cea98 EFLAGS: 00000217 ORIG_RAX: 0000000000000010 [ 31.751752] RAX: ffffffffffffffda RBX: 00000000004002e0 RCX: 0000000000443e39 [ 31.758991] RDX: 0000000020533000 RSI: 00000000400454ca RDI: 0000000000000004 [ 31.766228] RBP: 0000000000000086 R08: 0000000000000000 R09: 0000000000000000 [ 31.773461] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000401b20 [ 31.780696] R13: 0000000000401bb0 R14: 0000000000000000 R15: 0000000000000000 [ 31.787946] [ 31.789539] Allocated by task 3001: [ 31.793135] save_stack_trace+0x16/0x20 [ 31.797077] save_stack+0x43/0xd0 [ 31.800493] kasan_kmalloc+0xad/0xe0 [ 31.804173] kmem_cache_alloc_trace+0x12f/0x740 [ 31.808808] selinux_tun_dev_alloc_security+0x49/0x170 [ 31.814051] security_tun_dev_alloc_security+0x6d/0xa0 [ 31.819297] __tun_chr_ioctl+0x1730/0x3d50 [ 31.823496] tun_chr_ioctl+0x2a/0x40 [ 31.827177] do_vfs_ioctl+0x1b1/0x1520 [ 31.831027] SyS_ioctl+0x8f/0xc0 [ 31.834361] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 31.839076] [ 31.840667] Freed by task 3001: [ 31.843909] save_stack_trace+0x16/0x20 [ 31.847847] save_stack+0x43/0xd0 [ 31.851264] kasan_slab_free+0x71/0xc0 [ 31.855115] kfree+0xca/0x250 [ 31.858182] selinux_tun_dev_free_security+0x15/0x20 [ 31.863247] security_tun_dev_free_security+0x48/0x80 [ 31.868407] tun_free_netdev+0x13b/0x1b0 [ 31.872434] register_netdevice+0x8d0/0xee0 [ 31.876719] __tun_chr_ioctl+0x1caf/0x3d50 [ 31.880918] tun_chr_ioctl+0x2a/0x40 [ 31.884595] do_vfs_ioctl+0x1b1/0x1520 [ 31.888445] SyS_ioctl+0x8f/0xc0 [ 31.891776] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 31.896491] [ 31.898084] The buggy address belongs to the object at ffff8801d2254f00 [ 31.898084] which belongs to the cache kmalloc-32 of size 32 [ 31.910530] The buggy address is located 0 bytes inside of [ 31.910530] 32-byte region [ffff8801d2254f00, ffff8801d2254f20) [ 31.922105] The buggy address belongs to the page: [ 31.927000] page:ffffea0007489500 count:1 mapcount:0 mapping:ffff8801d2254000 index:0xffff8801d2254fc1 [ 31.936409] flags: 0x200000000000100(slab) [ 31.940611] raw: 0200000000000100 ffff8801d2254000 ffff8801d2254fc1 0000000100000039 [ 31.948456] raw: ffff8801dac01238 ffffea000749bba0 ffff8801dac001c0 0000000000000000 [ 31.956298] page dumped because: kasan: bad access detected [ 31.961970] [ 31.963562] Memory state around the buggy address: [ 31.968457] ffff8801d2254e00: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 31.975781] ffff8801d2254e80: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 31.983106] >ffff8801d2254f00: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 31.990429] ^ [ 31.993758] ffff8801d2254f80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 32.001088] ffff8801d2255000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.008412] ================================================================== [ 32.015733] Disabling lock debugging due to kernel taint [ 32.021144] Kernel panic - not syncing: panic_on_warn set ... [ 32.021144] [ 32.028468] CPU: 0 PID: 3001 Comm: syzkaller751022 Tainted: G B 4.13.0-rc5+ #43 [ 32.037012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 32.046328] Call Trace: [ 32.048881] dump_stack+0x194/0x257 [ 32.052473] ? arch_local_irq_restore+0x53/0x53 [ 32.057107] ? kasan_end_report+0x32/0x50 [ 32.061221] ? lock_downgrade+0x990/0x990 [ 32.065364] panic+0x1e4/0x417 [ 32.068521] ? __warn+0x1d9/0x1d9 [ 32.071953] ? selinux_tun_dev_free_security+0x15/0x20 [ 32.077199] ? selinux_tun_dev_free_security+0x15/0x20 [ 32.082449] kasan_end_report+0x50/0x50 [ 32.086394] kasan_report_double_free+0x72/0x80 [ 32.091026] kasan_slab_free+0xa3/0xc0 [ 32.094880] kfree+0xca/0x250 [ 32.097953] selinux_tun_dev_free_security+0x15/0x20 [ 32.103020] security_tun_dev_free_security+0x48/0x80 [ 32.108175] __tun_chr_ioctl+0x2ce6/0x3d50 [ 32.112382] ? tun_select_queue+0x580/0x580 [ 32.116669] ? check_noncircular+0x20/0x20 [ 32.120872] ? __handle_mm_fault+0x577/0x3860 [ 32.125334] ? check_noncircular+0x20/0x20 [ 32.129533] ? check_noncircular+0x20/0x20 [ 32.133729] ? __pmd_alloc+0x4e0/0x4e0 [ 32.137590] ? check_same_owner+0x320/0x320 [ 32.141874] ? handle_mm_fault+0x23e/0x860 [ 32.146077] ? tun_chr_compat_ioctl+0x30/0x30 [ 32.150533] tun_chr_ioctl+0x2a/0x40 [ 32.154209] ? tun_chr_ioctl+0x2a/0x40 [ 32.158065] do_vfs_ioctl+0x1b1/0x1520 [ 32.161920] ? ioctl_preallocate+0x2b0/0x2b0 [ 32.166295] ? selinux_capable+0x40/0x40 [ 32.170324] ? __handle_mm_fault+0x3860/0x3860 [ 32.174877] ? security_file_ioctl+0x7d/0xb0 [ 32.179248] ? security_file_ioctl+0x89/0xb0 [ 32.183621] SyS_ioctl+0x8f/0xc0 [ 32.186956] entry_SYSCALL_64_fastpath+0x1f/0xbe [ 32.191673] RIP: 0033:0x443e39 [ 32.194825] RSP: 002b:00007ffcb70cea98 EFLAGS: 00000217 ORIG_RAX: 0000000000000010 [ 32.202498] RAX: ffffffffffffffda RBX: 00000000004002e0 RCX: 0000000000443e39 [ 32.209731] RDX: 0000000020533000 RSI: 00000000400454ca RDI: 0000000000000004 [ 32.216965] RBP: 0000000000000086 R08: 0000000000000000 R09: 0000000000000000 [ 32.224196] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000401b20 [ 32.231431] R13: 0000000000401bb0 R14: 0000000000000000 R15: 0000000000000000 [ 32.238703] Dumping ftrace buffer: [ 32.242209] (ftrace buffer empty) [ 32.245891] Kernel Offset: disabled [ 32.249483] Rebooting in 86400 seconds..