Warning: Permanently added '10.128.1.14' (ECDSA) to the list of known hosts. [* ] A start job is running for dev-ttyS0.device (9s / 1min 30s) [** ] A start job is running for dev-ttyS0.device (10s / 1min 30s) [*** ] A start job is running for dev-ttyS0.device (10s / 1min 30s) [ *** ] A start job is running for dev-ttyS0.device (11s / 1min 30s) [ *** ] A start job is running for dev-ttyS0.device (11s / 1min 30s) [ ***] A start job is running for dev-ttyS0.device (12s / 1min 30s) [ **] A start job is running for dev-ttyS0.device (13s / 1min 30s) [ *] A start job is running for dev-ttyS0.device (13s / 1min 30s) [ **] A start job is running for dev-ttyS0.device (14s / 1min 30s) [ ***] A start job is running for dev-ttyS0.device (14s / 1min 30s) [ *** ] A start job is running for dev-ttyS0.device (15s / 1min 30s) [ *** ] A start job is running for dev-ttyS0.device (16s / 1min 30s) [*** ] A start job is running for dev-ttyS0.device (16s / 1min 30s) [** ] A start job is running for dev-ttyS0.device (17s / 1min 30s) [* ] A start job is running for dev-ttyS0.device (18s / 1min 30s) [** ] A start job is running for dev-ttyS0.device (18s / 1min 30s) [*** ] A start job is running for dev-ttyS0.device (19s / 1min 30s) [ *** ] A start job is running for dev-ttyS0.device (19s / 1min 30s) [ *** ] A start job is running for dev-ttyS0.device (20s / 1min 30s)[ 27.842538][ T22] audit: type=1400 audit(1597526910.333:8): avc: denied { execmem } for pid=341 comm="syz-executor918" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ ***] A start job is running for dev-ttyS0.device (21s / 1min 30s) [ **] A start job is running for dev-ttyS0.device (21s / 1min 30s) [ *] A start job is running for dev-ttyS0.device (22s / 1min 30s) [ **] A start job is running for dev-ttyS0.device (23s / 1min 30s) [ ***] A start job is running for dev-ttyS0.device (23s / 1min 30s) [ *** ] A start job is running for dev-ttyS0.device (24s / 1min 30s) [ *** ] A start job is running for dev-ttyS0.device (24s / 1min 30s) [*** ] A start job is running for dev-ttyS0.device (25s / 1min 30s) [** ] A start job is running for dev-ttyS0.device (26s / 1min 30s)[ 33.444358][ T2948] ================================================================== [ 33.452454][ T2948] BUG: KASAN: use-after-free in free_netdev+0x176/0x300 [ 33.459365][ T2948] Read of size 8 at addr ffff8881d4214538 by task syz-executor918/2948 [ 33.467569][ T2948] [ 33.469887][ T2948] CPU: 0 PID: 2948 Comm: syz-executor918 Not tainted 5.4.58-syzkaller-00210-gc3221b7ac740 #0 [ 33.479999][ T2948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.490022][ T2948] Call Trace: [ 33.493312][ T2948] dump_stack+0x14a/0x1ce [ 33.497614][ T2948] ? show_regs_print_info+0x12/0x12 [ 33.502781][ T2948] ? printk+0xd2/0x114 [ 33.506823][ T2948] print_address_description+0x93/0x620 [ 33.512340][ T2948] ? slab_free_freelist_hook+0xd0/0x150 [ 33.517878][ T2948] ? call_rcu+0x10/0x10 [ 33.522003][ T2948] __kasan_report+0x16d/0x1e0 [ 33.526669][ T2948] ? free_netdev+0x176/0x300 [ 33.532362][ T2948] kasan_report+0x36/0x60 [ 33.536680][ T2948] free_netdev+0x176/0x300 [ 33.541065][ T2948] netdev_run_todo+0xc38/0xe90 [ 33.545802][ T2948] ? netdev_refcnt_read+0x1a0/0x1a0 [ 33.550974][ T2948] ? mutex_trylock+0xb0/0xb0 [ 33.555549][ T2948] rtnetlink_rcv_msg+0x9a0/0xc60 [ 33.560478][ T2948] ? is_bpf_text_address+0x290/0x2b0 [ 33.565739][ T2948] ? rtnetlink_bind+0x80/0x80 [ 33.570387][ T2948] ? unwind_get_return_address+0x48/0x90 [ 33.576014][ T2948] ? arch_stack_walk+0xd8/0x120 [ 33.580949][ T2948] ? stack_trace_save+0x123/0x1f0 [ 33.585943][ T2948] ? stack_trace_snprint+0x150/0x150 [ 33.591198][ T2948] ? _raw_spin_lock_bh+0xa4/0x180 [ 33.596192][ T2948] ? rhashtable_jhash2+0x1cf/0x2f0 [ 33.601287][ T2948] ? jhash+0x740/0x740 [ 33.605326][ T2948] ? rht_key_hashfn+0x157/0x240 [ 33.610155][ T2948] ? deferred_put_nlk_sk+0x210/0x210 [ 33.615423][ T2948] ? netlink_sendmsg+0x77b/0xd80 [ 33.620328][ T2948] ? jhash+0x740/0x740 [ 33.624369][ T2948] ? netlink_hash+0xd0/0xd0 [ 33.628861][ T2948] ? __rcu_read_lock+0x50/0x50 [ 33.633595][ T2948] netlink_rcv_skb+0x200/0x480 [ 33.638329][ T2948] ? rtnetlink_bind+0x80/0x80 [ 33.642975][ T2948] ? netlink_ack+0xa90/0xa90 [ 33.647621][ T2948] ? __rcu_read_lock+0x50/0x50 [ 33.652372][ T2948] ? selinux_vm_enough_memory+0x170/0x170 [ 33.658065][ T2948] ? netlink_trim+0x10a/0x230 [ 33.662711][ T2948] netlink_unicast+0x8ad/0xa50 [ 33.667448][ T2948] ? netlink_detachskb+0x60/0x60 [ 33.672353][ T2948] ? __virt_addr_valid+0x1fd/0x290 [ 33.677434][ T2948] netlink_sendmsg+0x9de/0xd80 [ 33.682167][ T2948] ? netlink_getsockopt+0x8e0/0x8e0 [ 33.687334][ T2948] ? import_iovec+0x1c2/0x380 [ 33.691979][ T2948] ? security_socket_sendmsg+0xad/0xc0 [ 33.697405][ T2948] ? netlink_getsockopt+0x8e0/0x8e0 [ 33.702572][ T2948] ____sys_sendmsg+0x58a/0x8d0 [ 33.707323][ T2948] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 33.712502][ T2948] ? percpu_counter_add_batch+0x12d/0x150 [ 33.718305][ T2948] __sys_sendmsg+0x2d5/0x3c0 [ 33.722907][ T2948] ? ____sys_sendmsg+0x8d0/0x8d0 [ 33.727826][ T2948] ? find_next_zero_bit+0xfb/0x120 [ 33.732914][ T2948] ? sock_alloc_file+0x14a/0x230 [ 33.737825][ T2948] ? fput_many+0x42/0x1a0 [ 33.742125][ T2948] do_syscall_64+0xcb/0x150 [ 33.746602][ T2948] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 33.752463][ T2948] RIP: 0033:0x44a099 [ 33.756416][ T2948] Code: e8 9c e6 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 04 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 33.776002][ T2948] RSP: 002b:00007f725d5e3d98 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 33.784380][ T2948] RAX: ffffffffffffffda RBX: 00000000006e0c68 RCX: 000000000044a099 [ 33.792324][ T2948] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005 [ 33.800267][ T2948] RBP: 00000000006e0c60 R08: 0000000000000000 R09: 0000000000000000 [ 33.808227][ T2948] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006e0c6c [ 33.816169][ T2948] R13: 0000000000006f6c R14: 0000000000000000 R15: 0000000000000000 [ 33.824110][ T2948] [ 33.826410][ T2948] Allocated by task 2948: [ 33.830710][ T2948] __kasan_kmalloc+0x12c/0x1c0 [ 33.835443][ T2948] __kmalloc+0xf7/0x2d0 [ 33.839567][ T2948] sk_prot_alloc+0xd6/0x290 [ 33.844038][ T2948] sk_alloc+0x33/0x340 [ 33.848077][ T2948] tun_chr_open+0x77/0x4a0 [ 33.852482][ T2948] misc_open+0x356/0x3d0 [ 33.856708][ T2948] chrdev_open+0x585/0x640 [ 33.861094][ T2948] do_dentry_open+0x8f7/0x1070 [ 33.865840][ T2948] path_openat+0x12db/0x3d10 [ 33.870399][ T2948] do_filp_open+0x20d/0x440 [ 33.874872][ T2948] do_sys_open+0x387/0x7d0 [ 33.879375][ T2948] do_syscall_64+0xcb/0x150 [ 33.883862][ T2948] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 33.889727][ T2948] [ 33.892028][ T2948] Freed by task 2947: [ 33.896001][ T2948] __kasan_slab_free+0x181/0x230 [ 33.900911][ T2948] slab_free_freelist_hook+0xd0/0x150 [ 33.906248][ T2948] kfree+0x12b/0x600 [ 33.910111][ T2948] __sk_destruct+0x3f9/0x480 [ 33.914668][ T2948] tun_chr_close+0xb4/0xd0 [ 33.919051][ T2948] __fput+0x27d/0x6c0 [ 33.923001][ T2948] task_work_run+0x176/0x1a0 [ 33.927561][ T2948] prepare_exit_to_usermode+0x286/0x2e0 [ 33.933074][ T2948] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 33.938931][ T2948] [ 33.941232][ T2948] The buggy address belongs to the object at ffff8881d4214000 [ 33.941232][ T2948] which belongs to the cache kmalloc-2k of size 2048 [ 33.955252][ T2948] The buggy address is located 1336 bytes inside of [ 33.955252][ T2948] 2048-byte region [ffff8881d4214000, ffff8881d4214800) [ 33.968661][ T2948] The buggy address belongs to the page: [ 33.974263][ T2948] page:ffffea0007508400 refcount:1 mapcount:0 mapping:ffff8881da80c000 index:0x0 compound_mapcount: 0 [ 33.985157][ T2948] flags: 0x8000000000010200(slab|head) [ 33.990587][ T2948] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881da80c000 [ 33.999139][ T2948] raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000 [ 34.007687][ T2948] page dumped because: kasan: bad access detected [ 34.014067][ T2948] [ 34.016367][ T2948] Memory state around the buggy address: [ 34.021966][ T2948] ffff8881d4214400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.029997][ T2948] ffff8881d4214480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.038120][ T2948] >ffff8881d4214500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb executing program executing program executing program executing program executing program executing program [ 34.046147][ T2948] ^ [ 34.052005][ T2948] ffff8881d4214580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.060033][ T2948] ffff8881d4214600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.068061][ T2948] ================================================================== [ 34.076106][ T2948] Disabling lock debugging due to kernel taint executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program