BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:71 in_atomic(): 1, irqs_disabled(): 0, pid: 11671, name: syz-executor1 2 locks held by syz-executor1/11671: #0: (&vcpu->mutex){+.+.}, at: [] vcpu_load+0x1c/0x70 arch/x86/kvm/../../../virt/kvm/kvm_main.c:154 #1: (&kvm->srcu){....}, at: [] vcpu_enter_guest arch/x86/kvm/x86.c:7021 [inline] #1: (&kvm->srcu){....}, at: [] vcpu_run arch/x86/kvm/x86.c:7100 [inline] #1: (&kvm->srcu){....}, at: [] kvm_arch_vcpu_ioctl_run+0x1bdd/0x5a30 arch/x86/kvm/x86.c:7261 CPU: 1 PID: 11671 Comm: syz-executor1 Not tainted 4.13.0-next-20170911+ #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6012 __might_sleep+0x95/0x190 kernel/sched/core.c:5965 __might_fault+0xab/0x1d0 mm/memory.c:4499 __copy_from_user include/linux/uaccess.h:71 [inline] paging32_walk_addr_generic+0x427/0x1d80 arch/x86/kvm/paging_tmpl.h:369 paging32_walk_addr arch/x86/kvm/paging_tmpl.h:475 [inline] paging32_gva_to_gpa+0xa5/0x230 arch/x86/kvm/paging_tmpl.h:913 kvm_read_guest_virt_helper+0xd8/0x140 arch/x86/kvm/x86.c:4436 kvm_read_guest_virt_system+0x3c/0x50 arch/x86/kvm/x86.c:4503 segmented_read_std+0x10c/0x180 arch/x86/kvm/emulate.c:822 em_fxrstor+0x27b/0x410 arch/x86/kvm/emulate.c:4025 x86_emulate_insn+0x55d/0x3cf0 arch/x86/kvm/emulate.c:5483 x86_emulate_instruction+0x411/0x1ca0 arch/x86/kvm/x86.c:5735 kvm_mmu_page_fault+0x1b0/0x2f0 arch/x86/kvm/mmu.c:4956 handle_ept_violation+0x194/0x540 arch/x86/kvm/vmx.c:6502 vmx_handle_exit+0x24b/0x1a60 arch/x86/kvm/vmx.c:8823 vcpu_enter_guest arch/x86/kvm/x86.c:7038 [inline] vcpu_run arch/x86/kvm/x86.c:7100 [inline] kvm_arch_vcpu_ioctl_run+0x1d36/0x5a30 arch/x86/kvm/x86.c:7261 kvm_vcpu_ioctl+0x64c/0x1010 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2550 vfs_ioctl fs/ioctl.c:45 [inline] do_vfs_ioctl+0x1b1/0x1530 fs/ioctl.c:685 SYSC_ioctl fs/ioctl.c:700 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:691 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x447299 RSP: 002b:00007f6764364c08 EFLAGS: 00000296 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000019 RCX: 0000000000447299 RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000019 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000296 R12: 000000000000001a R13: 0000000000005790 R14: 00000000006e8850 R15: 0000000000000019 device syz7 entered promiscuous mode netlink: 11 bytes leftover after parsing attributes in process `syz-executor4'. device syz7 left promiscuous mode netlink: 11 bytes leftover after parsing attributes in process `syz-executor4'. audit: type=1326 audit(1505131048.902:1975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=11747 comm="syz-executor6" exe="/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 netlink: 1 bytes leftover after parsing attributes in process `syz-executor1'. audit: type=1326 audit(1505131048.969:1976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=11747 comm="syz-executor6" exe="/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 netlink: 1 bytes leftover after parsing attributes in process `syz-executor1'. dccp_v6_rcv: dropped packet with invalid checksum device syz4 left promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): syz4: link becomes ready print_req_error: I/O error, dev loop0, sector 0 buffer_io_error: 120 callbacks suppressed Buffer I/O error on dev loop0, logical block 0, lost async page write IPv6: ADDRCONF(NETDEV_CHANGE): syz4: link becomes ready syz-executor6: vmalloc: allocation failure: 4833356120 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) syz-executor6 cpuset=/ mems_allowed=0-1 CPU: 1 PID: 12144 Comm: syz-executor6 Tainted: G W 4.13.0-next-20170911+ #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 warn_alloc+0x1c2/0x2f0 mm/page_alloc.c:3257 __vmalloc_node_range+0x599/0x730 mm/vmalloc.c:1781 __vmalloc_node mm/vmalloc.c:1810 [inline] __vmalloc_node_flags_caller+0x50/0x60 mm/vmalloc.c:1832 kvmalloc_node+0x82/0xd0 mm/util.c:406 kvmalloc include/linux/mm.h:529 [inline] kvmalloc_array include/linux/mm.h:545 [inline] xt_alloc_entry_offsets+0x21/0x30 net/netfilter/x_tables.c:774 translate_table+0x235/0x1610 net/ipv4/netfilter/ip_tables.c:686 do_replace net/ipv4/netfilter/ip_tables.c:1130 [inline] do_ipt_set_ctl+0x34b/0x5c0 net/ipv4/netfilter/ip_tables.c:1664 nf_sockopt net/netfilter/nf_sockopt.c:105 [inline] nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:114 ip_setsockopt+0xa1/0xb0 net/ipv4/ip_sockglue.c:1251 tcp_setsockopt+0x82/0xd0 net/ipv4/tcp.c:2799 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2960 SYSC_setsockopt net/socket.c:1852 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1831 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x447299 RSP: 002b:00007fa8ddec9c08 EFLAGS: 00000292 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000447299 RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000006 RBP: 0000000000000082 R08: 0000000000000055 R09: 0000000000000000 R10: 0000000020006000 R11: 0000000000000292 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fa8ddeca9c0 R15: 00007fa8ddeca700 warn_alloc_show_mem: 1 callbacks suppressed Mem-Info: active_anon:88975 inactive_anon:43 isolated_anon:0 active_file:3657 inactive_file:4280 isolated_file:0 unevictable:0 dirty:126 writeback:0 unstable:0 slab_reclaimable:6324 slab_unreclaimable:37900 mapped:20726 shmem:52 pagetables:809 bounce:0 free:248993 free_pcp:1036 free_cma:0 Node 0 active_anon:83528kB inactive_anon:84kB active_file:8968kB inactive_file:12692kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:62688kB dirty:172kB writeback:0kB shmem:96kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 1 active_anon:295156kB inactive_anon:88kB active_file:5660kB inactive_file:4428kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:20216kB dirty:332kB writeback:0kB shmem:112kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 22528kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 0 DMA free:15908kB min:640kB low:800kB high:960kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 886 886 886 Node 0 DMA32 free:632668kB min:36536kB low:45668kB high:54800kB active_anon:83528kB inactive_anon:84kB active_file:8968kB inactive_file:17536kB unevictable:0kB writepending:172kB present:1032192kB managed:909784kB mlocked:0kB kernel_stack:3744kB pagetables:1424kB bounce:0kB free_pcp:2076kB local_pcp:624kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 Node 1 DMA32 free:326056kB min:30404kB low:38004kB high:45604kB active_anon:295156kB inactive_anon:88kB active_file:5660kB inactive_file:9448kB unevictable:0kB writepending:332kB present:1048560kB managed:755216kB mlocked:0kB kernel_stack:2112kB pagetables:1940kB bounce:0kB free_pcp:2076kB local_pcp:252kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 67*4kB (UME) 1809*8kB (UME) 1338*16kB (UME) 518*32kB (UME) 366*64kB (UME) 73*128kB (UME) 27*256kB (UM) 23*512kB (UM) 12*1024kB (UME) 2*2048kB (ME) 125*4096kB (UM) = 632564kB Node 1 DMA32: 54*4kB (UE) 2095*8kB (UME) 1242*16kB (UME) 839*32kB (UME) 431*64kB (UME) 48*128kB (UM) 13*256kB (UME) 10*512kB (UM) 7*1024kB (UME) 2*2048kB (UE) 51*4096kB (M) = 326032kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 7988 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 524186 pages RAM 0 pages HighMem/MovableOnly 103959 pages reserved syz-executor6: vmalloc: allocation failure: 4833356120 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) syz-executor6 cpuset=/ mems_allowed=0-1 CPU: 2 PID: 12158 Comm: syz-executor6 Tainted: G W 4.13.0-next-20170911+ #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 warn_alloc+0x1c2/0x2f0 mm/page_alloc.c:3257 __vmalloc_node_range+0x599/0x730 mm/vmalloc.c:1781 __vmalloc_node mm/vmalloc.c:1810 [inline] __vmalloc_node_flags_caller+0x50/0x60 mm/vmalloc.c:1832 kvmalloc_node+0x82/0xd0 mm/util.c:406 kvmalloc include/linux/mm.h:529 [inline] kvmalloc_array include/linux/mm.h:545 [inline] xt_alloc_entry_offsets+0x21/0x30 net/netfilter/x_tables.c:774 translate_table+0x235/0x1610 net/ipv4/netfilter/ip_tables.c:686 do_replace net/ipv4/netfilter/ip_tables.c:1130 [inline] do_ipt_set_ctl+0x34b/0x5c0 net/ipv4/netfilter/ip_tables.c:1664 nf_sockopt net/netfilter/nf_sockopt.c:105 [inline] nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:114 ip_setsockopt+0xa1/0xb0 net/ipv4/ip_sockglue.c:1251 tcp_setsockopt+0x82/0xd0 net/ipv4/tcp.c:2799 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2960 SYSC_setsockopt net/socket.c:1852 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1831 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x447299 RSP: 002b:00007fa8ddea8c08 EFLAGS: 00000292 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000000001b RCX: 0000000000447299 RDX: 0000000000000040 RSI: 0000000000000000 RDI: 000000000000001b RBP: 0000000000000082 R08: 0000000000000055 R09: 0000000000000000 R10: 0000000020006000 R11: 0000000000000292 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fa8ddea99c0 R15: 00007fa8ddea9700 sctp: [Deprecated]: syz-executor6 (pid 12172) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead QAT: Invalid ioctl QAT: Invalid ioctl sctp: [Deprecated]: syz-executor6 (pid 12172) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead QAT: Invalid ioctl QAT: Invalid ioctl device lo entered promiscuous mode device lo left promiscuous mode 9pnet_virtio: no channels available for device ./file0 9pnet_virtio: no channels available for device ./file0 sctp: [Deprecated]: syz-executor6 (pid 12297) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead print_req_error: I/O error, dev loop0, sector 0 sctp: [Deprecated]: syz-executor6 (pid 12327) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead kvm_hv_get_msr: 461 callbacks suppressed kvm [12319]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008f kvm [12319]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008e kvm [12319]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008d kvm [12319]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008c kvm [12319]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008b kvm [12319]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008a kvm [12319]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x40000089 kvm [12319]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x40000088 print_req_error: I/O error, dev loop0, sector 0 kvm [12319]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x40000087 kvm [12319]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x40000086 sctp: [Deprecated]: syz-executor0 (pid 12410) Use of int in maxseg socket option. Use struct sctp_assoc_value instead audit: type=1326 audit(1505131050.231:1977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=12477 comm="syz-executor2" exe="/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 kvm: vcpu 0: requested 159936 ns lapic timer period limited to 500000 ns audit: type=1326 audit(1505131050.293:1978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=12477 comm="syz-executor2" exe="/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 device gre0 entered promiscuous mode *** Guest State *** CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 CR3 = 0x00000000fffbc000 RSP = 0x0000000000000000 RIP = 0x000000000000fff0 RFLAGS=0x00010000 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 GDTR: limit=0x0000ffff, base=0x0000000000000000 LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 IDTR: limit=0x0000ffff, base=0x0000000000000000 TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 EFER = 0x0000000000000000 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 BndCfgS = 0x0000000000000000 Interruptibility = 00000008 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811b8bff RSP = 0xffff8800387874c8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007fa8dde65700 GSBase=ffff88006de00000 TRBase=ffff88003ec23100 GDTBase=ffffffffff577000 IDTBase=ffffffffff57b000 CR0=0000000080050033 CR3=0000000039d75000 CR4=00000000000026e0 Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84d3ec00 EFER = 0x0000000000000d01 PAT = 0x0007040600070406 *** Control State *** PinBased=0000003f CPUBased=b6d9edfe SecondaryExec=000000e2 EntryControls=0001d1ff ExitControls=00afefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=80000b05 errcode=00000080 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000002 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffffd46452b002 EPT pointer = 0x000000006bd6601e Virtual processor ID = 0x0160 audit: type=1326 audit(1505131050.752:1979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=12757 comm="syz-executor1" exe="/syz-executor1" sig=9 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0x0 audit: type=1326 audit(1505131050.826:1980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=12757 comm="syz-executor1" exe="/syz-executor1" sig=9 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0x0 QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pig=12906 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12917 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pig=12918 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12918 comm=syz-executor7 IPv6: Can't replace route, no match found IPv6: Can't replace route, no match found audit: type=1326 audit(1505131051.984:1981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=13141 comm="syz-executor5" exe="/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 device gre0 entered promiscuous mode ================================================================== BUG: KASAN: use-after-free in __write_once_size include/linux/compiler.h:305 [inline] BUG: KASAN: use-after-free in __hlist_del include/linux/list.h:648 [inline] BUG: KASAN: use-after-free in detach_timer kernel/time/timer.c:791 [inline] BUG: KASAN: use-after-free in detach_if_pending+0x557/0x610 kernel/time/timer.c:808 Write of size 8 at addr ffff880067ab3cc0 by task syz-executor1/13199 CPU: 2 PID: 13199 Comm: syz-executor1 Tainted: G W 4.13.0-next-20170911+ #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 print_address_description+0x73/0x250 mm/kasan/report.c:252 kasan_report_error mm/kasan/report.c:351 [inline] kasan_report+0x24e/0x340 mm/kasan/report.c:409 __asan_report_store8_noabort+0x17/0x20 mm/kasan/report.c:435 __write_once_size include/linux/compiler.h:305 [inline] __hlist_del include/linux/list.h:648 [inline] detach_timer kernel/time/timer.c:791 [inline] detach_if_pending+0x557/0x610 kernel/time/timer.c:808 try_to_del_timer_sync+0xa2/0x120 kernel/time/timer.c:1182 del_timer_sync+0x18a/0x240 kernel/time/timer.c:1247 tun_flow_uninit drivers/net/tun.c:1104 [inline] tun_free_netdev+0x105/0x1b0 drivers/net/tun.c:1776 netdev_run_todo+0x870/0xca0 net/core/dev.c:7864 rtnl_unlock+0xe/0x10 net/core/rtnetlink.c:106 tun_detach drivers/net/tun.c:588 [inline] tun_chr_close+0x49/0x60 drivers/net/tun.c:2609 __fput+0x333/0x7f0 fs/file_table.c:210 ____fput+0x15/0x20 fs/file_table.c:244 task_work_run+0x199/0x270 kernel/task_work.c:112 exit_task_work include/linux/task_work.h:21 [inline] do_exit+0xa52/0x1b40 kernel/exit.c:865 do_group_exit+0x149/0x400 kernel/exit.c:968 get_signal+0x7e8/0x17e0 kernel/signal.c:2334 do_signal+0x94/0x1ee0 arch/x86/kernel/signal.c:808 exit_to_usermode_loop+0x224/0x300 arch/x86/entry/common.c:158 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath+0x42f/0x500 arch/x86/entry/common.c:266 entry_SYSCALL_64_fastpath+0xbc/0xbe RIP: 0033:0x447299 RSP: 002b:00007f6764364cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000000 RBX: 0000000000708028 RCX: 0000000000447299 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000708028 RBP: 0000000000708000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f67643659c0 R15: 00007f6764365700 Allocated by task 13216: save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:59 save_stack+0x43/0xd0 mm/kasan/kasan.c:447 set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0xad/0xe0 mm/kasan/kasan.c:551 __do_kmalloc_node mm/slab.c:3689 [inline] __kmalloc_node+0x47/0x70 mm/slab.c:3696 kmalloc_node include/linux/slab.h:535 [inline] kvmalloc_node+0x64/0xd0 mm/util.c:397 kvmalloc include/linux/mm.h:529 [inline] kvzalloc include/linux/mm.h:537 [inline] alloc_netdev_mqs+0x16e/0xed0 net/core/dev.c:8018 tun_set_iff drivers/net/tun.c:2022 [inline] __tun_chr_ioctl+0x12be/0x3d20 drivers/net/tun.c:2276 tun_chr_ioctl+0x2a/0x40 drivers/net/tun.c:2521 vfs_ioctl fs/ioctl.c:45 [inline] do_vfs_ioctl+0x1b1/0x1530 fs/ioctl.c:685 SYSC_ioctl fs/ioctl.c:700 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:691 entry_SYSCALL_64_fastpath+0x1f/0xbe Freed by task 13216: save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:59 save_stack+0x43/0xd0 mm/kasan/kasan.c:447 set_track mm/kasan/kasan.c:459 [inline] kasan_slab_free+0x71/0xc0 mm/kasan/kasan.c:524 __cache_free mm/slab.c:3503 [inline] kfree+0xca/0x250 mm/slab.c:3820 kvfree+0x36/0x60 mm/util.c:416 netdev_freemem net/core/dev.c:7970 [inline] free_netdev+0x2cf/0x360 net/core/dev.c:8132 tun_set_iff drivers/net/tun.c:2105 [inline] __tun_chr_ioctl+0x2cf6/0x3d20 drivers/net/tun.c:2276 tun_chr_ioctl+0x2a/0x40 drivers/net/tun.c:2521 vfs_ioctl fs/ioctl.c:45 [inline] do_vfs_ioctl+0x1b1/0x1530 fs/ioctl.c:685 SYSC_ioctl fs/ioctl.c:700 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:691 entry_SYSCALL_64_fastpath+0x1f/0xbe The buggy address belongs to the object at ffff880067ab08c0 which belongs to the cache kmalloc-16384 of size 16384 The buggy address is located 13312 bytes inside of 16384-byte region [ffff880067ab08c0, ffff880067ab48c0) The buggy address belongs to the page: page:ffffea00019eac00 count:1 mapcount:0 mapping:ffff880067ab08c0 index:0x0 compound_mapcount: 0 flags: 0x500000000008100(slab|head) raw: 0500000000008100 ffff880067ab08c0 0000000000000000 0000000100000001 raw: ffffea0001485a20 ffffea00019ede20 ffff88003e802200 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff880067ab3b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff880067ab3c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff880067ab3c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff880067ab3d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff880067ab3d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ==================================================================