[....] Starting enhanced syslogd: rsyslogd[ 10.884522] audit: type=1400 audit(1516393795.316:4): avc: denied { syslog } for pid=3170 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.39' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 32.659670] ================================================================== [ 32.660761] BUG: KASAN: slab-out-of-bounds in sg_remove_request+0x103/0x120 [ 32.661736] Read of size 8 at addr ffff8801caf44140 by task syzkaller113041/3335 [ 32.662952] [ 32.663188] CPU: 0 PID: 3335 Comm: syzkaller113041 Not tainted 4.9.77-g9c3804b #17 [ 32.664257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 32.665494] ffff8801c90bfab0 ffffffff81d941c9 ffffea00072bd100 ffff8801caf44140 [ 32.666829] 0000000000000000 ffff8801caf44140 ffff8801c8f9c438 ffff8801c90bfae8 [ 32.668278] ffffffff8153db93 ffff8801caf44140 0000000000000008 0000000000000000 [ 32.669520] Call Trace: [ 32.669881] [] dump_stack+0xc1/0x128 [ 32.670819] [] print_address_description+0x73/0x280 [ 32.671791] [] kasan_report+0x275/0x360 [ 32.672548] [] ? sg_remove_request+0x103/0x120 [ 32.673437] [] __asan_report_load8_noabort+0x14/0x20 [ 32.674495] [] sg_remove_request+0x103/0x120 [ 32.675331] [] sg_finish_rem_req+0x295/0x340 [ 32.676132] [] sg_read+0xa1c/0x1440 [ 32.676835] [] ? sg_proc_seq_show_debug+0xd10/0xd10 [ 32.677799] [] ? debug_check_no_locks_freed+0x2c0/0x2c0 [ 32.678776] [] ? fasync_helper+0x37/0xb0 [ 32.679562] [] ? sg_proc_seq_show_debug+0xd10/0xd10 [ 32.685272] [] __vfs_read+0x103/0x670 [ 32.690777] [] ? default_llseek+0x290/0x290 [ 32.696717] [] ? fsnotify+0x86/0xf30 [ 32.702052] [] ? fsnotify+0xf30/0xf30 [ 32.707481] [] ? avc_policy_seqno+0x9/0x20 [ 32.713332] [] ? selinux_file_permission+0x82/0x460 [ 32.719976] [] ? security_file_permission+0x89/0x1e0 [ 32.726702] [] ? rw_verify_area+0xe5/0x2b0 [ 32.732554] [] vfs_read+0x11e/0x380 [ 32.737803] [] SyS_read+0xd9/0x1b0 [ 32.742962] [] ? vfs_copy_file_range+0x740/0x740 [ 32.749357] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 32.756173] [] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 32.762721] [] entry_SYSCALL_64_fastpath+0x29/0xe8 [ 32.769269] [ 32.770867] Allocated by task 0: [ 32.774201] (stack is not available) [ 32.777880] [ 32.779483] Freed by task 0: [ 32.782466] (stack is not available) [ 32.786156] [ 32.787761] The buggy address belongs to the object at ffff8801caf44100 [ 32.787761] which belongs to the cache fasync_cache of size 96 [ 32.800732] The buggy address is located 64 bytes inside of [ 32.800732] 96-byte region [ffff8801caf44100, ffff8801caf44160) [ 32.812401] The buggy address belongs to the page: [ 32.817300] page:ffffea00072bd100 count:1 mapcount:0 mapping: (null) index:0x0 [ 32.825530] flags: 0x8000000000000080(slab) [ 32.829929] page dumped because: kasan: bad access detected [ 32.835607] [ 32.837212] Memory state around the buggy address: [ 32.842110] ffff8801caf44000: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 32.849448] ffff8801caf44080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.856780] >ffff8801caf44100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.864108] ^ [ 32.869537] ffff8801caf44180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.877135] ffff8801caf44200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.884549] ================================================================== [ 32.891877] Disabling lock debugging due to kernel taint [ 32.897413] Kernel panic - not syncing: panic_on_warn set ... [ 32.897413] [ 32.904845] CPU: 0 PID: 3335 Comm: syzkaller113041 Tainted: G B 4.9.77-g9c3804b #17 [ 32.913737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 32.923064] ffff8801c90bfa08 ffffffff81d941c9 ffffffff841970ff ffff8801c90bfae0 [ 32.931045] 0000000000000000 ffff8801caf44140 ffff8801c8f9c438 ffff8801c90bfad0 [ 32.939032] ffffffff8142f3c1 0000000041b58ab3 ffffffff8418ab70 ffffffff8142f205 [ 32.947025] Call Trace: [ 32.949585] [] dump_stack+0xc1/0x128 [ 32.954925] [] panic+0x1bc/0x3a8 [ 32.959913] [] ? percpu_up_read_preempt_enable.constprop.53+0xd7/0xd7 [ 32.968115] [] ? preempt_schedule+0x25/0x30 [ 32.974057] [] ? ___preempt_schedule+0x16/0x18 [ 32.980272] [] kasan_end_report+0x50/0x50 [ 32.986040] [] kasan_report+0x167/0x360 [ 32.991638] [] ? sg_remove_request+0x103/0x120 [ 32.997843] [] __asan_report_load8_noabort+0x14/0x20 [ 33.004574] [] sg_remove_request+0x103/0x120 [ 33.010602] [] sg_finish_rem_req+0x295/0x340 [ 33.016630] [] sg_read+0xa1c/0x1440 [ 33.021877] [] ? sg_proc_seq_show_debug+0xd10/0xd10 [ 33.028607] [] ? debug_check_no_locks_freed+0x2c0/0x2c0 [ 33.035593] [] ? fasync_helper+0x37/0xb0 [ 33.041274] [] ? sg_proc_seq_show_debug+0xd10/0xd10 [ 33.047911] [] __vfs_read+0x103/0x670 [ 33.053333] [] ? default_llseek+0x290/0x290 [ 33.059276] [] ? fsnotify+0x86/0xf30 [ 33.064613] [] ? fsnotify+0xf30/0xf30 [ 33.070047] [] ? avc_policy_seqno+0x9/0x20 [ 33.075908] [] ? selinux_file_permission+0x82/0x460 [ 33.082547] [] ? security_file_permission+0x89/0x1e0 [ 33.089272] [] ? rw_verify_area+0xe5/0x2b0 [ 33.095128] [] vfs_read+0x11e/0x380 [ 33.100385] [] SyS_read+0xd9/0x1b0 [ 33.105547] [] ? vfs_copy_file_range+0x740/0x740 [ 33.111934] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 33.118748] [] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 33.125390] [] entry_SYSCALL_64_fastpath+0x29/0xe8 [ 33.132350] Dumping ftrace buffer: [ 33.135870] (ftrace buffer empty) [ 33.139549] Kernel Offset: disabled [ 33.143150] Rebooting in 86400 seconds..