[....] Starting enhanced syslogd: rsyslogd[ 11.184863] audit: type=1400 audit(1514746901.210:5): avc: denied { syslog } for pid=2999 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 16.312486] audit: type=1400 audit(1514746906.338:6): avc: denied { map } for pid=3138 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.4' (ECDSA) to the list of known hosts. [ 30.302799] audit: type=1400 audit(1514746920.328:7): avc: denied { map } for pid=3155 comm="syzkaller937981" path="/root/syzkaller937981273" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 30.307834] ================================================================== [ 30.307853] BUG: KASAN: slab-out-of-bounds in cap_inode_getsecurity+0x621/0x7d0 [ 30.307858] Read of size 4 at addr ffff8801c8d0cc40 by task syzkaller937981/3155 [ 30.307859] [ 30.307866] CPU: 0 PID: 3155 Comm: syzkaller937981 Not tainted 4.15.0-rc4-next-20171221+ #78 [ 30.307870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.307872] Call Trace: [ 30.307882] dump_stack+0x194/0x257 [ 30.307890] ? arch_local_irq_restore+0x53/0x53 [ 30.307898] ? show_regs_print_info+0x18/0x18 [ 30.307908] ? dput.part.23+0x207/0x830 [ 30.307914] ? cap_inode_getsecurity+0x621/0x7d0 [ 30.307922] print_address_description+0x73/0x250 [ 30.307927] ? cap_inode_getsecurity+0x621/0x7d0 [ 30.307933] kasan_report+0x25b/0x340 [ 30.307942] __asan_report_load4_noabort+0x14/0x20 [ 30.307947] cap_inode_getsecurity+0x621/0x7d0 [ 30.307953] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 30.307961] ? rootid_owns_currentns+0x150/0x150 [ 30.307970] ? __might_sleep+0x95/0x190 [ 30.307982] security_inode_getsecurity+0xcd/0x110 [ 30.307986] ? security_inode_getsecurity+0xcd/0x110 [ 30.307997] xattr_getsecurity+0xd3/0x1f0 [ 30.308009] ? xattr_permission+0x260/0x260 [ 30.308018] ? security_inode_getxattr+0xdd/0x120 [ 30.308027] vfs_getxattr+0xc8/0x110 [ 30.308036] getxattr+0x116/0x2a0 [ 30.308043] ? path_listxattr+0x150/0x150 [ 30.308051] ? strncpy_from_user+0x323/0x430 [ 30.308061] ? mpi_resize+0x200/0x200 [ 30.308078] ? getname_flags+0x256/0x580 [ 30.308087] ? user_path_at_empty+0x40/0x50 [ 30.308097] path_getxattr+0xed/0x170 [ 30.308106] ? getxattr+0x2a0/0x2a0 [ 30.308116] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 30.308126] SyS_getxattr+0x33/0x40 [ 30.308135] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 30.308139] RIP: 0033:0x43fd09 [ 30.308142] RSP: 002b:00007ffee6309898 EFLAGS: 00000217 ORIG_RAX: 00000000000000bf [ 30.308147] RAX: ffffffffffffffda RBX: 0030656c69662f2e RCX: 000000000043fd09 [ 30.308150] RDX: 0000000020227f74 RSI: 0000000020b29f57 RDI: 000000002072d000 [ 30.308153] RBP: 00000000006ca018 R08: 0000000000000000 R09: 0000000000000000 [ 30.308155] R10: 000000000000008c R11: 0000000000000217 R12: 0000000000401670 [ 30.308158] R13: 0000000000401700 R14: 0000000000000000 R15: 0000000000000000 [ 30.308175] [ 30.308177] Allocated by task 3155: [ 30.308182] save_stack+0x43/0xd0 [ 30.308185] kasan_kmalloc+0xad/0xe0 [ 30.308189] __kmalloc_track_caller+0x15e/0x760 [ 30.308194] krealloc+0x65/0xc0 [ 30.308198] vfs_getxattr_alloc+0x177/0x270 [ 30.308201] cap_inode_getsecurity+0xfa/0x7d0 [ 30.308204] security_inode_getsecurity+0xcd/0x110 [ 30.308208] xattr_getsecurity+0xd3/0x1f0 [ 30.308212] vfs_getxattr+0xc8/0x110 [ 30.308215] getxattr+0x116/0x2a0 [ 30.308218] path_getxattr+0xed/0x170 [ 30.308222] SyS_getxattr+0x33/0x40 [ 30.308225] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 30.308226] [ 30.308228] Freed by task 1693: [ 30.308232] save_stack+0x43/0xd0 [ 30.308235] kasan_slab_free+0x71/0xc0 [ 30.308238] kfree+0xd6/0x260 [ 30.308243] security_context_to_sid_core+0x182/0x5a0 [ 30.308247] security_context_to_sid+0x32/0x40 [ 30.308252] selinux_inode_setxattr+0x3a2/0xa60 [ 30.308255] security_inode_setxattr+0xf3/0x170 [ 30.308259] vfs_setxattr+0xa0/0xe0 [ 30.308262] setxattr+0x319/0x400 [ 30.308265] path_setxattr+0x198/0x1e0 [ 30.308269] SyS_lsetxattr+0x38/0x50 [ 30.308272] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 30.308274] [ 30.308277] The buggy address belongs to the object at ffff8801c8d0cc40 [ 30.308277] which belongs to the cache kmalloc-32 of size 32 [ 30.308280] The buggy address is located 0 bytes inside of [ 30.308280] 32-byte region [ffff8801c8d0cc40, ffff8801c8d0cc60) [ 30.308282] The buggy address belongs to the page: [ 30.308286] page:00000000fc227142 count:1 mapcount:0 mapping:00000000434ec1ae index:0xffff8801c8d0cfc1 [ 30.308290] flags: 0x2fffc0000000100(slab) [ 30.308297] raw: 02fffc0000000100 ffff8801c8d0c000 ffff8801c8d0cfc1 000000010000003f [ 30.308301] raw: ffffea0007264720 ffffea000726d620 ffff8801dac001c0 0000000000000000 [ 30.308303] page dumped because: kasan: bad access detected [ 30.308304] [ 30.308306] Memory state around the buggy address: [ 30.308309] ffff8801c8d0cb00: 00 00 00 fc fc fc fc fc fb fb fb fb fc fc fc fc [ 30.308313] ffff8801c8d0cb80: 00 00 00 fc fc fc fc fc fb fb fb fb fc fc fc fc [ 30.308316] >ffff8801c8d0cc00: 00 00 01 fc fc fc fc fc 01 fc fc fc fc fc fc fc [ 30.308317] ^ [ 30.308320] ffff8801c8d0cc80: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 30.308323] ffff8801c8d0cd00: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 30.308325] ================================================================== [ 30.308326] Disabling lock debugging due to kernel taint [ 30.308345] Kernel panic - not syncing: panic_on_warn set ... [ 30.308345] [ 30.308349] CPU: 0 PID: 3155 Comm: syzkaller937981 Tainted: G B 4.15.0-rc4-next-20171221+ #78 [ 30.308351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.308352] Call Trace: [ 30.308356] dump_stack+0x194/0x257 [ 30.308362] ? arch_local_irq_restore+0x53/0x53 [ 30.308369] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 30.308374] ? vsnprintf+0x1ed/0x1900 [ 30.308378] ? cap_inode_getsecurity+0x5d0/0x7d0 [ 30.308384] panic+0x1e4/0x41c [ 30.308388] ? refcount_error_report+0x214/0x214 [ 30.308394] ? add_taint+0x1c/0x50 [ 30.308398] ? add_taint+0x1c/0x50 [ 30.308404] ? cap_inode_getsecurity+0x621/0x7d0 [ 30.308408] kasan_end_report+0x50/0x50 [ 30.308412] kasan_report+0x144/0x340 [ 30.308418] __asan_report_load4_noabort+0x14/0x20 [ 30.308422] cap_inode_getsecurity+0x621/0x7d0 [ 30.308426] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 30.308431] ? rootid_owns_currentns+0x150/0x150 [ 30.308437] ? __might_sleep+0x95/0x190 [ 30.308444] security_inode_getsecurity+0xcd/0x110 [ 30.308448] ? security_inode_getsecurity+0xcd/0x110 [ 30.308454] xattr_getsecurity+0xd3/0x1f0 [ 30.308460] ? xattr_permission+0x260/0x260 [ 30.308467] ? security_inode_getxattr+0xdd/0x120 [ 30.308473] vfs_getxattr+0xc8/0x110 [ 30.308479] getxattr+0x116/0x2a0 [ 30.308484] ? path_listxattr+0x150/0x150 [ 30.308489] ? strncpy_from_user+0x323/0x430 [ 30.308496] ? mpi_resize+0x200/0x200 [ 30.308506] ? getname_flags+0x256/0x580 [ 30.308512] ? user_path_at_empty+0x40/0x50 [ 30.308519] path_getxattr+0xed/0x170 [ 30.308525] ? getxattr+0x2a0/0x2a0 [ 30.308531] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 30.308537] SyS_getxattr+0x33/0x40 [ 30.308543] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 30.308545] RIP: 0033:0x43fd09 [ 30.308547] RSP: 002b:00007ffee6309898 EFLAGS: 00000217 ORIG_RAX: 00000000000000bf [ 30.308551] RAX: ffffffffffffffda RBX: 0030656c69662f2e RCX: 000000000043fd09 [ 30.308553] RDX: 0000000020227f74 RSI: 0000000020b29f57 RDI: 000000002072d000 [ 30.308556] RBP: 00000000006ca018 R08: 0000000000000000 R09: 0000000000000000 [ 30.308558] R10: 000000000000008c R11: 0000000000000217 R12: 0000000000401670 [ 30.308560] R13: 0000000000401700 R14: 0000000000000000 R15: 0000000000000000 [ 30.328674] Dumping ftrace buffer: [ 30.328678] (ftrace buffer empty) [ 30.328680] Kernel Offset: disabled [ 31.017977] Rebooting in 86400 seconds..