[ 10.345649] audit: type=1400 audit(1514693128.862:5): avc: denied { syslog } for pid=2987 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 16.451945] audit: type=1400 audit(1514693134.968:6): avc: denied { map } for pid=3130 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.9' (ECDSA) to the list of known hosts. executing program [ 29.255479] audit: type=1400 audit(1514693147.772:7): avc: denied { map } for pid=3146 comm="syzkaller769484" path="/root/syzkaller769484980" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 29.281401] audit: type=1400 audit(1514693147.775:8): avc: denied { sys_admin } for pid=3146 comm="syzkaller769484" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 29.311471] audit: type=1400 audit(1514693147.828:9): avc: denied { sys_chroot } for pid=3147 comm="syzkaller769484" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 29.317706] device syz0 entered promiscuous mode [ 29.340748] audit: type=1400 audit(1514693147.830:10): avc: denied { net_raw } for pid=3147 comm="syzkaller769484" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 29.365153] audit: type=1400 audit(1514693147.832:11): avc: denied { net_admin } for pid=3147 comm="syzkaller769484" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 29.400498] ================================================================== [ 29.407894] BUG: KASAN: use-after-free in __dev_queue_xmit+0x20d3/0x2200 [ 29.414706] Read of size 2 at addr ffff8801cb360d38 by task syzkaller769484/3147 [ 29.422208] [ 29.423804] CPU: 0 PID: 3147 Comm: syzkaller769484 Not tainted 4.15.0-rc4-mm1+ #49 [ 29.431479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 29.440797] Call Trace: [ 29.443357] dump_stack+0x194/0x257 [ 29.446961] ? arch_local_irq_restore+0x53/0x53 [ 29.451701] ? show_regs_print_info+0x18/0x18 [ 29.456196] ? lock_release+0xa40/0xa40 [ 29.460139] ? __dev_queue_xmit+0x20d3/0x2200 [ 29.464605] print_address_description+0x73/0x250 [ 29.469414] ? __dev_queue_xmit+0x20d3/0x2200 [ 29.473877] kasan_report+0x23b/0x360 [ 29.477651] __asan_report_load2_noabort+0x14/0x20 [ 29.482826] __dev_queue_xmit+0x20d3/0x2200 [ 29.487157] ? netdev_pick_tx+0x300/0x300 [ 29.491280] ? lock_release+0xa40/0xa40 [ 29.495227] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 29.501082] ? refcount_add+0x24/0x60 [ 29.504876] ? skb_set_owner_w+0x232/0x330 [ 29.509086] ? __might_sleep+0x95/0x190 [ 29.513029] ? kasan_check_write+0x14/0x20 [ 29.517251] ? copyin+0x91/0xb0 [ 29.520503] ? _copy_from_iter+0x367/0xf30 [ 29.524706] ? __check_object_size+0x25d/0x4f0 [ 29.529257] ? check_stack_object+0x140/0x140 [ 29.533724] ? copy_page_to_iter+0xe00/0xe00 [ 29.538103] ? _copy_from_iter_full+0x22b/0xbb0 [ 29.542763] ? skb_copy_datagram_from_iter+0x3a5/0x5a0 [ 29.548019] ? iov_iter_advance+0x13f0/0x13f0 [ 29.552492] dev_queue_xmit+0x17/0x20 [ 29.556262] packet_sendmsg+0x3ad5/0x60a0 [ 29.560383] ? find_held_lock+0x35/0x1d0 [ 29.564420] ? avc_has_perm+0x35e/0x680 [ 29.568377] ? packet_cached_dev_get+0x2b0/0x2b0 [ 29.573108] ? mark_held_locks+0xaf/0x100 [ 29.577231] ? avc_has_perm+0x43e/0x680 [ 29.581177] ? avc_has_perm_noaudit+0x520/0x520 [ 29.585823] ? locks_remove_posix+0x518/0x820 [ 29.590291] ? find_held_lock+0x35/0x1d0 [ 29.594330] ? avc_has_perm+0x35e/0x680 [ 29.598284] ? sock_has_perm+0x2a4/0x420 [ 29.602315] ? selinux_secmark_relabel_packet+0xc0/0xc0 [ 29.607664] ? selinux_socket_sendmsg+0x36/0x40 [ 29.612301] ? security_socket_sendmsg+0x89/0xb0 [ 29.617023] ? packet_cached_dev_get+0x2b0/0x2b0 [ 29.621760] sock_sendmsg+0xca/0x110 [ 29.625444] sock_write_iter+0x31a/0x5d0 [ 29.629474] ? sock_sendmsg+0x110/0x110 [ 29.633425] ? iov_iter_init+0xaf/0x1d0 [ 29.637371] __vfs_write+0x684/0x970 [ 29.641058] ? kernel_read+0x120/0x120 [ 29.644911] ? bpf_fd_pass+0x280/0x280 [ 29.648768] ? _cond_resched+0x14/0x30 [ 29.652625] ? selinux_file_permission+0x82/0x460 [ 29.657445] ? rw_verify_area+0xe5/0x2b0 [ 29.661472] ? __fdget_raw+0x20/0x20 [ 29.665155] vfs_write+0x189/0x510 [ 29.668667] SyS_write+0xef/0x220 [ 29.672088] ? SyS_read+0x220/0x220 [ 29.675679] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 29.681104] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 29.685836] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 29.690558] RIP: 0033:0x444b89 [ 29.693729] RSP: 002b:00000000007eff78 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 29.701406] RAX: ffffffffffffffda RBX: 00007fff91d02bb0 RCX: 0000000000444b89 [ 29.708641] RDX: 000000000000005d RSI: 0000000020384000 RDI: 0000000000000005 [ 29.715876] RBP: 0000000000000000 R08: 0000000120080522 R09: 0000000120080522 [ 29.723113] R10: 0000000120080522 R11: 0000000000000293 R12: 0000000000402780 [ 29.730372] R13: 0000000000402810 R14: 0000000000000000 R15: 0000000000000000 [ 29.737624] [ 29.739219] Allocated by task 1643: [ 29.742841] save_stack+0x43/0xd0 [ 29.746259] kasan_kmalloc+0xad/0xe0 [ 29.749961] kmem_cache_alloc_trace+0x136/0x750 [ 29.754595] kernfs_fop_open+0x357/0xeb0 [ 29.758632] do_dentry_open+0x667/0xd40 [ 29.762569] vfs_open+0x107/0x220 [ 29.765986] path_openat+0x1151/0x3530 [ 29.769840] do_filp_open+0x25b/0x3b0 [ 29.773605] do_sys_open+0x502/0x6d0 [ 29.777285] SyS_open+0x2d/0x40 [ 29.780536] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 29.785254] [ 29.786860] Freed by task 1643: [ 29.790115] save_stack+0x43/0xd0 [ 29.793532] kasan_slab_free+0x71/0xc0 [ 29.797384] kfree+0xd6/0x260 [ 29.800454] kernfs_fop_release+0x13f/0x180 [ 29.804740] __fput+0x327/0x7e0 [ 29.807996] ____fput+0x15/0x20 [ 29.811243] task_work_run+0x199/0x270 [ 29.815096] exit_to_usermode_loop+0x275/0x2f0 [ 29.819641] syscall_return_slowpath+0x490/0x550 [ 29.824370] entry_SYSCALL_64_fastpath+0x94/0x96 [ 29.829087] [ 29.830680] The buggy address belongs to the object at ffff8801cb360cc0 [ 29.830680] which belongs to the cache kmalloc-512 of size 512 [ 29.843309] The buggy address is located 120 bytes inside of [ 29.843309] 512-byte region [ffff8801cb360cc0, ffff8801cb360ec0) [ 29.855149] The buggy address belongs to the page: [ 29.860055] page:ffffea00072cd800 count:1 mapcount:0 mapping:ffff8801cb360040 index:0x0 [ 29.868173] flags: 0x2fffc0000000100(slab) [ 29.872378] raw: 02fffc0000000100 ffff8801cb360040 0000000000000000 0000000100000006 [ 29.880235] raw: ffffea00072bb6a0 ffffea00072bf720 ffff8801dac00940 0000000000000000 [ 29.888083] page dumped because: kasan: bad access detected [ 29.893765] [ 29.895362] Memory state around the buggy address: [ 29.900273] ffff8801cb360c00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.907598] ffff8801cb360c80: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 29.914920] >ffff8801cb360d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.922245] ^ [ 29.927408] ffff8801cb360d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.934740] ffff8801cb360e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.942064] ================================================================== [ 29.949395] Disabling lock debugging due to kernel taint [ 29.954864] Kernel panic - not syncing: panic_on_warn set ... [ 29.954864] [ 29.962210] CPU: 0 PID: 3147 Comm: syzkaller769484 Tainted: G B 4.15.0-rc4-mm1+ #49 [ 29.971183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 29.980504] Call Trace: [ 29.983063] dump_stack+0x194/0x257 [ 29.986659] ? arch_local_irq_restore+0x53/0x53 [ 29.991299] ? kasan_end_report+0x32/0x50 [ 29.995418] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 30.000141] ? vsnprintf+0x1ed/0x1900 [ 30.003910] ? __dev_queue_xmit+0x1fe0/0x2200 [ 30.008373] panic+0x1e4/0x41c [ 30.011531] ? refcount_error_report+0x214/0x214 [ 30.016254] ? add_taint+0x1c/0x50 [ 30.019759] ? add_taint+0x1c/0x50 [ 30.023266] ? __dev_queue_xmit+0x20d3/0x2200 [ 30.027729] kasan_end_report+0x50/0x50 [ 30.031669] kasan_report+0x148/0x360 [ 30.035437] __asan_report_load2_noabort+0x14/0x20 [ 30.040351] __dev_queue_xmit+0x20d3/0x2200 [ 30.044671] ? netdev_pick_tx+0x300/0x300 [ 30.048809] ? lock_release+0xa40/0xa40 [ 30.052771] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 30.058622] ? refcount_add+0x24/0x60 [ 30.062389] ? skb_set_owner_w+0x232/0x330 [ 30.066592] ? __might_sleep+0x95/0x190 [ 30.070543] ? kasan_check_write+0x14/0x20 [ 30.074744] ? copyin+0x91/0xb0 [ 30.077993] ? _copy_from_iter+0x367/0xf30 [ 30.082193] ? __check_object_size+0x25d/0x4f0 [ 30.086751] ? check_stack_object+0x140/0x140 [ 30.091216] ? copy_page_to_iter+0xe00/0xe00 [ 30.095591] ? _copy_from_iter_full+0x22b/0xbb0 [ 30.100229] ? skb_copy_datagram_from_iter+0x3a5/0x5a0 [ 30.105472] ? iov_iter_advance+0x13f0/0x13f0 [ 30.109937] dev_queue_xmit+0x17/0x20 [ 30.113707] packet_sendmsg+0x3ad5/0x60a0 [ 30.117833] ? find_held_lock+0x35/0x1d0 [ 30.121866] ? avc_has_perm+0x35e/0x680 [ 30.125815] ? packet_cached_dev_get+0x2b0/0x2b0 [ 30.130545] ? mark_held_locks+0xaf/0x100 [ 30.134667] ? avc_has_perm+0x43e/0x680 [ 30.138612] ? avc_has_perm_noaudit+0x520/0x520 [ 30.143263] ? locks_remove_posix+0x518/0x820 [ 30.147727] ? find_held_lock+0x35/0x1d0 [ 30.151758] ? avc_has_perm+0x35e/0x680 [ 30.155701] ? sock_has_perm+0x2a4/0x420 [ 30.159728] ? selinux_secmark_relabel_packet+0xc0/0xc0 [ 30.165067] ? selinux_socket_sendmsg+0x36/0x40 [ 30.169713] ? security_socket_sendmsg+0x89/0xb0 [ 30.174446] ? packet_cached_dev_get+0x2b0/0x2b0 [ 30.179171] sock_sendmsg+0xca/0x110 [ 30.182854] sock_write_iter+0x31a/0x5d0 [ 30.186883] ? sock_sendmsg+0x110/0x110 [ 30.190830] ? iov_iter_init+0xaf/0x1d0 [ 30.194774] __vfs_write+0x684/0x970 [ 30.198458] ? kernel_read+0x120/0x120 [ 30.202309] ? bpf_fd_pass+0x280/0x280 [ 30.206164] ? _cond_resched+0x14/0x30 [ 30.210040] ? selinux_file_permission+0x82/0x460 [ 30.214856] ? rw_verify_area+0xe5/0x2b0 [ 30.218882] ? __fdget_raw+0x20/0x20 [ 30.222575] vfs_write+0x189/0x510 [ 30.226083] SyS_write+0xef/0x220 [ 30.229505] ? SyS_read+0x220/0x220 [ 30.233103] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 30.238086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 30.242823] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 30.247545] RIP: 0033:0x444b89 [ 30.250703] RSP: 002b:00000000007eff78 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 30.258388] RAX: ffffffffffffffda RBX: 00007fff91d02bb0 RCX: 0000000000444b89 [ 30.265624] RDX: 000000000000005d RSI: 0000000020384000 RDI: 0000000000000005 [ 30.272871] RBP: 0000000000000000 R08: 0000000120080522 R09: 0000000120080522 [ 30.280109] R10: 0000000120080522 R11: 0000000000000293 R12: 0000000000402780 [ 30.287346] R13: 0000000000402810 R14: 0000000000000000 R15: 0000000000000000 [ 30.294640] Dumping ftrace buffer: [ 30.298147] (ftrace buffer empty) [ 30.301825] Kernel Offset: disabled [ 30.305419] Rebooting in 86400 seconds..