[....] Starting enhanced syslogd: rsyslogd[ 12.777290] audit: type=1400 audit(1515845722.245:4): avc: denied { syslog } for pid=3176 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.17' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 33.277048] ================================================================== [ 33.284430] BUG: KASAN: slab-out-of-bounds in sg_remove_request+0x103/0x120 [ 33.291498] Read of size 8 at addr ffff8801c8b08140 by task syzkaller082363/3337 [ 33.298997] [ 33.300595] CPU: 1 PID: 3337 Comm: syzkaller082363 Not tainted 4.9.76-g8e170a5 #11 [ 33.309047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.318992] ffff8801c860fab0 ffffffff81d93149 ffffea000722c200 ffff8801c8b08140 [ 33.326938] 0000000000000000 ffff8801c8b08140 ffff8801c87c8238 ffff8801c860fae8 [ 33.335077] ffffffff8153cb43 ffff8801c8b08140 0000000000000008 0000000000000000 [ 33.343024] Call Trace: [ 33.345578] [] dump_stack+0xc1/0x128 [ 33.350907] [] print_address_description+0x73/0x280 [ 33.358850] [] kasan_report+0x275/0x360 [ 33.358854] [] ? sg_remove_request+0x103/0x120 [ 33.358858] [] __asan_report_load8_noabort+0x14/0x20 [ 33.358862] [] sg_remove_request+0x103/0x120 [ 33.358865] [] sg_finish_rem_req+0x295/0x340 [ 33.358869] [] sg_read+0xa1c/0x1440 [ 33.358878] [] ? sg_proc_seq_show_debug+0xd10/0xd10 [ 33.358884] [] ? debug_check_no_locks_freed+0x2c0/0x2c0 [ 33.358889] [] ? fasync_helper+0x37/0xb0 [ 33.358893] [] ? sg_proc_seq_show_debug+0xd10/0xd10 [ 33.358898] [] __vfs_read+0x103/0x670 [ 33.358902] [] ? default_llseek+0x290/0x290 [ 33.358906] [] ? fsnotify+0x86/0xf30 [ 33.358909] [] ? fsnotify+0xf30/0xf30 [ 33.358914] [] ? avc_policy_seqno+0x9/0x20 [ 33.358917] [] ? selinux_file_permission+0x82/0x460 [ 33.358921] [] ? security_file_permission+0x89/0x1e0 [ 33.358925] [] ? rw_verify_area+0xe5/0x2b0 [ 33.358929] [] vfs_read+0x11e/0x380 [ 33.358932] [] SyS_read+0xd9/0x1b0 [ 33.358936] [] ? vfs_copy_file_range+0x740/0x740 [ 33.358941] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 33.358946] [] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 33.358951] [] entry_SYSCALL_64_fastpath+0x23/0xe2 [ 33.358953] [ 33.358955] Allocated by task 0: [ 33.358956] (stack is not available) [ 33.358957] [ 33.358958] Freed by task 0: [ 33.358959] (stack is not available) [ 33.358960] [ 33.358963] The buggy address belongs to the object at ffff8801c8b08100 [ 33.358963] which belongs to the cache fasync_cache of size 96 [ 33.358966] The buggy address is located 64 bytes inside of [ 33.358966] 96-byte region [ffff8801c8b08100, ffff8801c8b08160) [ 33.358967] The buggy address belongs to the page: [ 33.358971] page:ffffea000722c200 count:1 mapcount:0 mapping: (null) index:0x0 [ 33.358974] flags: 0x8000000000000080(slab) [ 33.358975] page dumped because: kasan: bad access detected [ 33.358976] [ 33.358977] Memory state around the buggy address: [ 33.358981] ffff8801c8b08000: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 33.358984] ffff8801c8b08080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.358987] >ffff8801c8b08100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.358989] ^ [ 33.358992] ffff8801c8b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.358994] ffff8801c8b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.358995] ================================================================== [ 33.358996] Disabling lock debugging due to kernel taint [ 33.361096] Kernel panic - not syncing: panic_on_warn set ... [ 33.361096] [ 33.361102] CPU: 1 PID: 3337 Comm: syzkaller082363 Tainted: G B 4.9.76-g8e170a5 #11 [ 33.361104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.361111] ffff8801c860fa08 ffffffff81d93149 ffffffff84195c17 ffff8801c860fae0 [ 33.361116] 0000000000000000 ffff8801c8b08140 ffff8801c87c8238 ffff8801c860fad0 [ 33.361121] ffffffff8142e371 0000000041b58ab3 ffffffff84189678 ffffffff8142e1b5 [ 33.361122] Call Trace: [ 33.361129] [] dump_stack+0xc1/0x128 [ 33.361136] [] panic+0x1bc/0x3a8 [ 33.361141] [] ? percpu_up_read_preempt_enable.constprop.53+0xd7/0xd7 [ 33.361147] [] ? preempt_schedule+0x25/0x30 [ 33.361152] [] ? ___preempt_schedule+0x16/0x18 [ 33.361157] [] kasan_end_report+0x50/0x50 [ 33.361161] [] kasan_report+0x167/0x360 [ 33.361165] [] ? sg_remove_request+0x103/0x120 [ 33.361169] [] __asan_report_load8_noabort+0x14/0x20 [ 33.361173] [] sg_remove_request+0x103/0x120 [ 33.361176] [] sg_finish_rem_req+0x295/0x340 [ 33.361180] [] sg_read+0xa1c/0x1440 [ 33.361184] [] ? sg_proc_seq_show_debug+0xd10/0xd10 [ 33.361190] [] ? debug_check_no_locks_freed+0x2c0/0x2c0 [ 33.361194] [] ? fasync_helper+0x37/0xb0 [ 33.361204] [] ? sg_proc_seq_show_debug+0xd10/0xd10 [ 33.361209] [] __vfs_read+0x103/0x670 [ 33.361212] [] ? default_llseek+0x290/0x290 [ 33.361216] [] ? fsnotify+0x86/0xf30 [ 33.361219] [] ? fsnotify+0xf30/0xf30 [ 33.361224] [] ? avc_policy_seqno+0x9/0x20 [ 33.361227] [] ? selinux_file_permission+0x82/0x460 [ 33.361231] [] ? security_file_permission+0x89/0x1e0 [ 33.361235] [] ? rw_verify_area+0xe5/0x2b0 [ 33.361239] [] vfs_read+0x11e/0x380 [ 33.361242] [] SyS_read+0xd9/0x1b0 [ 33.361246] [] ? vfs_copy_file_range+0x740/0x740 [ 33.361251] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 33.361254] [] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 33.361258] [] entry_SYSCALL_64_fastpath+0x23/0xe2 [ 33.364870] Dumping ftrace buffer: [ 33.364873] (ftrace buffer empty) [ 33.364874] Kernel Offset: disabled [ 33.891059] Rebooting in 86400 seconds..