[....] Starting enhanced syslogd: rsyslogd[ 12.277866] audit: type=1400 audit(1515718524.026:5): avc: denied { syslog } for pid=3359 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 18.840822] audit: type=1400 audit(1515718530.589:6): avc: denied { map } for pid=3498 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.15.226' (ECDSA) to the list of known hosts. [ 25.021911] audit: type=1400 audit(1515718536.770:7): avc: denied { map } for pid=3512 comm="syzkaller248848" path="/root/syzkaller248848683" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 25.047874] audit: type=1400 audit(1515718536.773:8): avc: denied { sys_admin } for pid=3512 comm="syzkaller248848" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 executing program [ 25.075531] audit: type=1400 audit(1515718536.824:9): avc: denied { sys_chroot } for pid=3513 comm="syzkaller248848" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 25.077651] ================================================================== [ 25.077665] BUG: KASAN: use-after-free in map_lookup_elem+0x4dc/0xbd0 [ 25.077669] Read of size 4 at addr ffff8801cbd99c98 by task syzkaller248848/3513 [ 25.077670] [ 25.077676] CPU: 1 PID: 3513 Comm: syzkaller248848 Not tainted 4.15.0-rc7-next-20180111+ #94 [ 25.077678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 25.077680] Call Trace: [ 25.077687] dump_stack+0x194/0x257 [ 25.077695] ? arch_local_irq_restore+0x53/0x53 [ 25.077701] ? show_regs_print_info+0x18/0x18 [ 25.077711] ? map_lookup_elem+0x4dc/0xbd0 [ 25.077720] print_address_description+0x73/0x250 [ 25.077725] ? map_lookup_elem+0x4dc/0xbd0 [ 25.077730] kasan_report+0x23b/0x360 [ 25.077739] check_memory_region+0x137/0x190 [ 25.077745] memcpy+0x23/0x50 [ 25.077752] map_lookup_elem+0x4dc/0xbd0 [ 25.077762] ? bpf_map_get_with_uref+0x110/0x110 [ 25.077769] ? __might_sleep+0x95/0x190 [ 25.077777] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 25.077784] ? selinux_bpf+0xd1/0x110 [ 25.077794] ? security_bpf+0x89/0xb0 [ 25.077803] SyS_bpf+0x922/0x4400 [ 25.077809] ? perf_event_mmap+0x115/0x12a0 [ 25.077817] ? bpf_prog_get+0x20/0x20 [ 25.077825] ? perf_event_fork+0x30/0x30 [ 25.077838] ? __lock_is_held+0xb6/0x140 [ 25.077845] ? check_noncircular+0x20/0x20 [ 25.077850] ? vma_wants_writenotify+0x51/0x3b0 [ 25.077860] ? __handle_mm_fault+0x80e/0x3ce0 [ 25.077869] ? check_noncircular+0x20/0x20 [ 25.077873] ? __pmd_alloc+0x4e0/0x4e0 [ 25.077876] ? vma_link+0xe9/0x170 [ 25.077887] ? find_held_lock+0x35/0x1d0 [ 25.077899] ? handle_mm_fault+0x2a0/0x930 [ 25.077907] ? find_held_lock+0x35/0x1d0 [ 25.077921] ? __do_page_fault+0x5f7/0xc90 [ 25.077927] ? lock_downgrade+0x980/0x980 [ 25.077940] ? handle_mm_fault+0x476/0x930 [ 25.077944] ? down_read_trylock+0xdb/0x170 [ 25.077950] ? __handle_mm_fault+0x3ce0/0x3ce0 [ 25.077954] ? vmacache_find+0x5f/0x280 [ 25.077965] ? up_read+0x1a/0x40 [ 25.077971] ? __do_page_fault+0x3d6/0xc90 [ 25.077983] ? mm_fault_error+0x2c0/0x2c0 [ 25.077998] ? do_page_fault+0xee/0x720 [ 25.078007] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 25.078012] ? __do_page_fault+0xc90/0xc90 [ 25.078025] ? SyS_mmap_pgoff+0x243/0x5f0 [ 25.078039] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 25.078052] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 25.078056] RIP: 0033:0x440ab9 [ 25.078058] RSP: 002b:00000000007dff68 EFLAGS: 00000203 ORIG_RAX: 0000000000000141 [ 25.078064] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000440ab9 [ 25.078066] RDX: 0000000000000018 RSI: 0000000020c3c000 RDI: 0000000000000001 [ 25.078069] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 25.078071] R10: 0000000000000000 R11: 0000000000000203 R12: 0000000000402290 [ 25.078074] R13: 0000000000402320 R14: 0000000000000000 R15: 0000000000000000 [ 25.078090] [ 25.078093] Allocated by task 1869: [ 25.078098] save_stack+0x43/0xd0 [ 25.078102] kasan_kmalloc+0xad/0xe0 [ 25.078106] kmem_cache_alloc_trace+0x136/0x750 [ 25.078110] seq_open+0x83/0x1f0 [ 25.078114] kernfs_fop_open+0x684/0xeb0 [ 25.078119] do_dentry_open+0x667/0xd40 [ 25.078122] vfs_open+0x107/0x220 [ 25.078126] path_openat+0x1151/0x3530 [ 25.078129] do_filp_open+0x25b/0x3b0 [ 25.078133] do_sys_open+0x502/0x6d0 [ 25.078136] SyS_open+0x2d/0x40 [ 25.078139] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 25.078140] [ 25.078142] Freed by task 1869: [ 25.078146] save_stack+0x43/0xd0 [ 25.078149] __kasan_slab_free+0x11a/0x170 [ 25.078153] kasan_slab_free+0xe/0x10 [ 25.078156] kfree+0xd9/0x260 [ 25.078159] seq_release+0x59/0x70 [ 25.078163] kernfs_fop_release+0x10b/0x180 [ 25.078165] __fput+0x327/0x7e0 [ 25.078168] ____fput+0x15/0x20 [ 25.078172] task_work_run+0x199/0x270 [ 25.078175] exit_to_usermode_loop+0x275/0x2f0 [ 25.078179] syscall_return_slowpath+0x490/0x550 [ 25.078182] entry_SYSCALL_64_fastpath+0x9e/0xa0 [ 25.078183] [ 25.078186] The buggy address belongs to the object at ffff8801cbd99c00 [ 25.078186] which belongs to the cache kmalloc-256 of size 256 [ 25.078190] The buggy address is located 152 bytes inside of [ 25.078190] 256-byte region [ffff8801cbd99c00, ffff8801cbd99d00) [ 25.078191] The buggy address belongs to the page: [ 25.078196] page:ffffea00072f6640 count:1 mapcount:0 mapping:ffff8801cbd990c0 index:0xffff8801cbd990c0 [ 25.078200] flags: 0x2fffc0000000100(slab) [ 25.078207] raw: 02fffc0000000100 ffff8801cbd990c0 ffff8801cbd990c0 000000010000000b [ 25.078211] raw: ffffea00072e8c60 ffffea00073981a0 ffff8801dac007c0 0000000000000000 [ 25.078213] page dumped because: kasan: bad access detected [ 25.078214] [ 25.078216] Memory state around the buggy address: [ 25.078219] ffff8801cbd99b80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.078222] ffff8801cbd99c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.078225] >ffff8801cbd99c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.078226] ^ [ 25.078230] ffff8801cbd99d00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 25.078233] ffff8801cbd99d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.078234] ================================================================== [ 25.078235] Disabling lock debugging due to kernel taint [ 25.078259] Kernel panic - not syncing: panic_on_warn set ... [ 25.078259] [ 25.078263] CPU: 1 PID: 3513 Comm: syzkaller248848 Tainted: G B 4.15.0-rc7-next-20180111+ #94 [ 25.078265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 25.078266] Call Trace: [ 25.078271] dump_stack+0x194/0x257 [ 25.078276] ? arch_local_irq_restore+0x53/0x53 [ 25.078280] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 25.078286] ? vsnprintf+0x1ed/0x1900 [ 25.078290] ? map_lookup_elem+0x430/0xbd0 [ 25.078296] panic+0x1e4/0x41c [ 25.078300] ? refcount_error_report+0x214/0x214 [ 25.078306] ? add_taint+0x1c/0x50 [ 25.078310] ? add_taint+0x1c/0x50 [ 25.078315] ? map_lookup_elem+0x4dc/0xbd0 [ 25.078320] kasan_end_report+0x50/0x50 [ 25.078324] kasan_report+0x148/0x360 [ 25.078330] check_memory_region+0x137/0x190 [ 25.078334] memcpy+0x23/0x50 [ 25.078339] map_lookup_elem+0x4dc/0xbd0 [ 25.078346] ? bpf_map_get_with_uref+0x110/0x110 [ 25.078350] ? __might_sleep+0x95/0x190 [ 25.078355] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 25.078359] ? selinux_bpf+0xd1/0x110 [ 25.078364] ? security_bpf+0x89/0xb0 [ 25.078369] SyS_bpf+0x922/0x4400 [ 25.078374] ? perf_event_mmap+0x115/0x12a0 [ 25.078379] ? bpf_prog_get+0x20/0x20 [ 25.078384] ? perf_event_fork+0x30/0x30 [ 25.078392] ? __lock_is_held+0xb6/0x140 [ 25.078397] ? check_noncircular+0x20/0x20 [ 25.078401] ? vma_wants_writenotify+0x51/0x3b0 [ 25.078407] ? __handle_mm_fault+0x80e/0x3ce0 [ 25.078413] ? check_noncircular+0x20/0x20 [ 25.078417] ? __pmd_alloc+0x4e0/0x4e0 [ 25.078419] ? vma_link+0xe9/0x170 [ 25.078426] ? find_held_lock+0x35/0x1d0 [ 25.078434] ? handle_mm_fault+0x2a0/0x930 [ 25.078440] ? find_held_lock+0x35/0x1d0 [ 25.078448] ? __do_page_fault+0x5f7/0xc90 [ 25.078452] ? lock_downgrade+0x980/0x980 [ 25.078460] ? handle_mm_fault+0x476/0x930 [ 25.078463] ? down_read_trylock+0xdb/0x170 [ 25.078469] ? __handle_mm_fault+0x3ce0/0x3ce0 [ 25.078471] ? vmacache_find+0x5f/0x280 [ 25.078479] ? up_read+0x1a/0x40 [ 25.078483] ? __do_page_fault+0x3d6/0xc90 [ 25.078491] ? mm_fault_error+0x2c0/0x2c0 [ 25.078500] ? do_page_fault+0xee/0x720 [ 25.078504] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 25.078508] ? __do_page_fault+0xc90/0xc90 [ 25.078516] ? SyS_mmap_pgoff+0x243/0x5f0 [ 25.078525] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 25.078532] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 25.078534] RIP: 0033:0x440ab9 [ 25.078536] RSP: 002b:00000000007dff68 EFLAGS: 00000203 ORIG_RAX: 0000000000000141 [ 25.078540] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000440ab9 [ 25.078542] RDX: 0000000000000018 RSI: 0000000020c3c000 RDI: 0000000000000001 [ 25.078544] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 25.078546] R10: 0000000000000000 R11: 0000000000000203 R12: 0000000000402290 [ 25.078548] R13: 0000000000402320 R14: 0000000000000000 R15: 0000000000000000 [ 25.100345] Dumping ftrace buffer: [ 25.100349] (ftrace buffer empty) [ 25.100351] Kernel Offset: disabled [ 25.889517] Rebooting in 86400 seconds..