[....] Starting enhanced syslogd: rsyslogd[ 11.420347] audit: type=1400 audit(1516456035.342:4): avc: denied { syslog } for pid=3173 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.6' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 42.346676] ================================================================== [ 42.347789] BUG: KASAN: use-after-free in do_raw_spin_lock+0x1ac/0x1e0 [ 42.348669] Read of size 4 at addr ffff8801c97f02dc by task syzkaller975444/3347 [ 42.349685] [ 42.349953] CPU: 0 PID: 3347 Comm: syzkaller975444 Not tainted 4.9.77-ge12a9c4 #27 [ 42.351023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 42.352264] ffff8801c7897c08 ffffffff81d941c9 ffffea000725fc00 ffff8801c97f02dc [ 42.353420] 0000000000000000 ffff8801c97f02dc ffff8801c97f0400 ffff8801c7897c40 [ 42.354594] ffffffff8153db93 ffff8801c97f02dc 0000000000000004 0000000000000000 [ 42.355738] Call Trace: [ 42.356096] [] dump_stack+0xc1/0x128 [ 42.356820] [] print_address_description+0x73/0x280 [ 42.357724] [] kasan_report+0x275/0x360 [ 42.358600] [] ? do_raw_spin_lock+0x1ac/0x1e0 [ 42.359441] [] __asan_report_load4_noabort+0x14/0x20 [ 42.360380] [] do_raw_spin_lock+0x1ac/0x1e0 [ 42.361188] [] _raw_spin_lock_irqsave+0x56/0x70 [ 42.362054] [] ? skb_dequeue+0x22/0x180 [ 42.362885] [] skb_dequeue+0x22/0x180 [ 42.363608] [] l2tp_session_queue_purge+0xab/0x100 [ 42.364526] [] ? sock_release+0x1e0/0x1e0 [ 42.365349] [] pppol2tp_release+0x1ff/0x2e0 [ 42.366178] [] sock_release+0x8d/0x1e0 [ 42.367686] [] sock_close+0x16/0x20 [ 42.372930] [] __fput+0x28c/0x6e0 [ 42.377999] [] ____fput+0x15/0x20 [ 42.383071] [] task_work_run+0x115/0x190 [ 42.388750] [] exit_to_usermode_loop+0xfc/0x120 [ 42.395036] [] do_fast_syscall_32+0x5de/0x890 [ 42.401149] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 42.407784] [] entry_SYSENTER_compat+0x74/0x83 [ 42.413992] [ 42.415590] Allocated by task 3346: [ 42.419185] save_stack_trace+0x16/0x20 [ 42.423127] save_stack+0x43/0xd0 [ 42.426546] kasan_kmalloc+0xad/0xe0 [ 42.430226] __kmalloc+0x11d/0x310 [ 42.433741] l2tp_session_create+0x38/0x1770 [ 42.438119] pppol2tp_connect+0x10fe/0x18f0 [ 42.442408] SYSC_connect+0x1b6/0x310 [ 42.446175] SyS_connect+0x24/0x30 [ 42.449683] do_fast_syscall_32+0x2f7/0x890 [ 42.453972] entry_SYSENTER_compat+0x74/0x83 [ 42.458355] [ 42.459952] Freed by task 3346: [ 42.463199] save_stack_trace+0x16/0x20 [ 42.467141] save_stack+0x43/0xd0 [ 42.470563] kasan_slab_free+0x72/0xc0 [ 42.474417] kfree+0x103/0x300 [ 42.477579] l2tp_session_free+0x166/0x200 [ 42.481783] l2tp_tunnel_closeall+0x26c/0x3a0 [ 42.486246] l2tp_udp_encap_destroy+0x87/0xe0 [ 42.490732] udpv6_destroy_sock+0xb1/0xd0 [ 42.494847] sk_common_release+0x6b/0x2f0 [ 42.498961] udp_lib_close+0x15/0x20 [ 42.502652] inet_release+0xfa/0x1d0 [ 42.506334] inet6_release+0x50/0x70 [ 42.510015] sock_release+0x8d/0x1e0 [ 42.513696] sock_close+0x16/0x20 [ 42.517119] __fput+0x28c/0x6e0 [ 42.520366] ____fput+0x15/0x20 [ 42.523611] task_work_run+0x115/0x190 [ 42.527463] exit_to_usermode_loop+0xfc/0x120 [ 42.531927] do_fast_syscall_32+0x5de/0x890 [ 42.536222] entry_SYSENTER_compat+0x74/0x83 [ 42.540603] [ 42.542200] The buggy address belongs to the object at ffff8801c97f0280 [ 42.542200] which belongs to the cache kmalloc-512 of size 512 [ 42.554836] The buggy address is located 92 bytes inside of [ 42.554836] 512-byte region [ffff8801c97f0280, ffff8801c97f0480) [ 42.567213] The buggy address belongs to the page: [ 42.572112] page:ffffea000725fc00 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 42.582272] flags: 0x8000000000004080(slab|head) [ 42.586989] page dumped because: kasan: bad access detected [ 42.592665] [ 42.594258] Memory state around the buggy address: [ 42.599156] ffff8801c97f0180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.606483] ffff8801c97f0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.613810] >ffff8801c97f0280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.621137] ^ [ 42.627336] ffff8801c97f0300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.634662] ffff8801c97f0380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.641985] ================================================================== [ 42.649308] Disabling lock debugging due to kernel taint [ 42.654727] Kernel panic - not syncing: panic_on_warn set ... [ 42.654727] [ 42.662070] CPU: 0 PID: 3347 Comm: syzkaller975444 Tainted: G B 4.9.77-ge12a9c4 #27 [ 42.670956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 42.680288] ffff8801c7897b60 ffffffff81d941c9 ffffffff841970ff ffff8801c7897c38 [ 42.688252] 0000000000000000 ffff8801c97f02dc ffff8801c97f0400 ffff8801c7897c28 [ 42.696214] ffffffff8142f3c1 0000000041b58ab3 ffffffff8418ab70 ffffffff8142f205 [ 42.704182] Call Trace: [ 42.706739] [] dump_stack+0xc1/0x128 [ 42.712070] [] panic+0x1bc/0x3a8 [ 42.717054] [] ? percpu_up_read_preempt_enable.constprop.53+0xd7/0xd7 [ 42.725251] [] kasan_end_report+0x50/0x50 [ 42.731015] [] kasan_report+0x167/0x360 [ 42.736607] [] ? do_raw_spin_lock+0x1ac/0x1e0 [ 42.742732] [] __asan_report_load4_noabort+0x14/0x20 [ 42.749454] [] do_raw_spin_lock+0x1ac/0x1e0 [ 42.755394] [] _raw_spin_lock_irqsave+0x56/0x70 [ 42.761683] [] ? skb_dequeue+0x22/0x180 [ 42.767284] [] skb_dequeue+0x22/0x180 [ 42.772708] [] l2tp_session_queue_purge+0xab/0x100 [ 42.779252] [] ? sock_release+0x1e0/0x1e0 [ 42.785015] [] pppol2tp_release+0x1ff/0x2e0 [ 42.790952] [] sock_release+0x8d/0x1e0 [ 42.796455] [] sock_close+0x16/0x20 [ 42.801708] [] __fput+0x28c/0x6e0 [ 42.806777] [] ____fput+0x15/0x20 [ 42.811849] [] task_work_run+0x115/0x190 [ 42.817525] [] exit_to_usermode_loop+0xfc/0x120 [ 42.823810] [] do_fast_syscall_32+0x5de/0x890 [ 42.829920] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 42.836552] [] entry_SYSENTER_compat+0x74/0x83 [ 42.843151] Dumping ftrace buffer: [ 42.846677] (ftrace buffer empty) [ 42.850359] Kernel Offset: disabled [ 42.853954] Rebooting in 86400 seconds..