[....] Starting enhanced syslogd: rsyslogd[ 13.413984] audit: type=1400 audit(1516645161.261:5): avc: denied { syslog } for pid=3494 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 18.094360] audit: type=1400 audit(1516645165.942:6): avc: denied { map } for pid=3636 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.5' (ECDSA) to the list of known hosts. [ 24.355431] audit: type=1400 audit(1516645172.203:7): avc: denied { map } for pid=3650 comm="syzkaller942389" path="/root/syzkaller942389030" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 24.381368] audit: type=1400 audit(1516645172.207:8): avc: denied { sys_admin } for pid=3650 comm="syzkaller942389" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 [ 24.570765] audit: type=1400 audit(1516645172.418:9): avc: denied { net_admin } for pid=3651 comm="syzkaller942389" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 24.775218] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument executing program [ 25.112391] audit: type=1400 audit(1516645172.960:10): avc: denied { sys_chroot } for pid=3651 comm="syzkaller942389" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 25.114661] ================================================================== [ 25.114684] BUG: KASAN: use-after-free in erspan_build_header+0x3bf/0x3d0 [ 25.114690] Read of size 2 at addr ffff8801d82a834b by task syzkaller942389/3651 [ 25.114692] [ 25.114700] CPU: 0 PID: 3651 Comm: syzkaller942389 Not tainted 4.15.0-rc9+ #184 [ 25.114704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 25.114708] Call Trace: [ 25.114721] dump_stack+0x194/0x257 [ 25.114735] ? arch_local_irq_restore+0x53/0x53 [ 25.114748] ? show_regs_print_info+0x18/0x18 [ 25.114763] ? refcount_add+0x24/0x60 [ 25.114773] ? erspan_build_header+0x3bf/0x3d0 [ 25.114787] print_address_description+0x73/0x250 [ 25.114795] ? erspan_build_header+0x3bf/0x3d0 [ 25.114805] kasan_report+0x25b/0x340 [ 25.114820] __asan_report_load_n_noabort+0xf/0x20 [ 25.114827] erspan_build_header+0x3bf/0x3d0 [ 25.114845] erspan_xmit+0x3b8/0x13b0 [ 25.114859] ? prepare_fb_xmit+0x9a0/0x9a0 [ 25.114871] ? netif_skb_features+0x9b0/0x9b0 [ 25.114883] ? __dev_get_by_index+0x1a0/0x1a0 [ 25.114893] ? check_noncircular+0x20/0x20 [ 25.114921] packet_direct_xmit+0x315/0x6b0 [ 25.114936] packet_sendmsg+0x3aed/0x60b0 [ 25.114950] ? find_held_lock+0x35/0x1d0 [ 25.114972] ? avc_has_perm+0x35e/0x680 [ 25.115011] ? packet_cached_dev_get+0x2b0/0x2b0 [ 25.115029] ? avc_has_perm+0x43e/0x680 [ 25.115044] ? avc_has_perm_noaudit+0x520/0x520 [ 25.115049] ? packet_setsockopt+0xfa5/0x1ea0 [ 25.115065] ? fanout_add+0x1430/0x1430 [ 25.115075] ? find_held_lock+0x35/0x1d0 [ 25.115102] ? find_held_lock+0x35/0x1d0 [ 25.115126] ? sock_has_perm+0x2a4/0x420 [ 25.115138] ? selinux_secmark_relabel_packet+0xc0/0xc0 [ 25.115146] ? lock_release+0x952/0xa40 [ 25.115154] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 25.115165] ? __check_object_size+0x25d/0x4f0 [ 25.115172] ? avc_has_perm+0x43e/0x680 [ 25.115201] ? selinux_socket_sendmsg+0x36/0x40 [ 25.115209] ? security_socket_sendmsg+0x89/0xb0 [ 25.115217] ? packet_cached_dev_get+0x2b0/0x2b0 [ 25.115229] sock_sendmsg+0xca/0x110 [ 25.115240] SYSC_sendto+0x361/0x5c0 [ 25.115255] ? SYSC_connect+0x4a0/0x4a0 [ 25.115269] ? sock_has_perm+0x2a4/0x420 [ 25.115282] ? selinux_secmark_relabel_packet+0xc0/0xc0 [ 25.115299] ? selinux_netlbl_sock_rcv_skb+0x730/0x730 [ 25.115305] ? lock_downgrade+0x980/0x980 [ 25.115342] ? compat_packet_setsockopt+0xe8/0x140 [ 25.115351] ? fput+0xd2/0x140 [ 25.115365] ? compat_SyS_setsockopt+0x200/0x410 [ 25.115371] ? packet_setsockopt+0x1ea0/0x1ea0 [ 25.115385] ? scm_detach_fds_compat+0x3c0/0x3c0 [ 25.115400] SyS_sendto+0x40/0x50 [ 25.115409] ? SyS_getpeername+0x30/0x30 [ 25.115423] do_fast_syscall_32+0x3ee/0xf9d [ 25.115442] ? do_int80_syscall_32+0x9d0/0x9d0 [ 25.115463] ? syscall_return_slowpath+0x2ad/0x550 [ 25.115472] ? prepare_exit_to_usermode+0x340/0x340 [ 25.115484] ? sysret32_from_system_call+0x5/0x3b [ 25.115500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 25.115519] entry_SYSENTER_compat+0x54/0x63 [ 25.115524] RIP: 0023:0xf7f0bc79 [ 25.115528] RSP: 002b:000000000820fdfc EFLAGS: 00000216 ORIG_RAX: 0000000000000171 [ 25.115536] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020003fd9 [ 25.115540] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020008000 [ 25.115544] RBP: 000000000000001c R08: 0000000000000000 R09: 0000000000000000 [ 25.115547] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 25.115551] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 25.115580] [ 25.115583] Allocated by task 3767: [ 25.115590] save_stack+0x43/0xd0 [ 25.115595] kasan_kmalloc+0xad/0xe0 [ 25.115601] kasan_slab_alloc+0x12/0x20 [ 25.115606] kmem_cache_alloc+0x12e/0x760 [ 25.115613] prepare_creds+0x78/0x360 [ 25.115618] SyS_access+0x8f/0x6a0 [ 25.115623] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 25.115625] [ 25.115628] Freed by task 3768: [ 25.115633] save_stack+0x43/0xd0 [ 25.115638] kasan_slab_free+0x71/0xc0 [ 25.115643] kmem_cache_free+0x83/0x2a0 [ 25.115649] put_cred_rcu+0x263/0x400 [ 25.115655] rcu_process_callbacks+0xd6c/0x17f0 [ 25.115661] __do_softirq+0x2d7/0xb85 [ 25.115662] [ 25.115667] The buggy address belongs to the object at ffff8801d82a8300 [ 25.115667] which belongs to the cache cred_jar of size 168 [ 25.115673] The buggy address is located 75 bytes inside of [ 25.115673] 168-byte region [ffff8801d82a8300, ffff8801d82a83a8) [ 25.115675] The buggy address belongs to the page: [ 25.115681] page:ffffea000760aa00 count:1 mapcount:0 mapping:ffff8801d82a8000 index:0x0 [ 25.115688] flags: 0x2fffc0000000100(slab) [ 25.115698] raw: 02fffc0000000100 ffff8801d82a8000 0000000000000000 0000000100000010 [ 25.115705] raw: ffffea00076115a0 ffffea00076138a0 ffff8801dad30380 0000000000000000 [ 25.115708] page dumped because: kasan: bad access detected [ 25.115710] [ 25.115712] Memory state around the buggy address: [ 25.115718] ffff8801d82a8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.115723] ffff8801d82a8280: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc [ 25.115728] >ffff8801d82a8300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.115731] ^ [ 25.115736] ffff8801d82a8380: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc [ 25.115741] ffff8801d82a8400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.115743] ================================================================== [ 25.115746] Disabling lock debugging due to kernel taint [ 25.115764] Kernel panic - not syncing: panic_on_warn set ... [ 25.115764] [ 25.115770] CPU: 0 PID: 3651 Comm: syzkaller942389 Tainted: G B 4.15.0-rc9+ #184 [ 25.115774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 25.115775] Call Trace: [ 25.115783] dump_stack+0x194/0x257 [ 25.115792] ? arch_local_irq_restore+0x53/0x53 [ 25.115800] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 25.115808] ? vsnprintf+0x1ed/0x1900 [ 25.115815] ? erspan_build_header+0x360/0x3d0 [ 25.115824] panic+0x1e4/0x41c [ 25.115831] ? refcount_error_report+0x214/0x214 [ 25.115840] ? add_taint+0x1c/0x50 [ 25.115847] ? add_taint+0x1c/0x50 [ 25.115855] ? erspan_build_header+0x3bf/0x3d0 [ 25.115862] kasan_end_report+0x50/0x50 [ 25.115869] kasan_report+0x144/0x340 [ 25.115879] __asan_report_load_n_noabort+0xf/0x20 [ 25.115885] erspan_build_header+0x3bf/0x3d0 [ 25.115895] erspan_xmit+0x3b8/0x13b0 [ 25.115905] ? prepare_fb_xmit+0x9a0/0x9a0 [ 25.115912] ? netif_skb_features+0x9b0/0x9b0 [ 25.115920] ? __dev_get_by_index+0x1a0/0x1a0 [ 25.115927] ? check_noncircular+0x20/0x20 [ 25.115941] packet_direct_xmit+0x315/0x6b0 [ 25.115952] packet_sendmsg+0x3aed/0x60b0 [ 25.115961] ? find_held_lock+0x35/0x1d0 [ 25.115972] ? avc_has_perm+0x35e/0x680 [ 25.115992] ? packet_cached_dev_get+0x2b0/0x2b0 [ 25.116006] ? avc_has_perm+0x43e/0x680 [ 25.116016] ? avc_has_perm_noaudit+0x520/0x520 [ 25.116021] ? packet_setsockopt+0xfa5/0x1ea0 [ 25.116031] ? fanout_add+0x1430/0x1430 [ 25.116037] ? find_held_lock+0x35/0x1d0 [ 25.116052] ? find_held_lock+0x35/0x1d0 [ 25.116066] ? sock_has_perm+0x2a4/0x420 [ 25.116079] ? selinux_secmark_relabel_packet+0xc0/0xc0 [ 25.116085] ? lock_release+0x952/0xa40 [ 25.116091] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 25.116098] ? __check_object_size+0x25d/0x4f0 [ 25.116104] ? avc_has_perm+0x43e/0x680 [ 25.116121] ? selinux_socket_sendmsg+0x36/0x40 [ 25.116127] ? security_socket_sendmsg+0x89/0xb0 [ 25.116134] ? packet_cached_dev_get+0x2b0/0x2b0 [ 25.116141] sock_sendmsg+0xca/0x110 [ 25.116150] SYSC_sendto+0x361/0x5c0 [ 25.116159] ? SYSC_connect+0x4a0/0x4a0 [ 25.116168] ? sock_has_perm+0x2a4/0x420 [ 25.116177] ? selinux_secmark_relabel_packet+0xc0/0xc0 [ 25.116188] ? selinux_netlbl_sock_rcv_skb+0x730/0x730 [ 25.116193] ? lock_downgrade+0x980/0x980 [ 25.116214] ? compat_packet_setsockopt+0xe8/0x140 [ 25.116220] ? fput+0xd2/0x140 [ 25.116228] ? compat_SyS_setsockopt+0x200/0x410 [ 25.116234] ? packet_setsockopt+0x1ea0/0x1ea0 [ 25.116243] ? scm_detach_fds_compat+0x3c0/0x3c0 [ 25.116252] SyS_sendto+0x40/0x50 [ 25.116260] ? SyS_getpeername+0x30/0x30 [ 25.116267] do_fast_syscall_32+0x3ee/0xf9d [ 25.116279] ? do_int80_syscall_32+0x9d0/0x9d0 [ 25.116292] ? syscall_return_slowpath+0x2ad/0x550 [ 25.116300] ? prepare_exit_to_usermode+0x340/0x340 [ 25.116307] ? sysret32_from_system_call+0x5/0x3b [ 25.116318] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 25.116329] entry_SYSENTER_compat+0x54/0x63 [ 25.116333] RIP: 0023:0xf7f0bc79 [ 25.116337] RSP: 002b:000000000820fdfc EFLAGS: 00000216 ORIG_RAX: 0000000000000171 [ 25.116343] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020003fd9 [ 25.116346] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020008000 [ 25.116349] RBP: 000000000000001c R08: 0000000000000000 R09: 0000000000000000 [ 25.116353] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 25.116356] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 25.137396] Dumping ftrace buffer: [ 25.137400] (ftrace buffer empty) [ 25.137403] Kernel Offset: disabled [ 26.002211] Rebooting in 86400 seconds..