[....] Starting enhanced syslogd: rsyslogd[ 10.217907] audit: type=1400 audit(1513135321.448:4): avc: denied { syslog } for pid=3166 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added 'ci-android-49-kasan-gce-5,10.128.0.43' (ECDSA) to the list of known hosts. 2017/12/13 03:22:12 parsed 1 programs 2017/12/13 03:22:12 executed programs: 0 syzkaller login: [ 21.291616] IPVS: Creating netns size=2536 id=1 [ 21.308203] IPVS: Creating netns size=2536 id=2 [ 21.326949] IPVS: Creating netns size=2536 id=3 [ 21.347098] IPVS: Creating netns size=2536 id=4 [ 21.367740] IPVS: Creating netns size=2536 id=5 [ 21.378897] IPVS: Creating netns size=2536 id=6 [ 21.399549] IPVS: Creating netns size=2536 id=7 [ 21.410448] IPVS: Creating netns size=2536 id=8 2017/12/13 03:22:17 executed programs: 739 [ 30.438264] ================================================================== [ 30.445669] BUG: KASAN: out-of-bounds in __unwind_start+0x3a7/0x3c0 at addr ffff8801d016fc28 [ 30.454228] Read of size 8 by task syz-executor6/8545 [ 30.459402] page:ffffea0007405bc0 count:0 mapcount:0 mapping: (null) index:0x0 [ 30.467628] flags: 0x8000000000000000() [ 30.471593] page dumped because: kasan: bad access detected [ 30.477277] CPU: 1 PID: 8545 Comm: syz-executor6 Not tainted 4.9.68-gfb66dc2 #107 [ 30.484863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.494184] ffff8801cfa1f8e8 ffffffff81d90889 ffffed003a02df86 0000000000000008 [ 30.502145] 0000000000000000 ffffed003a02df86 ffff8801d016fc28 ffff8801cfa1f970 [ 30.510101] ffffffff8153a9b3 ffffffff838a00de dffffc0000000000 ffffffff810d41b7 [ 30.518086] Call Trace: [ 30.520643] [] dump_stack+0xc1/0x128 [ 30.525980] [] kasan_report.part.1+0x4c3/0x500 [ 30.533544] [] ? mutex_lock_killable_nested+0x60e/0x960 [ 30.540528] [] ? __unwind_start+0x3a7/0x3c0 [ 30.546466] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 30.554100] [] __asan_report_load8_noabort+0x29/0x30 [ 30.560825] [] __unwind_start+0x3a7/0x3c0 [ 30.566590] [] ? ptrace_may_access+0x24/0x50 [ 30.572773] [] __save_stack_trace+0x59/0xf0 [ 30.578724] [] save_stack_trace_tsk+0x48/0x70 [ 30.584837] [] proc_pid_stack+0x146/0x230 [ 30.590600] [] ? lock_trace+0xc0/0xc0 [ 30.596031] [] proc_single_show+0xf8/0x170 [ 30.601907] [] seq_read+0x32f/0x1290 [ 30.607247] [] ? seq_escape+0x200/0x200 [ 30.612847] [] ? do_futex+0x3f8/0x15c0 [ 30.618353] [] ? __lock_is_held+0xa1/0xf0 [ 30.624119] [] ? seq_escape+0x200/0x200 [ 30.629715] [] __vfs_read+0x103/0x670 [ 30.635148] [] ? default_llseek+0x290/0x290 [ 30.641094] [] ? fsnotify+0x86/0xf30 [ 30.646422] [] ? fsnotify+0xf30/0xf30 [ 30.651838] [] ? avc_policy_seqno+0x9/0x20 [ 30.657691] [] ? selinux_file_permission+0x82/0x460 [ 30.664330] [] ? security_file_permission+0x89/0x1e0 [ 30.671067] [] ? rw_verify_area+0xe5/0x2b0 [ 30.676926] [] vfs_read+0x11e/0x380 [ 30.682194] [] SyS_read+0xd9/0x1b0 [ 30.687350] [] ? vfs_copy_file_range+0x740/0x740 [ 30.693725] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 30.700532] [] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 30.707078] [] entry_SYSCALL_64_fastpath+0x23/0xc6 [ 30.713619] Memory state around the buggy address: [ 30.718512] ffff8801d016fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.725843] ffff8801d016fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.733184] >ffff8801d016fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.740517] ^ [ 30.745411] ffff8801d016fc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.752739] ffff8801d016fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.760073] ================================================================== [ 30.760075] Disabling lock debugging due to kernel taint 2017/12/13 03:22:22 executed programs: 1434