[ 14.312606] audit: type=1400 audit(1517703050.734:4): avc: denied { syslog } for pid=3898 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.24' (ECDSA) to the list of known hosts. executing program executing program syzkaller login: [ 72.538852] ================================================================== [ 72.546248] BUG: KASAN: slab-out-of-bounds in sg_remove_request+0x103/0x120 [ 72.553322] Read of size 8 at addr ffff8801ba11f140 by task syzkaller831351/4091 [ 72.561432] [ 72.563032] CPU: 0 PID: 4091 Comm: syzkaller831351 Not tainted 4.9.79-g47af77b #26 [ 72.570705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.580044] ffff8801b23879b0 ffffffff81d94b09 ffffea0006e847c0 ffff8801ba11f140 [ 72.588019] 0000000000000000 ffff8801ba11f140 ffff8801d3e50238 ffff8801b23879e8 [ 72.595992] ffffffff8153e083 ffff8801ba11f140 0000000000000008 0000000000000000 [ 72.603963] Call Trace: [ 72.606524] [] dump_stack+0xc1/0x128 [ 72.611860] [] print_address_description+0x73/0x280 [ 72.618501] [] kasan_report+0x275/0x360 [ 72.624097] [] ? sg_remove_request+0x103/0x120 [ 72.630301] [] __asan_report_load8_noabort+0x14/0x20 [ 72.637024] [] sg_remove_request+0x103/0x120 [ 72.643056] [] sg_finish_rem_req+0x295/0x340 [ 72.649088] [] sg_read+0xa16/0x1440 [ 72.654334] [] ? sg_proc_seq_show_debug+0xd90/0xd90 [ 72.661144] [] ? fsnotify+0xf30/0xf30 [ 72.666573] [] ? avc_policy_seqno+0x9/0x20 [ 72.672446] [] do_loop_readv_writev.part.17+0x141/0x1e0 [ 72.679435] [] ? security_file_permission+0x89/0x1e0 [ 72.686159] [] ? sg_proc_seq_show_debug+0xd90/0xd90 [ 72.692793] [] ? sg_proc_seq_show_debug+0xd90/0xd90 [ 72.699427] [] do_readv_writev+0x520/0x750 [ 72.705291] [] ? vfs_write+0x530/0x530 [ 72.710800] [] ? __fget+0x228/0x3a0 [ 72.716050] [] ? __fget+0x47/0x3a0 [ 72.721225] [] vfs_readv+0x84/0xc0 [ 72.726386] [] do_readv+0xe6/0x250 [ 72.731546] [] ? vfs_readv+0xc0/0xc0 [ 72.736891] [] ? entry_SYSCALL_64_fastpath+0x5/0xe8 [ 72.743530] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 72.750343] [] SyS_readv+0x27/0x30 [ 72.755501] [] entry_SYSCALL_64_fastpath+0x29/0xe8 [ 72.762049] [ 72.763647] Allocated by task 0: [ 72.766979] (stack is not available) [ 72.770760] [ 72.772356] Freed by task 0: [ 72.775341] (stack is not available) [ 72.779021] [ 72.780619] The buggy address belongs to the object at ffff8801ba11f100 [ 72.780619] which belongs to the cache fasync_cache of size 96 [ 72.793251] The buggy address is located 64 bytes inside of [ 72.793251] 96-byte region [ffff8801ba11f100, ffff8801ba11f160) [ 72.804920] The buggy address belongs to the page: [ 72.809820] page:ffffea0006e847c0 count:1 mapcount:0 mapping: (null) index:0x0 [ 72.818309] flags: 0x8000000000000080(slab) [ 72.822597] page dumped because: kasan: bad access detected [ 72.828283] [ 72.829878] Memory state around the buggy address: executing program [ 72.834860] ffff8801ba11f000: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 72.842185] ffff8801ba11f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.849511] >ffff8801ba11f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.856845] ^ [ 72.862274] ffff8801ba11f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.869602] ffff8801ba11f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.876925] ================================================================== [ 72.884249] Disabling lock debugging due to kernel taint [ 72.890205] Kernel panic - not syncing: panic_on_warn set ... [ 72.890205] [ 72.897650] CPU: 0 PID: 4091 Comm: syzkaller831351 Tainted: G B 4.9.79-g47af77b #26 [ 72.906542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.915869] ffff8801b2387908 ffffffff81d94b09 ffffffff8419709f ffff8801b23879e0 [ 72.923944] 0000000000000000 ffff8801ba11f140 ffff8801d3e50238 ffff8801b23879d0 [ 72.931911] ffffffff8142f531 0000000041b58ab3 ffffffff8418ab10 ffffffff8142f375 [ 72.939910] Call Trace: [ 72.942469] [] dump_stack+0xc1/0x128 [ 72.947810] [] panic+0x1bc/0x3a8 [ 72.952798] [] ? percpu_up_read_preempt_enable.constprop.53+0xd7/0xd7 [ 72.960998] [] ? preempt_schedule+0x25/0x30 [ 72.966946] [] ? ___preempt_schedule+0x16/0x18 [ 72.973150] [] kasan_end_report+0x50/0x50 [ 72.978921] [] kasan_report+0x167/0x360 [ 72.984518] [] ? sg_remove_request+0x103/0x120 [ 72.990723] [] __asan_report_load8_noabort+0x14/0x20 [ 72.997454] [] sg_remove_request+0x103/0x120 [ 73.003481] [] sg_finish_rem_req+0x295/0x340 [ 73.009508] [] sg_read+0xa16/0x1440 [ 73.014769] [] ? sg_proc_seq_show_debug+0xd90/0xd90 [ 73.021407] [] ? fsnotify+0xf30/0xf30 [ 73.026830] [] ? avc_policy_seqno+0x9/0x20 [ 73.032684] [] do_loop_readv_writev.part.17+0x141/0x1e0 [ 73.039667] [] ? security_file_permission+0x89/0x1e0 [ 73.046485] [] ? sg_proc_seq_show_debug+0xd90/0xd90 [ 73.053129] [] ? sg_proc_seq_show_debug+0xd90/0xd90 [ 73.059768] [] do_readv_writev+0x520/0x750 [ 73.065622] [] ? vfs_write+0x530/0x530 [ 73.071150] [] ? __fget+0x228/0x3a0 [ 73.076404] [] ? __fget+0x47/0x3a0 [ 73.081571] [] vfs_readv+0x84/0xc0 [ 73.086828] [] do_readv+0xe6/0x250 [ 73.091997] [] ? vfs_readv+0xc0/0xc0 [ 73.097329] [] ? entry_SYSCALL_64_fastpath+0x5/0xe8 [ 73.103967] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 73.110789] [] SyS_readv+0x27/0x30 [ 73.115958] [] entry_SYSCALL_64_fastpath+0x29/0xe8 [ 73.122993] Dumping ftrace buffer: [ 73.126598] (ftrace buffer empty) [ 73.130288] Kernel Offset: disabled [ 73.133890] Rebooting in 86400 seconds..