[....] Starting enhanced syslogd: rsyslogd[ 10.716848] audit: type=1400 audit(1514736415.080:5): avc: denied { syslog } for pid=2987 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 16.685930] audit: type=1400 audit(1514736421.073:6): avc: denied { map } for pid=3126 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.62' (ECDSA) to the list of known hosts. executing program [ 35.914207] audit: type=1400 audit(1514736440.301:7): avc: denied { map } for pid=3144 comm="syzkaller665937" path="/root/syzkaller665937188" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 35.917851] ================================================================== [ 35.917867] BUG: KASAN: slab-out-of-bounds in cap_inode_getsecurity+0x621/0x7d0 [ 35.917872] Read of size 4 at addr ffff8801ca4628c0 by task syzkaller665937/3144 [ 35.917873] [ 35.917878] CPU: 1 PID: 3144 Comm: syzkaller665937 Not tainted 4.15.0-rc4-mm1+ #49 [ 35.917881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.917883] Call Trace: [ 35.917890] dump_stack+0x194/0x257 [ 35.917898] ? arch_local_irq_restore+0x53/0x53 [ 35.917906] ? show_regs_print_info+0x18/0x18 [ 35.917915] ? dput.part.23+0x207/0x830 [ 35.917921] ? cap_inode_getsecurity+0x621/0x7d0 [ 35.917929] print_address_description+0x73/0x250 [ 35.917934] ? cap_inode_getsecurity+0x621/0x7d0 [ 35.917940] kasan_report+0x23b/0x360 [ 35.917949] __asan_report_load4_noabort+0x14/0x20 [ 35.917953] cap_inode_getsecurity+0x621/0x7d0 [ 35.917959] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 35.917967] ? rootid_owns_currentns+0x150/0x150 [ 35.917976] ? __might_sleep+0x95/0x190 [ 35.917988] security_inode_getsecurity+0xcd/0x110 [ 35.917992] ? security_inode_getsecurity+0xcd/0x110 [ 35.918005] xattr_getsecurity+0xd3/0x1f0 [ 35.918013] ? xattr_permission+0x260/0x260 [ 35.918024] ? security_inode_getxattr+0xdd/0x120 [ 35.918035] vfs_getxattr+0xc8/0x110 [ 35.918046] getxattr+0x116/0x2a0 [ 35.918053] ? path_listxattr+0x150/0x150 [ 35.918061] ? strncpy_from_user+0x323/0x430 [ 35.918071] ? mpi_resize+0x200/0x200 [ 35.918086] ? getname_flags+0x256/0x580 [ 35.918095] ? user_path_at_empty+0x40/0x50 [ 35.918105] path_getxattr+0xed/0x170 [ 35.918114] ? getxattr+0x2a0/0x2a0 [ 35.918123] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 35.918133] SyS_getxattr+0x33/0x40 [ 35.918141] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 35.918145] RIP: 0033:0x43fd09 [ 35.918148] RSP: 002b:00007fff1c00e9d8 EFLAGS: 00000217 ORIG_RAX: 00000000000000bf [ 35.918153] RAX: ffffffffffffffda RBX: 0030656c69662f2e RCX: 000000000043fd09 [ 35.918155] RDX: 0000000020227f74 RSI: 0000000020b29f57 RDI: 000000002072d000 [ 35.918158] RBP: 00000000006ca018 R08: 0000000000000000 R09: 0000000000000000 [ 35.918160] R10: 000000000000008c R11: 0000000000000217 R12: 0000000000401670 [ 35.918162] R13: 0000000000401700 R14: 0000000000000000 R15: 0000000000000000 [ 35.918179] [ 35.918182] Allocated by task 3144: [ 35.918186] save_stack+0x43/0xd0 [ 35.918189] kasan_kmalloc+0xad/0xe0 [ 35.918193] __kmalloc_track_caller+0x15e/0x760 [ 35.918198] krealloc+0x65/0xc0 [ 35.918202] vfs_getxattr_alloc+0x177/0x270 [ 35.918205] cap_inode_getsecurity+0xfa/0x7d0 [ 35.918209] security_inode_getsecurity+0xcd/0x110 [ 35.918212] xattr_getsecurity+0xd3/0x1f0 [ 35.918215] vfs_getxattr+0xc8/0x110 [ 35.918219] getxattr+0x116/0x2a0 [ 35.918222] path_getxattr+0xed/0x170 [ 35.918226] SyS_getxattr+0x33/0x40 [ 35.918229] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 35.918230] [ 35.918232] Freed by task 1647: [ 35.918235] save_stack+0x43/0xd0 [ 35.918239] kasan_slab_free+0x71/0xc0 [ 35.918242] kfree+0xd6/0x260 [ 35.918246] sel_write_context+0x1bd/0x340 [ 35.918249] selinux_transaction_write+0xd1/0x130 [ 35.918254] __vfs_write+0xef/0x970 [ 35.918257] vfs_write+0x189/0x510 [ 35.918260] SyS_write+0xef/0x220 [ 35.918263] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 35.918264] [ 35.918267] The buggy address belongs to the object at ffff8801ca4628c0 [ 35.918267] which belongs to the cache kmalloc-32 of size 32 [ 35.918271] The buggy address is located 0 bytes inside of [ 35.918271] 32-byte region [ffff8801ca4628c0, ffff8801ca4628e0) [ 35.918272] The buggy address belongs to the page: [ 35.918276] page:ffffea0007291880 count:1 mapcount:0 mapping:ffff8801ca462000 index:0xffff8801ca462fc1 [ 35.918280] flags: 0x2fffc0000000100(slab) [ 35.918286] raw: 02fffc0000000100 ffff8801ca462000 ffff8801ca462fc1 000000010000003f [ 35.918290] raw: ffffea000725de20 ffffea00072e12e0 ffff8801dac001c0 0000000000000000 [ 35.918293] page dumped because: kasan: bad access detected [ 35.918294] [ 35.918295] Memory state around the buggy address: [ 35.918299] ffff8801ca462780: 00 00 00 fc fc fc fc fc fb fb fb fb fc fc fc fc [ 35.918302] ffff8801ca462800: 00 00 00 fc fc fc fc fc fb fb fb fb fc fc fc fc [ 35.918305] >ffff8801ca462880: fb fb fb fb fc fc fc fc 01 fc fc fc fc fc fc fc [ 35.918307] ^ [ 35.918310] ffff8801ca462900: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 35.918313] ffff8801ca462980: fb fb fb fb fc fc fc fc 00 00 01 fc fc fc fc fc [ 35.918314] ================================================================== [ 35.918316] Disabling lock debugging due to kernel taint [ 35.918334] Kernel panic - not syncing: panic_on_warn set ... [ 35.918334] [ 35.918338] CPU: 1 PID: 3144 Comm: syzkaller665937 Tainted: G B 4.15.0-rc4-mm1+ #49 [ 35.918340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.918342] Call Trace: [ 35.918346] dump_stack+0x194/0x257 [ 35.918351] ? arch_local_irq_restore+0x53/0x53 [ 35.918357] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 35.918362] ? vsnprintf+0x1ed/0x1900 [ 35.918366] ? cap_inode_getsecurity+0x550/0x7d0 [ 35.918372] panic+0x1e4/0x41c [ 35.918377] ? refcount_error_report+0x214/0x214 [ 35.918382] ? add_taint+0x1c/0x50 [ 35.918386] ? add_taint+0x1c/0x50 [ 35.918391] ? cap_inode_getsecurity+0x621/0x7d0 [ 35.918395] kasan_end_report+0x50/0x50 [ 35.918399] kasan_report+0x148/0x360 [ 35.918406] __asan_report_load4_noabort+0x14/0x20 [ 35.918409] cap_inode_getsecurity+0x621/0x7d0 [ 35.918413] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 35.918419] ? rootid_owns_currentns+0x150/0x150 [ 35.918424] ? __might_sleep+0x95/0x190 [ 35.918431] security_inode_getsecurity+0xcd/0x110 [ 35.918435] ? security_inode_getsecurity+0xcd/0x110 [ 35.918441] xattr_getsecurity+0xd3/0x1f0 [ 35.918447] ? xattr_permission+0x260/0x260 [ 35.918453] ? security_inode_getxattr+0xdd/0x120 [ 35.918459] vfs_getxattr+0xc8/0x110 [ 35.918465] getxattr+0x116/0x2a0 [ 35.918470] ? path_listxattr+0x150/0x150 [ 35.918475] ? strncpy_from_user+0x323/0x430 [ 35.918482] ? mpi_resize+0x200/0x200 [ 35.918491] ? getname_flags+0x256/0x580 [ 35.918498] ? user_path_at_empty+0x40/0x50 [ 35.918504] path_getxattr+0xed/0x170 [ 35.918510] ? getxattr+0x2a0/0x2a0 [ 35.918516] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 35.918522] SyS_getxattr+0x33/0x40 [ 35.918528] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 35.918530] RIP: 0033:0x43fd09 [ 35.918532] RSP: 002b:00007fff1c00e9d8 EFLAGS: 00000217 ORIG_RAX: 00000000000000bf [ 35.918536] RAX: ffffffffffffffda RBX: 0030656c69662f2e RCX: 000000000043fd09 [ 35.918538] RDX: 0000000020227f74 RSI: 0000000020b29f57 RDI: 000000002072d000 [ 35.918540] RBP: 00000000006ca018 R08: 0000000000000000 R09: 0000000000000000 [ 35.918542] R10: 000000000000008c R11: 0000000000000217 R12: 0000000000401670 [ 35.918544] R13: 0000000000401700 R14: 0000000000000000 R15: 0000000000000000 [ 35.940087] Dumping ftrace buffer: [ 35.940090] (ftrace buffer empty) [ 35.940092] Kernel Offset: disabled [ 36.614191] Rebooting in 86400 seconds..