Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 41.888960][ T25] audit: type=1800 audit(1552736883.152:33): pid=7805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 45.652444][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 45.652459][ T25] audit: type=1400 audit(1552736886.912:35): avc: denied { map } for pid=7980 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.174' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program [ 59.000686][ T25] audit: type=1400 audit(1552736900.262:36): avc: denied { map } for pid=7992 comm="syz-executor510" path="/root/syz-executor510401116" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 60.316975][ T8466] ================================================================== [ 60.325329][ T8466] BUG: KASAN: slab-out-of-bounds in linear_transfer+0x6de/0x970 [ 60.332960][ T8466] Read of size 1 at addr ffff88807ffcf3b8 by task syz-executor510/8466 [ 60.341189][ T8466] [ 60.343522][ T8466] CPU: 1 PID: 8466 Comm: syz-executor510 Not tainted 5.0.0+ #24 [ 60.351145][ T8466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.361336][ T8466] Call Trace: [ 60.364638][ T8466] dump_stack+0x172/0x1f0 [ 60.368994][ T8466] ? linear_transfer+0x6de/0x970 [ 60.373969][ T8466] print_address_description.cold+0x7c/0x20d [ 60.380140][ T8466] ? linear_transfer+0x6de/0x970 [ 60.385088][ T8466] ? linear_transfer+0x6de/0x970 [ 60.390048][ T8466] kasan_report.cold+0x1b/0x40 [ 60.394853][ T8466] ? linear_transfer+0x6de/0x970 [ 60.399811][ T8466] check_memory_region+0x123/0x190 [ 60.404934][ T8466] memcpy+0x24/0x50 [ 60.408770][ T8466] linear_transfer+0x6de/0x970 executing program executing program [ 60.413540][ T8466] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 60.419980][ T8466] ? snd_pcm_plugin_build_copy+0x410/0x410 [ 60.426177][ T8466] ? io_capture_transfer+0x1fd/0x330 [ 60.431470][ T8466] ? rate_dst_frames+0x2e0/0x2e0 [ 60.436422][ T8466] snd_pcm_plug_read_transfer+0x1a1/0x2f0 [ 60.442152][ T8466] ? snd_pcm_plug_write_transfer+0x400/0x400 [ 60.448137][ T8466] ? snd_pcm_format_physical_width+0x75/0x90 [ 60.454136][ T8466] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 60.459868][ T8466] ? snd_pcm_plug_client_channels_buf+0x212/0x450 executing program [ 60.466808][ T8466] snd_pcm_oss_read2+0x1f0/0x3f0 [ 60.471761][ T8466] ? snd_pcm_oss_read3+0x420/0x420 [ 60.477675][ T8466] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 60.483938][ T8466] snd_pcm_oss_read+0x53a/0x6a0 [ 60.488807][ T8466] __vfs_read+0x8d/0x110 [ 60.493059][ T8466] ? snd_pcm_oss_read2+0x3f0/0x3f0 [ 60.498194][ T8466] vfs_read+0x194/0x3e0 [ 60.502388][ T8466] ksys_read+0xea/0x1f0 [ 60.506555][ T8466] ? kernel_write+0x120/0x120 [ 60.511241][ T8466] ? do_syscall_64+0x26/0x610 executing program executing program [ 60.515923][ T8466] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 60.521995][ T8466] ? do_syscall_64+0x26/0x610 [ 60.526687][ T8466] __x64_sys_read+0x73/0xb0 [ 60.531199][ T8466] do_syscall_64+0x103/0x610 [ 60.535828][ T8466] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 60.541746][ T8466] RIP: 0033:0x446839 [ 60.545668][ T8466] Code: e8 0c e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b 07 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 60.565366][ T8466] RSP: 002b:00007f018eea3db8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 60.573780][ T8466] RAX: ffffffffffffffda RBX: 00000000006dbc38 RCX: 0000000000446839 [ 60.581780][ T8466] RDX: 0000000000001000 RSI: 00000000200012c0 RDI: 0000000000000003 [ 60.589757][ T8466] RBP: 00000000006dbc30 R08: 0000000000000000 R09: 0000000000000000 [ 60.597742][ T8466] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dbc3c [ 60.605716][ T8466] R13: 00007fff63b9986f R14: 00007f018eea49c0 R15: 0000000000000000 [ 60.613702][ T8466] executing program [ 60.616205][ T8466] Allocated by task 8450: [ 60.620539][ T8466] save_stack+0x45/0xd0 [ 60.624699][ T8466] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 60.630338][ T8466] kasan_kmalloc+0x9/0x10 [ 60.634674][ T8466] __kmalloc_node+0x4e/0x70 [ 60.639211][ T8466] kvmalloc_node+0x68/0x100 [ 60.643725][ T8466] snd_pcm_plugin_alloc+0x585/0x770 [ 60.648930][ T8466] snd_pcm_plug_alloc+0x148/0x330 [ 60.653966][ T8466] snd_pcm_oss_change_params_locked+0x2118/0x3750 [ 60.660385][ T8466] snd_pcm_oss_change_params+0x7b/0xd0 [ 60.665846][ T8466] snd_pcm_oss_get_active_substream+0x136/0x190 [ 60.672106][ T8466] snd_pcm_oss_ioctl+0x8f7/0x3430 [ 60.677596][ T8466] do_vfs_ioctl+0xd6e/0x1390 [ 60.682198][ T8466] ksys_ioctl+0xab/0xd0 [ 60.686359][ T8466] __x64_sys_ioctl+0x73/0xb0 [ 60.690958][ T8466] do_syscall_64+0x103/0x610 [ 60.695586][ T8466] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 60.701509][ T8466] [ 60.703862][ T8466] Freed by task 0: [ 60.707789][ T8466] (stack is not available) [ 60.712200][ T8466] [ 60.714557][ T8466] The buggy address belongs to the object at ffff88807ffce800 [ 60.714557][ T8466] which belongs to the cache kmalloc-4k of size 4096 [ 60.728614][ T8466] The buggy address is located 3000 bytes inside of [ 60.728614][ T8466] 4096-byte region [ffff88807ffce800, ffff88807ffcf800) [ 60.742060][ T8466] The buggy address belongs to the page: [ 60.747730][ T8466] page:ffffea0001fff380 count:1 mapcount:0 mapping:ffff88812c3f0dc0 index:0x0 compound_mapcount: 0 [ 60.758425][ T8466] flags: 0x1fffc0000010200(slab|head) [ 60.763806][ T8466] raw: 01fffc0000010200 ffffea0001e65408 ffffea00027e2408 ffff88812c3f0dc0 [ 60.772398][ T8466] raw: 0000000000000000 ffff88807ffce800 0000000100000001 0000000000000000 [ 60.781328][ T8466] page dumped because: kasan: bad access detected [ 60.787756][ T8466] [ 60.790085][ T8466] Memory state around the buggy address: [ 60.795738][ T8466] ffff88807ffcf280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 60.803803][ T8466] ffff88807ffcf300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 executing program executing program executing program executing program executing program [ 60.811894][ T8466] >ffff88807ffcf380: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 60.819952][ T8466] ^ [ 60.825931][ T8466] ffff88807ffcf400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.833996][ T8466] ffff88807ffcf480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.842228][ T8466] ================================================================== [ 60.850283][ T8466] Disabling lock debugging due to kernel taint [ 60.861478][ T8466] Kernel panic - not syncing: panic_on_warn set ... executing program [ 60.868085][ T8466] CPU: 1 PID: 8466 Comm: syz-executor510 Tainted: G B 5.0.0+ #24 [ 60.877117][ T8466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.887172][ T8466] Call Trace: [ 60.890465][ T8466] dump_stack+0x172/0x1f0 [ 60.894810][ T8466] panic+0x2cb/0x65c [ 60.898713][ T8466] ? __warn_printk+0xf3/0xf3 [ 60.903309][ T8466] ? linear_transfer+0x6de/0x970 [ 60.908251][ T8466] ? preempt_schedule+0x4b/0x60 [ 60.913121][ T8466] ? ___preempt_schedule+0x16/0x18 executing program [ 60.918239][ T8466] ? trace_hardirqs_on+0x5e/0x230 [ 60.923279][ T8466] ? linear_transfer+0x6de/0x970 [ 60.928225][ T8466] end_report+0x47/0x4f [ 60.932386][ T8466] ? linear_transfer+0x6de/0x970 [ 60.937325][ T8466] kasan_report.cold+0xe/0x40 [ 60.942007][ T8466] ? linear_transfer+0x6de/0x970 [ 60.946951][ T8466] check_memory_region+0x123/0x190 [ 60.952064][ T8466] memcpy+0x24/0x50 [ 60.955893][ T8466] linear_transfer+0x6de/0x970 [ 60.960661][ T8466] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 executing program executing program executing program [ 60.966913][ T8466] ? snd_pcm_plugin_build_copy+0x410/0x410 [ 60.972757][ T8466] ? io_capture_transfer+0x1fd/0x330 [ 60.978055][ T8466] ? rate_dst_frames+0x2e0/0x2e0 [ 60.983042][ T8466] snd_pcm_plug_read_transfer+0x1a1/0x2f0 [ 60.988770][ T8466] ? snd_pcm_plug_write_transfer+0x400/0x400 [ 60.994928][ T8466] ? snd_pcm_format_physical_width+0x75/0x90 [ 61.000912][ T8466] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 61.006645][ T8466] ? snd_pcm_plug_client_channels_buf+0x212/0x450 [ 61.013068][ T8466] snd_pcm_oss_read2+0x1f0/0x3f0 executing program [ 61.018028][ T8466] ? snd_pcm_oss_read3+0x420/0x420 [ 61.023153][ T8466] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 61.029398][ T8466] snd_pcm_oss_read+0x53a/0x6a0 [ 61.034255][ T8466] __vfs_read+0x8d/0x110 [ 61.038504][ T8466] ? snd_pcm_oss_read2+0x3f0/0x3f0 [ 61.043658][ T8466] vfs_read+0x194/0x3e0 [ 61.047846][ T8466] ksys_read+0xea/0x1f0 [ 61.052036][ T8466] ? kernel_write+0x120/0x120 [ 61.056725][ T8466] ? do_syscall_64+0x26/0x610 [ 61.061403][ T8466] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe executing program executing program [ 61.067473][ T8466] ? do_syscall_64+0x26/0x610 [ 61.072160][ T8466] __x64_sys_read+0x73/0xb0 [ 61.076671][ T8466] do_syscall_64+0x103/0x610 [ 61.081292][ T8466] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 61.087188][ T8466] RIP: 0033:0x446839 [ 61.091087][ T8466] Code: e8 0c e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b 07 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 61.110706][ T8466] RSP: 002b:00007f018eea3db8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 executing program [ 61.119128][ T8466] RAX: ffffffffffffffda RBX: 00000000006dbc38 RCX: 0000000000446839 [ 61.127113][ T8466] RDX: 0000000000001000 RSI: 00000000200012c0 RDI: 0000000000000003 [ 61.135085][ T8466] RBP: 00000000006dbc30 R08: 0000000000000000 R09: 0000000000000000 [ 61.143068][ T8466] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dbc3c [ 61.151106][ T8466] R13: 00007fff63b9986f R14: 00007f018eea49c0 R15: 0000000000000000 [ 61.159876][ T8466] Kernel Offset: disabled [ 61.164198][ T8466] Rebooting in 86400 seconds..