[....] Starting enhanced syslogd: rsyslogd[ 17.160929] audit: type=1400 audit(1520612131.678:5): avc: denied { syslog } for pid=4097 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 22.939686] audit: type=1400 audit(1520612137.457:6): avc: denied { map } for pid=4236 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.52' (ECDSA) to the list of known hosts. executing program [ 29.261630] audit: type=1400 audit(1520612143.779:7): avc: denied { map } for pid=4250 comm="syzkaller191035" path="/root/syzkaller191035422" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 29.272136] IPVS: ftp: loaded support on port[0] = 21 executing program executing program executing program executing program [ 29.314229] IPVS: ftp: loaded support on port[0] = 21 [ 29.318320] audit: type=1400 audit(1520612143.836:8): avc: denied { map } for pid=4259 comm="syzkaller191035" path="/dev/dsp1" dev="devtmpfs" ino=1250 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 [ 29.338563] IPVS: ftp: loaded support on port[0] = 21 [ 29.371519] IPVS: ftp: loaded support on port[0] = 21 [ 29.374847] ================================================================== [ 29.384141] BUG: KASAN: use-after-free in snd_pcm_oss_get_formats+0x320/0x380 [ 29.391387] Read of size 4 at addr ffff8801bace4024 by task syzkaller191035/4271 [ 29.398888] [ 29.400490] CPU: 0 PID: 4271 Comm: syzkaller191035 Not tainted 4.16.0-rc4+ #346 [ 29.400748] IPVS: ftp: loaded support on port[0] = 21 [ 29.407907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 29.407911] Call Trace: [ 29.407922] dump_stack+0x194/0x24d [ 29.407930] ? arch_local_irq_restore+0x53/0x53 [ 29.407938] ? show_regs_print_info+0x18/0x18 [ 29.407951] ? trace_hardirqs_off+0xd/0x10 [ 29.440828] IPVS: ftp: loaded support on port[0] = 21 [ 29.441917] ? snd_pcm_oss_get_formats+0x320/0x380 [ 29.441927] print_address_description+0x73/0x250 [ 29.441935] ? snd_pcm_oss_get_formats+0x320/0x380 [ 29.461741] kasan_report+0x23c/0x360 [ 29.465519] __asan_report_load4_noabort+0x14/0x20 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 29.470421] snd_pcm_oss_get_formats+0x320/0x380 [ 29.475150] ? snd_pcm_oss_set_channels+0x3a0/0x3a0 [ 29.480152] ? __might_sleep+0x95/0x190 [ 29.484108] snd_pcm_oss_ioctl+0x1e2f/0x39f0 [ 29.487234] IPVS: ftp: loaded support on port[0] = 21 [ 29.488492] ? lock_release+0xa40/0xa40 [ 29.488503] ? snd_pcm_oss_release+0x280/0x280 [ 29.502296] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 29.507298] ? finish_task_switch+0x1c1/0x7e0 [ 29.511775] ? avc_has_extended_perms+0x7fa/0x12c0 [ 29.516680] ? find_held_lock+0x80/0x1d0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 29.520726] ? avc_ss_reset+0x110/0x110 [ 29.524681] ? lock_release+0xa40/0xa40 [ 29.528631] ? __lock_is_held+0xb6/0x140 [ 29.532688] ? check_same_owner+0x320/0x320 [ 29.536990] ? rcu_note_context_switch+0x710/0x710 [ 29.541904] ? snd_pcm_oss_release+0x280/0x280 [ 29.543798] IPVS: ftp: loaded support on port[0] = 21 [ 29.546465] do_vfs_ioctl+0x1b1/0x1520 [ 29.546479] ? ioctl_preallocate+0x2b0/0x2b0 [ 29.546489] ? selinux_capable+0x40/0x40 [ 29.564026] ? kmem_cache_free+0x258/0x2a0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 29.568241] ? exit_to_usermode_loop+0x8b/0x2f0 [ 29.572894] ? security_file_ioctl+0x7d/0xb0 [ 29.577293] ? security_file_ioctl+0x89/0xb0 [ 29.581701] SyS_ioctl+0x8f/0xc0 [ 29.585044] ? do_vfs_ioctl+0x1520/0x1520 [ 29.589179] do_syscall_64+0x281/0x940 [ 29.593044] ? __do_page_fault+0xc90/0xc90 [ 29.597255] ? _raw_spin_unlock_irq+0x27/0x70 [ 29.601727] ? finish_task_switch+0x1c1/0x7e0 [ 29.606197] ? syscall_return_slowpath+0x550/0x550 [ 29.611100] ? syscall_return_slowpath+0x2ac/0x550 [ 29.616005] ? prepare_exit_to_usermode+0x350/0x350 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 29.621000] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 29.626341] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 29.631162] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 29.636324] RIP: 0033:0x4499e9 [ 29.639485] RSP: 002b:00007fa1872a5da8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 29.647165] RAX: ffffffffffffffda RBX: 00000000006dbc24 RCX: 00000000004499e9 [ 29.654416] RDX: 0000000020000080 RSI: 00800000c0045005 RDI: 0000000000000003 [ 29.661669] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 29.668911] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dbc20 [ 29.676150] R13: 7073642f7665642f R14: 00800000c0045005 R15: 0000000000000003 [ 29.683404] [ 29.685003] Allocated by task 4271: [ 29.688603] save_stack+0x43/0xd0 [ 29.692025] kasan_kmalloc+0xad/0xe0 [ 29.695710] kmem_cache_alloc_trace+0x136/0x740 [ 29.700355] snd_pcm_oss_get_formats+0x1c7/0x380 [ 29.705082] snd_pcm_oss_ioctl+0x1e2f/0x39f0 [ 29.709463] do_vfs_ioctl+0x1b1/0x1520 [ 29.713323] SyS_ioctl+0x8f/0xc0 [ 29.716658] do_syscall_64+0x281/0x940 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 29.720517] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 29.725672] [ 29.727270] Freed by task 4271: [ 29.730518] save_stack+0x43/0xd0 [ 29.733940] __kasan_slab_free+0x11a/0x170 [ 29.738143] kasan_slab_free+0xe/0x10 [ 29.741913] kfree+0xd9/0x260 [ 29.744991] snd_pcm_oss_get_formats+0x216/0x380 [ 29.749716] snd_pcm_oss_ioctl+0x1e2f/0x39f0 [ 29.754094] do_vfs_ioctl+0x1b1/0x1520 [ 29.757954] SyS_ioctl+0x8f/0xc0 [ 29.761290] do_syscall_64+0x281/0x940 [ 29.765162] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 29.770319] executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 29.771919] The buggy address belongs to the object at ffff8801bace4000 [ 29.771919] which belongs to the cache kmalloc-1024 of size 1024 [ 29.784718] The buggy address is located 36 bytes inside of [ 29.784718] 1024-byte region [ffff8801bace4000, ffff8801bace4400) [ 29.796576] The buggy address belongs to the page: [ 29.801481] page:ffffea0006eb3900 count:1 mapcount:0 mapping:ffff8801bace4000 index:0x0 compound_mapcount: 0 [ 29.811422] flags: 0x2fffc0000008100(slab|head) [ 29.816065] raw: 02fffc0000008100 ffff8801bace4000 0000000000000000 0000000100000007 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 29.823916] raw: ffffea000761d7a0 ffffea0006eb39a0 ffff8801dac00ac0 0000000000000000 [ 29.831764] page dumped because: kasan: bad access detected [ 29.837461] [ 29.839075] Memory state around the buggy address: [ 29.843995] ffff8801bace3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.851327] ffff8801bace3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.858655] >ffff8801bace4000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.865985] ^ executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 29.870362] ffff8801bace4080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.877698] ffff8801bace4100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.885035] ================================================================== [ 29.892362] Disabling lock debugging due to kernel taint [ 29.897856] Kernel panic - not syncing: panic_on_warn set ... [ 29.897856] [ 29.905196] CPU: 0 PID: 4271 Comm: syzkaller191035 Tainted: G B 4.16.0-rc4+ #346 [ 29.913914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 29.923238] Call Trace: [ 29.925800] dump_stack+0x194/0x24d [ 29.929398] ? arch_local_irq_restore+0x53/0x53 [ 29.934038] ? kasan_end_report+0x32/0x50 [ 29.938160] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 29.942884] ? vsnprintf+0x1ed/0x1900 [ 29.946661] ? snd_pcm_oss_get_formats+0x2c0/0x380 [ 29.951561] panic+0x1e4/0x41c [ 29.954722] ? refcount_error_report+0x214/0x214 [ 29.959448] ? add_taint+0x1c/0x50 [ 29.962957] ? add_taint+0x1c/0x50 [ 29.966472] ? snd_pcm_oss_get_formats+0x320/0x380 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 29.971370] kasan_end_report+0x50/0x50 [ 29.975316] kasan_report+0x149/0x360 [ 29.979087] __asan_report_load4_noabort+0x14/0x20 [ 29.983987] snd_pcm_oss_get_formats+0x320/0x380 [ 29.988715] ? snd_pcm_oss_set_channels+0x3a0/0x3a0 [ 29.993706] ? __might_sleep+0x95/0x190 [ 29.997656] snd_pcm_oss_ioctl+0x1e2f/0x39f0 [ 30.002039] ? lock_release+0xa40/0xa40 [ 30.005986] ? snd_pcm_oss_release+0x280/0x280 [ 30.010535] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 30.015523] ? finish_task_switch+0x1c1/0x7e0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 30.019993] ? avc_has_extended_perms+0x7fa/0x12c0 [ 30.024892] ? find_held_lock+0x80/0x1d0 [ 30.028929] ? avc_ss_reset+0x110/0x110 [ 30.032900] ? lock_release+0xa40/0xa40 [ 30.036847] ? __lock_is_held+0xb6/0x140 [ 30.040892] ? check_same_owner+0x320/0x320 [ 30.045185] ? rcu_note_context_switch+0x710/0x710 [ 30.050088] ? snd_pcm_oss_release+0x280/0x280 [ 30.054639] do_vfs_ioctl+0x1b1/0x1520 [ 30.058498] ? ioctl_preallocate+0x2b0/0x2b0 [ 30.062878] ? selinux_capable+0x40/0x40 [ 30.066908] ? kmem_cache_free+0x258/0x2a0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 30.071118] ? exit_to_usermode_loop+0x8b/0x2f0 [ 30.075764] ? security_file_ioctl+0x7d/0xb0 [ 30.080141] ? security_file_ioctl+0x89/0xb0 [ 30.084521] SyS_ioctl+0x8f/0xc0 [ 30.087859] ? do_vfs_ioctl+0x1520/0x1520 [ 30.091976] do_syscall_64+0x281/0x940 [ 30.095835] ? __do_page_fault+0xc90/0xc90 [ 30.100055] ? _raw_spin_unlock_irq+0x27/0x70 [ 30.104519] ? finish_task_switch+0x1c1/0x7e0 [ 30.108993] ? syscall_return_slowpath+0x550/0x550 [ 30.113891] ? syscall_return_slowpath+0x2ac/0x550 [ 30.118803] ? prepare_exit_to_usermode+0x350/0x350 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 30.123788] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 30.129121] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 30.133937] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 30.139098] RIP: 0033:0x4499e9 [ 30.142259] RSP: 002b:00007fa1872a5da8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 30.149936] RAX: ffffffffffffffda RBX: 00000000006dbc24 RCX: 00000000004499e9 [ 30.157177] RDX: 0000000020000080 RSI: 00800000c0045005 RDI: 0000000000000003 [ 30.164416] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 executing program [ 30.171752] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dbc20 [ 30.178989] R13: 7073642f7665642f R14: 00800000c0045005 R15: 0000000000000003 [ 30.186591] Dumping ftrace buffer: [ 30.190099] (ftrace buffer empty) [ 30.193780] Kernel Offset: disabled [ 30.197380] Rebooting in 86400 seconds..