[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 19.182901] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 22.961191] random: sshd: uninitialized urandom read (32 bytes read) [ 23.348619] random: sshd: uninitialized urandom read (32 bytes read) [ 24.063266] random: sshd: uninitialized urandom read (32 bytes read) [ 24.215777] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.21' (ECDSA) to the list of known hosts. [ 29.693870] random: sshd: uninitialized urandom read (32 bytes read) 2018/04/29 10:54:17 parsed 1 programs 2018/04/29 10:54:17 executed programs: 0 [ 30.152619] IPVS: ftp: loaded support on port[0] = 21 [ 30.199176] ================================================================== [ 30.206690] BUG: KASAN: slab-out-of-bounds in __sctp_v6_cmp_addr+0x4c7/0x530 [ 30.213876] Read of size 8 at addr ffff8801d77873a0 by task syz-executor0/4456 [ 30.221217] [ 30.222840] CPU: 1 PID: 4456 Comm: syz-executor0 Not tainted 4.17.0-rc2+ #48 [ 30.230007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.239396] Call Trace: [ 30.241984] dump_stack+0x1b9/0x294 [ 30.245607] ? dump_stack_print_info.cold.2+0x52/0x52 [ 30.250791] ? printk+0x9e/0xba [ 30.254064] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 30.258809] ? kasan_check_write+0x14/0x20 [ 30.263045] print_address_description+0x6c/0x20b [ 30.267875] ? __sctp_v6_cmp_addr+0x4c7/0x530 [ 30.272361] kasan_report.cold.7+0x242/0x2fe [ 30.276757] __asan_report_load8_noabort+0x14/0x20 [ 30.281669] __sctp_v6_cmp_addr+0x4c7/0x530 [ 30.285971] sctp_inet6_cmp_addr+0x169/0x1a0 [ 30.290364] sctp_bind_addr_match+0x20b/0x400 [ 30.294843] ? sctp_bind_addrs_to_raw+0x370/0x370 [ 30.299682] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 30.305201] ? sctp_v4_available+0x1b1/0x200 [ 30.309594] ? sctp_inet6_bind_verify+0xb2/0x500 [ 30.314334] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 30.319945] sctp_do_bind+0x1c0/0x5f0 [ 30.323732] sctp_bindx_add+0x90/0x1a0 [ 30.327603] sctp_setsockopt_bindx+0x2ad/0x320 [ 30.332167] sctp_setsockopt+0x12c4/0x7000 [ 30.336394] ? graph_lock+0x170/0x170 [ 30.340184] ? sctp_setsockopt_paddr_thresholds+0x560/0x560 [ 30.345875] ? print_usage_bug+0xc0/0xc0 [ 30.349921] ? mark_held_locks+0xc9/0x160 [ 30.354056] ? page_add_new_anon_rmap+0x3ff/0x850 [ 30.358887] ? find_held_lock+0x36/0x1c0 [ 30.362936] ? __lock_acquire+0x7f5/0x5140 [ 30.367161] ? pudp_huge_clear_flush+0x230/0x230 [ 30.371905] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 30.377080] ? debug_check_no_locks_freed+0x310/0x310 [ 30.382253] ? get_futex_key+0x1e90/0x1e90 [ 30.386479] ? do_huge_pmd_anonymous_page+0x48d/0x1cc0 [ 30.391752] ? __thp_get_unmapped_area+0x180/0x180 [ 30.396670] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 30.401846] ? do_futex+0x249/0x27d0 [ 30.405541] ? find_held_lock+0x36/0x1c0 [ 30.409586] ? graph_lock+0x170/0x170 [ 30.413375] ? exit_robust_list+0x290/0x290 [ 30.417701] ? kasan_check_read+0x11/0x20 [ 30.421842] ? find_held_lock+0x36/0x1c0 [ 30.425894] ? lock_downgrade+0x8e0/0x8e0 [ 30.430042] ? kasan_check_read+0x11/0x20 [ 30.434179] ? rcu_is_watching+0x85/0x140 [ 30.438318] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 30.443507] ? __fget+0x40c/0x650 [ 30.446947] ? expand_files.part.8+0x9a0/0x9a0 [ 30.451518] ? lock_downgrade+0x8e0/0x8e0 [ 30.455651] ? handle_mm_fault+0x8c0/0xc70 [ 30.459874] compat_sock_common_setsockopt+0x10c/0x150 [ 30.465144] ? sock_common_setsockopt+0xe0/0xe0 [ 30.469804] __compat_sys_setsockopt+0x1ab/0x7c0 [ 30.474545] ? __compat_sys_getsockopt+0x7f0/0x7f0 [ 30.479555] ? __x32_compat_sys_get_robust_list+0x430/0x430 [ 30.485265] ? mm_fault_error+0x380/0x380 [ 30.489411] __ia32_compat_sys_setsockopt+0xbd/0x150 [ 30.494495] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 30.499494] do_fast_syscall_32+0x345/0xf9b [ 30.503799] ? do_int80_syscall_32+0x880/0x880 [ 30.508363] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 30.513196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 30.518713] ? syscall_return_slowpath+0x30f/0x5c0 [ 30.523631] ? sysret32_from_system_call+0x5/0x46 [ 30.528458] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 30.533285] entry_SYSENTER_compat+0x70/0x7f [ 30.537671] RIP: 0023:0xf7f36cb9 [ 30.541020] RSP: 002b:00000000ff91257c EFLAGS: 00000282 ORIG_RAX: 000000000000016e [ 30.548724] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000084 [ 30.555974] RDX: 0000000000000064 RSI: 0000000020000140 RDI: 0000000000000020 [ 30.563224] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 30.570471] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 30.577721] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 30.584975] [ 30.586583] Allocated by task 4456: [ 30.590194] save_stack+0x43/0xd0 [ 30.593626] kasan_kmalloc+0xc4/0xe0 [ 30.597328] __kmalloc_node+0x47/0x70 [ 30.601113] kvmalloc_node+0x6b/0x100 [ 30.604902] vmemdup_user+0x2d/0xa0 [ 30.608516] sctp_setsockopt_bindx+0x5d/0x320 [ 30.612994] sctp_setsockopt+0x12c4/0x7000 [ 30.617216] compat_sock_common_setsockopt+0x10c/0x150 [ 30.622475] __compat_sys_setsockopt+0x1ab/0x7c0 [ 30.627211] __ia32_compat_sys_setsockopt+0xbd/0x150 [ 30.632307] do_fast_syscall_32+0x345/0xf9b [ 30.636626] entry_SYSENTER_compat+0x70/0x7f [ 30.641008] [ 30.642638] Freed by task 2822: [ 30.645908] save_stack+0x43/0xd0 [ 30.649344] __kasan_slab_free+0x11a/0x170 [ 30.653569] kasan_slab_free+0xe/0x10 [ 30.657360] kfree+0xd9/0x260 [ 30.660447] single_release+0x8f/0xb0 [ 30.664232] __fput+0x34d/0x890 [ 30.667490] ____fput+0x15/0x20 [ 30.670752] task_work_run+0x1e4/0x290 [ 30.674635] exit_to_usermode_loop+0x2bd/0x310 [ 30.679205] do_syscall_64+0x6ac/0x800 [ 30.683076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 30.688242] [ 30.689851] The buggy address belongs to the object at ffff8801d7787380 [ 30.689851] which belongs to the cache kmalloc-32 of size 32 [ 30.702316] The buggy address is located 0 bytes to the right of [ 30.702316] 32-byte region [ffff8801d7787380, ffff8801d77873a0) [ 30.714448] The buggy address belongs to the page: [ 30.719365] page:ffffea00075de1c0 count:1 mapcount:0 mapping:ffff8801d7787000 index:0xffff8801d7787fc1 [ 30.728797] flags: 0x2fffc0000000100(slab) [ 30.733027] raw: 02fffc0000000100 ffff8801d7787000 ffff8801d7787fc1 0000000100000029 [ 30.740894] raw: ffffea000766caa0 ffffea00075dfae0 ffff8801da8001c0 0000000000000000 [ 30.748752] page dumped because: kasan: bad access detected [ 30.754439] [ 30.756047] Memory state around the buggy address: [ 30.760955] ffff8801d7787280: fb fb fb fb fc fc fc fc 05 fc fc fc fc fc fc fc [ 30.768303] ffff8801d7787300: 00 00 04 fc fc fc fc fc 00 00 00 00 fc fc fc fc [ 30.775648] >ffff8801d7787380: 00 00 00 00 fc fc fc fc fb fb fb fb fc fc fc fc [ 30.782991] ^ [ 30.787383] ffff8801d7787400: fb fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 30.794723] ffff8801d7787480: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 30.802063] ================================================================== [ 30.809411] Disabling lock debugging due to kernel taint [ 30.814911] Kernel panic - not syncing: panic_on_warn set ... [ 30.814911] [ 30.822285] CPU: 1 PID: 4456 Comm: syz-executor0 Tainted: G B 4.17.0-rc2+ #48 [ 30.830850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.840194] Call Trace: [ 30.842772] dump_stack+0x1b9/0x294 [ 30.846379] ? dump_stack_print_info.cold.2+0x52/0x52 [ 30.851552] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 30.856288] ? __sctp_v6_cmp_addr+0x3f0/0x530 [ 30.860767] panic+0x22f/0x4de [ 30.863940] ? add_taint.cold.5+0x16/0x16 [ 30.868074] ? do_raw_spin_unlock+0x9e/0x2e0 [ 30.872461] ? do_raw_spin_unlock+0x9e/0x2e0 [ 30.876854] ? __sctp_v6_cmp_addr+0x4c7/0x530 [ 30.881326] kasan_end_report+0x47/0x4f [ 30.885286] kasan_report.cold.7+0x76/0x2fe [ 30.889595] __asan_report_load8_noabort+0x14/0x20 [ 30.894523] __sctp_v6_cmp_addr+0x4c7/0x530 [ 30.898826] sctp_inet6_cmp_addr+0x169/0x1a0 [ 30.903220] sctp_bind_addr_match+0x20b/0x400 [ 30.907696] ? sctp_bind_addrs_to_raw+0x370/0x370 [ 30.912528] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 30.918046] ? sctp_v4_available+0x1b1/0x200 [ 30.922440] ? sctp_inet6_bind_verify+0xb2/0x500 [ 30.927185] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 30.932706] sctp_do_bind+0x1c0/0x5f0 [ 30.936501] sctp_bindx_add+0x90/0x1a0 [ 30.940380] sctp_setsockopt_bindx+0x2ad/0x320 [ 30.944948] sctp_setsockopt+0x12c4/0x7000 [ 30.949165] ? graph_lock+0x170/0x170 [ 30.952946] ? sctp_setsockopt_paddr_thresholds+0x560/0x560 [ 30.958640] ? print_usage_bug+0xc0/0xc0 [ 30.962683] ? mark_held_locks+0xc9/0x160 [ 30.966810] ? page_add_new_anon_rmap+0x3ff/0x850 [ 30.971638] ? find_held_lock+0x36/0x1c0 [ 30.975687] ? __lock_acquire+0x7f5/0x5140 [ 30.979904] ? pudp_huge_clear_flush+0x230/0x230 [ 30.984647] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 30.989840] ? debug_check_no_locks_freed+0x310/0x310 [ 30.995477] ? get_futex_key+0x1e90/0x1e90 [ 30.999695] ? do_huge_pmd_anonymous_page+0x48d/0x1cc0 [ 31.004962] ? __thp_get_unmapped_area+0x180/0x180 [ 31.009886] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 31.015070] ? do_futex+0x249/0x27d0 [ 31.018776] ? find_held_lock+0x36/0x1c0 [ 31.022826] ? graph_lock+0x170/0x170 [ 31.026626] ? exit_robust_list+0x290/0x290 [ 31.030939] ? kasan_check_read+0x11/0x20 [ 31.035065] ? find_held_lock+0x36/0x1c0 [ 31.039109] ? lock_downgrade+0x8e0/0x8e0 [ 31.043249] ? kasan_check_read+0x11/0x20 [ 31.047383] ? rcu_is_watching+0x85/0x140 [ 31.051768] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 31.056951] ? __fget+0x40c/0x650 [ 31.060394] ? expand_files.part.8+0x9a0/0x9a0 [ 31.064959] ? lock_downgrade+0x8e0/0x8e0 [ 31.069092] ? handle_mm_fault+0x8c0/0xc70 [ 31.073309] compat_sock_common_setsockopt+0x10c/0x150 [ 31.078568] ? sock_common_setsockopt+0xe0/0xe0 [ 31.083224] __compat_sys_setsockopt+0x1ab/0x7c0 [ 31.087960] ? __compat_sys_getsockopt+0x7f0/0x7f0 [ 31.092875] ? __x32_compat_sys_get_robust_list+0x430/0x430 [ 31.098584] ? mm_fault_error+0x380/0x380 [ 31.102730] __ia32_compat_sys_setsockopt+0xbd/0x150 [ 31.107825] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 31.112861] do_fast_syscall_32+0x345/0xf9b [ 31.117173] ? do_int80_syscall_32+0x880/0x880 [ 31.121746] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 31.126502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 31.132027] ? syscall_return_slowpath+0x30f/0x5c0 [ 31.136939] ? sysret32_from_system_call+0x5/0x46 [ 31.141763] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 31.146585] entry_SYSENTER_compat+0x70/0x7f [ 31.150971] RIP: 0023:0xf7f36cb9 [ 31.154313] RSP: 002b:00000000ff91257c EFLAGS: 00000282 ORIG_RAX: 000000000000016e [ 31.162008] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000084 [ 31.169264] RDX: 0000000000000064 RSI: 0000000020000140 RDI: 0000000000000020 [ 31.176517] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 31.183763] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 31.191021] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 31.198776] Dumping ftrace buffer: [ 31.202297] (ftrace buffer empty) [ 31.205994] Kernel Offset: disabled [ 31.209688] Rebooting in 86400 seconds..