[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 34.000212] random: sshd: uninitialized urandom read (32 bytes read) [ 34.319411] kauditd_printk_skb: 9 callbacks suppressed [ 34.319419] audit: type=1400 audit(1572318834.451:35): avc: denied { map } for pid=6867 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 34.374765] random: sshd: uninitialized urandom read (32 bytes read) [ 34.895574] random: sshd: uninitialized urandom read (32 bytes read) [ 35.076374] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.160' (ECDSA) to the list of known hosts. [ 40.541643] random: sshd: uninitialized urandom read (32 bytes read) [ 40.660111] audit: type=1400 audit(1572318840.791:36): avc: denied { map } for pid=6880 comm="syz-executor638" path="/root/syz-executor638725772" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 40.696608] ================================================================== [ 40.704147] BUG: KASAN: null-ptr-deref in llcp_sock_getname+0x38f/0x4a0 [ 40.710905] Read of size 1 at addr (null) by task syz-executor638/6903 [ 40.718436] [ 40.720064] CPU: 1 PID: 6903 Comm: syz-executor638 Not tainted 4.14.150 #0 [ 40.727087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 40.736436] Call Trace: [ 40.739012] dump_stack+0x138/0x197 [ 40.742637] ? llcp_sock_getname+0x38f/0x4a0 [ 40.747037] kasan_report.cold+0x127/0x2af [ 40.751268] check_memory_region+0x123/0x190 [ 40.755676] memcpy+0x24/0x50 [ 40.758779] llcp_sock_getname+0x38f/0x4a0 [ 40.763014] ? security_socket_getpeername+0x79/0xa0 [ 40.768124] SYSC_getpeername+0x120/0x270 [ 40.772268] ? SYSC_getsockname+0x1f0/0x1f0 [ 40.776594] ? __do_page_fault+0x358/0xb80 [ 40.780829] SyS_getpeername+0x24/0x30 [ 40.784709] ? SyS_getsockname+0x30/0x30 [ 40.788917] do_syscall_64+0x1e8/0x640 [ 40.792800] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 40.797647] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 40.802836] RIP: 0033:0x441299 [ 40.806358] RSP: 002b:00007ffcf2d4ffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000034 [ 40.814068] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441299 [ 40.821335] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 40.828607] RBP: 0000000000009ed9 R08: 00000000004002c8 R09: 00000000004002c8 [ 40.835873] R10: 00000000004002c8 R11: 0000000000000246 R12: 0000000000402010 [ 40.843140] R13: 00000000004020a0 R14: 0000000000000000 R15: 0000000000000000 [ 40.850420] ================================================================== [ 40.857776] Disabling lock debugging due to kernel taint [ 40.865607] BUG: unable to handle kernel NULL pointer dereference at (null) [ 40.873633] IP: memcpy_erms+0x6/0x10 [ 40.877331] PGD 7ec31067 P4D 7ec31067 PUD 953a8067 PMD 0 [ 40.882855] Oops: 0000 [#1] PREEMPT SMP KASAN [ 40.887323] Modules linked in: [ 40.890495] CPU: 1 PID: 6928 Comm: syz-executor638 Tainted: G B 4.14.150 #0 [ 40.898697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 40.908029] task: ffff888081e8e080 task.stack: ffff88807fa68000 [ 40.914098] RIP: 0010:memcpy_erms+0x6/0x10 [ 40.918305] RSP: 0018:ffff88807fa6fd20 EFLAGS: 00010246 [ 40.923681] RAX: ffff88807fa6fe0a RBX: ffff88807fa6fdf8 RCX: 0000000000000001 [ 40.930928] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff88807fa6fe0a [ 40.938184] RBP: ffff88807fa6fd40 R08: 1ffff1100ff4dfc1 R09: ffffed100ff4dfc2 [ 40.945428] R10: ffffed100ff4dfc1 R11: ffff88807fa6fe0a R12: 0000000000000001 [ 40.952675] R13: ffff88807fa6fe0a R14: 0000000000000000 R15: ffffffff87069c40 [ 40.959923] FS: 0000000000cec880(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 40.968558] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 40.974416] CR2: 0000000000000000 CR3: 0000000096d1a000 CR4: 00000000001406e0 [ 40.981668] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 40.988919] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 40.996163] Call Trace: [ 40.998728] ? memcpy+0x46/0x50 [ 41.001988] llcp_sock_getname+0x38f/0x4a0 [ 41.006201] ? security_socket_getpeername+0x79/0xa0 [ 41.011283] SYSC_getpeername+0x120/0x270 [ 41.015411] ? SYSC_getsockname+0x1f0/0x1f0 [ 41.019725] ? __do_page_fault+0x358/0xb80 [ 41.023937] SyS_getpeername+0x24/0x30 [ 41.027801] ? SyS_getsockname+0x30/0x30 [ 41.031873] do_syscall_64+0x1e8/0x640 [ 41.035805] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 41.040652] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 41.045823] RIP: 0033:0x441299 [ 41.048991] RSP: 002b:00007ffcf2d4ffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000034 [ 41.056681] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441299 [ 41.063932] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 41.071192] RBP: 0000000000009f36 R08: 00000000004002c8 R09: 00000000004002c8 [ 41.078437] R10: 00000000004002c8 R11: 0000000000000246 R12: 0000000000402010 [ 41.085777] R13: 00000000004020a0 R14: 0000000000000000 R15: 0000000000000000 [ 41.093029] Code: 90 90 90 90 90 eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 [ 41.112128] RIP: memcpy_erms+0x6/0x10 RSP: ffff88807fa6fd20 [ 41.117811] CR2: 0000000000000000 [ 41.121252] BUG: unable to handle kernel NULL pointer dereference at (null) [ 41.122733] Kernel panic - not syncing: panic_on_warn set ... [ 41.122733] [ 41.129244] IP: memcpy_erms+0x6/0x10 [ 41.140279] PGD 8ab60067 P4D 8ab60067 PUD 96b6f067 PMD 0 [ 41.145814] Oops: 0000 [#2] PREEMPT SMP KASAN [ 41.150290] Modules linked in: [ 41.153472] CPU: 0 PID: 6968 Comm: syz-executor638 Tainted: G B D 4.14.150 #0 [ 41.161679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.171015] task: ffff88809eb00240 task.stack: ffff888098050000 [ 41.177056] RIP: 0010:memcpy_erms+0x6/0x10 [ 41.181302] RSP: 0018:ffff888098057d20 EFLAGS: 00010246 [ 41.186645] RAX: ffff888098057e0a RBX: ffff888098057df8 RCX: 0000000000000001 [ 41.193894] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff888098057e0a [ 41.201144] RBP: ffff888098057d40 R08: 1ffff1101300afc1 R09: ffffed101300afc2 [ 41.208397] R10: ffffed101300afc1 R11: ffff888098057e0a R12: 0000000000000001 [ 41.215657] R13: ffff888098057e0a R14: 0000000000000000 R15: ffffffff87069c40 [ 41.222908] FS: 0000000000cec880(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 41.231125] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.236990] CR2: 0000000000000000 CR3: 00000000955f1000 CR4: 00000000001406f0 [ 41.244251] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 41.251506] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 41.258778] Call Trace: [ 41.261351] ? memcpy+0x46/0x50 [ 41.264619] llcp_sock_getname+0x38f/0x4a0 [ 41.268838] ? security_socket_getpeername+0x79/0xa0 [ 41.273926] SYSC_getpeername+0x120/0x270 [ 41.278054] ? SYSC_getsockname+0x1f0/0x1f0 [ 41.282361] ? __do_page_fault+0x358/0xb80 [ 41.286585] SyS_getpeername+0x24/0x30 [ 41.290452] ? SyS_getsockname+0x30/0x30 [ 41.294523] do_syscall_64+0x1e8/0x640 [ 41.298389] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 41.303213] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 41.308380] RIP: 0033:0x441299 [ 41.311548] RSP: 002b:00007ffcf2d4ffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000034 [ 41.319245] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441299 [ 41.326493] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 41.333743] RBP: 0000000000009ef5 R08: 00000000004002c8 R09: 00000000004002c8 [ 41.340989] R10: 00000000004002c8 R11: 0000000000000246 R12: 0000000000402010 [ 41.348238] R13: 00000000004020a0 R14: 0000000000000000 R15: 0000000000000000 [ 41.355492] Code: 90 90 90 90 90 eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 [ 41.374612] RIP: memcpy_erms+0x6/0x10 RSP: ffff888098057d20 [ 41.380297] CR2: 0000000000000000 [ 41.385119] Kernel Offset: disabled [ 41.388740] Rebooting in 86400 seconds..