[ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Started System Logging Service. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Started OpenBSD Secure Shell server. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.215' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 76.088400][ T8425] ================================================================== [ 76.096692][ T8425] BUG: KASAN: slab-out-of-bounds in _copy_to_user+0xc7/0x150 [ 76.104109][ T8425] Read of size 42 at addr ffff8880180e6200 by task syz-executor926/8425 [ 76.112449][ T8425] [ 76.114778][ T8425] CPU: 0 PID: 8425 Comm: syz-executor926 Not tainted 5.12.0-rc4-syzkaller #0 [ 76.123552][ T8425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.133620][ T8425] Call Trace: [ 76.136906][ T8425] dump_stack+0x141/0x1d7 [ 76.141267][ T8425] ? _copy_to_user+0xc7/0x150 [ 76.145950][ T8425] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 76.152984][ T8425] ? _copy_to_user+0xc7/0x150 [ 76.157670][ T8425] ? _copy_to_user+0xc7/0x150 [ 76.162353][ T8425] kasan_report.cold+0x7c/0xd8 [ 76.167148][ T8425] ? _copy_to_user+0xc7/0x150 [ 76.171837][ T8425] kasan_check_range+0x13d/0x180 [ 76.176786][ T8425] _copy_to_user+0xc7/0x150 [ 76.181315][ T8425] __htab_map_lookup_and_delete_batch+0xef4/0x1860 [ 76.187837][ T8425] ? find_held_lock+0x2d/0x110 [ 76.192637][ T8425] ? htab_of_map_alloc+0xf0/0xf0 [ 76.197594][ T8425] ? htab_map_lookup_batch+0x30/0x30 [ 76.202894][ T8425] bpf_map_do_batch+0x3d5/0x510 [ 76.207761][ T8425] __do_sys_bpf+0x1be4/0x4f40 [ 76.212456][ T8425] ? bpf_link_get_from_fd+0x110/0x110 [ 76.217845][ T8425] ? find_held_lock+0x2d/0x110 [ 76.222621][ T8425] ? __context_tracking_exit+0xb8/0xe0 [ 76.228089][ T8425] ? lock_downgrade+0x6e0/0x6e0 [ 76.232970][ T8425] ? syscall_enter_from_user_mode+0x27/0x70 [ 76.238877][ T8425] do_syscall_64+0x2d/0x70 [ 76.243310][ T8425] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 76.249225][ T8425] RIP: 0033:0x445ac9 [ 76.253127][ T8425] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 76.272742][ T8425] RSP: 002b:00007f6ef742d2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 76.281168][ T8425] RAX: ffffffffffffffda RBX: 00000000004cb410 RCX: 0000000000445ac9 [ 76.289146][ T8425] RDX: 0000000000000038 RSI: 0000000020000080 RDI: 0000000000000019 [ 76.297124][ T8425] RBP: 000000000049a8f0 R08: 00007f6ef742d700 R09: 0000000000000000 [ 76.305099][ T8425] R10: 00007f6ef742d700 R11: 0000000000000246 R12: 00000000200031c0 [ 76.313071][ T8425] R13: 000000000049a078 R14: 00000000200021c0 R15: 00000000004cb418 [ 76.321075][ T8425] [ 76.323403][ T8425] Allocated by task 8425: [ 76.327727][ T8425] kasan_save_stack+0x1b/0x40 [ 76.332414][ T8425] __kasan_kmalloc+0x99/0xc0 [ 76.337006][ T8425] kvmalloc_node+0x61/0xf0 [ 76.341427][ T8425] __htab_map_lookup_and_delete_batch+0x513/0x1860 [ 76.347937][ T8425] bpf_map_do_batch+0x3d5/0x510 [ 76.352793][ T8425] __do_sys_bpf+0x1be4/0x4f40 [ 76.357479][ T8425] do_syscall_64+0x2d/0x70 [ 76.361908][ T8425] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 76.367816][ T8425] [ 76.370135][ T8425] The buggy address belongs to the object at ffff8880180e6200 [ 76.370135][ T8425] which belongs to the cache kmalloc-64 of size 64 [ 76.384017][ T8425] The buggy address is located 0 bytes inside of [ 76.384017][ T8425] 64-byte region [ffff8880180e6200, ffff8880180e6240) [ 76.397037][ T8425] The buggy address belongs to the page: [ 76.402664][ T8425] page:ffffea0000603980 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x180e6 [ 76.412817][ T8425] flags: 0xfff00000000200(slab) [ 76.417700][ T8425] raw: 00fff00000000200 ffffea0005055900 0000000d0000000d ffff888010441640 [ 76.426288][ T8425] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 76.434867][ T8425] page dumped because: kasan: bad access detected [ 76.441280][ T8425] [ 76.443604][ T8425] Memory state around the buggy address: [ 76.449232][ T8425] ffff8880180e6100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 76.457308][ T8425] ffff8880180e6180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 76.465369][ T8425] >ffff8880180e6200: 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc fc [ 76.473425][ T8425] ^ [ 76.478531][ T8425] ffff8880180e6280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc executing program executing program [ 76.486591][ T8425] ffff8880180e6300: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.494653][ T8425] ================================================================== [ 76.502730][ T8425] Disabling lock debugging due to kernel taint [ 77.525123][ T8425] Kernel panic - not syncing: panic_on_warn set ... [ 77.531747][ T8425] CPU: 1 PID: 8425 Comm: syz-executor926 Tainted: G B 5.12.0-rc4-syzkaller #0 [ 77.541895][ T8425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.551945][ T8425] Call Trace: [ 77.555221][ T8425] dump_stack+0x141/0x1d7 [ 77.559562][ T8425] panic+0x306/0x73d [ 77.563463][ T8425] ? __warn_printk+0xf3/0xf3 [ 77.568052][ T8425] ? preempt_schedule_common+0x59/0xc0 [ 77.573518][ T8425] ? _copy_to_user+0xc7/0x150 [ 77.578200][ T8425] ? preempt_schedule_thunk+0x16/0x18 [ 77.583575][ T8425] ? trace_hardirqs_on+0x38/0x1c0 [ 77.588611][ T8425] ? trace_hardirqs_on+0x51/0x1c0 [ 77.593642][ T8425] ? _copy_to_user+0xc7/0x150 [ 77.598317][ T8425] ? _copy_to_user+0xc7/0x150 [ 77.603012][ T8425] end_report.cold+0x5a/0x5a [ 77.607607][ T8425] kasan_report.cold+0x6a/0xd8 [ 77.612375][ T8425] ? _copy_to_user+0xc7/0x150 [ 77.617053][ T8425] kasan_check_range+0x13d/0x180 [ 77.621993][ T8425] _copy_to_user+0xc7/0x150 [ 77.626506][ T8425] __htab_map_lookup_and_delete_batch+0xef4/0x1860 [ 77.633013][ T8425] ? find_held_lock+0x2d/0x110 [ 77.637805][ T8425] ? htab_of_map_alloc+0xf0/0xf0 [ 77.642751][ T8425] ? htab_map_lookup_batch+0x30/0x30 [ 77.648036][ T8425] bpf_map_do_batch+0x3d5/0x510 [ 77.652891][ T8425] __do_sys_bpf+0x1be4/0x4f40 [ 77.657601][ T8425] ? bpf_link_get_from_fd+0x110/0x110 [ 77.662979][ T8425] ? find_held_lock+0x2d/0x110 [ 77.667740][ T8425] ? __context_tracking_exit+0xb8/0xe0 [ 77.673202][ T8425] ? lock_downgrade+0x6e0/0x6e0 [ 77.678058][ T8425] ? syscall_enter_from_user_mode+0x27/0x70 [ 77.683954][ T8425] do_syscall_64+0x2d/0x70 [ 77.688371][ T8425] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 77.694267][ T8425] RIP: 0033:0x445ac9 [ 77.698158][ T8425] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 77.717762][ T8425] RSP: 002b:00007f6ef742d2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 77.726179][ T8425] RAX: ffffffffffffffda RBX: 00000000004cb410 RCX: 0000000000445ac9 [ 77.734144][ T8425] RDX: 0000000000000038 RSI: 0000000020000080 RDI: 0000000000000019 [ 77.742110][ T8425] RBP: 000000000049a8f0 R08: 00007f6ef742d700 R09: 0000000000000000 [ 77.750078][ T8425] R10: 00007f6ef742d700 R11: 0000000000000246 R12: 00000000200031c0 [ 77.758045][ T8425] R13: 000000000049a078 R14: 00000000200021c0 R15: 00000000004cb418 [ 77.766442][ T8425] Kernel Offset: disabled [ 77.770771][ T8425] Rebooting in 86400 seconds..