[ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.197' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 56.933210][ T6836] ================================================================== [ 56.941484][ T6836] BUG: KASAN: wild-memory-access in sctp_setsockopt+0x293/0x9380 [ 56.949179][ T6836] Read of size 8 at addr 00000000ffffffff by task syz-executor099/6836 [ 56.957390][ T6836] [ 56.959699][ T6836] CPU: 1 PID: 6836 Comm: syz-executor099 Not tainted 5.8.0-syzkaller #0 [ 56.967996][ T6836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.978036][ T6836] Call Trace: [ 56.981326][ T6836] dump_stack+0x18f/0x20d [ 56.985642][ T6836] ? sctp_setsockopt+0x293/0x9380 [ 56.990646][ T6836] ? sctp_setsockopt+0x293/0x9380 [ 56.995705][ T6836] kasan_report.cold+0x5/0x37 [ 57.000359][ T6836] ? sctp_setsockopt+0x293/0x9380 [ 57.005361][ T6836] check_memory_region+0x13d/0x180 [ 57.010493][ T6836] memcpy+0x20/0x60 [ 57.014367][ T6836] sctp_setsockopt+0x293/0x9380 [ 57.019221][ T6836] ? __get_unused_fd_flags+0x60/0x60 [ 57.024526][ T6836] ? aa_af_perm+0x230/0x230 [ 57.029008][ T6836] ? __sctp_setsockopt_connectx+0x140/0x140 [ 57.034881][ T6836] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 57.040404][ T6836] ? sock_common_recvmsg+0x1a0/0x1a0 [ 57.045712][ T6836] __sys_setsockopt+0x2ad/0x6d0 [ 57.050540][ T6836] ? __ia32_sys_recv+0x100/0x100 [ 57.055471][ T6836] ? __fd_install+0x1e6/0x600 [ 57.060128][ T6836] ? syscall_enter_from_user_mode+0x20/0x290 [ 57.066086][ T6836] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 57.072067][ T6836] __ia32_sys_setsockopt+0xb9/0x150 [ 57.077243][ T6836] ? syscall_enter_from_user_mode+0x20/0x290 [ 57.083199][ T6836] __do_fast_syscall_32+0x57/0x80 [ 57.088197][ T6836] do_fast_syscall_32+0x2f/0x70 [ 57.093043][ T6836] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 57.099351][ T6836] RIP: 0023:0xf7feb569 [ 57.103414][ T6836] Code: 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 57.123012][ T6836] RSP: 002b:00000000fffd6e0c EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 57.131398][ T6836] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000084 [ 57.139346][ T6836] RDX: 0000000000000013 RSI: 00000000ffffffff RDI: 0000000000000008 [ 57.147293][ T6836] RBP: 0000000000000012 R08: 0000000000000000 R09: 0000000000000000 [ 57.155240][ T6836] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 57.163188][ T6836] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 57.171142][ T6836] ================================================================== [ 57.179194][ T6836] Disabling lock debugging due to kernel taint [ 57.185544][ T6836] Kernel panic - not syncing: panic_on_warn set ... [ 57.192138][ T6836] CPU: 1 PID: 6836 Comm: syz-executor099 Tainted: G B 5.8.0-syzkaller #0 [ 57.201839][ T6836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 57.211883][ T6836] Call Trace: [ 57.215150][ T6836] dump_stack+0x18f/0x20d [ 57.219452][ T6836] ? sctp_setsockopt+0x290/0x9380 [ 57.224449][ T6836] panic+0x2e3/0x75c [ 57.228315][ T6836] ? __warn_printk+0xf3/0xf3 [ 57.232876][ T6836] ? preempt_schedule_common+0x59/0xc0 [ 57.238305][ T6836] ? sctp_setsockopt+0x293/0x9380 [ 57.243322][ T6836] ? preempt_schedule_thunk+0x16/0x18 [ 57.248684][ T6836] ? trace_hardirqs_on+0x55/0x220 [ 57.253682][ T6836] ? sctp_setsockopt+0x293/0x9380 [ 57.258694][ T6836] ? sctp_setsockopt+0x293/0x9380 [ 57.263690][ T6836] end_report+0x4d/0x53 [ 57.267818][ T6836] kasan_report.cold+0xd/0x37 [ 57.272470][ T6836] ? sctp_setsockopt+0x293/0x9380 [ 57.277466][ T6836] check_memory_region+0x13d/0x180 [ 57.282547][ T6836] memcpy+0x20/0x60 [ 57.286328][ T6836] sctp_setsockopt+0x293/0x9380 [ 57.291172][ T6836] ? __get_unused_fd_flags+0x60/0x60 [ 57.296431][ T6836] ? aa_af_perm+0x230/0x230 [ 57.300909][ T6836] ? __sctp_setsockopt_connectx+0x140/0x140 [ 57.306785][ T6836] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 57.312305][ T6836] ? sock_common_recvmsg+0x1a0/0x1a0 [ 57.317562][ T6836] __sys_setsockopt+0x2ad/0x6d0 [ 57.322385][ T6836] ? __ia32_sys_recv+0x100/0x100 [ 57.327294][ T6836] ? __fd_install+0x1e6/0x600 [ 57.331967][ T6836] ? syscall_enter_from_user_mode+0x20/0x290 [ 57.337944][ T6836] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 57.343916][ T6836] __ia32_sys_setsockopt+0xb9/0x150 [ 57.349088][ T6836] ? syscall_enter_from_user_mode+0x20/0x290 [ 57.355042][ T6836] __do_fast_syscall_32+0x57/0x80 [ 57.360041][ T6836] do_fast_syscall_32+0x2f/0x70 [ 57.364881][ T6836] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 57.371178][ T6836] RIP: 0023:0xf7feb569 [ 57.375221][ T6836] Code: 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 57.394798][ T6836] RSP: 002b:00000000fffd6e0c EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 57.403196][ T6836] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000084 [ 57.411139][ T6836] RDX: 0000000000000013 RSI: 00000000ffffffff RDI: 0000000000000008 [ 57.419084][ T6836] RBP: 0000000000000012 R08: 0000000000000000 R09: 0000000000000000 [ 57.427054][ T6836] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 57.435017][ T6836] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 57.444258][ T6836] Kernel Offset: disabled [ 57.448576][ T6836] Rebooting in 86400 seconds..