INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.58' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 32.357739] ================================================================== [ 32.365184] BUG: KASAN: slab-out-of-bounds in __sctp_v6_cmp_addr+0x4c7/0x530 [ 32.372352] Read of size 8 at addr ffff8801add124e0 by task syzkaller172586/4500 [ 32.379887] [ 32.381497] CPU: 1 PID: 4500 Comm: syzkaller172586 Not tainted 4.17.0-rc1+ #10 [ 32.388830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 32.398157] Call Trace: [ 32.400728] dump_stack+0x1b9/0x294 [ 32.404341] ? dump_stack_print_info.cold.2+0x52/0x52 [ 32.409513] ? printk+0x9e/0xba [ 32.412774] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 32.417510] ? kasan_check_write+0x14/0x20 [ 32.421723] print_address_description+0x6c/0x20b [ 32.426544] ? __sctp_v6_cmp_addr+0x4c7/0x530 [ 32.431015] kasan_report.cold.7+0x242/0x2fe [ 32.435404] __asan_report_load8_noabort+0x14/0x20 [ 32.440311] __sctp_v6_cmp_addr+0x4c7/0x530 [ 32.444612] sctp_inet6_cmp_addr+0x169/0x1a0 [ 32.449008] sctp_bind_addr_match+0x20b/0x400 [ 32.453497] ? sctp_bind_addrs_to_raw+0x370/0x370 [ 32.458325] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 32.463842] ? sctp_v4_available+0x1b1/0x200 [ 32.468229] ? sctp_inet6_bind_verify+0xb2/0x500 [ 32.472976] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 32.478499] sctp_do_bind+0x1c0/0x5f0 [ 32.482281] sctp_bindx_add+0x90/0x1a0 [ 32.486151] sctp_setsockopt_bindx+0x2ad/0x320 [ 32.490712] sctp_setsockopt+0x12c4/0x7000 [ 32.494928] ? mark_held_locks+0xc9/0x160 [ 32.499053] ? page_add_new_anon_rmap+0x3ff/0x850 [ 32.503874] ? sctp_setsockopt_paddr_thresholds+0x560/0x560 [ 32.509564] ? find_held_lock+0x36/0x1c0 [ 32.513607] ? lock_downgrade+0x8e0/0x8e0 [ 32.517734] ? pudp_huge_clear_flush+0x230/0x230 [ 32.522470] ? kasan_check_read+0x11/0x20 [ 32.526602] ? do_raw_spin_unlock+0x9e/0x2e0 [ 32.530988] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 32.535552] ? kasan_check_write+0x14/0x20 [ 32.539764] ? do_raw_spin_lock+0xc1/0x200 [ 32.543988] ? _raw_spin_unlock+0x22/0x30 [ 32.548126] ? do_huge_pmd_anonymous_page+0x48d/0x1cc0 [ 32.553384] ? __thp_get_unmapped_area+0x180/0x180 [ 32.558297] ? debug_check_no_locks_freed+0x310/0x310 [ 32.563467] ? alloc_file+0x24/0x3e0 [ 32.567161] ? sock_alloc_file+0x1f3/0x4e0 [ 32.571374] ? __sys_socket+0x16f/0x250 [ 32.575325] ? do_syscall_64+0x1b1/0x800 [ 32.579366] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 32.584710] ? find_held_lock+0x36/0x1c0 [ 32.588748] ? debug_mutex_init+0x1c/0x60 [ 32.592874] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 32.597865] ? graph_lock+0x170/0x170 [ 32.601642] ? lock_downgrade+0x8e0/0x8e0 [ 32.605767] ? pud_val+0x80/0xf0 [ 32.609108] ? pmd_val+0xf0/0xf0 [ 32.612457] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 32.617971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 32.623488] ? __handle_mm_fault+0x93a/0x4310 [ 32.627968] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 32.632699] ? graph_lock+0x170/0x170 [ 32.636475] ? graph_lock+0x170/0x170 [ 32.640251] ? find_held_lock+0x36/0x1c0 [ 32.644305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 32.649824] ? __fget_light+0x2ef/0x430 [ 32.653778] ? fget_raw+0x20/0x20 [ 32.657209] ? lock_downgrade+0x8e0/0x8e0 [ 32.661336] ? handle_mm_fault+0x8c0/0xc70 [ 32.665553] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 32.671069] ? handle_mm_fault+0x55a/0xc70 [ 32.675288] sock_common_setsockopt+0x9a/0xe0 [ 32.679763] __sys_setsockopt+0x1bd/0x390 [ 32.683890] ? kernel_accept+0x310/0x310 [ 32.687932] ? mm_fault_error+0x380/0x380 [ 32.692066] ? __ia32_sys_fallocate+0xf0/0xf0 [ 32.696544] __x64_sys_setsockopt+0xbe/0x150 [ 32.700931] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 32.705955] do_syscall_64+0x1b1/0x800 [ 32.709824] ? syscall_return_slowpath+0x5c0/0x5c0 [ 32.714733] ? syscall_return_slowpath+0x30f/0x5c0 [ 32.719641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 32.725158] ? retint_user+0x18/0x18 [ 32.728852] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 32.733676] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 32.738842] RIP: 0033:0x43fda9 [ 32.742013] RSP: 002b:00007fff442adc88 EFLAGS: 00000217 ORIG_RAX: 0000000000000036 [ 32.749706] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 000000000043fda9 [ 32.756952] RDX: 0000000000000064 RSI: 0000000000000084 RDI: 0000000000000003 [ 32.764200] RBP: 00000000006ca018 R08: 0000000000000020 R09: 00000000004002c8 [ 32.771448] R10: 0000000020000140 R11: 0000000000000217 R12: 00000000004016d0 [ 32.778692] R13: 0000000000401760 R14: 0000000000000000 R15: 0000000000000000 [ 32.785945] [ 32.787551] Allocated by task 4500: [ 32.791164] save_stack+0x43/0xd0 [ 32.794595] kasan_kmalloc+0xc4/0xe0 [ 32.798285] __kmalloc_node+0x47/0x70 [ 32.802062] kvmalloc_node+0x6b/0x100 [ 32.805846] vmemdup_user+0x2d/0xa0 [ 32.809453] sctp_setsockopt_bindx+0x5d/0x320 [ 32.813934] sctp_setsockopt+0x12c4/0x7000 [ 32.818149] sock_common_setsockopt+0x9a/0xe0 [ 32.822621] __sys_setsockopt+0x1bd/0x390 [ 32.826744] __x64_sys_setsockopt+0xbe/0x150 [ 32.831129] do_syscall_64+0x1b1/0x800 [ 32.835001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 32.840168] [ 32.841774] Freed by task 2846: [ 32.845040] save_stack+0x43/0xd0 [ 32.848475] __kasan_slab_free+0x11a/0x170 [ 32.852686] kasan_slab_free+0xe/0x10 [ 32.856460] kfree+0xd9/0x260 [ 32.859545] single_release+0x8f/0xb0 [ 32.863320] __fput+0x34d/0x890 [ 32.866575] ____fput+0x15/0x20 [ 32.869830] task_work_run+0x1e4/0x290 [ 32.873697] exit_to_usermode_loop+0x2bd/0x310 [ 32.878256] do_syscall_64+0x6ac/0x800 [ 32.882122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 32.887281] [ 32.888889] The buggy address belongs to the object at ffff8801add124c0 [ 32.888889] which belongs to the cache kmalloc-32 of size 32 [ 32.901348] The buggy address is located 0 bytes to the right of [ 32.901348] 32-byte region [ffff8801add124c0, ffff8801add124e0) [ 32.913454] The buggy address belongs to the page: [ 32.918360] page:ffffea0006b74480 count:1 mapcount:0 mapping:ffff8801add12000 index:0xffff8801add12fc1 [ 32.927781] flags: 0x2fffc0000000100(slab) [ 32.931998] raw: 02fffc0000000100 ffff8801add12000 ffff8801add12fc1 000000010000003f [ 32.939866] raw: ffffea0007374160 ffffea0006b610a0 ffff8801da8001c0 0000000000000000 [ 32.947722] page dumped because: kasan: bad access detected [ 32.953402] [ 32.955004] Memory state around the buggy address: [ 32.959919] ffff8801add12380: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 32.967256] ffff8801add12400: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 32.974591] >ffff8801add12480: fb fb fb fb fc fc fc fc 00 00 00 00 fc fc fc fc [ 32.981937] ^ [ 32.988403] ffff8801add12500: 00 00 00 00 fc fc fc fc 00 00 04 fc fc fc fc fc [ 32.995741] ffff8801add12580: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 33.003075] ================================================================== [ 33.010407] Disabling lock debugging due to kernel taint [ 33.015945] Kernel panic - not syncing: panic_on_warn set ... [ 33.015945] [ 33.023316] CPU: 1 PID: 4500 Comm: syzkaller172586 Tainted: G B 4.17.0-rc1+ #10 [ 33.032048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.041376] Call Trace: [ 33.043951] dump_stack+0x1b9/0x294 [ 33.047556] ? dump_stack_print_info.cold.2+0x52/0x52 [ 33.052725] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 33.057459] ? __sctp_v6_cmp_addr+0x4a0/0x530 [ 33.061932] panic+0x22f/0x4de [ 33.065102] ? add_taint.cold.5+0x16/0x16 [ 33.069234] ? do_raw_spin_unlock+0x9e/0x2e0 [ 33.073617] ? do_raw_spin_unlock+0x9e/0x2e0 [ 33.077999] ? __sctp_v6_cmp_addr+0x4c7/0x530 [ 33.082477] kasan_end_report+0x47/0x4f [ 33.086428] kasan_report.cold.7+0x76/0x2fe [ 33.090727] __asan_report_load8_noabort+0x14/0x20 [ 33.095631] __sctp_v6_cmp_addr+0x4c7/0x530 [ 33.099929] sctp_inet6_cmp_addr+0x169/0x1a0 [ 33.104316] sctp_bind_addr_match+0x20b/0x400 [ 33.108788] ? sctp_bind_addrs_to_raw+0x370/0x370 [ 33.113611] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 33.119126] ? sctp_v4_available+0x1b1/0x200 [ 33.123513] ? sctp_inet6_bind_verify+0xb2/0x500 [ 33.128260] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 33.133772] sctp_do_bind+0x1c0/0x5f0 [ 33.137548] sctp_bindx_add+0x90/0x1a0 [ 33.141414] sctp_setsockopt_bindx+0x2ad/0x320 [ 33.145971] sctp_setsockopt+0x12c4/0x7000 [ 33.150182] ? mark_held_locks+0xc9/0x160 [ 33.154304] ? page_add_new_anon_rmap+0x3ff/0x850 [ 33.159129] ? sctp_setsockopt_paddr_thresholds+0x560/0x560 [ 33.164817] ? find_held_lock+0x36/0x1c0 [ 33.168864] ? lock_downgrade+0x8e0/0x8e0 [ 33.172991] ? pudp_huge_clear_flush+0x230/0x230 [ 33.177726] ? kasan_check_read+0x11/0x20 [ 33.181850] ? do_raw_spin_unlock+0x9e/0x2e0 [ 33.186242] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 33.190801] ? kasan_check_write+0x14/0x20 [ 33.195019] ? do_raw_spin_lock+0xc1/0x200 [ 33.199243] ? _raw_spin_unlock+0x22/0x30 [ 33.203368] ? do_huge_pmd_anonymous_page+0x48d/0x1cc0 [ 33.208632] ? __thp_get_unmapped_area+0x180/0x180 [ 33.213548] ? debug_check_no_locks_freed+0x310/0x310 [ 33.218720] ? alloc_file+0x24/0x3e0 [ 33.222411] ? sock_alloc_file+0x1f3/0x4e0 [ 33.226621] ? __sys_socket+0x16f/0x250 [ 33.230573] ? do_syscall_64+0x1b1/0x800 [ 33.234611] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 33.239953] ? find_held_lock+0x36/0x1c0 [ 33.243991] ? debug_mutex_init+0x1c/0x60 [ 33.248122] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 33.253114] ? graph_lock+0x170/0x170 [ 33.256902] ? lock_downgrade+0x8e0/0x8e0 [ 33.261032] ? pud_val+0x80/0xf0 [ 33.264375] ? pmd_val+0xf0/0xf0 [ 33.267721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 33.273247] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 33.278765] ? __handle_mm_fault+0x93a/0x4310 [ 33.283238] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 33.287968] ? graph_lock+0x170/0x170 [ 33.291745] ? graph_lock+0x170/0x170 [ 33.295520] ? find_held_lock+0x36/0x1c0 [ 33.299563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 33.305075] ? __fget_light+0x2ef/0x430 [ 33.309029] ? fget_raw+0x20/0x20 [ 33.312462] ? lock_downgrade+0x8e0/0x8e0 [ 33.316587] ? handle_mm_fault+0x8c0/0xc70 [ 33.320811] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 33.326323] ? handle_mm_fault+0x55a/0xc70 [ 33.330536] sock_common_setsockopt+0x9a/0xe0 [ 33.335023] __sys_setsockopt+0x1bd/0x390 [ 33.339154] ? kernel_accept+0x310/0x310 [ 33.343192] ? mm_fault_error+0x380/0x380 [ 33.347318] ? __ia32_sys_fallocate+0xf0/0xf0 [ 33.351790] __x64_sys_setsockopt+0xbe/0x150 [ 33.356173] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 33.361167] do_syscall_64+0x1b1/0x800 [ 33.365032] ? syscall_return_slowpath+0x5c0/0x5c0 [ 33.369937] ? syscall_return_slowpath+0x30f/0x5c0 [ 33.374850] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 33.380368] ? retint_user+0x18/0x18 [ 33.384069] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 33.388892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 33.394057] RIP: 0033:0x43fda9 [ 33.397224] RSP: 002b:00007fff442adc88 EFLAGS: 00000217 ORIG_RAX: 0000000000000036 [ 33.404905] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 000000000043fda9 [ 33.412149] RDX: 0000000000000064 RSI: 0000000000000084 RDI: 0000000000000003 [ 33.419397] RBP: 00000000006ca018 R08: 0000000000000020 R09: 00000000004002c8 [ 33.426641] R10: 0000000020000140 R11: 0000000000000217 R12: 00000000004016d0 [ 33.433887] R13: 0000000000401760 R14: 0000000000000000 R15: 0000000000000000 [ 33.441602] Dumping ftrace buffer: [ 33.445119] (ftrace buffer empty) [ 33.448804] Kernel Offset: disabled [ 33.452406] Rebooting in 86400 seconds..