[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 18.379145] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 19.859497] random: sshd: uninitialized urandom read (32 bytes read) [ 20.046560] random: sshd: uninitialized urandom read (32 bytes read) [ 20.809728] random: sshd: uninitialized urandom read (32 bytes read) [ 26.350416] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.40' (ECDSA) to the list of known hosts. [ 31.760382] random: sshd: uninitialized urandom read (32 bytes read) 2018/06/02 12:01:55 parsed 1 programs 2018/06/02 12:01:55 executed programs: 0 [ 32.282270] IPVS: ftp: loaded support on port[0] = 21 [ 32.404885] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.411348] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.418564] device bridge_slave_0 entered promiscuous mode [ 32.434866] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.441248] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.448237] device bridge_slave_1 entered promiscuous mode [ 32.463558] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 32.478915] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 32.518562] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 32.535922] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 32.595137] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 32.602399] team0: Port device team_slave_0 added [ 32.616236] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 32.623411] team0: Port device team_slave_1 added [ 32.638346] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 32.654868] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 32.670934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 32.687277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 32.801118] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.807573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.814374] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.820729] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.216238] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 33.222353] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.264096] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 33.305513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.312799] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 33.348922] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 33.355066] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.361359] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 33.596667] ================================================================== [ 33.604143] BUG: KASAN: stack-out-of-bounds in compat_copy_entries+0x96c/0x14a0 [ 33.611581] Write of size 33 at addr ffff8801d960f888 by task syz-executor0/4737 [ 33.619105] [ 33.620721] CPU: 1 PID: 4737 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #103 [ 33.627969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.637314] Call Trace: [ 33.639889] dump_stack+0x1b9/0x294 [ 33.643500] ? dump_stack_print_info.cold.2+0x52/0x52 [ 33.648671] ? printk+0x9e/0xba [ 33.651935] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 33.656673] ? kasan_check_write+0x14/0x20 [ 33.660899] print_address_description+0x6c/0x20b [ 33.665734] ? compat_copy_entries+0x96c/0x14a0 [ 33.670386] kasan_report.cold.7+0x242/0x2fe [ 33.674780] check_memory_region+0x13e/0x1b0 [ 33.679180] memcpy+0x37/0x50 [ 33.682268] compat_copy_entries+0x96c/0x14a0 [ 33.686748] ? compat_table_info+0x660/0x660 [ 33.691139] ? xt_compat_init_offsets+0x26e/0x340 [ 33.695967] ? xt_compat_flush_offsets+0x270/0x270 [ 33.700887] compat_do_replace+0x483/0x900 [ 33.705103] ? compat_do_ebt_get_ctl+0x910/0x910 [ 33.709842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 33.715359] ? cap_capable+0x1f9/0x260 [ 33.719243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 33.724769] ? ns_capable_common+0x13f/0x170 [ 33.729166] compat_do_ebt_set_ctl+0x2ac/0x324 [ 33.733741] ? compat_do_replace+0x900/0x900 [ 33.738161] ? mutex_unlock+0xd/0x10 [ 33.741887] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 33.747323] compat_nf_setsockopt+0x9b/0x140 [ 33.751714] ? compat_do_replace+0x900/0x900 [ 33.756108] compat_ip_setsockopt+0xff/0x140 [ 33.760501] inet_csk_compat_setsockopt+0x97/0x120 [ 33.765413] ? ip_setsockopt+0xf0/0xf0 [ 33.769282] compat_tcp_setsockopt+0x49/0x80 [ 33.773686] compat_sock_common_setsockopt+0xb4/0x150 [ 33.778859] ? tcp_setsockopt+0xe0/0xe0 [ 33.782815] ? sock_common_setsockopt+0xe0/0xe0 [ 33.787465] __compat_sys_setsockopt+0x1ab/0x840 [ 33.792216] ? __compat_sys_getsockopt+0x880/0x880 [ 33.797140] ? __x32_compat_sys_get_robust_list+0x430/0x430 [ 33.802835] ? mm_fault_error+0x380/0x380 [ 33.806966] __ia32_compat_sys_setsockopt+0xbd/0x150 [ 33.812049] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 33.817053] do_fast_syscall_32+0x345/0xf9b [ 33.821357] ? do_int80_syscall_32+0x880/0x880 [ 33.825920] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 33.830668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 33.836184] ? syscall_return_slowpath+0x30f/0x5c0 [ 33.841108] ? sysret32_from_system_call+0x5/0x46 [ 33.845932] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 33.850760] entry_SYSENTER_compat+0x70/0x7f [ 33.855147] RIP: 0023:0xf7f3acb9 [ 33.858496] RSP: 002b:00000000ffb028cc EFLAGS: 00000282 ORIG_RAX: 000000000000016e [ 33.866182] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 33.873431] RDX: 0000000000000080 RSI: 0000000020000040 RDI: 0000000000000554 [ 33.880686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 33.887939] R10: 0000000000000000 R11: 0000000000000296 R12: 0000000000000000 [ 33.895189] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 33.902452] [ 33.904056] The buggy address belongs to the page: [ 33.908962] page:ffffea00076583c0 count:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 33.917079] flags: 0x2fffc0000000000() [ 33.920947] raw: 02fffc0000000000 0000000000000000 0000000000000000 00000000ffffffff [ 33.928805] raw: 0000000000000000 ffffea0007650101 0000000000000000 0000000000000000 [ 33.936656] page dumped because: kasan: bad access detected [ 33.942338] [ 33.943938] Memory state around the buggy address: [ 33.948858] ffff8801d960f780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.956192] ffff8801d960f800: 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 f2 f2 f2 [ 33.963538] >ffff8801d960f880: f2 00 00 00 07 f3 f3 f3 f3 00 00 00 00 00 00 00 [ 33.970870] ^ [ 33.975256] ffff8801d960f900: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 [ 33.982595] ffff8801d960f980: 00 f2 f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 [ 33.989927] ================================================================== [ 33.997264] Disabling lock debugging due to kernel taint [ 34.003051] Kernel panic - not syncing: panic_on_warn set ... [ 34.003051] [ 34.010411] CPU: 1 PID: 4737 Comm: syz-executor0 Tainted: G B 4.17.0-rc7+ #103 [ 34.019050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.028378] Call Trace: [ 34.030958] dump_stack+0x1b9/0x294 [ 34.034572] ? dump_stack_print_info.cold.2+0x52/0x52 [ 34.039741] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 34.044489] ? compat_copy_entries+0x950/0x14a0 [ 34.049138] panic+0x22f/0x4de [ 34.052316] ? add_taint.cold.5+0x16/0x16 [ 34.056450] ? do_raw_spin_unlock+0x9e/0x2e0 [ 34.060848] ? do_raw_spin_unlock+0x9e/0x2e0 [ 34.065242] ? compat_copy_entries+0x96c/0x14a0 [ 34.069899] kasan_end_report+0x47/0x4f [ 34.073865] kasan_report.cold.7+0x76/0x2fe [ 34.078176] check_memory_region+0x13e/0x1b0 [ 34.082564] memcpy+0x37/0x50 [ 34.085653] compat_copy_entries+0x96c/0x14a0 [ 34.090130] ? compat_table_info+0x660/0x660 [ 34.094519] ? xt_compat_init_offsets+0x26e/0x340 [ 34.099341] ? xt_compat_flush_offsets+0x270/0x270 [ 34.104269] compat_do_replace+0x483/0x900 [ 34.108485] ? compat_do_ebt_get_ctl+0x910/0x910 [ 34.113222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 34.118751] ? cap_capable+0x1f9/0x260 [ 34.122632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 34.128160] ? ns_capable_common+0x13f/0x170 [ 34.132556] compat_do_ebt_set_ctl+0x2ac/0x324 [ 34.137125] ? compat_do_replace+0x900/0x900 [ 34.141517] ? mutex_unlock+0xd/0x10 [ 34.145212] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 34.150468] compat_nf_setsockopt+0x9b/0x140 [ 34.154860] ? compat_do_replace+0x900/0x900 [ 34.159260] compat_ip_setsockopt+0xff/0x140 [ 34.163663] inet_csk_compat_setsockopt+0x97/0x120 [ 34.168583] ? ip_setsockopt+0xf0/0xf0 [ 34.172473] compat_tcp_setsockopt+0x49/0x80 [ 34.176876] compat_sock_common_setsockopt+0xb4/0x150 [ 34.182045] ? tcp_setsockopt+0xe0/0xe0 [ 34.185999] ? sock_common_setsockopt+0xe0/0xe0 [ 34.190655] __compat_sys_setsockopt+0x1ab/0x840 [ 34.195390] ? __compat_sys_getsockopt+0x880/0x880 [ 34.200324] ? __x32_compat_sys_get_robust_list+0x430/0x430 [ 34.206024] ? mm_fault_error+0x380/0x380 [ 34.210167] __ia32_compat_sys_setsockopt+0xbd/0x150 [ 34.215296] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 34.220296] do_fast_syscall_32+0x345/0xf9b [ 34.224663] ? do_int80_syscall_32+0x880/0x880 [ 34.229222] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 34.233961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 34.239476] ? syscall_return_slowpath+0x30f/0x5c0 [ 34.244389] ? sysret32_from_system_call+0x5/0x46 [ 34.249214] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 34.254058] entry_SYSENTER_compat+0x70/0x7f [ 34.258472] RIP: 0023:0xf7f3acb9 [ 34.261815] RSP: 002b:00000000ffb028cc EFLAGS: 00000282 ORIG_RAX: 000000000000016e [ 34.269509] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 34.276767] RDX: 0000000000000080 RSI: 0000000020000040 RDI: 0000000000000554 [ 34.284027] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 34.291279] R10: 0000000000000000 R11: 0000000000000296 R12: 0000000000000000 [ 34.298530] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 34.306269] Dumping ftrace buffer: [ 34.309787] (ftrace buffer empty) [ 34.313475] Kernel Offset: disabled [ 34.317086] Rebooting in 86400 seconds..