usercopy: kernel memory overwrite attempt detected to 0000000083896bbd (kmalloc-1024) (984 bytes) ------------[ cut here ]------------ kernel BUG at mm/usercopy.c:72! invalid opcode: 0000 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 15613 Comm: syz-executor1 Not tainted 4.15.0-rc2+ #148 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:report_usercopy mm/usercopy.c:64 [inline] RIP: 0010:__check_object_size+0x3a2/0x4f0 mm/usercopy.c:264 RSP: 0000:ffff8801bf067940 EFLAGS: 00010282 nla_parse: 26 callbacks suppressed netlink: 7 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 7 bytes leftover after parsing attributes in process `syz-executor0'. RAX: 0000000000000061 RBX: ffffffff85328d40 RCX: 0000000000000000 RDX: 0000000000000061 RSI: ffffc9000371b000 RDI: ffffed0037e0cf1c selinux_nlmsg_perm: 1 callbacks suppressed SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15634 comm=syz-executor0 RBP: ffff8801bf067a30 R08: ffff8801bf0671a8 R09: 0000000000000000 R10: 0000000066bd054e R11: 0000000000000000 R12: ffffffff85328d00 netlink: 16 bytes leftover after parsing attributes in process `syz-executor2'. R13: ffff8801ce9df290 R14: 00000000000003d8 R15: ffffea00073a7780 FS: 00007fd4893db700(0000) GS:ffff8801db500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb3401c7d90 CR3: 00000001d0c1d000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: netlink: 16 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 7 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 7 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 7 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 7 bytes leftover after parsing attributes in process `syz-executor6'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15670 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15672 comm=syz-executor6 check_object_size include/linux/thread_info.h:112 [inline] check_copy_size include/linux/thread_info.h:143 [inline] copy_from_user include/linux/uaccess.h:146 [inline] ___sys_sendmsg+0x58f/0x8a0 net/socket.c:2003 __sys_sendmmsg+0x1e6/0x5f0 net/socket.c:2116 netlink: 16 bytes leftover after parsing attributes in process `syz-executor2'. SYSC_sendmmsg net/socket.c:2147 [inline] SyS_sendmmsg+0x35/0x60 net/socket.c:2142 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007fd4893dac58 EFLAGS: 00000212 ORIG_RAX: 0000000000000133 netlink: 16 bytes leftover after parsing attributes in process `syz-executor2'. RAX: ffffffffffffffda RBX: 00000000007580d8 RCX: 0000000000452a39 RDX: 0000000000000002 RSI: 00000000201ce000 RDI: 0000000000000015 RBP: 000000000000039b R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000004000 R11: 0000000000000212 R12: 00000000006f3728 dccp_invalid_packet: pskb_may_pull failed R13: 00000000ffffffff R14: 00007fd4893db6d4 R15: 000000000000001f Code: 48 0f 44 da e8 e0 6e c2 ff 48 8b 85 28 ff ff ff 4d 89 f1 4c 89 e9 4c 89 e2 48 89 de 48 c7 c7 00 8e 32 85 49 89 c0 e8 e6 2c ac ff <0f> 0b 48 c7 c0 c0 8b 32 85 eb 96 48 c7 c0 00 8c 32 85 eb 8d 48 RIP: report_usercopy mm/usercopy.c:64 [inline] RSP: ffff8801bf067940 RIP: __check_object_size+0x3a2/0x4f0 mm/usercopy.c:264 RSP: ffff8801bf067940 ---[ end trace 6f57547da7abdca4 ]---