random: sshd: uninitialized urandom read (32 bytes read, 31 bits of entropy available) random: sshd: uninitialized urandom read (32 bytes read, 31 bits of entropy available) random: nonblocking pool is initialized ================================================================== BUG: KASAN: slab-out-of-bounds in pfkey_msg2xfrm_state net/key/af_key.c:1188 [inline] BUG: KASAN: slab-out-of-bounds in pfkey_add+0x270e/0x3490 net/key/af_key.c:1506 Read of size 2081 at addr ffff8801d19bcc98 by task syzkaller303259/3581 CPU: 0 PID: 3581 Comm: syzkaller303259 Not tainted 4.4.125-g38f41ec #63 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 add6343ee45d5d6b ffff8801cf0b7778 ffffffff81d067bd ffffea0007466f00 ffff8801d19bcc98 0000000000000000 ffff8801d19bce80 ffff8801cf0b79b8 ffff8801cf0b77b0 ffffffff814fea83 ffff8801d19bcc98 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] print_address_description+0x73/0x260 mm/kasan/report.c:252 [] kasan_report_error mm/kasan/report.c:351 [inline] [] kasan_report+0x285/0x370 mm/kasan/report.c:408 [] check_memory_region_inline mm/kasan/kasan.c:325 [inline] [] check_memory_region+0x137/0x190 mm/kasan/kasan.c:332 [] memcpy+0x23/0x50 mm/kasan/kasan.c:367 [] pfkey_msg2xfrm_state net/key/af_key.c:1188 [inline] [] pfkey_add+0x270e/0x3490 net/key/af_key.c:1506 [] pfkey_process+0x68b/0x750 net/key/af_key.c:2834 [] pfkey_sendmsg+0x3a9/0x760 net/key/af_key.c:3678 [] sock_sendmsg_nosec net/socket.c:625 [inline] [] sock_sendmsg+0xca/0x110 net/socket.c:635 [] ___sys_sendmsg+0x6c1/0x7c0 net/socket.c:1962 [] __sys_sendmsg+0xd3/0x190 net/socket.c:1996 [] SYSC_sendmsg net/socket.c:2007 [inline] [] SyS_sendmsg+0x2d/0x50 net/socket.c:2003 [] entry_SYSCALL_64_fastpath+0x22/0x9e Allocated by task 3581: [] save_stack_trace+0x26/0x50 arch/x86/kernel/stacktrace.c:63 [] save_stack+0x43/0xd0 mm/kasan/kasan.c:512 [] set_track mm/kasan/kasan.c:524 [inline] [] kasan_kmalloc+0xad/0xe0 mm/kasan/kasan.c:616 [] kasan_krealloc+0x64/0x80 mm/kasan/kasan.c:654 [] ksize+0x92/0xf0 mm/slub.c:3727 [] __alloc_skb+0x132/0x600 net/core/skbuff.c:237 [] alloc_skb include/linux/skbuff.h:815 [inline] [] pfkey_sendmsg+0x135/0x760 net/key/af_key.c:3665 [] sock_sendmsg_nosec net/socket.c:625 [inline] [] sock_sendmsg+0xca/0x110 net/socket.c:635 [] ___sys_sendmsg+0x6c1/0x7c0 net/socket.c:1962 [] __sys_sendmsg+0xd3/0x190 net/socket.c:1996 [] SYSC_sendmsg net/socket.c:2007 [inline] [] SyS_sendmsg+0x2d/0x50 net/socket.c:2003 [] entry_SYSCALL_64_fastpath+0x22/0x9e Freed by task 1984: [] save_stack_trace+0x26/0x50 arch/x86/kernel/stacktrace.c:63 [] save_stack+0x43/0xd0 mm/kasan/kasan.c:512 [] set_track mm/kasan/kasan.c:524 [inline] [] kasan_slab_free+0x72/0xc0 mm/kasan/kasan.c:589 [] slab_free_hook mm/slub.c:1383 [inline] [] slab_free_freelist_hook mm/slub.c:1405 [inline] [] slab_free mm/slub.c:2859 [inline] [] kfree+0xfc/0x300 mm/slub.c:3749 [] skb_free_head net/core/skbuff.c:571 [inline] [] skb_release_data+0x2ed/0x3b0 net/core/skbuff.c:602 [] skb_release_all+0x4a/0x60 net/core/skbuff.c:661 [] __kfree_skb net/core/skbuff.c:675 [inline] [] consume_skb+0xf3/0x3d0 net/core/skbuff.c:748 [] skb_free_datagram+0x1a/0xe0 net/core/datagram.c:280 [] netlink_recvmsg+0x60b/0xe10 net/netlink/af_netlink.c:1926 [] sock_recvmsg_nosec net/socket.c:727 [inline] [] sock_recvmsg+0x8c/0xc0 net/socket.c:735 [] ___sys_recvmsg+0x26d/0x560 net/socket.c:2116 [] __sys_recvmsg+0xd3/0x190 net/socket.c:2162 [] SYSC_recvmsg net/socket.c:2174 [inline] [] SyS_recvmsg+0x2d/0x50 net/socket.c:2169 [] entry_SYSCALL_64_fastpath+0x22/0x9e The buggy address belongs to the object at ffff8801d19bcc80 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 24 bytes inside of 512-byte region [ffff8801d19bcc80, ffff8801d19bce80) The buggy address belongs to the page: INFO: trying to register non-static key. the code is fine but needs lockdep annotation. turning off the locking correctness validator. CPU: 1 PID: 3558 Comm: getty Not tainted 4.4.125-g38f41ec #63 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 8f21700d52bfbaec ffff8801d0b5f930 ffffffff81d067bd ffffffff8515d9c0 0000000000000000 ffff8800b434b000 ffff8801cd413430 0000000000000000 ffff8801d0b5f940 ffffffff8141b6f3 ffff8801d0b5faf0 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] register_lock_class.part.26+0x32/0x36 kernel/locking/lockdep.c:762 [] register_lock_class kernel/locking/lockdep.c:767 [inline] [] __lock_acquire+0x3a49/0x4b50 kernel/locking/lockdep.c:3101 [] lock_acquire+0x15e/0x460 kernel/locking/lockdep.c:3592 [] down_write+0x41/0xa0 kernel/locking/rwsem.c:49 [] i_mmap_lock_write include/linux/fs.h:502 [inline] [] unlink_file_vma+0x75/0xb0 mm/mmap.c:273 [] free_pgtables+0x226/0x330 mm/memory.c:555 [] exit_mmap+0x1e3/0x3a0 mm/mmap.c:2928 [] __mmput kernel/fork.c:715 [inline] [] mmput+0xf8/0x2d0 kernel/fork.c:735 [] exit_mm kernel/exit.c:444 [inline] [] do_exit+0x714/0x2a10 kernel/exit.c:746 [] do_group_exit+0x108/0x320 kernel/exit.c:889 [] SYSC_exit_group kernel/exit.c:900 [inline] [] SyS_exit_group+0x1d/0x20 kernel/exit.c:898 [] entry_SYSCALL_64_fastpath+0x22/0x9e BUG: unable to handle kernel paging request at fffffffe115da5c0 IP: [] cpuacct_charge+0x155/0x390 kernel/sched/cpuacct.c:247 PGD 420f067 PUD 0 Oops: 0000 [#1] PREEMPT SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 3468 Comm: rsyslogd Not tainted 4.4.125-g38f41ec #63 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8801d18b6000 task.stack: ffff8801d1018000 RIP: 0010:[] [] cpuacct_charge+0x155/0x390 kernel/sched/cpuacct.c:247 RSP: 0000:ffff8801d101f730 EFLAGS: 00010046 RAX: 1ffffffff0855007 RBX: 0000000000018528 RCX: ffffffff847ec9c0 RDX: fffffbffc22bb4b8 RSI: fffffffe115da5c0 RDI: ffffffff842a8038 RBP: ffff8801d101f778 R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff83844600 R11: 1ffff1003a203eb2 R12: ffffffff842a7f60 R13: dffffc0000000000 R14: 00000000568ecc73 R15: ffffffffd19bdb80 FS: 00007fcac7dff700(0000) GS:ffff8801db300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffe115da5c0 CR3: 00000000b6406000 CR4: 0000000000160670 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffffffff8122b960 0000000000000046 ffff8801d101f780 ffffffff81d665bb ffff8801cf961860 ffffffff83844600 00000000568ecc73 ffff8801cf9618b0 ffff8801cf961800 ffff8801d101f7c8 ffffffff811dd0c7 ffff8801db21f4c0 Call Trace: [] update_curr+0x2c7/0x6c0 kernel/sched/fair.c:882 [] enqueue_entity kernel/sched/fair.c:3511 [inline] [] enqueue_task_fair+0x313/0x2940 kernel/sched/fair.c:4694 [] enqueue_task kernel/sched/core.c:858 [inline] [] activate_task+0x148/0x270 kernel/sched/core.c:874 [] ttwu_activate kernel/sched/core.c:1736 [inline] [] ttwu_do_activate.constprop.131+0xbf/0x1e0 kernel/sched/core.c:1789 [] ttwu_queue kernel/sched/core.c:1934 [inline] [] try_to_wake_up+0x68d/0xf60 kernel/sched/core.c:2068 [] wake_up_state+0x10/0x20 kernel/sched/core.c:2148 [] signal_wake_up_state+0x44/0x70 kernel/signal.c:659 [] signal_wake_up include/linux/sched.h:3323 [inline] [] zap_process+0x1c9/0x290 fs/coredump.c:301 [] zap_threads fs/coredump.c:320 [inline] [] coredump_wait fs/coredump.c:397 [inline] [] do_coredump+0x664/0x2980 fs/coredump.c:562 [] get_signal+0x5c2/0x1550 kernel/signal.c:2311 [] do_signal+0x8b/0x1d40 arch/x86/kernel/signal.c:712 [] exit_to_usermode_loop+0x11a/0x160 arch/x86/entry/common.c:248 [] prepare_exit_to_usermode+0xe3/0x100 arch/x86/entry/common.c:283 [] retint_user+0x8/0x3c Code: 49 8d bc 24 d8 00 00 00 48 89 f8 48 c1 e8 03 42 80 3c 28 00 0f 85 9e 01 00 00 49 8b 9c 24 d8 00 00 00 80 3a 00 0f 85 0a 02 00 00 <4a> 03 1c f9 48 89 d8 48 c1 e8 03 42 80 3c 28 00 0f 85 cf 01 00 RIP [] cpuacct_charge+0x155/0x390 kernel/sched/cpuacct.c:247 RSP CR2: fffffffe115da5c0 ---[ end trace f0cddb682402c4b7 ]---