random: sshd: uninitialized urandom read (32 bytes read) random: sshd: uninitialized urandom read (32 bytes read) random: sshd: uninitialized urandom read (32 bytes read) ================================================================== kasan: CONFIG_KASAN_INLINE enabled BUG: KASAN: stack-out-of-bounds in create_huge_pud mm/memory.c:3893 [inline] BUG: KASAN: stack-out-of-bounds in __handle_mm_fault+0x3aa3/0x4460 mm/memory.c:4041 Read of size 8 at addr ffff8801ab353d18 by task sshd/4469 CPU: 1 PID: 4469 Comm: sshd Not tainted 4.18.0-rc3+ #130 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: kasan: GPF could be caused by NULL-ptr deref or user memory access __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c9/0x2b4 lib/dump_stack.c:113 general protection fault: 0000 [#1] SMP KASAN CPU: 0 PID: 4484 Comm: syz-executor008 Not tainted 4.18.0-rc3+ #130 print_address_description+0x6c/0x20b mm/kasan/report.c:256 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:bpf_tcp_close+0x215/0x1050 kernel/bpf/sockmap.c:327 kasan_report_error mm/kasan/report.c:354 [inline] kasan_report.cold.7+0x242/0x2fe mm/kasan/report.c:412 Code: __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:433 ------------[ cut here ]------------ create_huge_pud mm/memory.c:3893 [inline] __handle_mm_fault+0x3aa3/0x4460 mm/memory.c:4041 Bad or missing usercopy whitelist? Kernel memory overwrite attempt detected to SLAB object 'TCPv6' (offset 592, size 64)! WARNING: CPU: 0 PID: 4484 at mm/usercopy.c:81 usercopy_warn+0xf5/0x120 mm/usercopy.c:76 Kernel panic - not syncing: panic_on_warn set ... handle_mm_fault+0x53e/0xc80 mm/memory.c:4133 __do_page_fault+0x620/0xe50 arch/x86/mm/fault.c:1396 do_page_fault+0xf6/0x8c0 arch/x86/mm/fault.c:1471 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1160 RIP: 0033:0x55b971b3e3db Code: 89 5c 24 d0 48 89 6c 24 d8 48 89 fb 4c 89 64 24 e0 4c 89 6c 24 e8 48 89 f5 4c 89 74 24 f0 4c 89 7c 24 f8 48 81 ec b8 00 00 00 <64> 48 8b 04 25 28 00 00 00 48 89 44 24 78 31 c0 49 89 d4 e8 ad d9 RSP: 002b:00007ffda8e118f0 EFLAGS: 00010206 RAX: 000055b971b3e3b0 RBX: 000055b971ee7f30 RCX: 00007efcf2abb3e0 RDX: 000055b971ee6ab0 RSI: 000055b971ee6ad0 RDI: 000055b971ee7f30 RBP: 000055b971ee6ad0 R08: 00007ffda8e119a0 R09: 0101010101010101 R10: 0000000000000008 R11: 0000000000000000 R12: 000055b971d88dc0 R13: 000055b971ee6ad0 R14: 000055b971ee6ab0 R15: 0000000000000050 The buggy address belongs to the page: page:ffffea0006acd4c0 count:1 mapcount:0 mapping:0000000000000000 index:0x0 flags: 0x2fffc0000000000() raw: 02fffc0000000000 dead000000000100 0000000000000000 0000000000000000 raw: 0000000000000000 ffff8801bec434d0 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801ab353c00: f2 f2 f2 f2 00 f2 f2 f2 00 00 00 00 00 00 00 00 ffff8801ab353c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 >ffff8801ab353d00: f1 00 f2 f2 f2 f2 f2 f2 f2 00 f2 f2 f2 f2 f2 f2 ^ ffff8801ab353d80: f2 00 f2 f2 f2 f2 f2 f2 f2 f8 f2 f2 f2 f2 f2 f2 ffff8801ab353e00: f2 00 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 ================================================================== Dumping ftrace buffer: (ftrace buffer empty) Kernel Offset: disabled Rebooting in 86400 seconds..